Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data existence authentication system, authentication method and verification method

An authentication system and authentication method technology, applied in the field of data existence authentication system, can solve problems such as dependence, high authentication cost, and inability to guarantee the rights of right holders, and achieve the effect of simplifying the path, reducing complexity, and reducing authentication costs

Active Publication Date: 2019-05-14
BEIJING ZHONGXIANG BIT TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the existing certification mechanism strongly relies on the credit of the certification body. Once the certification body has a credit problem, the rights and interests of the obligee cannot be guaranteed.
[0003] At the same time, based on the development of time stamp technology, it provides a solution for the time proof of data. However, the application of time stamp has not yet been popularized by the existing certification bodies, resulting in the certification in third-party certification bodies often unable to meet the needs of time proof.
[0004] In addition, the certification services of some certification agencies often charge a lot of money, and the cost of certification is relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data existence authentication system, authentication method and verification method
  • Data existence authentication system, authentication method and verification method
  • Data existence authentication system, authentication method and verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0036] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0037] figure 1 It is a schematic structural diagram of a data existence authentication system in an embodiment of the present invention.

[0038] like figure 1 As shown, in this embodiment, the data existence authentication system provided by the present invention includes a data acquisition un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data existence authentication system, a data existence authentication method and a data existence verification method. The authentication method comprises the steps of obtaining hash values of target data, and storing the hash values; generating at least one Merkel tree according to the hash values, and storing tree roots of the Merkel tree in block chains of a predetermined block chain network through trading; and generating receipts corresponding to the target data respectively, wherein the receipts comprise corresponding target hash values, corresponding tree roots and paths of the Merkel tree, and trading data storage paths, and the paths comprise the hash values sequentially paired with the target hash values to finally generate the tree roots. According to the data existence authentication system, the data existence authentication method and the data existence verification method, the authentication of the existence of the target data in the trading time can be realized through the trading without depending on an authentication mechanism by utilizing characteristics of the Merkel tree and a characteristic that data in the block chains cannot be rewritten, the trading only needs to store the tree roots in the block chains, and the authentication of batch data can be finished by one-time trading, so that the authentication cost is greatly reduced.

Description

technical field [0001] The application relates to the technical field of data authentication, in particular to a data existence authentication system, authentication method and verification method. Background technique [0002] In real life, in order to prove their legitimate rights, such as writing an article, owning a certain certificate, owning the copyright of certain works, etc., the right holder usually needs to be certified by a third-party certification agency. Therefore, the existing certification mechanism strongly relies on the credit of the certification body. Once the certification body has a credit problem, the rights and interests of the obligee cannot be guaranteed. [0003] At the same time, based on the development of time stamp technology, it provides a solution for the time proof of data. However, the application of time stamp has not been popularized by the existing certification bodies. As a result, certification in third-party certification bodies ofte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/45
CPCG06F21/45
Inventor 吴飞鹏卢小明陈姝
Owner BEIJING ZHONGXIANG BIT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products