Blockchain evidence storage method and device

A technology of chain storage and blockchain, which is applied in the field of blockchain, can solve problems such as the inability to guarantee the originality of evidence files

Inactive Publication Date: 2018-11-30
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention solves the technical problem that the originality of the...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain evidence storage method and device
  • Blockchain evidence storage method and device
  • Blockchain evidence storage method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0142] After step S8, after the management node issues the target evidence file extracted from the storage area to the forensic node, the forensic node determines whether verification is required. For verification, a verification request is initiated to the management node, and the verification request carries the target evidence file issued by the management node, so that the management node verifies the target evidence file from the forensic node through the following process:

[0143] Step 1. The management node receives the verification request from the forensic node, and extracts the target evidence file from the verification request, and the forensic node is connected to the blockchain.

[0144] According to the target evidence file uploaded by the user to the management node on the verification interface of the evidence acquisition node, the evidence acquisition node sends the target evidence file of the management node to the management node, and requests the management...

Embodiment approach 2

[0153] Implementation Mode 2: The management node can verify the evidence files extracted from the storage area before the management node sends the evidence files extracted from the storage area to the forensics node. The specific implementation process is as follows:

[0154] Step 1': the management node obtains the first forensic evidence for extracting the target evidence file from the forensics node, and the forensics node is connected to the block chain;

[0155] Step 2': the management node extracts the evidence file from the storage area according to the first evidence collection certificate, and obtains the on-chain file fingerprint of the source evidence file from the block chain according to the first evidence collection certificate;

[0156] Step 3': The management node verifies the target evidence file according to the fingerprint of the file on the chain, and obtains the verification result of the target evidence file;

[0157] Step 4': The management node sends ...

Embodiment approach 3

[0164] Embodiment 3. The forensics node can verify the evidence files extracted by the management node from the storage area. The implementation process is as follows:

[0165] Step 1": The management node obtains the second forensic credential from the forensic node for extracting the target evidence file. Specifically, the first forensic credential may be the same as the first forensic credential, for example, the evidence number of the target evidence file.

[0166] Step 2": the management node extracts the target evidence file from the storage area according to the second evidence collection credential.

[0167] Step 3": The management node generates the fingerprint of the file to be verified according to the target evidence file. Specifically, the fingerprint of the file to be verified is generated in the same way as the fingerprint of the file on the chain. The fingerprint of the file to be verified is: based on the same method of generating the fingerprint of the file on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a blockchain evidence storage method and device applied to an management node. The method comprises the steps that a source evidence file from an evidence storage node is acquired, wherein the evidence storage node and the management node access to the same blockchain; the source evidence file is processed to generate a cochain file fingerprint of the source evidence file;the source evidence file is saved to a storage area in docking with the management node; the cochain file fingerprint is written into the blockchain, wherein the cochain file fingerprint is used for verifying a target evidence file acquired from the storage area and corresponding to the source evidence file. The technical problem that the originality of an extracted evidence file cannot be guaranteed is solved.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a method and device for storing certificates in block chains. Background technique [0002] Ordinary certificate storage is to store electronic data in the form of backup on the server of your own organization or lease. Since electronic data is very easy to be damaged, it is easy to cause flaws, breakpoints, incomplete evidence and other faults during the transmission process. This not only requires high technical requirements for the third-party evidence storage institutions, but also reduces the number of transfers and handovers in the generation, curing, storage, storage and subsequent use of electronic data. If these electronic data are stored in leased On the server, the number of data transfers will inevitably increase, the risk of data tampering will also increase, and the integrity will also be destroyed. Moreover, third-party certificate depository institut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218G06F2221/2107
Inventor 孟之杰梁超许坚张安柏盼
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products