A blockchain-based data authentication method, system and storage medium
A blockchain and verification technology, applied in the field of verification and traceability, can solve the problem of being unable to judge which part of the data has a problem, and achieve the effect of rapid judgment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] Such as figure 1 A blockchain-based data verification method shown includes:
[0045] S1. Read the source data, calculate the hash value of the source data, define it as the main hash, and store the main hash on the chain;
[0046] S2. Extract the attribute name key and attribute value value of the source data, calculate the hash value hash(key) of the source data attribute name, and the hash value hash(value) of the source data attribute value, and combine hash(key) and hash(value ) are stored on the chain separately;
[0047] S3. Put the attribute name key and attribute value value of the source data into the Map structure of the blockchain, calculate the hash value of the Map, define it as a secondary hash, and store the secondary hash on the chain;
[0048] S4. Obtain the data that needs to be verified, calculate the hash value of the verified data, and compare the hash value of the verified data with the main hash on the chain: if the comparison results are the s...
Embodiment 2
[0064] A blockchain-based data verification system, such as figure 2 shown, including:
[0065] Source data calculation module, used to calculate main hash, hash (key), hash (value) and secondary hash; wherein said main hash is the hash value of source data, and said hash (key) is source data attribute The hash value of the name, the hash (value) is the hash value of the source data attribute value, and the secondary hash is the hash value of the Map structure including the attribute name key and the attribute value value of the block chain of the source data;
[0066] The source data on-chain module is used to store certificates on the chain of the main hash, hash (key), hash (value) and secondary hash;
[0067] Verification data calculation module, used to calculate the hash value of verification data, the hash value of verification data Map, hash(key1) and hash(value1); wherein the hash value of verification data Map is block The chain contains the hash value of the Map ...
Embodiment 3
[0081] A computer-readable storage medium includes a computer program. When the computer program runs, the device where the storage medium is located is controlled to execute the data verification method as described in Embodiment 1.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

