Data existence authentication system, authentication method and verification method

An authentication system and authentication method technology, applied in the field of data existence authentication system, can solve the problems of dependence, high authentication cost, and inability to protect the rights and interests of rights holders, and achieve the effect of reducing authentication costs, simplifying paths, and reducing complexity.

Active Publication Date: 2017-02-15
BEIJING ZHONGXIANG BIT TECH
View PDF3 Cites 56 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the existing certification mechanism strongly relies on the credit of the certification body. Once the certification body has a credit problem, the rights and interests of the obligee cannot be guaranteed.
[0003] At the same time, based on the development of time stamp technology, it provides a solution for the time proof of data. However, the ap

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data existence authentication system, authentication method and verification method
  • Data existence authentication system, authentication method and verification method
  • Data existence authentication system, authentication method and verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0036] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0037] figure 1 It is a schematic structural diagram of a data existence authentication system in an embodiment of the present invention.

[0038] Such as figure 1 As shown, in this embodiment, the data existence authentication system provided by the present invention includes a data acquisition...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data existence authentication system, a data existence authentication method and a data existence verification method. The authentication method comprises the steps of obtaining hash values of target data, and storing the hash values; generating at least one Merkel tree according to the hash values, and storing tree roots of the Merkel tree in block chains of a predetermined block chain network through trading; and generating receipts corresponding to the target data respectively, wherein the receipts comprise corresponding target hash values, corresponding tree roots and paths of the Merkel tree, and trading data storage paths, and the paths comprise the hash values sequentially paired with the target hash values to finally generate the tree roots. According to the data existence authentication system, the data existence authentication method and the data existence verification method, the authentication of the existence of the target data in the trading time can be realized through the trading without depending on an authentication mechanism by utilizing characteristics of the Merkel tree and a characteristic that data in the block chains cannot be rewritten, the trading only needs to store the tree roots in the block chains, and the authentication of batch data can be finished by one-time trading, so that the authentication cost is greatly reduced.

Description

technical field [0001] The application relates to the technical field of data authentication, in particular to a data existence authentication system, authentication method and verification method. Background technique [0002] In real life, in order to prove their legitimate rights, such as writing an article, owning a certain certificate, owning the copyright of certain works, etc., the right holder usually needs to be certified by a third-party certification agency. Therefore, the existing certification mechanism strongly relies on the credit of the certification body. Once the certification body has a credit problem, the rights and interests of the obligee cannot be guaranteed. [0003] At the same time, based on the development of time stamp technology, it provides a solution for the time proof of data. However, the application of time stamp has not been popularized by the existing certification bodies. As a result, certification in third-party certification bodies ofte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/45
CPCG06F21/45
Inventor 吴飞鹏卢小明陈姝
Owner BEIJING ZHONGXIANG BIT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products