CN116232600A - Block chain-based data security storage method and system - Google Patents
Block chain-based data security storage method and system Download PDFInfo
- Publication number
- CN116232600A CN116232600A CN202211675743.XA CN202211675743A CN116232600A CN 116232600 A CN116232600 A CN 116232600A CN 202211675743 A CN202211675743 A CN 202211675743A CN 116232600 A CN116232600 A CN 116232600A
- Authority
- CN
- China
- Prior art keywords
- data
- hash
- stored
- node
- blockchain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a data security storage method and system based on a block chain, wherein the method comprises the following steps: s1, selecting a corresponding hash encryption algorithm according to the type of data to be stored, and calculating the data to be stored to obtain a hash value; and signing the hash value by using the private key to obtain the encrypted storage data. S2, uploading the encrypted storage data to the IPFS node by a user; s3, the IPFS node calculates and returns a hash label to the user; s4, the user verifies the correctness of the hash label; s5, the user sends the hash label to the block chain node for uplink; s6, verifying the hash label by the block chain node. The invention can store the data to be stored in the IPFS node in the form of the ciphertext, even if an attacker obtains the hash tag and the ciphertext from the IPFS node, the attacker cannot obtain the data to be stored under the condition of no symmetric key of the user. And after the data to be stored is uploaded and stored in the IPFS and the blockchain, the data becomes a record which cannot be tampered, and the reliability is improved.
Description
Technical Field
The invention relates to the technical field of data security, in particular to a data security storage method and system based on a blockchain.
Background
Data security refers to protection of data in the processes of collection, processing, storage, retrieval, transmission, exchange, display, diffusion and the like, and ensures that the data is authorized to be used in a legal way and is not illegally counterfeited, stolen, tampered, deleted or repudiated in all links, and confidentiality, authenticity, integrity and non-repudiation of data information are ensured. The core of the data security is to ensure that the data can be highly controllable in all stages of the full life cycle, and various threat factors are isolated as far as possible through technical protection and efficient management. The existing data security market is in a growth period, and with the increase of the number and the continuous deterioration of the properties of data leakage events, the acceleration of the digital transformation of enterprises, the landing of new technologies such as the Internet of things and the like, the importance of data security is increasing.
Storage is gaining increasing attention as an important part of the full cycle of data security. At present, the storage of a lot of data such as log data relies on a database or local files, and potential threats exist in terms of data security and storage.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a data security storage method and system based on a block chain, which can prevent data from being stolen and tampered and improve the security.
First aspect:
the invention provides a data security storage method based on a block chain, which comprises the following steps:
s1, selecting a corresponding hash encryption algorithm according to the type of data to be stored, and calculating the data to be stored to obtain a hash value; and signing the hash value by using a private key to obtain encrypted storage data.
S2, uploading the encrypted storage data to an IPFS node by a user;
s3, the IPFS node calculates the encrypted storage data and returns a hash tag to the user;
s4, the user verifies the correctness of the hash label;
s5, sending the hash label to a block chain node for uplink;
s6, verifying the hash label by the block chain node.
Preferably, in step S1, if the data to be stored is text type information, the text type information is converted into text character strings, and the text character strings are calculated according to a first type of hash encryption algorithm to obtain hash values.
Preferably, in step S1, if the data to be stored is image type information, the image type information is converted into an image character string, and the image character string is calculated according to a hash encryption algorithm of a second type to obtain a hash value.
Preferably, the step S3 specifically includes: after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using the hash encryption algorithm, and returns the hash tag to a user.
Preferably, the step S5 specifically includes: assembling the hash tag into a transaction structure in a blockchain body to obtain transaction data; and transmitting the transaction data to a blockchain node for data uplink operation.
Second aspect:
the invention provides a data security storage system based on a block chain, which comprises the following components:
the preprocessing module is used for selecting a corresponding hash encryption algorithm according to the type of the data to be stored to calculate the data to be stored to obtain a hash value; and signing the hash value by using a private key to obtain encrypted storage data.
The user uploading module is used for uploading the encrypted storage data to the IPFS node;
the tag return module is used for carrying out IPFS node calculation on the encrypted storage data and returning a hash tag to a user;
a user verification module for verifying the correctness of the hash tag,
the uplink module is used for transmitting the hash tag to a blockchain node for uplink;
and the block chain verification module is used for verifying the hash tag through the block chain node.
Preferably, if the data to be stored is text type information, the preprocessing module converts the text type information into text character strings, and calculates the text character strings according to a first type of hash encryption algorithm to obtain hash values.
Preferably, if the data to be stored is image type information, the preprocessing module converts the image type information into an image character string, and calculates the image character string according to a hash encryption algorithm of a second type to obtain a hash value.
Preferably, the tag return module is specifically configured to:
after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using the hash encryption algorithm, and returns the hash tag to a user.
Preferably, the uplink module is specifically configured to:
assembling the hash tag into a transaction structure in a blockchain body to obtain transaction data; and transmitting the transaction data to a blockchain node for data uplink operation.
The beneficial effects of the invention are as follows:
the data to be stored may be stored in the IPFS node in the form of a ciphertext, even if the attacker obtains the hash tag and the ciphertext from the IPFS node, the attacker cannot obtain the data to be stored without the user symmetric key. And after the data to be stored is uploaded and stored in the IPFS and the blockchain, the data becomes a record which cannot be tampered, and the reliability is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. Like elements or portions are generally identified by like reference numerals throughout the several figures. In the drawings, elements or portions thereof are not necessarily drawn to scale.
FIG. 1 is a flowchart of a method for securely storing data based on a blockchain according to an embodiment of the present invention;
fig. 2 is a flowchart of a data secure storage system based on blockchain according to a second embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this invention pertains.
As shown in fig. 1, an embodiment of the present invention provides a data secure storage method based on a blockchain, including the steps of:
s1, selecting a corresponding hash encryption algorithm according to the type of data to be stored, and calculating the data to be stored to obtain a hash value; and signing the hash value by using the private key to obtain the encrypted storage data.
S2, uploading the encrypted storage data to the IPFS node by a user;
s3, the IPFS node calculates the encrypted storage data and returns a hash tag to the user;
s4, the user verifies the correctness of the hash label;
s5, the user sends the hash label to the block chain node for uplink;
s6, verifying the hash label by the block chain node.
Specifically, in step S1, if the data to be stored is text type information, the text type information is converted into text character strings, and the text character strings are calculated according to a first type of hash encryption algorithm to obtain hash values. The first type of hash encryption algorithm may be any one of an MD5 algorithm, a SHA1 algorithm, and a SHA224 algorithm.
In step S1, if the data to be stored is image type information, the image type information is converted into an image character string, and the image character string is calculated according to a hash encryption algorithm of a second type to obtain a hash value. The second type of hash encryption algorithm may be any one of SHA256 algorithm, SHA384 algorithm, SHA512 algorithm.
The first type of hash encryption algorithm may be the same algorithm as the second type of hash encryption algorithm, or may be a different algorithm. Generally, the data of the image type information will be larger than the data of the text type information, and based on this, in the embodiment of the present invention, the hash value length obtained by adopting the hash encryption algorithm of the second type is larger than that of the hash encryption algorithm of the first type.
When the embodiment of the invention calculates the hash value of the data to be stored in different types, different types of hash encryption algorithms are adopted, so that the workload of calculating the hash value can be reduced.
Further, the step S3 specifically includes: after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using a hash encryption algorithm, and returns the hash tag to a user.
Specifically, after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, and if the verification is passed, it indicates that the encrypted storage data is not forged or tampered in the transmission process, otherwise, the IPFS node will give up the uploading request and return a failure message to the user. The embodiment of the invention ensures the authenticity of the encrypted stored data by utilizing the characteristics of quick forward direction, difficult reverse direction of the hash algorithm, non-repudiation, integrity and the like of the digital signature.
The step S4 specifically comprises the following steps: after receiving the data transmitted by the IPFS, the user decrypts the data by using the user private key to obtain the hash tag. And then, the user sends a query request to any one node of the IPFS network by using the hash tag, and verifies whether the encrypted storage data is stored in the IPFS network.
The step S5 specifically comprises the following steps: assembling the hash label into a transaction structure in the block chain body to obtain transaction data; and transmitting the transaction data to the blockchain node for data uplink operation.
The transaction data may include, among other things, a public key of the user, a transaction data generation timestamp, a hash tag of the transaction data, and a digital signature of the hash tag.
In step S6, the blockchain node verifies the hash-tag using the user' S public key and, after verification passes, broadcasts transaction data to other nodes in the blockchain network.
The embodiment of the invention provides a data security storage method based on a blockchain, which can store data to be stored in an IPFS node in a ciphertext mode, even if an attacker obtains a hash tag and obtains the ciphertext from the IPFS node, the attacker cannot obtain the data to be stored under the condition of no symmetric key of a user. And after the data to be stored is uploaded and stored in the IPFS and the blockchain, the data becomes a record which cannot be tampered, and the reliability is improved.
Example two
An embodiment of the present invention provides a data secure storage system based on a blockchain, as shown in fig. 2, including:
the preprocessing module is used for selecting a corresponding hash encryption algorithm according to the type of the data to be stored, and calculating the data to be stored to obtain a hash value; and signing the hash value by using the private key to obtain the encrypted storage data.
The user uploading module is used for uploading the encrypted storage data to the IPFS node;
the tag return module is used for performing IPFS node calculation on the encrypted storage data and returning a hash tag to a user;
a user verification module for verifying the correctness of the hash tag,
the uplink module is used for transmitting the hash tag to a blockchain node for uplink;
and the block chain verification module is used for verifying the hash tag through the block chain node.
Specifically, if the data to be stored is text type information, converting the text type information into text character strings, and calculating the text character strings according to a first type of hash encryption algorithm to obtain hash values. The first type of hash encryption algorithm may be any one of an MD5 algorithm, a SHA1 algorithm, and a SHA224 algorithm.
If the data to be stored is the image type information, converting the image type information into an image character string, and calculating the image character string according to a second type of hash encryption algorithm to obtain a hash value. The second type of hash encryption algorithm may be any one of SHA256 algorithm, SHA384 algorithm, SHA512 algorithm.
The first type of hash encryption algorithm may be the same algorithm as the second type of hash encryption algorithm, or may be a different algorithm. Generally, the data of the image type information will be larger than the data of the text type information, and based on this, in the embodiment of the present invention, the hash value length obtained by adopting the hash encryption algorithm of the second type is larger than that of the hash encryption algorithm of the first type.
When the embodiment of the invention calculates the hash value of the data to be stored in different types, different types of hash encryption algorithms are adopted, so that the workload of calculating the hash value can be reduced.
Further, the tag return module is specifically configured to: after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using a hash encryption algorithm, and returns the hash tag to a user.
Specifically, after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, and if the verification is passed, it indicates that the encrypted storage data is not forged or tampered in the transmission process, otherwise, the IPFS node will give up the uploading request and return a failure message to the user. The embodiment of the invention ensures the authenticity of the encrypted stored data by utilizing the characteristics of quick forward direction, difficult reverse direction of the hash algorithm, non-repudiation, integrity and the like of the digital signature.
The user authentication module is specifically used for: after receiving the data transmitted by the IPFS, the user decrypts the data by using the user private key to obtain the hash tag. And then, the user sends a query request to any one node of the IPFS network by using the hash tag, and verifies whether the encrypted storage data is stored in the IPFS network.
The uplink module is specifically used for: assembling the hash label into a transaction structure in the block chain body to obtain transaction data; and transmitting the transaction data to the blockchain node for data uplink operation.
The transaction data may include, among other things, a public key of the user, a transaction data generation timestamp, a hash tag of the transaction data, and a digital signature of the hash tag.
The block chain verification module is specifically configured to: the blockchain node uses the user's public key to authenticate the hash tag and, after authentication passes, broadcasts transaction data to other nodes in the blockchain network.
The embodiment of the invention provides a data security storage system based on a blockchain, which can store data to be stored in an IPFS node in a ciphertext mode, even if an attacker obtains a hash tag and obtains the ciphertext from the IPFS node, the attacker cannot obtain the data to be stored under the condition of no symmetric key of a user. And after the data to be stored is uploaded and stored in the IPFS and the blockchain, the data becomes a record which cannot be tampered, and the reliability is improved.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention, and are intended to be included within the scope of the appended claims and description.
Claims (10)
1. The data security storage method based on the block chain is characterized by comprising the following steps:
s1, selecting a corresponding hash encryption algorithm according to the type of data to be stored, and calculating the data to be stored to obtain a hash value; signing the hash value by using a private key to obtain encrypted storage data;
s2, uploading the encrypted storage data to an IPFS node by a user;
s3, the IPFS node calculates the encrypted storage data and returns a hash tag to the user;
s4, the user verifies the correctness of the hash label;
s5, sending the hash label to a block chain node for uplink;
s6, verifying the hash label by the block chain node.
2. The method according to claim 1, wherein in step S1, if the data to be stored is text type information, the text type information is converted into text character strings, and the text character strings are calculated according to a first type of hash encryption algorithm to obtain hash values.
3. The method according to claim 1, wherein in step S1, if the data to be stored is image type information, the image type information is converted into an image character string, and the image character string is calculated according to a second type of hash encryption algorithm to obtain a hash value.
4. The blockchain-based data secure storage method of claim 1, wherein the step S3 specifically includes: after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using the hash encryption algorithm, and returns the hash tag to a user.
5. The blockchain-based data secure storage method of claim 1, wherein the step S5 specifically includes: assembling the hash tag into a transaction structure in a blockchain body to obtain transaction data; and transmitting the transaction data to a blockchain node for data uplink operation.
6. A blockchain-based data secure storage system, comprising:
the preprocessing module is used for selecting a corresponding hash encryption algorithm according to the type of the data to be stored to calculate the data to be stored to obtain a hash value; signing the hash value by using a private key to obtain encrypted storage data;
the user uploading module is used for uploading the encrypted storage data to the IPFS node;
the tag return module is used for carrying out IPFS node calculation on the encrypted storage data and returning a hash tag to a user;
a user verification module for verifying the correctness of the hash tag,
the uplink module is used for transmitting the hash tag to a blockchain node for uplink;
and the block chain verification module is used for verifying the hash tag through the block chain node.
7. The blockchain-based data secure storage system of claim 6, wherein if the data to be stored is text-based information, the preprocessing module converts the text-based information into text strings, and calculates the text strings according to a first type of hash encryption algorithm to obtain hash values.
8. The blockchain-based data secure storage system of claim 6, wherein if the data to be stored is image type information, the preprocessing module converts the image type information into an image string, and calculates the image string according to a second type of hash encryption algorithm to obtain a hash value.
9. The blockchain-based data secure storage system of claim 6, wherein the tag return module is specifically configured to:
after receiving the encrypted storage data, the IPFS node performs public key verification and signature verification on the encrypted storage data, after verification, the IPFS node stores the encrypted storage data, obtains a hash tag of the encrypted storage data by using the hash encryption algorithm, and returns the hash tag to a user.
10. The blockchain-based data secure storage system of claim 6, wherein the uplink module is specifically configured to:
assembling the hash tag into a transaction structure in a blockchain body to obtain transaction data; and transmitting the transaction data to a blockchain node for data uplink operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211675743.XA CN116232600A (en) | 2022-12-26 | 2022-12-26 | Block chain-based data security storage method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211675743.XA CN116232600A (en) | 2022-12-26 | 2022-12-26 | Block chain-based data security storage method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116232600A true CN116232600A (en) | 2023-06-06 |
Family
ID=86583394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211675743.XA Pending CN116232600A (en) | 2022-12-26 | 2022-12-26 | Block chain-based data security storage method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116232600A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117395474A (en) * | 2023-12-12 | 2024-01-12 | 法序(厦门)信息科技有限公司 | Locally stored tamper-resistant video evidence obtaining and storing method and system |
-
2022
- 2022-12-26 CN CN202211675743.XA patent/CN116232600A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117395474A (en) * | 2023-12-12 | 2024-01-12 | 法序(厦门)信息科技有限公司 | Locally stored tamper-resistant video evidence obtaining and storing method and system |
CN117395474B (en) * | 2023-12-12 | 2024-02-27 | 法序(厦门)信息科技有限公司 | Locally stored tamper-resistant video evidence obtaining and storing method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10296248B2 (en) | Turn-control rewritable blockchain | |
AU2017269736B2 (en) | Multiple-link cryptologic blockchain | |
US11949789B2 (en) | Blockchain-enabled computing | |
Holt et al. | Logcrypt: forward security and public verification for secure audit logs | |
Accorsi | BBox: A distributed secure log architecture | |
US20040006692A1 (en) | Method and system for assuring an original | |
CN111898164B (en) | Data integrity auditing method supporting label block chain storage and query | |
CN1717896A (en) | Long-term secure digital signatures | |
EP0676109A1 (en) | Method of extending the validity of a cryptographic certificate | |
CN114651248A (en) | Random node selection for licensed blockchains | |
CN110597836B (en) | Information inquiry request response method and device based on block chain network | |
CN112732695B (en) | Cloud storage data security deduplication method based on block chain | |
CN111461622B (en) | Block chain-based warehouse credit rating, result acquisition and verification method and device | |
CN114372296B (en) | Block chain-based user behavior data auditing method and system | |
CN102419809A (en) | Safe, efficient and universal method for proving original value of electronic document | |
CN111881109B (en) | Database mergeable ledgers | |
CN112906056A (en) | Cloud storage key security management method based on block chain | |
CN110851848B (en) | Privacy protection method for symmetric searchable encryption | |
CN103326856A (en) | Cloud storage data responsibility confirmation structure and method based on two-way digital signature | |
CN116232600A (en) | Block chain-based data security storage method and system | |
JP2005275761A (en) | Disclosure monitoring method and computer system | |
JP3788976B2 (en) | Data registration system, data registration method and program | |
US7574607B1 (en) | Secure pipeline processing | |
CN114826607B (en) | Edge computing node compression method based on block chain and lightweight storage system | |
CN116366259A (en) | Public verifiable Boolean search system and method for ciphertext data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |