Document data security verification method based on block chain

A verification method and data security technology, which is applied to secure communication devices, user identity/authority verification, and key distribution, can solve problems affecting the accuracy of verification results, and achieve the effects of enhancing non-tampering, ensuring accuracy, and convenient operation

Pending Publication Date: 2022-06-28
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The method and system for realizing and verifying trusted electronic documents based on blockchain disclosed in this patent document, its security protection and verification of electronic documents is based on the trusted electronic document application s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document data security verification method based on block chain
  • Document data security verification method based on block chain
  • Document data security verification method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0039] Example 1

[0040] see figure 1 , a blockchain-based document data security verification method, comprising the following steps:

[0041] a. The user uses the word plug-in to generate a word document containing the user ID using the national secret algorithm. The national secret algorithm includes the SM2 algorithm and the SM3 algorithm;

[0042] b. Sign the word document, create user information in the blockchain cloud, and generate a CA certificate through the cloud server;

[0043] c. Generate blocks through the blockchain, bind the CA certificate and user ID generated by the cloud server and store them in the block;

[0044] d. Obtain the certificate of the corresponding user from the block of the blockchain according to the user ID of the word document, and complete the certificate verification and signature.

[0045] This embodiment is the most basic implementation, with distributed features, each user can independently sign and verify the electronic document, ...

Example Embodiment

[0046] Example 2

[0047] see figure 1 , a blockchain-based document data security verification method, comprising the following steps:

[0048] a. The user uses the word plug-in to generate a word document containing the user ID using the national secret algorithm. The national secret algorithm includes the SM2 algorithm and the SM3 algorithm;

[0049]b. Sign the word document, create user information in the blockchain cloud, and generate a CA certificate through the cloud server;

[0050] c. Generate blocks through the blockchain, bind the CA certificate and user ID generated by the cloud server and store them in the block;

[0051] d. Obtain the certificate of the corresponding user from the block of the blockchain according to the user ID of the word document, and complete the certificate verification and signature.

[0052] In the step a, the word plug-in is used to integrate signature, signature verification and user application for a certificate.

[0053] The user's...

Example Embodiment

[0057] Example 3

[0058] see figure 1 , a blockchain-based document data security verification method, comprising the following steps:

[0059] a. Through the word plug-in, the user uses the national secret algorithm to generate a word document containing the user ID. The national secret algorithm includes the SM2 algorithm and the SM3 algorithm;

[0060] b. Sign the word document, create user information in the blockchain cloud, and generate a CA certificate through the cloud server;

[0061] c. Generate blocks through the blockchain, bind the CA certificate and user ID generated by the cloud server and store them in the block;

[0062] d. Obtain the certificate of the corresponding user from the block of the blockchain according to the user ID of the word document, and complete the certificate verification and signature.

[0063] In the step a, the word plug-in is used to integrate signature, signature verification and user application for a certificate.

[0064] The us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a document data security verification method based on a block chain, which belongs to the technical field of document processing, and is characterized by comprising the following steps: a, a user generates a word document containing a user ID (Identity) by using a national cryptographic algorithm through a word plug-in, and the national cryptographic algorithm comprises an SM2 algorithm and an SM3 algorithm; b, signing the word document, creating user information at a block chain cloud, and generating a CA certificate through a cloud server; c, generating a block through the block chain, binding the CA certificate generated by the cloud server with the user ID, and storing the CA certificate and the user ID in the block; and d, obtaining the certificate of the corresponding user from the block of the block chain according to the user ID of the word document, and completing certificate verification signature. The system has a distributed characteristic, each user can independently sign and verify the electronic document, the precision of a verification result is guaranteed, the electronic document can be written locally, and the operation is more convenient and humanized.

Description

technical field [0001] The invention relates to the technical field of document processing, and in particular, to a method for security verification of document data based on blockchain. Background technique [0002] Blockchain is the core supporting technology of the digital cryptocurrency system represented by Bitcoin. Its core advantage is decentralization. By using data encryption, time stamps, distributed consensus and economic incentives, there is no need to trust each other at nodes. It realizes point-to-point transactions, coordination and collaboration based on decentralized credit in the distributed system, thereby providing solutions to the problems of high cost, low efficiency and insecure data storage that are common in centralized institutions. [0003] Electronic documents are vulnerable to attacks during channel transmission. After being attacked, the content of the documents may be tampered with, and the security cannot be guaranteed. At present, digital si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L9/08H04L9/32H04L67/12
CPCH04L63/0428H04L63/0823H04L9/0861H04L9/3247H04L9/3263H04L67/12
Inventor 代金祥王正仁杨挺张昌硕张然
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products