CN114239076A - Block chain-based electronic signature file processing method and device, and computer equipment - Google Patents

Block chain-based electronic signature file processing method and device, and computer equipment Download PDF

Info

Publication number
CN114239076A
CN114239076A CN202111388697.0A CN202111388697A CN114239076A CN 114239076 A CN114239076 A CN 114239076A CN 202111388697 A CN202111388697 A CN 202111388697A CN 114239076 A CN114239076 A CN 114239076A
Authority
CN
China
Prior art keywords
electronic signature
file
abstract
signature file
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111388697.0A
Other languages
Chinese (zh)
Inventor
吴勤勤
余志文
邓晓智
谭慧娟
肖健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Power Grid Co Ltd
Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Original Assignee
Guangdong Power Grid Co Ltd
Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd filed Critical Guangdong Power Grid Co Ltd
Priority to CN202111388697.0A priority Critical patent/CN114239076A/en
Publication of CN114239076A publication Critical patent/CN114239076A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/172Caching, prefetching or hoarding of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • G06F16/1834Distributed file systems implemented based on peer-to-peer networks, e.g. gnutella
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to an electronic signature file processing method and device based on a block chain and computer equipment. The method comprises the following steps: acquiring an electronic signature file, and determining a first characteristic abstract corresponding to the electronic signature file; the first characteristic abstract is obtained based on the electronic signature file; generating a plurality of block files corresponding to the electronic signature file based on the first characteristic abstract, performing uplink processing on the first characteristic abstract, storing the first characteristic abstract in a block chain, and storing the block files in a plurality of servers of an interplanetary file system (IPFS). By adopting the method, the safety guarantee of the uplink data can be realized, the third party can be effectively prevented from being tampered, and the safety and uniqueness of the content of the electronic signature file are ensured.

Description

Block chain-based electronic signature file processing method and device, and computer equipment
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a block chain-based electronic signature file processing method and apparatus, a computer device, and a storage medium.
Background
With the popularization and standardization of online office work, electronic document processing related to online office work is receiving more and more attention. The electronic document is a document with certain effectiveness guarantee after being signed by an electronic signature, and in the prior art, the important document is easily tampered by a third party when being stored on the network, so that the safety and uniqueness of the content are difficult to guarantee.
Disclosure of Invention
In view of the above, it is necessary to provide a block chain-based electronic signature file processing method, apparatus, computer device and storage medium capable of solving the above problems.
A block chain based electronic signature file processing method, the method comprising:
acquiring an electronic signature file, and determining a first characteristic abstract corresponding to the electronic signature file; the first characteristic abstract is obtained based on the electronic signature file;
generating a plurality of block files corresponding to the electronic signature file based on the first characteristic abstract, performing uplink processing on the first characteristic abstract, storing the first characteristic abstract in a block chain, and storing the block files in a plurality of servers of an interplanetary file system (IPFS).
In one embodiment, the method further comprises:
when a call request for the electronic signature file is obtained, a second feature abstract is obtained from the call request;
determining a file identifier corresponding to the second characteristic abstract, and acquiring the first characteristic abstract stored in a block chain according to the file identifier;
and comparing the second feature abstract with the first feature abstract, and if the second feature abstract is consistent with the first feature abstract, acquiring an electronic signature file corresponding to the first feature abstract from the interplanetary file system (IPFS).
In one embodiment, the determining the first feature digest corresponding to the electronic signature file includes:
determining sensitive data corresponding to the electronic signature file;
obtaining a first characteristic abstract corresponding to the electronic signature file according to preset Hash operation information and the sensitive data; the first characteristic abstract is a hash value, and the hash operation information is used for calculating the corresponding hash value through the sensitive data.
In one embodiment, the obtaining a first feature digest corresponding to the electronic signature file according to preset hash operation information and the sensitive data includes:
calculating to obtain a first characteristic abstract corresponding to the electronic signature file according to preset Hash operation information and the sensitive data by adopting an SHA256 algorithm; the first feature digest has 32 bytes.
In one embodiment, the uplink processing the first feature digest includes:
determining digital signature information;
and performing uplink processing on the first characteristic abstract by adopting the digital signature information so as to prevent transaction data corresponding to the uplink process of the first characteristic abstract from being tampered by a third party.
In one embodiment, the digital signature information is composed of a plurality of elements corresponding to numerical values, and the determining the digital signature information includes:
acquiring a preset random number and point information, and determining a first element according to the random number and the point information;
determining a second element based on the random number and the information to be encrypted, and determining a third element based on the point information;
and sequentially arranging the numerical values corresponding to the first element, the second element and the third element to obtain the digital signature information.
In one embodiment, the obtaining the electronic signature file includes:
acquiring the electronic signature file through the cloud signature server; the cloud signature server is used for receiving an encrypted original file, determining electronic signature information corresponding to the original file, acquiring confirmation information corresponding to the electronic signature information, and performing electronic signature deployment on the original file according to the confirmation information and the electronic signature information to generate the electronic signature file.
An electronic signature file processing device based on a block chain, the device comprising:
the characteristic abstract determining module is used for acquiring the electronic signature file and determining a first characteristic abstract corresponding to the electronic signature file; the first characteristic abstract is obtained based on the electronic signature file;
and the uplink storage module is used for generating a plurality of block files corresponding to the electronic signature file based on the first characteristic abstract, performing uplink processing on the first characteristic abstract, storing the block files in a block chain, and storing the block files in a plurality of servers of an interplanetary file system (IPFS).
A computer device comprising a memory storing a computer program and a processor implementing the steps of the block chain based electronic signature file processing method as described above when the processor executes the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of block-chain-based electronic signature file processing as described above.
According to the electronic signature file processing method and device based on the block chain, the first characteristic abstract corresponding to the electronic signature file is determined by obtaining the electronic signature file, the first characteristic abstract is obtained based on the electronic signature file, then the plurality of block files corresponding to the electronic signature file are generated based on the first characteristic abstract, the first characteristic abstract is subjected to chain connection processing and stored in the block chain, and the plurality of block files are stored in the plurality of servers of an interplanetary file system (IPFS), so that the safety guarantee of chain connection data is realized, third party tampering can be effectively prevented, and the safety and uniqueness of the contents of the electronic signature file are guaranteed.
Drawings
FIG. 1 is a diagram of an application environment of a block chain-based electronic signature file processing method in an embodiment;
FIG. 2 is a flowchart illustrating a block chain-based electronic signature file processing method according to an embodiment;
FIG. 3 is a flowchart illustrating the feature digest determination step in one embodiment;
FIG. 4 is a flowchart illustrating a characteristic summary uplink procedure according to an embodiment;
FIG. 5 is a block diagram of an apparatus for processing block chain-based electronic signature files in one embodiment;
FIG. 6 is a diagram of the internal structure of a computer device, in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The block chain-based electronic signature file processing method can be applied to the application environment shown in fig. 1. Specifically, the electronic signature file can be acquired through the cloud signature server 103, then the feature digest corresponding to the electronic signature file can be determined, and then the feature digest can be linked and stored in the block chain 101, the block chain 101 can be implemented by an independent server or a server cluster composed of a plurality of servers, and a plurality of block files corresponding to the electronic signature file can be stored in a plurality of servers of the interplanetary file system (IPFS) 102.
Blockchain 101 may establish a network connection and communicate with an interplanetary file system (IPFS)102, and upon invocation of an electronic signature file, the electronic signature file may be invoked from interplanetary file system (IPFS)102 by receiving a feature digest consistent with the feature digest stored in blockchain 101.
In one embodiment, as shown in fig. 2, there is provided a block chain-based electronic signature file processing method, which is described by taking the method as an example applied to fig. 1, and includes the following steps:
step 201, acquiring an electronic signature file, and determining a first feature abstract corresponding to the electronic signature file; the first characteristic abstract is obtained based on the electronic signature file;
as an example, the electronic signature file may be an electronic file deployed by electronic signature, such as a contract file with electronic signature, and the electronic file has a certain importance.
In practical application, the electronic signature file can be obtained through the cloud signature server, the electronic signature file can be an electronic file which is already subjected to electronic signature deployment, and then a first characteristic abstract corresponding to the electronic signature file can be determined, and the first characteristic abstract can be obtained based on the electronic signature file and has uniqueness.
Specifically, based on the electronic signature file, the first feature digest corresponding to the electronic signature file may be obtained through a hash operation, for example, the corresponding hash digest may be generated according to the electronic signature file.
Step 202, generating a plurality of block files corresponding to the electronic signature file based on the first feature abstract, performing uplink processing on the first feature abstract, storing the first feature abstract in a block chain, and storing the plurality of block files in a plurality of servers of an interplanetary file system (IPFS).
After the first feature abstract is obtained, a plurality of block files corresponding to the electronic signature file can be generated based on the first feature abstract, and then the first feature abstract can be subjected to uplink transmission processing and stored in a block chain, and the plurality of block files can be stored in a plurality of servers of an interplanetary file system (IPFS) so as to complete data uplink transmission.
Specifically, by combining the IPFS decentralized storage technology, the electronic signature file may be divided into a plurality of small blocks based on the first feature digest, and then the small blocks may be dispersedly stored in a plurality of servers of an interplanetary file system (IPFS), and the first feature digest may be uplinked in a block chain.
In an example, an interplanetary file system (IPFS) may also calculate a hash digest corresponding to the electronically signed file while the electronically signed file is being partitioned and stored, and may link the hash digest.
In an optional embodiment, in the process of adopting the IPFS decentralized storage technology, some important files can be stored through a private database.
In the embodiment of the application, the first feature abstract corresponding to the electronic signature file is determined by acquiring the electronic signature file, the first feature abstract is obtained based on the electronic signature file, then the plurality of block files corresponding to the electronic signature file are generated based on the first feature abstract, the first feature abstract is subjected to uplink transmission and stored in a block chain, and the plurality of block files are stored in a plurality of servers of an interstellar file system (IPFS), so that the safety guarantee of uplink data is realized, third party tampering can be effectively prevented, and the safety and uniqueness of the content of the electronic signature file are ensured.
In one embodiment, the method may further comprise the steps of:
when a call request for the electronic signature file is obtained, a second feature abstract is obtained from the call request;
in the specific implementation, the electronic signature file is stored in an interplanetary file system (IPFS) in blocks, and after a first feature abstract corresponding to the electronic signature file is linked and stored in a block chain, the electronic signature file can be called based on the first feature abstract, and then when a call request for the electronic signature file is obtained, a second feature abstract is obtained from the call request, so that the second feature abstract and the first feature abstract of the linked chain are further compared.
Determining a file identifier corresponding to the second characteristic abstract, and acquiring the first characteristic abstract stored in a block chain according to the file identifier;
the file identifier may be used to indicate an identifier of the electronic signature file, such as a file name of the electronic signature file, each electronic signature file may correspond to a file identifier, and the feature digest corresponding to the electronic signature file may have a corresponding relationship with the file identifier.
After the second feature abstract is obtained, a file identifier corresponding to the second feature abstract, that is, a file identifier of the electronic signature file to be called specified by the call request, may be determined, and then the first feature abstract stored in the block chain may be obtained according to the file identifier.
Specifically, the feature digest stored in the uplink may be searched in the blockchain according to a corresponding relationship between the preset file identifier and the first feature digest, and the first feature digest may be further obtained from the blockchain.
And comparing the second feature abstract with the first feature abstract, and if the second feature abstract is consistent with the first feature abstract, acquiring an electronic signature file corresponding to the first feature abstract from the interplanetary file system (IPFS).
After the second feature abstract and the first feature abstract are obtained, the second feature abstract and the first feature abstract of the uplink can be compared, if the second feature abstract is consistent with the first feature abstract, the accurate feature abstract of the electronic signature file to be called is confirmed to be obtained, and then the electronic signature file corresponding to the first feature abstract can be obtained from an interplanetary file system (IPFS).
For example, after determining to obtain an accurate hash digest of the electronic signature file to be called, the electronic signature file may be called through an interplanetary file system (IPFS) according to the hash digest.
When the call request for the electronic signature file is acquired through the embodiment, the second feature abstract is acquired from the call request, then the file identification corresponding to the second feature abstract is determined, the first feature abstract stored in the block chain is acquired according to the file identification, the second feature abstract is compared with the first feature abstract, if the second feature abstract is consistent with the first feature abstract, the electronic signature file corresponding to the first feature abstract is acquired from an interplanetary file system (IPFS), and once the electronic signature file is tampered, the corresponding hash abstract is not matched with the hash abstract stored in the chain, so that the electronic signature file can be prevented from being tampered, and the reliability is improved.
In one embodiment, as shown in fig. 3, the determining the first feature digest corresponding to the electronic signature file may include the following steps:
step 301, determining sensitive data corresponding to the electronic signature file;
in a specific implementation, sensitive data corresponding to the electronic signature file may be determined, so as to further generate a first feature summary corresponding to the electronic signature file based on the sensitive data.
Step 302, obtaining a first feature abstract corresponding to the electronic signature file according to preset hash operation information and the sensitive data; the first characteristic abstract is a hash value, and the hash operation information is used for calculating the corresponding hash value through the sensitive data.
The first feature digest may be a hash value, which may be obtained by performing a hash operation on the content of the electronic signature file.
After the sensitive data are obtained, the first feature digest corresponding to the electronic signature file can be obtained according to preset hash operation information and the sensitive data, and since the hash operation information can be used for calculating the corresponding hash value through the sensitive data, the hash value can be obtained by performing hash operation based on the sensitive data and serves as the first feature digest.
For example, the first feature digest may be obtained as follows:
C=H(v)
wherein, H can be a one-way hash algorithm; v may be sensitive data; c may be a hash result, i.e. a hash value.
For different input sensitive data v, the hash results C obtained through hash operation are different, and when the sensitive data v is randomly input, the unique hash result C can be obtained, is uniformly distributed and cannot be predicted, and has collision resistance.
Based on the unidirectionality of the one-way hash algorithm, the sensitive data v is difficult to reversely deduce through the hash value C, so that certain concealment is provided, and based on the collision resistance of the one-way hash algorithm, different sensitive data v are difficult to find to obtain the same hash value C, and certain binding is also provided.
The sensitive data corresponding to the electronic signature file is determined through the embodiment, and then the first characteristic abstract corresponding to the electronic signature file is obtained according to the preset hash operation information and the sensitive data, wherein the first characteristic abstract is a hash value, and the hash operation information is used for calculating the corresponding hash value through the sensitive data, so that the information can be ensured not to be tampered in the transmission process, and the integrity of the information can be verified.
In an embodiment, the obtaining a first feature digest corresponding to the electronic signature file according to preset hash operation information and the sensitive data may include the following steps:
calculating to obtain a first characteristic abstract corresponding to the electronic signature file according to preset Hash operation information and the sensitive data by adopting an SHA256 algorithm; the first feature digest has 32 bytes.
In practical application, an SHA256 algorithm may be adopted, and a first feature digest corresponding to the electronic signature file is obtained through calculation according to preset hash operation information and sensitive data, where the first feature digest may have 32 bytes.
For example, when the first feature digest corresponding to the electronic signature file is generated, the SHA256 algorithm may be adopted to perform a hash operation based on the content of the electronic signature file, and then a 32-byte hash digest may be calculated to be used as the first feature digest for the uplink processing.
In an alternative embodiment, after the SHA256 algorithm is used to obtain the 32-byte first feature digest, the first feature digest may be encrypted according to the importance of the electronic signature file and the related security protocol.
According to the embodiment, the SHA256 algorithm is adopted, the first characteristic abstract corresponding to the electronic signature file is obtained through calculation according to the preset hash operation information and the sensitive data, the first characteristic abstract has 32 bytes, the hash abstract with the short hash value length can be obtained, and the uplink storage of the characteristic abstract in a block chain is facilitated.
In an embodiment, as shown in fig. 4, the uplink processing on the first feature digest may include the following steps:
step 401, determining digital signature information;
in practical applications, the uplink processing may be performed by determining the digital signature information and combining the digital signature information and the first feature digest.
Step 402, performing uplink processing on the first feature abstract by using the digital signature information to prevent transaction data corresponding to the uplink process of the first feature abstract from being tampered by a third party.
After the digital signature information is obtained, the first feature abstract can be subjected to uplink processing by adopting the digital signature information, so that transaction data corresponding to the uplink process of the first feature abstract can be prevented from being tampered by a third party.
For example, the first feature digest needs to be transacted through data in an uplink process, and the first feature digest is broadcasted and packaged to a block at a specific time position in the transaction process, and the transaction process can combine digital signature information to support security, so that specific transaction data cannot be tampered by a third party.
The digital signature information is determined through the embodiment, and the digital signature information is adopted to carry out uplink processing on the first characteristic abstract, so that the transaction data corresponding to the uplink process of the first characteristic abstract is prevented from being tampered by a third party, the specific transaction data can be guaranteed not to be tampered by the third party, and the uplink safety of the characteristic abstract is improved.
In one embodiment, the digital signature information may be composed of values corresponding to a plurality of elements, and the determining the digital signature information may include the following steps:
acquiring a preset random number and point information, and determining a first element according to the random number and the point information;
in practical applications, the digital signature information may be composed of values corresponding to a plurality of elements, and when the digital signature information is generated, a preset random number and point information may be acquired, and the first element may be determined according to the random number and the point information.
For example, the first element may be determined as follows:
1. generating a random number k (namely a preset random number) with the value range of [1, order-1] by adopting a gen _ k () function;
2、Point.mult(k,G),Point.mult(k,G)=Q_point=(x,y),
mult (num, Point) is multiplication of points, parameters are number num and Point, and an obtained result is one Point (x, y); the G-point (i.e., point information) may include three parameters: x, y, order, which can be specifically as follows:
G.x0x79……98,
G.y0x48……B8,
G.order0xFF……41;
3. calculating _ rem (x, order) ═ r (i.e., the first element), and if r is 0, the random number k may be regenerated;
wherein, the calculated _ rem (num1, num2) is the operation of taking residue; x and order can be parameters of the G point.
Determining a second element based on the random number and the information to be encrypted, and determining a third element based on the point information;
in an example, the second element may be determined based on the random number and the information to be encrypted, and the third element may be determined based on the point information, and the second element and the third element may be determined as follows:
calculate _ s (k, hash _ and _ sth (m), priv) ═ s (i.e., the second element), and if s is 0, the random number k may be regenerated;
where k is a random number, and hash _ and _ sth (m) is a hash function, that is, a specific value is obtained for the information m to be encrypted (i.e., the information to be encrypted).
v (i.e., the third element) is 27+ calculated _ rem (y, 2),
the calculated _ rem (num1, num2) is a remainder operation, and y may be a parameter of point G.
And sequentially arranging the numerical values corresponding to the first element, the second element and the third element to obtain the digital signature information.
After the first element, the second element, and the third element are obtained, the respective corresponding values of the first element, the second element, and the third element may be sequentially arranged, so as to obtain the digital signature information. For example, the values of the first element r, the second element s, and the third element v may be sequentially connected to obtain the digital signature information.
By the embodiment, the preset random number and the point information are obtained, the first element is determined according to the random number and the point information, the second element is determined based on the random number and the information to be encrypted, the third element is determined based on the point information, and the numerical values corresponding to the first element, the second element and the third element are sequentially arranged to obtain the digital signature information, so that the characteristic abstract of the uplink can be prevented from being tampered by a third party, and the data security is ensured.
In one embodiment, the obtaining the electronic signature file may include the following steps:
acquiring the electronic signature file through the cloud signature server; the cloud signature server is used for receiving an encrypted original file, determining electronic signature information corresponding to the original file, acquiring confirmation information corresponding to the electronic signature information, and performing electronic signature deployment on the original file according to the confirmation information and the electronic signature information to generate the electronic signature file.
In practical application, the electronic signature file can be acquired through the cloud signature server, the cloud signature server can be used for receiving the encrypted original file, then electronic signature information corresponding to the original file can be determined, confirmation information corresponding to the electronic signature information can be acquired, and then electronic signature deployment can be performed on the original file according to the confirmation information and the electronic signature information to generate the electronic signature file.
For example, a file to be electronically signed (i.e., an original file) can be encrypted and uploaded to a cloud signature server, electronic signature deployment can be performed through confirmation of users of both parties involved in the file to be electronically signed, that is, information of a holder of the electronic signature can be input to perform electronic signature validity confirmation (i.e., confirmation information), and then the file after electronic signature deployment (i.e., an electronic signature file) can be exported.
In an optional embodiment, for the electronic signature deployment process, a third-party software except the cloud signature server may be used for assistance, that is, a real-time video sharing technology may be used for assistance through screen sharing and monitoring of peripheral equipment.
According to the embodiment, the electronic signature file is obtained through the cloud signature server, the cloud signature server is used for receiving the encrypted original file, determining the electronic signature information corresponding to the original file, obtaining the confirmation information corresponding to the electronic signature information, performing electronic signature deployment on the original file according to the confirmation information and the electronic signature information, generating the electronic signature file, and ensuring that the chaining data is confirmed by an electronic signature holder so that the electronic signature file has the characteristic of being incapable of being forged.
It should be understood that although the various steps in the flow charts of fig. 1-4 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1-4 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 5, there is provided an electronic signature file processing apparatus based on a block chain, including:
the feature abstract determining module 501 is configured to acquire an electronic signature file and determine a first feature abstract corresponding to the electronic signature file; the first characteristic abstract is obtained based on the electronic signature file;
a cochain storage module 502, configured to generate a plurality of block files corresponding to the electronic signature file based on the first feature digest, perform cochain processing on the first feature digest, store the result in a block chain, and store the plurality of block files in a plurality of servers of an interplanetary file system (IPFS).
In one embodiment, the apparatus further comprises:
the second characteristic abstract acquiring module is used for acquiring a second characteristic abstract from a calling request when the calling request of the electronic signature file is acquired;
the first characteristic abstract acquiring module is used for determining a file identifier corresponding to the second characteristic abstract and acquiring the first characteristic abstract stored in the block chain according to the file identifier;
and the comparison module is used for comparing the second characteristic abstract with the first characteristic abstract, and if the second characteristic abstract is consistent with the first characteristic abstract, acquiring an electronic signature file corresponding to the first characteristic abstract from the interplanetary file system (IPFS).
In one embodiment, the feature summary determination module 501 includes:
the sensitive data determining submodule is used for determining the sensitive data corresponding to the electronic signature file;
the characteristic abstract obtaining submodule is used for obtaining a first characteristic abstract corresponding to the electronic signature file according to preset Hash operation information and the sensitive data; the first characteristic abstract is a hash value, and the hash operation information is used for calculating the corresponding hash value through the sensitive data.
In one embodiment, the feature summarization obtaining sub-module comprises:
the characteristic abstract obtaining unit is used for obtaining a first characteristic abstract corresponding to the electronic signature file through calculation according to preset Hash operation information and the sensitive data by adopting an SHA256 algorithm; the first feature digest has 32 bytes.
In one embodiment, the uplink storage module 502 includes:
the digital signature information determining submodule is used for determining digital signature information;
and the characteristic abstract uplink module is used for performing uplink processing on the first characteristic abstract by adopting the digital signature information so as to prevent transaction data corresponding to the uplink process of the first characteristic abstract from being tampered by a third party.
In one embodiment, the digital signature information is composed of a plurality of elements corresponding to numerical values, and the digital signature information determination sub-module includes:
the first element determining unit is used for acquiring a preset random number and point information and determining a first element according to the random number and the point information;
a second element and third element determining unit configured to determine a second element based on the random number and information to be encrypted, and determine a third element based on the point information;
and the digital signature information obtaining unit is used for sequentially arranging the respective corresponding numerical values of the first element, the second element and the third element to obtain the digital signature information.
In one embodiment, the feature summary determination module 501 includes:
the electronic signature file acquisition submodule is used for acquiring the electronic signature file through the cloud signature server; the cloud signature server is used for receiving an encrypted original file, determining electronic signature information corresponding to the original file, acquiring confirmation information corresponding to the electronic signature information, and performing electronic signature deployment on the original file according to the confirmation information and the electronic signature information to generate the electronic signature file.
In the embodiment of the application, the first feature abstract corresponding to the electronic signature file is determined by acquiring the electronic signature file, the first feature abstract is obtained based on the electronic signature file, then the plurality of block files corresponding to the electronic signature file are generated based on the first feature abstract, the first feature abstract is subjected to uplink transmission and stored in a block chain, and the plurality of block files are stored in a plurality of servers of an interstellar file system (IPFS), so that the safety guarantee of uplink data is realized, third party tampering can be effectively prevented, and the safety and uniqueness of the content of the electronic signature file are ensured.
For specific definition of an electronic signature file processing apparatus based on a block chain, refer to the above definition of an electronic signature file processing method based on a block chain, which is not described herein again. The modules in the block chain-based electronic signature file processing device can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 6. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing the block chain-based electronic signature file processing data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a block chain-based electronic signature file processing method.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
acquiring an electronic signature file, and determining a first characteristic abstract corresponding to the electronic signature file; the first characteristic abstract is obtained based on the electronic signature file;
generating a plurality of block files corresponding to the electronic signature file based on the first characteristic abstract, performing uplink processing on the first characteristic abstract, storing the first characteristic abstract in a block chain, and storing the block files in a plurality of servers of an interplanetary file system (IPFS).
In one embodiment, the processor when executing the computer program also performs the steps of the block chain-based electronic signature file processing in the other embodiments described above.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring an electronic signature file, and determining a first characteristic abstract corresponding to the electronic signature file; the first characteristic abstract is obtained based on the electronic signature file;
generating a plurality of block files corresponding to the electronic signature file based on the first characteristic abstract, performing uplink processing on the first characteristic abstract, storing the first characteristic abstract in a block chain, and storing the block files in a plurality of servers of an interplanetary file system (IPFS).
In one embodiment, the computer program when executed by the processor further implements the steps of the block chain-based electronic signature file processing method in the other embodiments described above.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A block chain-based electronic signature file processing method is characterized by comprising the following steps:
acquiring an electronic signature file, and determining a first characteristic abstract corresponding to the electronic signature file; the first characteristic abstract is obtained based on the electronic signature file;
generating a plurality of block files corresponding to the electronic signature file based on the first characteristic abstract, performing uplink processing on the first characteristic abstract, storing the first characteristic abstract in a block chain, and storing the block files in a plurality of servers of an interplanetary file system (IPFS).
2. The method of claim 1, further comprising:
when a call request for the electronic signature file is obtained, a second feature abstract is obtained from the call request;
determining a file identifier corresponding to the second characteristic abstract, and acquiring the first characteristic abstract stored in a block chain according to the file identifier;
and comparing the second feature abstract with the first feature abstract, and if the second feature abstract is consistent with the first feature abstract, acquiring an electronic signature file corresponding to the first feature abstract from the interplanetary file system (IPFS).
3. The method according to claim 1 or 2, wherein the determining the first feature digest corresponding to the electronic signature file comprises:
determining sensitive data corresponding to the electronic signature file;
obtaining a first characteristic abstract corresponding to the electronic signature file according to preset Hash operation information and the sensitive data; the first characteristic abstract is a hash value, and the hash operation information is used for calculating the corresponding hash value through the sensitive data.
4. The method according to claim 3, wherein obtaining the first feature digest corresponding to the electronic signature file according to preset hash operation information and the sensitive data comprises:
calculating to obtain a first characteristic abstract corresponding to the electronic signature file according to preset Hash operation information and the sensitive data by adopting an SHA256 algorithm; the first feature digest has 32 bytes.
5. The method according to claim 1 or 2, wherein said uplink processing said first signature digest comprises:
determining digital signature information;
and performing uplink processing on the first characteristic abstract by adopting the digital signature information so as to prevent transaction data corresponding to the uplink process of the first characteristic abstract from being tampered by a third party.
6. The method of claim 5, wherein the digital signature information is composed of values corresponding to a plurality of elements, and wherein the determining the digital signature information comprises:
acquiring a preset random number and point information, and determining a first element according to the random number and the point information;
determining a second element based on the random number and the information to be encrypted, and determining a third element based on the point information;
and sequentially arranging the numerical values corresponding to the first element, the second element and the third element to obtain the digital signature information.
7. The method of claim 1 or 2, wherein the obtaining an electronic signature file comprises:
acquiring the electronic signature file through the cloud signature server; the cloud signature server is used for receiving an encrypted original file, determining electronic signature information corresponding to the original file, acquiring confirmation information corresponding to the electronic signature information, and performing electronic signature deployment on the original file according to the confirmation information and the electronic signature information to generate the electronic signature file.
8. An apparatus for processing an electronic signature file based on a block chain, the apparatus comprising:
the characteristic abstract determining module is used for acquiring the electronic signature file and determining a first characteristic abstract corresponding to the electronic signature file; the first characteristic abstract is obtained based on the electronic signature file;
and the uplink storage module is used for generating a plurality of block files corresponding to the electronic signature file based on the first characteristic abstract, performing uplink processing on the first characteristic abstract, storing the block files in a block chain, and storing the block files in a plurality of servers of an interplanetary file system (IPFS).
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor when executing the computer program implements the steps of the block chain-based electronic signature file processing method according to any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the block chain-based electronic signature file processing method according to any one of claims 1 to 7.
CN202111388697.0A 2021-11-22 2021-11-22 Block chain-based electronic signature file processing method and device, and computer equipment Pending CN114239076A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111388697.0A CN114239076A (en) 2021-11-22 2021-11-22 Block chain-based electronic signature file processing method and device, and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111388697.0A CN114239076A (en) 2021-11-22 2021-11-22 Block chain-based electronic signature file processing method and device, and computer equipment

Publications (1)

Publication Number Publication Date
CN114239076A true CN114239076A (en) 2022-03-25

Family

ID=80750430

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111388697.0A Pending CN114239076A (en) 2021-11-22 2021-11-22 Block chain-based electronic signature file processing method and device, and computer equipment

Country Status (1)

Country Link
CN (1) CN114239076A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115549978A (en) * 2022-09-04 2022-12-30 昆明理工大学 Block chain-based electronic signature verification system utilizing WASM and IPFS

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115549978A (en) * 2022-09-04 2022-12-30 昆明理工大学 Block chain-based electronic signature verification system utilizing WASM and IPFS
CN115549978B (en) * 2022-09-04 2024-02-20 昆明理工大学 Electronic signature based on blockchain utilizes WASM and IPFS's deposit verification system

Similar Documents

Publication Publication Date Title
CN110222533B (en) Distributed data security application method and system and electronic equipment
CN111211911B (en) Collaborative signature method, device, equipment and system
CN111563365B (en) Method and device for processing modification information of test standard worksheet and computer equipment
CN113438134B (en) Request message processing method, device, server and medium
CN109902495B (en) Data fusion method and device
EP3591563A1 (en) Verifying the integrity of a plurality of data blocks
CN110555769A (en) Block chain transaction data processing method and device, computer equipment and storage medium
CN110727949A (en) Data storage method and device, computer equipment and storage medium
CN112860778A (en) Database management method, device, equipment and medium for desktop application program
CN109145651B (en) Data processing method and device
CN111796936A (en) Request processing method and device, electronic equipment and medium
CN112069526A (en) Block chain-based account attribute processing method and device and storage medium
CN110598452B (en) Evidence information processing method, device, storage medium and equipment based on blockchain
CN113779545A (en) Data cross-process sharing method, terminal equipment and computer readable storage medium
CN114239076A (en) Block chain-based electronic signature file processing method and device, and computer equipment
CN110597820A (en) Block chain based information processing method and device, storage medium and equipment
CN113312630B (en) Method and device for realizing trusted scheduling
CN107133517B (en) Data recovery method based on data encryption and calculation in memory
CN112966229A (en) Method and device for safely operating SDK
CN109710692B (en) User information processing method and device in block chain network and storage medium
CN111652720A (en) Cloud evidence obtaining method and device, computer equipment and storage medium
CN114238914A (en) Digital certificate application system, method, device, computer equipment and storage medium
CN113159952B (en) Method, system, device and storage medium for storing digital assets based on blockchain
CN111597573B (en) Page embedding method and device, computer equipment and storage medium
CN114896621A (en) Application service acquisition method, encryption method, device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination