Block chain evidence storage method and systemTechnical Field
The invention relates to the field of block chain evidence storage application, in particular to a block chain evidence storage method and a block chain evidence storage system.
Background
The common evidence is that electronic data (such as electronic contract, webpage, photo, video, audio and video, electronic document, call record, e-mail and the like) is stored in a backup form on a self organization or a leased server, and because the electronic data is very easy to be damaged, faults such as flaws, breakpoints, incomplete evidence and the like are easily caused in the transmission process. Not only is there a high technical demand from third-party certificate authority, but also the number of transfers and hands-backs is reduced in the electronic data generation, solidification, certificate storage, storage and subsequent evidence use, and if the electronic data is stored on a leased server, the number of data transfers is necessarily increased, the risk of data tampering is increased, and the integrity is also destroyed. Furthermore, the third-party certificate authority is also an enterprise, and various unexpected situations such as unstable service are likely to occur.
With the rapid development of the blockchain technology, evidence storage services based on the blockchain technology are widely applied to various industries. The block chain evidence storage is based on a block chain technology, and adopts a multi-node common identification mode or combines electronic data evidence storage services of authoritative mechanism nodes such as a court, a notarization department, an arbitration mechanism, a judicial appraisal center, a time service mechanism, an auditing mechanism, a digital identity authentication center and the like.
The block chain evidence storing business can be accessed to third-party institutions such as an internet court, a judicial appraisal center, an international time service center trusted time service center, a CA authentication center and the like, so that the authority, reliability and authenticity of electronic data evidence storage are guaranteed. The 'regulations' issued in 2018 by the highest court in China mention that 'the authenticity of electronic data submitted by a party can be proved through the technical means of evidence collection, fixation and tamper resistance such as electronic signatures, credible timestamps, hash value verification, block chains and the like or through the authentication of an electronic evidence obtaining and storing platform, and the internet court should be confirmed'. The method is that the law confirmation is carried out on the evidence-based evidence-storing means such as the credible timestamp and the block chain in the judicial explanation form for the first time in China, means that the application of the electronic evidence-storing technology in the judicial level is a significant breakthrough, and simultaneously shows that the block chain evidence-storing application service has good market prospect.
In the current block chain evidence storage technology, a large amount of paid CA authentication service is usually adopted as a corresponding element of an evidence storage person, but because the CA authentication service provided by the current CA authentication center is charged and the evidence storage cost of a user is high, a method capable of replacing the CA authentication service as one of key elements of the block chain evidence storage is urgently needed to be provided.
Disclosure of Invention
The invention aims to provide a block chain evidence storing method and a block chain evidence storing system, which can realize that a user can use a physiological characteristic as one of key elements of block chain electronic data evidence storage to replace CA authentication service, thereby reducing the evidence storing cost.
In order to achieve the above object, in one aspect, the present invention provides a method for verifying a block chain, including:
extracting physiological characteristic values of the physiological characteristics of the user;
and taking the hash value of the physiological characteristic value as an element of evidence data of the user in block chain evidence.
Preferably, the extracting the physiological characteristic value of the physiological characteristic of the user comprises: and scanning the physiological characteristics of the user and extracting the physiological characteristic value of the scanned user physiological characteristic electronic data.
Preferably, the extracting the physiological characteristic value of the user further comprises: and uploading the physiological characteristic value of the user to a personal private server.
Preferably, the taking the hash value of the physiological characteristic value as an element of the evidence data of the user's evidence of the blockchain includes: and carrying out hash operation on the physiological characteristic value, binding the obtained hash value with evidence data uploaded by a user, and storing the bound hash value and the evidence data to a block chain network.
Preferably, the method further comprises the following steps: and the third party re-scans the physiological characteristics of the user and extracts physiological characteristic values, re-calculates the hash value of the physiological characteristic values and compares the hash value with the hash value which is taken as a verification factor before so as to verify whether the user verifies that the user self verifies the verification.
Preferably, the user physiological characteristics include at least one of facial characteristics, fingerprint characteristics, and iris characteristics of the user.
In another aspect of the present invention, a block chain credit system is provided, including:
the physiological characteristic extraction device is used for extracting a physiological characteristic value of a user and uploading the physiological characteristic value to the server;
the hash calculation module is used for calculating a hash value of the physiological characteristic value;
and the block chain evidence storing client is used for binding the hash value of the physiological characteristic value with the evidence data of the user and then storing the hash value and the evidence data to a block chain network.
Preferably, the hash calculation module is disposed in the server, and the server is a personal private server.
Preferably, the physiological characteristic extraction means scans a physiological characteristic of the user and extracts the physiological characteristic value in the scanned physiological characteristic electronic data.
Preferably, the physiological feature extraction means includes at least one of face recognition means, fingerprint recognition means, and iris recognition means.
The invention has the beneficial effects that:
(1) the physiological characteristics of the certificate depositor are identified by utilizing a physiological characteristic identification technology, and the hash value of the physiological characteristic value is one of key elements of the block chain certificate deposit, so that the certificate depositor can use the key element to replace CA authentication service, and the certificate deposit cost is reduced.
(2) The hash value of the personal physiological characteristic value can also be used as an additional key evidence storage element in the existing evidence storage, so that the effect of the evidence storage is improved.
(3) The personal physiological characteristic data is stored in the private server, only the hash value of the physiological characteristic value is used as a certificate storage element, the private information of the user cannot be revealed, and the security is higher.
The apparatus of the present invention has other features and advantages which will be apparent from or are set forth in detail in the accompanying drawings and the following detailed description, which are incorporated herein, and which together serve to explain certain principles of the invention.
Drawings
The above and other objects, features and advantages of the present invention will become more apparent by describing in more detail exemplary embodiments thereof with reference to the attached drawings, in which like reference numerals generally represent like parts.
Fig. 1 shows a flow chart of the steps of a blockchain credentialing method according to the invention.
Fig. 2 shows a schematic diagram of a blockchain presence system according to an embodiment of the invention.
Description of reference numerals:
1. a physiological feature extraction device; 2. a hash calculation module; 3. a block chaining certification client; 4. a server; 5. a blockchain network.
Detailed Description
The invention will be described in more detail below with reference to the accompanying drawings. While the preferred embodiments of the present invention are shown in the drawings, it should be understood that the present invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
According to an aspect of the present invention, a method for verifying a blockchain includes:
extracting physiological characteristic values of the physiological characteristics of the user;
and taking the hash value of the physiological characteristic value as an element of evidence data of the user evidence stored in the block chain.
Specifically, the hash value extracted from the unique physiological characteristic value of the user is one of the elements of the user for storing the certificate in the block chain, so that an individual or an enterprise can use the key element to replace a CA authentication service, thereby reducing the certificate storage cost, and can also coexist with the CA authentication to increase the effectiveness of the block chain certificate storage. Wherein the block chain is preferably a federation chain or a public chain. It should be noted that the users and the certificate depositors in the present application are not limited to individual users, but may also include enterprise users, and the physiological characteristic value of an enterprise user may select to obtain a hash value of the individual physiological characteristic value of the enterprise representative as a certificate-depositing element.
In one example, extracting a physiological characteristic value of a physiological characteristic of a user includes: and scanning the physiological characteristics of the user and extracting physiological characteristic values of the scanned physiological characteristic electronic data of the user.
Specifically, it is necessary to select an acquisition device suitable for different physiological characteristics to scan different physiological characteristics and generate corresponding physiological characteristic value electronic data, and the acquisition device may select an existing fingerprint recognition device, face recognition device, iris recognition device, or use an acquisition device capable of extracting multiple physiological characteristics at the same time, which is easy to implement for those skilled in the art of extracting physiological characteristics and is not described herein again.
In one example, extracting the physiological characteristic value of the user further comprises: and uploading the physiological characteristic value of the user to the personal private server.
Specifically, in order to avoid stealing or revealing personal private physiological features of the user, the scheme uploads the physiological feature data of the user to the user private server after the physiological features of the user are extracted, and the physiological feature data can be acquired only by the user, so that the privacy disclosure of the user is effectively avoided, and the evidence storage efficacy is increased.
In one example, taking a hash of the physiological characteristic value as an element of the proof data of the user's proof of existence in the blockchain comprises: and performing hash operation on the physiological characteristic value, binding the obtained hash value with evidence data uploaded by the user, and storing the bound hash value and the evidence data to the block chain network.
Specifically, elements such as a timestamp of a national time service center, user personal identity information, a digital signature of a third-party CA authentication service, a hash value of electronic data and the like are generally bound in the electronic data uploaded to the block chain certificate, and meanwhile, the block chain has the characteristics of distributed decentralized storage and non-falsification, so that the electronic certificate of the user can be guaranteed to have the characteristics of high reliability, non-falsification, strong safety, non-reversible time sequence and the like, and even the user cannot modify the electronic certificate by a chaining operation; according to the scheme, the hash value of the physiological characteristic value of the user can replace the digital signature of the CA authentication service charged by a third party, the characteristics of high reliability, incapability of tampering, strong safety, irreversible time sequence and the like of the electronic certificate of the user can be guaranteed, the cost of the electronic certificate can be saved for the user, and the more the elements in the electronic certificate are, the higher the effect of the certificate is, so that the physiological characteristic value of the user can be increased in the normal certificate storage elements to increase the effect of the electronic data certificate.
In one example, further comprising: and the third party re-scans the physiological characteristics of the user and extracts the physiological characteristic value, re-calculates the hash value of the physiological characteristic value and compares the hash value with the hash value which is taken as the evidence storage element before so as to verify whether the user stores the evidence.
Specifically, when the authenticity of the stored electronic data needs to be verified, if legal dispute occurs, the verification organization (e.g., a notarization department, a judicial authentication center, etc.) may extract the corresponding user physiological characteristic value in the stored electronic data again and perform a hash operation, compare the calculated hash value with the hash value of the physiological characteristic value in the stored electronic data, if the hash values are consistent, it is verified that the user self stores the certificate, and if the hash values are inconsistent, it is determined that the user self stores the certificate.
In one example, the user physiological characteristics include at least one of facial characteristics, fingerprint characteristics, and iris characteristics of the user.
Specifically, the physiological feature values of the user in the present scheme are not limited to facial features, fingerprint features and iris features, but also include unique biological features of each individual, such as palm print features, behavior features (e.g., gait, voice, handwriting), DNA sequences, and the like of the user.
In another aspect of the present invention, a block chain credit system includes:
the physiological characteristic extraction device is used for extracting a physiological characteristic value of the user and uploading the physiological characteristic value to the server;
the hash calculation module is used for calculating a hash value of the physiological characteristic value;
and the block chain evidence storing client is used for binding the hash value of the physiological characteristic value with the evidence data of the user and then storing the hash value and the evidence data to the block chain network.
In one example, the hash calculation module is disposed in a server, and the server is a personal private server.
In one example, the physiological characteristic extraction means scans a physiological characteristic of the user and extracts a physiological characteristic value in the scanned physiological characteristic electronic data.
In one example, the physiological feature extraction device includes at least one of a facial recognition device, a fingerprint recognition device, and an iris recognition device.
Example (b):
fig. 1 shows a flow chart of the steps of a blockchain credentialing method according to the invention.
As shown in fig. 1, a method for block chain verification includes:
step 1: extracting physiological characteristic values of the physiological characteristics of the user;
step 2: and taking the hash value of the physiological characteristic value as an element of evidence data of the user evidence stored in the block chain.
Wherein,step 1 includes: and scanning the physiological characteristics of the user and extracting physiological characteristic values of the scanned physiological characteristic electronic data of the user. And uploading the physiological characteristic value of the user to the personal private server.
Wherein,step 2 includes: and performing hash operation on the physiological characteristic value, binding the obtained hash value with evidence data uploaded by the user, and storing the bound hash value and the evidence data to the block chain network.
Wherein the user physiological characteristics include at least one of facial characteristics, fingerprint characteristics, and iris characteristics of the user.
Further comprising: the third party rescans the physiological characteristics of the user and extracts the physiological characteristic value, recalculates the hash value of the physiological characteristic value and compares the hash value with the hash value which is taken as the evidence storage element before:
when the hash values are the same, the user is judged to store the certificate;
and when the hash values are different, determining that the user does not store the certificate.
Fig. 2 shows a schematic diagram of a blockchain presence system according to an embodiment of the invention.
As shown in fig. 2, a blockchain credit system includes: the system comprises a physiological characteristic extraction device, a Hash calculation module and a block chain evidence storage client, wherein the physiological characteristic extraction device is used for extracting a physiological characteristic value of a user and uploading the physiological characteristic value to a server; the hash calculation module is used for calculating a hash value of the physiological characteristic value; and the block chain evidence storing client is used for binding the hash value of the physiological characteristic value with the evidence data of the user and then storing the hash value and the evidence data to the block chain network.
The hash calculation module is arranged in the server, and the server is a personal private server. The physiological characteristic extraction device scans the physiological characteristics of the user and extracts physiological characteristic values in the scanned physiological characteristic electronic data. The physiological characteristic extraction means includes at least one of face recognition means, fingerprint recognition means, and iris recognition means.
The embodiment identifies the physiological characteristics of the person storing the certificate by using a physiological characteristic identification technology, and takes the hash value of the physiological characteristic value as one of key elements for block chain certificate storage, so that the person can use the key element to replace CA authentication service, thereby reducing certificate storage cost or improving certificate storage effectiveness as an increased element, and simultaneously, the physiological characteristic data of the person is stored in a privacy server, and only the hash value of the physiological characteristic value is taken as the certificate storage element, so that the privacy information of the user cannot be leaked, and the security is higher.
Having described embodiments of the present invention, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments.