CN108121498A - The method and apparatus that a kind of learning records based on block chain technology preserve - Google Patents
The method and apparatus that a kind of learning records based on block chain technology preserve Download PDFInfo
- Publication number
- CN108121498A CN108121498A CN201611069627.8A CN201611069627A CN108121498A CN 108121498 A CN108121498 A CN 108121498A CN 201611069627 A CN201611069627 A CN 201611069627A CN 108121498 A CN108121498 A CN 108121498A
- Authority
- CN
- China
- Prior art keywords
- block
- learning records
- current block
- cryptographic hash
- learner
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000005516 engineering process Methods 0.000 title claims abstract description 20
- 238000000034 method Methods 0.000 title claims description 38
- 238000012795 verification Methods 0.000 claims description 22
- 238000012545 processing Methods 0.000 claims description 16
- 238000010586 diagram Methods 0.000 description 13
- 238000007726 management method Methods 0.000 description 10
- 238000004422 calculation algorithm Methods 0.000 description 7
- 238000004590 computer program Methods 0.000 description 7
- 238000011156 evaluation Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000004321 preservation Methods 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 230000001755 vocal effect Effects 0.000 description 3
- 239000000203 mixture Substances 0.000 description 2
- 238000012163 sequencing technique Methods 0.000 description 2
- 238000012549 training Methods 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
- G06Q50/205—Education administration or guidance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Educational Technology (AREA)
- Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- General Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Educational Administration (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
In the embodiment of the present invention, at least one learning records in the study stage of learner are obtained;First Hash operation is carried out to the learning records obtained and generates corresponding first cryptographic Hash;First cryptographic Hash is encrypted using default private key the corresponding signature of generation;Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash;Second cryptographic Hash and the learning records obtained are saved in current block.The embodiment of the invention also discloses the devices that a kind of learning records based on block chain technology preserve.
Description
Technical field
The present invention relates to the sides that Internet technical field more particularly to a kind of learning records based on block chain technology preserve
Method and device.
Background technology
It is most important for the safe and complete preservation of the learning records of learner in field of Education and teaching.But at present very
More schools and educational management department when being managed to learner's learning records there are many problems, for example, learning records are held
It is easily stolen, criminal carries out unfair transaction using the learning records stolen;Learning records are easily tampered, learning records
Can be carried out according to the demand of learner it is random increase and delete, lose its original integrality.Therefore existing study
Record storing method can not ensure the security and integrality that learning records preserve.
The content of the invention
In order to solve the above technical problems, an embodiment of the present invention is intended to provide a kind of learning records guarantors based on block chain technology
The method and apparatus deposited realize the global learning record for preserving learner's whole life cycle, ensure that learner learns note
The security of record.
The technical proposal of the invention is realized in this way:
An embodiment of the present invention provides a kind of method that learning records based on block chain technology preserve, including:
Obtain at least one learning records in the study stage of learner;
First Hash operation is carried out to the learning records obtained and generates corresponding first cryptographic Hash;
First cryptographic Hash is encrypted using default private key the corresponding signature of generation;
Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash;
Second cryptographic Hash and the learning records obtained are saved in current block.
In said program, the default private key includes:The private key of school or the private of educational management department where learner
Key.
It is described after second cryptographic Hash and the learning records obtained are saved in current block in said program
Method further includes:When the current block is not the first study stage corresponding block of learner, by the current block with
Upper one learns stage corresponding block connection, generates new block chain.
In said program, the current block includes:Block head and block body;
Correspondingly, it is described that second cryptographic Hash and the learning records obtained are saved in current block and included:It will
Second cryptographic Hash and the learning records obtained are saved in the block body of current block;
It is described to include current block block connection corresponding with a upper study stage:By the current block
Block head is established with a upper block and connected, and the block head of the current block preserves the index information to a upper block.
It is described after second cryptographic Hash and the learning records obtained are saved in current block in said program
Method further includes:Current block is sent to all nodes, has in all nodes at least current block described in M node verification effective
When, the current block is added in block chain, M takes the integer more than 0.
In said program, the verification current block effectively includes:It is in the block that node does not preserve received area
At least one learning records, and node determines that received area all learning records in the block are all effective.
In said program, the method further includes:The node does not preserve received area in the block at least one the
Two cryptographic Hash determine that the node does not preserve received area's at least one learning records in the block.
In said program, node determines that i-th learning records is effective in received block, including:Node acquisition is connect
Corresponding i-th of the signature of i-th learning records in the block of receipts, and i-th of signature is decrypted using default public key
To cryptographic Hash A;Again i-th learning records are carried out with the first Hash operation generation cryptographic Hash B, i and takes whole less than N more than 0
Number, N are the number of current block learning record, and the default public key is:The corresponding public key of the default private key;It is described
When cryptographic Hash A is equal to cryptographic Hash B, node determines that i-th learning records are effective.
The embodiment of the present invention additionally provides the device that a kind of learning records based on block chain technology preserve, described device bag
It includes:Described device includes:Acquisition module, the first computing module, encrypting module, the second computing module and preserving module;Wherein,
Acquisition module, for obtaining at least one learning records in learner study stage;
First computing module generates corresponding first Hash for carrying out the first Hash operation to the learning records obtained
Value;
Encrypting module, for first cryptographic Hash being encrypted using default private key the corresponding signature of generation;
Second computing module carries out the second Hash operation to the signature and generates corresponding second cryptographic Hash;
Second cryptographic Hash and the learning records obtained are saved in current block by preserving module.
In said program, the default private key includes:The private key of school or the private of educational management department where learner
Key.
In said program, described device further includes:Link block;The link block, in the current block not
When being the first study stage corresponding block of learner, current block block corresponding with upper one study stage is connected
It connects, generates new block chain.
In said program, described device further includes:Sending module and processing module;
The sending module, for second cryptographic Hash and the learning records obtained to be saved in current block
Afterwards, current block is sent to all nodes;
The processing module, for when determining that at least current block described in M node verification is effective, working as proparea by described in
Block is added in block chain.
In the embodiment of the present invention, at least one learning records in the study stage of learner are obtained;To what is obtained
Learning records carry out the first Hash operation and generate corresponding first cryptographic Hash;Using default private key to first cryptographic Hash into
Row encryption generates corresponding signature;Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash;By described
Two cryptographic Hash and the learning records obtained are saved in current block.It in this way, can be by each study stage of learner
All learning records be stored in corresponding block, then these blocks are added to block chain according to the time sequencing of generation
In, which can preserve the global learning record of learner's whole life cycle, ensure that learner's learning records
Integrality and security.
Description of the drawings
Fig. 1 is the structure diagram of block chain node in the embodiment of the present invention;
Fig. 2 is the flow chart of the method that block chain is established in the embodiment of the present invention;
Fig. 3 is the flow chart of the first embodiment of the method preserved the present invention is based on the learning records of block chain technology;
Fig. 4 is the first structure schematic diagram of block chain in the embodiment of the present invention;
Fig. 5 is the second structure diagram of block chain in the embodiment of the present invention;
Fig. 6 is the flow chart of the second embodiment of the method preserved the present invention is based on the learning records of block chain technology;
Fig. 7 is the composition structure diagram for the device that learning records of the embodiment of the present invention based on block chain technology preserve.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes.
A kind of method that learning records based on block chain technology preserve, wherein block chain are provided in the embodiment of the present invention
Also distributed account book is referred to as, is a kind of internet database technology, by decentralization, goes trust collective maintenance one can
The technical solution of the database leaned on.
The characteristics of distributed architecture of this decentralization of block chain, can allow each node participating in record
Also verify the correctness of other nodes records data simultaneously.Each node is reciprocity, is all that data disclose between node
's.Block chain technology is applied in learning records preservation, can make learning records in the form of electronical record by permanent storage
Get off, the file for storing these electronical records is just referred to as " block (block) ".Block be in chronological order one by one successively
Generation, each block saves the learning records of its learner's generation during being created, and all blocks take together shape
Into the learning records intersection of a learner.
Block caused by one node can send block to other multiple nodes simultaneously and carry out block verification.Only
When the whole network major part node (such as more than 50%) all thinks that the block that this node is generated is effective simultaneously, i.e., more than 50%
Node comparing result it is consistent after, the validity of block can just obtain the accreditation of all nodes, and block is just allowed to be connected to area
In block chain.
Fig. 1 is the structure diagram of block chain node in the embodiment of the present invention, as shown in Figure 1, participating in learner's block chain
The node of foundation can have:Educational management department, school, online education mechanism and other educational institutions etc., these nodes all may be used
Think that learner creates block or verifies the validity of current block.The foundation of one study stage block of learner is desirable
Pass through the mandate of other nodes, it is also desirable to which the verification of other nodes just may be coupled to after verification is qualified in block chain.
Fig. 2 is the flow chart of the method that block chain is established in the embodiment of the present invention.As shown in Fig. 2, it is established for learner
During block chain, it is necessary first to be asked according to learning records, build learning records block;Second by formed learning records block,
Generate the learning records block chain of learner's Life cycle.
First embodiment
Fig. 3 is the flow chart of the first embodiment of the method preserved the present invention is based on the learning records of block chain technology, such as
Shown in Fig. 3, this method includes:
Step 300:Obtain at least one learning records in the study stage of learner.
In actual implementation, a study stage can be following at least one:It is kindergarten, primary school, middle school, senior middle school, big
The stages such as, postgraduate, doctor, other vocational educations or training.
At least one learning records can be the global learning records in a study stage in a period, also may be used
To be once great examination record, conduct sheet etc..
Step 301:First Hash operation is carried out to the learning records obtained and generates corresponding first cryptographic Hash.
It should be noted that can the first Hash operation directly be carried out to the learning records of acquisition, it can also give what is obtained
Learning records carry out the first Hash operation again after adding a random number.
Here, carrying out the hash algorithm that the first Hash operation uses can be:Message Digest 5 (Message-Digest
Algorithm 5, MD5), Secure Hash Algorithm (Secure Hash Algorithm, SHA-1) etc..
Step 302:First cryptographic Hash is encrypted using default private key the corresponding signature of generation.
Default private key can include:The private key of school or the private key of educational management department where learner.
In actual implementation, school can preserve learning records of the learner during school, and educational management department can protect
Deposit the great examination of learner's participation or the rewards and punishments situation of key activities.Therefore can when need preserve relational learning record when,
The first cryptographic Hash is encrypted using the private key of school or educational management department the corresponding signature of generation, in this way, being learned in verification
It can only be decrypted by their public key during the validity for practising record and be just able to verify that, avoid the row of malicious modification learning records
For.
Step 303:Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash.
It should be noted that the second Hash operation can also may be used with the first Hash operation using identical hash algorithm
To be using different hash algorithms.Here, the second Hash operation can be used for whether judging current block learning record
Through being stored.
Step 304:Second cryptographic Hash and the learning records obtained are saved in current block.
Current block can include:Block head and block body.Block is successively to generate one by one in chronological order, often
One block records all activities that it occurs during being created, and all blocks take together to form a record intersection.
All learning records can be completely recorded in these blocks one learner from birth to death.
Wherein block head:The guarantee of integrality is provided for the block for being linked to front and for block chain database, for example,
When a block i and upper block i-1 links together, the index information to block i-1 is contained in the block head of block i.Example
Such as, can include in block head:
Version number:For indicating the relevant release note of software and agreement;
Father's block cryptographic Hash:For block i to be connected with previous block i-1 in block chain;
Merkle tree roots:For the integrality of rapid verification area data in block;
Timestamp:For recording time of block generation etc..
In addition, block body is used to preserve the learning records of learner's whole in block generated time section.
Here, the second cryptographic Hash and the learning records obtained are saved in the block body of current block;And pass through and work as
The block head of preceding block is established with a upper block and connected, and the block head of current block, which preserves, believes the index of a upper block
Breath.
In actual implementation, after the second cryptographic Hash and the learning records obtained are saved in current block, if this
One learns having not been completed for stage, also has new learning records generation, then continue at new learning records
It manages and is saved in current block;If the completion in this study stage, current block also establish completion, it is necessary to will
Current block is connected in the corresponding block chain of learner, the learning records preserved so as to renewal learning person in block chain.
Here, if current block is not the first study stage corresponding block of learner, by current block with it is upper
The corresponding block connection of one study stage, generates new block chain;If current block is the first study stage of learner
During corresponding block, illustrate that there are no corresponding block chain, corresponding area is established with current block for the learner by the learner
Block chain, current block is the study stage of learner first corresponding block at this time.
Fig. 4 is the first structure schematic diagram of block chain in the embodiment of the present invention, as shown in figure 4, after learner's birth
For the first time into during kindergarten's study, it is necessary to start to establish block chain for learner, when in first area for establishing learner
, it is necessary to verify the information such as learner's birth certificate, the registered permanent residence location during block, after verification is qualified, the kindergarten of the learner is remembered
Record generation block 1, the learning records in kindergarten's stage are stored in block body 1, the identity information of learner is stored in area
In build 1, the block of generation first 1 and block body 1 are packed into block 1 at this time, and mark upper generated time.When learner is complete
Into kindergarten's school work into small class hour, to primary school's record generation block 2 of the learner, the learning records of primary school period are preserved
In block body 2, preserved wherein in block first 2 to 1 index information of block, it so can be by block first 2 by block 2 and area
Block 1 connects.Same method can generate the block corresponding to junior middle school, senior middle school, university and other study stages, and according to
Generated time is sequentially connected in the corresponding block chain of learner, can so complete the entire life of a learner
The preservation of the learning records in cycle.
Fig. 5 is the second structure diagram of block chain in the embodiment of the present invention, as shown in figure 5, what can be become apparent from sees
Go out between each study stage corresponding block and be sequentially connected with according to generated time.
The learning records of usually each learner are distributed and saveds, some are stored in the archives of learner, by each
School oneself come be responsible for safeguard and keeping.It is dispersed in due to the learning records of learner in different schools, there are school controls
Personnel carelessness cause archives of paper quality lose or school's server by attacked cause electronic data lose possibility.It is in addition, very much
On-line study, vocational training etc. all can not be recorded effectively.Therefore, recorded now for these scattered incomplete students,
Learner is very inconvenient in access or use.As when going abroad in learner academic record, educational background needed to record and win a prize
Record is when come when handling corresponding entries, it is also necessary to search the archives of oneself or each school once learnt is gone to issue phase
Closing proves, adds intractability.Therefore the study in each study stage of learner is remembered using the structure of above-mentioned block chain
Record is preserved, and can existing scattered learning records be realized complete preserve.
In actual implementation, in preceding block before being connected in the corresponding block chain of learner, it is also necessary to which verification is current
The validity of block, concrete implementation method can include:
After school where current learner establishes current block for learner, current block, institute will be sent to all nodes
Having in node has at least that current block described in M node verification is effective, the current block is added in block chain, M takes greatly
In 0 integer.It should be noted that only most of node (such as node more than 50%) all thinks this node institute simultaneously
When the block of generation is effective, block is just allowed to be connected in block chain.
Here, verify that the effective method of the current block can include:It is in the block that node does not preserve received area
At least one learning records, and node determines that received area all learning records in the block are all effective.
In an optional embodiment, node is determining to preserve received area's at least one second cryptographic Hash in the block
When, it determines to preserve received area at least one learning records in the block;Otherwise, it determines received area is not preserved
At least one learning records in the block.That is, on each node, judge whether to search for from existing block chain
To the cryptographic Hash identical with the second cryptographic Hash preserved in received block, if search in received block
The identical cryptographic Hash of at least one second cryptographic Hash, then existing block chain save received area in the block at least one
A learning records;The block for illustrating to receive at this time may be block after being tampered or since sender's error causes
Repetition send etc..And then the node for sending the block can be reminded to reaffirm the block or ignore received area
Block.
In another optional embodiment, node determines that i-th learning records can effectively wrap in received block
It includes:Node obtains corresponding i-th of the signature of i-th learning records in received block, and using default public key to i-th
Signature is decrypted to obtain cryptographic Hash A;I-th learning records progress the first Hash operation generation cryptographic Hash B, i are taken again
It is less than the integer of N more than 0, N is the number of current block learning record, and the default public key is:The default private key
Corresponding public key;When the cryptographic Hash A is equal to cryptographic Hash B, node determines that i-th learning records are effective.
By above-mentioned block generation method and block verification method, the learning records quilt of learner can be effectively avoided
It steals or distorts, so as to ensure the authenticity of learner's whole life cycle learning record.
In the embodiment of the present invention, at least one learning records in the study stage of learner are obtained;To what is obtained
Learning records carry out the first Hash operation and generate corresponding first cryptographic Hash;Using default private key to first cryptographic Hash into
Row encryption generates corresponding signature;Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash;By described
Two cryptographic Hash and the learning records obtained are saved in current block.It in this way, can be by each study stage of learner
All learning records be stored in corresponding block, then these blocks are added to block chain according to the time sequencing of generation
In, which can preserve the global learning record of learner's whole life cycle, ensure that learner's learning records
Integrality and security.
Second embodiment
In order to more embody the purpose of the present invention, on the basis of first embodiment of the invention, established for learner big
It is further illustrated exemplified by study stage corresponding block.
Fig. 6 is the flow chart of the second embodiment of the method preserved the present invention is based on the learning records of block chain technology, should
Method includes:
Step 600:Universities and colleges where learner obtain the right that block is established for learner, and are established for learner and work as proparea
Block.
In this step, universities and colleges where learner are established before block currently to learn personnel, it is necessary to first verify learner's body
The authenticity of part information, if the identity of learner is true, it is also necessary to which the identity information of learner is supplied to it by place universities and colleges
His node, other nodes are secondary verify and confirm after, universities and colleges where allowing establish the area in current study stage for the learner
Block.Here, other nodes can include:The school learnt before educational management department, learner or unit etc..
Illustratively, for learner when having just enter into university, place universities and colleges need the individual currently provided according to learner
Archives establish the corresponding block of university stage for learner.Place universities and colleges, can be from learner's current block before block is established
Identity information, rewards and punishments information etc. of learner is obtained on chain, compared with the Profile provided with learner after, such as
Fruit information is coincide, and can prove the authenticity of learner's identity;Then universities and colleges were once learned to education department and the student where
The identity information that the school practised sends the learner carries out secondary verification, the school that education department and the student once learnt
Can secondary verification be carried out to pupilage by identical method, verify that the identity of learner can effectively prevent and distort shelves
Case or forger, so as to effectively ensure the authenticity of student information, prevent to the distorting of the learning records of learner,
Situations such as replacing, increasing.Universities and colleges establish block for learner where can allowing after other node verification information truths.
Step 601:Obtain the learning records list of learner.
It is understood that place universities and colleges are obtained after establishing the right of block for learner, the learner can be based on
During university preservation in need learning records, generate the learning records list of learner, learning records list be deposited into and is worked as
In preceding block.
Here, learning records list can include:Learner's essential information, learning time, study place, school grade, prize
Punish situation and other information.
Illustratively, place universities and colleges can be total by all learning records of the upper halves of learner when the new term begins for every halves
The learning records list of upper halves is generated after knot, which can be:Score of each subject list, foreign language grade examination achievement
Single, prize-winning certificate, participation activity detail etc..Learning records list is saved in the block of learner again.
In this step, in order to ensure learner information is tampered in source, school needs that special personnel is specified to carry out typing
The learning records list of learner, and audit crew is appointed to examine the learning records list of typing, after examining qualification, just may be used
It is operated with carrying out following preserve.
Step 602:First time Hash operation is carried out to learning records list and generates corresponding first cryptographic Hash.
Preferably, in order to enable the confidentiality of the first cryptographic Hash arrived is stronger, learning records list can be given to add random number
The first cryptographic Hash is generated by hash algorithm again afterwards.
Step 603:The first cryptographic Hash is encrypted the corresponding signature of generation using the private key of place universities and colleges.
It is understood that the first cryptographic Hash is encrypted the corresponding signature of generation in the private key of place universities and colleges, so do
Purpose be:Other nodes can verify the authenticity of the learning records preserved in current block by the public key of the universities and colleges.
Step 604:Second of Hash operation is carried out to signature and generates corresponding second cryptographic Hash.
Step 605:Second cryptographic Hash and corresponding learning records list are saved in current block.
Step 606:Whether the learning tasks of university stage are completed;If so, perform step 607;If not, return to step
601。
Step 607:The foundation of current block is completed, and to other all node broadcasts current blocks.
In this step, complete current block foundation further include the setting to the block head of current block so as to establish with it is upper
The connection of one block.
Step 608:Judge whether current block is effective;If so, perform step 609;If not, perform step 610.
In this step, after all nodes receive current block, if there is at least M node verification to work as in all nodes
Preceding block is effective, and current block is added in block chain, and M takes the integer more than 0.Such as there are at least 12 sections in 20 nodes
Point verification current block is effective, just allows current block being added in block chain.
The verification effective method of current block can include:Educational management department, other schools or unit can be by sentencing
Whether the received block that breaks is already present in current block chain, if so, the possibility for illustrating the block is deceptive information
Or the school during block is established there are the possibility of maloperation, determine that current block is invalid;If not, judge to be connect again
Area's each the learning records list in the block received whether be where the original learning records list that provides of universities and colleges, if so,
Assert that current block is effective;If not, determine that current block is invalid.
Step 609:Current block is connected to the end of current block chain, forms new block chain.
In the specific implementation, the learning records for the learner that can also be recorded according to current block, default evaluation rule
It extracts relevant information and profile's evaluation is carried out to learner, then all profiles to obtaining evaluate and carry out individual always
Knot, the finally personal summary by the learner and all profiles evaluation are saved in the evaluation block chain pre-established.Its
In, evaluation block chain can be the summary information for being used to preserve learner's difference study stage that responsible educational institution establishes, with
Just the study condition in objective appraisal learner difference study stage and personal touch are learner future school work direction and cause
The foundation of the offers such as direction reference.
Illustratively, default evaluation rule can be:By extracting each section's school grade of learner, learner is analyzed
The study subject be good at or be bad at;By learner's rewards and punishments situation, the learning state of learner or personal love are analyzed
It is good;According to existing vocational evaluation test order, the keyword message of needs can also be obtained, so as to draw suitable learner's
Learning areas etc..
Step 610:Refusal current block is connected in current block chain.
Preferably, refusal current block be connected in the block chain of learner after, can also remind universities and colleges' current block without
Effect, please reaffirm block information.
3rd embodiment
For the method for the embodiment of the present invention, the embodiment of the present invention additionally provides a kind of study note based on block chain technology
Record the device preserved.Fig. 7 is that the composition structure for the device that learning records of the embodiment of the present invention based on block chain technology preserve is shown
It is intended to, as shown in fig. 7, the device includes:Described device includes:Acquisition module 700, the first computing module 701, encrypting module
702nd, the second computing module 703 and preserving module 704;Wherein,
Acquisition module 700, for obtaining at least one learning records in learner study stage.
First computing module 701, for the learning records obtained to be carried out with the first Hash operation generation corresponding first
Cryptographic Hash.
Encrypting module 702, for first cryptographic Hash being encrypted using default private key the corresponding signature of generation.
Second computing module 703 carries out the second Hash operation to the signature and generates corresponding second cryptographic Hash.
Second cryptographic Hash and the learning records obtained are saved in current block by preserving module 704.
Preferably, the default private key can include:The private key of school or the private of educational management department where learner
Key.
Described device further includes:Link block;Link block, for not being first of learner in the current block
During habit stage corresponding block, current block block corresponding with upper one study stage is connected, generates new block
Chain.
Described device further includes:Sending module and processing module.
Sending module, for after second cryptographic Hash and the learning records that are obtained are saved in current block, to
All nodes send current block.
Processing module, for when determining that at least current block described in M node verification is effective, the current block to be added
Enter into block chain.
Processing module specifically for not preserving received area's at least one learning records in the block in node, and saves
Point determines that received area's all learning records in the block are all effective, determines that the verification current block is effective.
Optionally, processing module:Received area in the block at least one second is not preserved specifically for the node
Cryptographic Hash determines that the node does not preserve received area's at least one learning records in the block.
Optionally, processing module, specifically for determining that i-th learning records is effective in received block, including:Node
Obtain corresponding i-th of the signature of i-th learning records in received block, and signed to i-th using default public key into
Row decryption obtains cryptographic Hash A;Again i-th learning records are carried out with the generation of the first Hash operation cryptographic Hash B, i and takes small more than 0
In the integer of N, N is the number of current block learning record, and the default public key is:The corresponding public affairs of the default private key
Key;When the cryptographic Hash A is equal to cryptographic Hash B, node determines that i-th learning records are effective.
In practical applications;Wherein, acquisition module 700, the first computing module 701, encrypting module 702, the second computing mould
Block 703 and preserving module 704 can by be located in terminal device central processing unit (Central Processing Unit,
CPU), microprocessor (Micro Processor Unit, MPU), digital signal processor (Digital Signal
Processor, DSP) or the realizations such as field programmable gate array (Field Programmable Gate Array, FPGA).
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program
Product.Therefore, the shape of the embodiment in terms of hardware embodiment, software implementation or combination software and hardware can be used in the present invention
Formula.Moreover, the present invention can be used can use storage in one or more computers for wherein including computer usable program code
The form for the computer program product that medium is implemented on (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided
The processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices is generated for real
The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction generation being stored in the computer-readable memory includes referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to generate computer implemented processing, so as in computer or
The instruction offer performed on other programmable devices is used to implement in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (12)
1. a kind of method that learning records based on block chain technology preserve, which is characterized in that the described method includes:
Obtain at least one learning records in the study stage of learner;
First Hash operation is carried out to the learning records obtained and generates corresponding first cryptographic Hash;
First cryptographic Hash is encrypted using default private key the corresponding signature of generation;
Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash;
Second cryptographic Hash and the learning records obtained are saved in current block.
2. according to the method described in claim 1, it is characterized in that, the default private key includes:School where learner
Private key or the private key of educational management department.
3. according to the method described in claim 1, it is characterized in that, by second cryptographic Hash and the learning records that are obtained
After being saved in current block, the method further includes:The current block is not the first study stage corresponding area of learner
During block, current block block corresponding with upper one study stage is connected, generates new block chain.
4. according to the method described in claim 3, it is characterized in that, the current block includes:Block head and block body;
Correspondingly, it is described that second cryptographic Hash and the learning records obtained are saved in current block and included:By described in
Second cryptographic Hash and the learning records obtained are saved in the block body of current block;
It is described to include current block block connection corresponding with a upper study stage:By the block of the current block
Head is established with a upper block and connected, and the block head of the current block preserves the index information to a upper block.
5. according to the method described in claim 1, it is characterized in that, by second cryptographic Hash and the learning records that are obtained
After being saved in current block, the method further includes:Current block is sent to all nodes, has at least M section in all nodes
When point verifies that the current block is effective, the current block is added in block chain, M takes the integer more than 0.
6. according to the method described in claim 5, it is characterized in that, the verification current block effectively includes:Node is not
Received area's at least one learning records in the block are preserved, and node determines received area all learning records in the block
All effectively.
7. according to the method described in claim 6, it is characterized in that, the method further includes:The node, which does not preserve, to be received
Area's at least one second cryptographic Hash in the block arrived determines that the node does not preserve received area's at least one in the block
Practise record.
8. according to the method described in claim 6, it is characterized in that, node determines i-th learning records in received block
Effectively, including:Node obtains corresponding i-th of the signature of i-th learning records in received block, and uses default public key
I-th of signature is decrypted to obtain cryptographic Hash A;Again i-th learning records are carried out with the first Hash operation generation Hash
Value B, i take the integer for being less than N more than 0, and N is the number of current block learning record, and the default public key is:It is described default
The corresponding public key of private key;
When the cryptographic Hash A is equal to cryptographic Hash B, node determines that i-th learning records are effective.
9. the device that a kind of learning records based on block chain technology preserve, which is characterized in that described device includes:Obtain mould
Block, the first computing module, encrypting module, the second computing module and preserving module;Wherein,
Acquisition module, for obtaining at least one learning records in learner study stage;
First computing module generates corresponding first cryptographic Hash for carrying out the first Hash operation to the learning records obtained;
Encrypting module, for first cryptographic Hash being encrypted using default private key the corresponding signature of generation;
Second computing module carries out the second Hash operation to the signature and generates corresponding second cryptographic Hash;
Second cryptographic Hash and the learning records obtained are saved in current block by preserving module.
10. device according to claim 9, which is characterized in that the default private key includes:School where learner
Private key or the private key of educational management department.
11. device according to claim 9, which is characterized in that described device further includes:Link block;The connection mould
Block, during for not being the first study stage corresponding block of learner in the current block, by the current block with it is upper
The corresponding block connection of one study stage, generates new block chain.
12. device according to claim 9, which is characterized in that described device further includes:Sending module and processing module;
The sending module, for after second cryptographic Hash and the learning records that are obtained are saved in current block, to
All nodes send current block;
The processing module, for when determining that at least current block described in M node verification is effective, the current block to be added
Enter into block chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611069627.8A CN108121498A (en) | 2016-11-28 | 2016-11-28 | The method and apparatus that a kind of learning records based on block chain technology preserve |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611069627.8A CN108121498A (en) | 2016-11-28 | 2016-11-28 | The method and apparatus that a kind of learning records based on block chain technology preserve |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108121498A true CN108121498A (en) | 2018-06-05 |
Family
ID=62224416
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611069627.8A Pending CN108121498A (en) | 2016-11-28 | 2016-11-28 | The method and apparatus that a kind of learning records based on block chain technology preserve |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108121498A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108831524A (en) * | 2018-06-07 | 2018-11-16 | 赛飞特工程技术集团有限公司 | Laborer occupational health management system based on block chain technology |
CN108846293A (en) * | 2018-06-12 | 2018-11-20 | 北京阿尔山金融科技有限公司 | Resume information generation method and device |
CN109146404A (en) * | 2018-07-16 | 2019-01-04 | 付坤元 | A kind of machine examination data processing method and system based on block chain technology |
CN109165134A (en) * | 2018-07-16 | 2019-01-08 | 付坤元 | Machine examination data processing method and system based on block chain technology |
CN109241756A (en) * | 2018-08-20 | 2019-01-18 | 深圳市腾讯网络信息技术有限公司 | Data processing method, system, server and medium based on block chain |
CN109271801A (en) * | 2018-09-25 | 2019-01-25 | 宁波弘讯科技股份有限公司 | Injecting products approaches to IM, server, injection molding machine based on block chain |
CN109299058A (en) * | 2018-11-06 | 2019-02-01 | 北京新唐思创教育科技有限公司 | Academic storage method, academic querying method and computer storage medium |
CN109447858A (en) * | 2018-09-21 | 2019-03-08 | 牛雨丝 | A kind of ubiquitous academic environment construction method based on block chain |
CN109658297A (en) * | 2018-10-15 | 2019-04-19 | 广东工业大学 | A kind of colleges and universities' study track block catenary system |
CN109831501A (en) * | 2019-01-30 | 2019-05-31 | 京东数字科技控股有限公司 | Information dispensing method and system based on block chain |
CN110008287A (en) * | 2019-03-28 | 2019-07-12 | 广州番禺职业技术学院 | A kind of learning life information recording method based on block chain |
CN111159746A (en) * | 2019-12-31 | 2020-05-15 | 北京嗨学网教育科技股份有限公司 | Learning behavior data storage method and device based on block chain technology |
CN111914429A (en) * | 2020-08-12 | 2020-11-10 | 国网河北省电力有限公司培训中心 | Power simulation training learning data management system and method based on block chain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105959307A (en) * | 2016-06-30 | 2016-09-21 | 中国科学院计算技术研究所 | Existence certification and authentication service method and system based on block chain technology |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106130738A (en) * | 2016-08-25 | 2016-11-16 | 杭州天谷信息科技有限公司 | A kind of block catenary system supporting the close algorithm of state |
-
2016
- 2016-11-28 CN CN201611069627.8A patent/CN108121498A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN105959307A (en) * | 2016-06-30 | 2016-09-21 | 中国科学院计算技术研究所 | Existence certification and authentication service method and system based on block chain technology |
CN106130738A (en) * | 2016-08-25 | 2016-11-16 | 杭州天谷信息科技有限公司 | A kind of block catenary system supporting the close algorithm of state |
Non-Patent Citations (2)
Title |
---|
中国区块链应用研究中心: "《图解区块链》", 31 July 2016, 首都经贸大学出版社 * |
梅海涛 等: "区块链的产业现状、存在问题和政策建议", 《中国知网》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108831524A (en) * | 2018-06-07 | 2018-11-16 | 赛飞特工程技术集团有限公司 | Laborer occupational health management system based on block chain technology |
CN108846293A (en) * | 2018-06-12 | 2018-11-20 | 北京阿尔山金融科技有限公司 | Resume information generation method and device |
CN109146404A (en) * | 2018-07-16 | 2019-01-04 | 付坤元 | A kind of machine examination data processing method and system based on block chain technology |
CN109165134A (en) * | 2018-07-16 | 2019-01-08 | 付坤元 | Machine examination data processing method and system based on block chain technology |
CN109241756B (en) * | 2018-08-20 | 2020-01-31 | 深圳市腾讯网络信息技术有限公司 | Data processing method, system, server and medium based on block chain |
CN109241756A (en) * | 2018-08-20 | 2019-01-18 | 深圳市腾讯网络信息技术有限公司 | Data processing method, system, server and medium based on block chain |
CN109447858A (en) * | 2018-09-21 | 2019-03-08 | 牛雨丝 | A kind of ubiquitous academic environment construction method based on block chain |
CN109271801A (en) * | 2018-09-25 | 2019-01-25 | 宁波弘讯科技股份有限公司 | Injecting products approaches to IM, server, injection molding machine based on block chain |
CN109658297A (en) * | 2018-10-15 | 2019-04-19 | 广东工业大学 | A kind of colleges and universities' study track block catenary system |
CN109299058A (en) * | 2018-11-06 | 2019-02-01 | 北京新唐思创教育科技有限公司 | Academic storage method, academic querying method and computer storage medium |
CN109299058B (en) * | 2018-11-06 | 2021-04-09 | 北京新唐思创教育科技有限公司 | Academic calendar storage method, academic calendar query method and computer storage medium |
CN109831501A (en) * | 2019-01-30 | 2019-05-31 | 京东数字科技控股有限公司 | Information dispensing method and system based on block chain |
CN110008287A (en) * | 2019-03-28 | 2019-07-12 | 广州番禺职业技术学院 | A kind of learning life information recording method based on block chain |
CN111159746A (en) * | 2019-12-31 | 2020-05-15 | 北京嗨学网教育科技股份有限公司 | Learning behavior data storage method and device based on block chain technology |
CN111914429A (en) * | 2020-08-12 | 2020-11-10 | 国网河北省电力有限公司培训中心 | Power simulation training learning data management system and method based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108121498A (en) | The method and apparatus that a kind of learning records based on block chain technology preserve | |
Gingerich et al. | Seeing the ‘black box’differently: assessor cognition from three research perspectives | |
Hatfield | Virtuous human hacking: The ethics of social engineering in penetration-testing | |
Adebayo et al. | E-exams system for Nigerian universities with emphasis on security and result integrity | |
CN109801043A (en) | Life cycle learning records authentication device and authentication method based on block chain | |
Green | Redistricting transparency | |
Ayasrah et al. | Blockchain-based student assessment and evaluation: a secure and transparent approach in jordan's tertiary institutions | |
El Koshiry et al. | Unlocking the power of blockchain in education: An overview of innovations and outcomes | |
Younis et al. | The use of computer games for teaching and learning cybersecurity in higher education institutions | |
Rodchua | Effective tools and strategies to promote academic integrity in e-learning | |
Dawson | Cybersecurity: the next academic integrity frontier | |
CN114170045A (en) | Safety education training system based on block chain | |
Isbell et al. | Software engineering of machine learning systems | |
Al Yousufi et al. | Tracking Students’ Progress using Big Data Analytics to enhance student’s Employability: A Review | |
Liao et al. | Research on the trusted online examination systems | |
Henderi et al. | A bitcoin blockchain-based educational digital assets management system | |
Kostopoulos et al. | Blockchain Technology as an Asset for Innovative Educational Applications: A Systematic Review | |
Hjelmås et al. | Full-spectrum information security education: integrating B. Sc., M. Sc., and Ph. D. programs | |
Yesmin et al. | Pandemic effect on education system among university students | |
AbuMansour | Proposed bio-authentication system for question bank in learning management systems | |
Rife | Improving Information Security Awareness Training Through Real-Time Simulation Augmentation | |
Nag et al. | A Conceptual Learning Framework of Cybersecurity Education for Military and Law Enforcement: Workforce Development | |
Kuznetsova et al. | Analysis of Information Risks and Strategies for Protecting Schoolchildren from the Negative Consequences of Digitalization of Education | |
Wisher et al. | Verifying the Learner in distance learning | |
Baneres | Anonymity Privacy filter to assure that an identity is not identifiable within a given set. Anti-plagiarism tool Computer program aimed to detect plagiarism between doc-uments. Assistive technology comprises assistive, adaptive and rehabilitative devices or |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180605 |
|
RJ01 | Rejection of invention patent application after publication |