CN108121498A - The method and apparatus that a kind of learning records based on block chain technology preserve - Google Patents

The method and apparatus that a kind of learning records based on block chain technology preserve Download PDF

Info

Publication number
CN108121498A
CN108121498A CN201611069627.8A CN201611069627A CN108121498A CN 108121498 A CN108121498 A CN 108121498A CN 201611069627 A CN201611069627 A CN 201611069627A CN 108121498 A CN108121498 A CN 108121498A
Authority
CN
China
Prior art keywords
block
learning records
current block
cryptographic hash
learner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611069627.8A
Other languages
Chinese (zh)
Inventor
魏冰
李小文
李昕颖
王欢
杨帅
孔令军
白义
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201611069627.8A priority Critical patent/CN108121498A/en
Publication of CN108121498A publication Critical patent/CN108121498A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Educational Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Educational Administration (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

In the embodiment of the present invention, at least one learning records in the study stage of learner are obtained;First Hash operation is carried out to the learning records obtained and generates corresponding first cryptographic Hash;First cryptographic Hash is encrypted using default private key the corresponding signature of generation;Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash;Second cryptographic Hash and the learning records obtained are saved in current block.The embodiment of the invention also discloses the devices that a kind of learning records based on block chain technology preserve.

Description

The method and apparatus that a kind of learning records based on block chain technology preserve
Technical field
The present invention relates to the sides that Internet technical field more particularly to a kind of learning records based on block chain technology preserve Method and device.
Background technology
It is most important for the safe and complete preservation of the learning records of learner in field of Education and teaching.But at present very More schools and educational management department when being managed to learner's learning records there are many problems, for example, learning records are held It is easily stolen, criminal carries out unfair transaction using the learning records stolen;Learning records are easily tampered, learning records Can be carried out according to the demand of learner it is random increase and delete, lose its original integrality.Therefore existing study Record storing method can not ensure the security and integrality that learning records preserve.
The content of the invention
In order to solve the above technical problems, an embodiment of the present invention is intended to provide a kind of learning records guarantors based on block chain technology The method and apparatus deposited realize the global learning record for preserving learner's whole life cycle, ensure that learner learns note The security of record.
The technical proposal of the invention is realized in this way:
An embodiment of the present invention provides a kind of method that learning records based on block chain technology preserve, including:
Obtain at least one learning records in the study stage of learner;
First Hash operation is carried out to the learning records obtained and generates corresponding first cryptographic Hash;
First cryptographic Hash is encrypted using default private key the corresponding signature of generation;
Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash;
Second cryptographic Hash and the learning records obtained are saved in current block.
In said program, the default private key includes:The private key of school or the private of educational management department where learner Key.
It is described after second cryptographic Hash and the learning records obtained are saved in current block in said program Method further includes:When the current block is not the first study stage corresponding block of learner, by the current block with Upper one learns stage corresponding block connection, generates new block chain.
In said program, the current block includes:Block head and block body;
Correspondingly, it is described that second cryptographic Hash and the learning records obtained are saved in current block and included:It will Second cryptographic Hash and the learning records obtained are saved in the block body of current block;
It is described to include current block block connection corresponding with a upper study stage:By the current block Block head is established with a upper block and connected, and the block head of the current block preserves the index information to a upper block.
It is described after second cryptographic Hash and the learning records obtained are saved in current block in said program Method further includes:Current block is sent to all nodes, has in all nodes at least current block described in M node verification effective When, the current block is added in block chain, M takes the integer more than 0.
In said program, the verification current block effectively includes:It is in the block that node does not preserve received area At least one learning records, and node determines that received area all learning records in the block are all effective.
In said program, the method further includes:The node does not preserve received area in the block at least one the Two cryptographic Hash determine that the node does not preserve received area's at least one learning records in the block.
In said program, node determines that i-th learning records is effective in received block, including:Node acquisition is connect Corresponding i-th of the signature of i-th learning records in the block of receipts, and i-th of signature is decrypted using default public key To cryptographic Hash A;Again i-th learning records are carried out with the first Hash operation generation cryptographic Hash B, i and takes whole less than N more than 0 Number, N are the number of current block learning record, and the default public key is:The corresponding public key of the default private key;It is described When cryptographic Hash A is equal to cryptographic Hash B, node determines that i-th learning records are effective.
The embodiment of the present invention additionally provides the device that a kind of learning records based on block chain technology preserve, described device bag It includes:Described device includes:Acquisition module, the first computing module, encrypting module, the second computing module and preserving module;Wherein,
Acquisition module, for obtaining at least one learning records in learner study stage;
First computing module generates corresponding first Hash for carrying out the first Hash operation to the learning records obtained Value;
Encrypting module, for first cryptographic Hash being encrypted using default private key the corresponding signature of generation;
Second computing module carries out the second Hash operation to the signature and generates corresponding second cryptographic Hash;
Second cryptographic Hash and the learning records obtained are saved in current block by preserving module.
In said program, the default private key includes:The private key of school or the private of educational management department where learner Key.
In said program, described device further includes:Link block;The link block, in the current block not When being the first study stage corresponding block of learner, current block block corresponding with upper one study stage is connected It connects, generates new block chain.
In said program, described device further includes:Sending module and processing module;
The sending module, for second cryptographic Hash and the learning records obtained to be saved in current block Afterwards, current block is sent to all nodes;
The processing module, for when determining that at least current block described in M node verification is effective, working as proparea by described in Block is added in block chain.
In the embodiment of the present invention, at least one learning records in the study stage of learner are obtained;To what is obtained Learning records carry out the first Hash operation and generate corresponding first cryptographic Hash;Using default private key to first cryptographic Hash into Row encryption generates corresponding signature;Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash;By described Two cryptographic Hash and the learning records obtained are saved in current block.It in this way, can be by each study stage of learner All learning records be stored in corresponding block, then these blocks are added to block chain according to the time sequencing of generation In, which can preserve the global learning record of learner's whole life cycle, ensure that learner's learning records Integrality and security.
Description of the drawings
Fig. 1 is the structure diagram of block chain node in the embodiment of the present invention;
Fig. 2 is the flow chart of the method that block chain is established in the embodiment of the present invention;
Fig. 3 is the flow chart of the first embodiment of the method preserved the present invention is based on the learning records of block chain technology;
Fig. 4 is the first structure schematic diagram of block chain in the embodiment of the present invention;
Fig. 5 is the second structure diagram of block chain in the embodiment of the present invention;
Fig. 6 is the flow chart of the second embodiment of the method preserved the present invention is based on the learning records of block chain technology;
Fig. 7 is the composition structure diagram for the device that learning records of the embodiment of the present invention based on block chain technology preserve.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes.
A kind of method that learning records based on block chain technology preserve, wherein block chain are provided in the embodiment of the present invention Also distributed account book is referred to as, is a kind of internet database technology, by decentralization, goes trust collective maintenance one can The technical solution of the database leaned on.
The characteristics of distributed architecture of this decentralization of block chain, can allow each node participating in record Also verify the correctness of other nodes records data simultaneously.Each node is reciprocity, is all that data disclose between node 's.Block chain technology is applied in learning records preservation, can make learning records in the form of electronical record by permanent storage Get off, the file for storing these electronical records is just referred to as " block (block) ".Block be in chronological order one by one successively Generation, each block saves the learning records of its learner's generation during being created, and all blocks take together shape Into the learning records intersection of a learner.
Block caused by one node can send block to other multiple nodes simultaneously and carry out block verification.Only When the whole network major part node (such as more than 50%) all thinks that the block that this node is generated is effective simultaneously, i.e., more than 50% Node comparing result it is consistent after, the validity of block can just obtain the accreditation of all nodes, and block is just allowed to be connected to area In block chain.
Fig. 1 is the structure diagram of block chain node in the embodiment of the present invention, as shown in Figure 1, participating in learner's block chain The node of foundation can have:Educational management department, school, online education mechanism and other educational institutions etc., these nodes all may be used Think that learner creates block or verifies the validity of current block.The foundation of one study stage block of learner is desirable Pass through the mandate of other nodes, it is also desirable to which the verification of other nodes just may be coupled to after verification is qualified in block chain.
Fig. 2 is the flow chart of the method that block chain is established in the embodiment of the present invention.As shown in Fig. 2, it is established for learner During block chain, it is necessary first to be asked according to learning records, build learning records block;Second by formed learning records block, Generate the learning records block chain of learner's Life cycle.
First embodiment
Fig. 3 is the flow chart of the first embodiment of the method preserved the present invention is based on the learning records of block chain technology, such as Shown in Fig. 3, this method includes:
Step 300:Obtain at least one learning records in the study stage of learner.
In actual implementation, a study stage can be following at least one:It is kindergarten, primary school, middle school, senior middle school, big The stages such as, postgraduate, doctor, other vocational educations or training.
At least one learning records can be the global learning records in a study stage in a period, also may be used To be once great examination record, conduct sheet etc..
Step 301:First Hash operation is carried out to the learning records obtained and generates corresponding first cryptographic Hash.
It should be noted that can the first Hash operation directly be carried out to the learning records of acquisition, it can also give what is obtained Learning records carry out the first Hash operation again after adding a random number.
Here, carrying out the hash algorithm that the first Hash operation uses can be:Message Digest 5 (Message-Digest Algorithm 5, MD5), Secure Hash Algorithm (Secure Hash Algorithm, SHA-1) etc..
Step 302:First cryptographic Hash is encrypted using default private key the corresponding signature of generation.
Default private key can include:The private key of school or the private key of educational management department where learner.
In actual implementation, school can preserve learning records of the learner during school, and educational management department can protect Deposit the great examination of learner's participation or the rewards and punishments situation of key activities.Therefore can when need preserve relational learning record when, The first cryptographic Hash is encrypted using the private key of school or educational management department the corresponding signature of generation, in this way, being learned in verification It can only be decrypted by their public key during the validity for practising record and be just able to verify that, avoid the row of malicious modification learning records For.
Step 303:Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash.
It should be noted that the second Hash operation can also may be used with the first Hash operation using identical hash algorithm To be using different hash algorithms.Here, the second Hash operation can be used for whether judging current block learning record Through being stored.
Step 304:Second cryptographic Hash and the learning records obtained are saved in current block.
Current block can include:Block head and block body.Block is successively to generate one by one in chronological order, often One block records all activities that it occurs during being created, and all blocks take together to form a record intersection. All learning records can be completely recorded in these blocks one learner from birth to death.
Wherein block head:The guarantee of integrality is provided for the block for being linked to front and for block chain database, for example, When a block i and upper block i-1 links together, the index information to block i-1 is contained in the block head of block i.Example Such as, can include in block head:
Version number:For indicating the relevant release note of software and agreement;
Father's block cryptographic Hash:For block i to be connected with previous block i-1 in block chain;
Merkle tree roots:For the integrality of rapid verification area data in block;
Timestamp:For recording time of block generation etc..
In addition, block body is used to preserve the learning records of learner's whole in block generated time section.
Here, the second cryptographic Hash and the learning records obtained are saved in the block body of current block;And pass through and work as The block head of preceding block is established with a upper block and connected, and the block head of current block, which preserves, believes the index of a upper block Breath.
In actual implementation, after the second cryptographic Hash and the learning records obtained are saved in current block, if this One learns having not been completed for stage, also has new learning records generation, then continue at new learning records It manages and is saved in current block;If the completion in this study stage, current block also establish completion, it is necessary to will Current block is connected in the corresponding block chain of learner, the learning records preserved so as to renewal learning person in block chain.
Here, if current block is not the first study stage corresponding block of learner, by current block with it is upper The corresponding block connection of one study stage, generates new block chain;If current block is the first study stage of learner During corresponding block, illustrate that there are no corresponding block chain, corresponding area is established with current block for the learner by the learner Block chain, current block is the study stage of learner first corresponding block at this time.
Fig. 4 is the first structure schematic diagram of block chain in the embodiment of the present invention, as shown in figure 4, after learner's birth For the first time into during kindergarten's study, it is necessary to start to establish block chain for learner, when in first area for establishing learner , it is necessary to verify the information such as learner's birth certificate, the registered permanent residence location during block, after verification is qualified, the kindergarten of the learner is remembered Record generation block 1, the learning records in kindergarten's stage are stored in block body 1, the identity information of learner is stored in area In build 1, the block of generation first 1 and block body 1 are packed into block 1 at this time, and mark upper generated time.When learner is complete Into kindergarten's school work into small class hour, to primary school's record generation block 2 of the learner, the learning records of primary school period are preserved In block body 2, preserved wherein in block first 2 to 1 index information of block, it so can be by block first 2 by block 2 and area Block 1 connects.Same method can generate the block corresponding to junior middle school, senior middle school, university and other study stages, and according to Generated time is sequentially connected in the corresponding block chain of learner, can so complete the entire life of a learner The preservation of the learning records in cycle.
Fig. 5 is the second structure diagram of block chain in the embodiment of the present invention, as shown in figure 5, what can be become apparent from sees Go out between each study stage corresponding block and be sequentially connected with according to generated time.
The learning records of usually each learner are distributed and saveds, some are stored in the archives of learner, by each School oneself come be responsible for safeguard and keeping.It is dispersed in due to the learning records of learner in different schools, there are school controls Personnel carelessness cause archives of paper quality lose or school's server by attacked cause electronic data lose possibility.It is in addition, very much On-line study, vocational training etc. all can not be recorded effectively.Therefore, recorded now for these scattered incomplete students, Learner is very inconvenient in access or use.As when going abroad in learner academic record, educational background needed to record and win a prize Record is when come when handling corresponding entries, it is also necessary to search the archives of oneself or each school once learnt is gone to issue phase Closing proves, adds intractability.Therefore the study in each study stage of learner is remembered using the structure of above-mentioned block chain Record is preserved, and can existing scattered learning records be realized complete preserve.
In actual implementation, in preceding block before being connected in the corresponding block chain of learner, it is also necessary to which verification is current The validity of block, concrete implementation method can include:
After school where current learner establishes current block for learner, current block, institute will be sent to all nodes Having in node has at least that current block described in M node verification is effective, the current block is added in block chain, M takes greatly In 0 integer.It should be noted that only most of node (such as node more than 50%) all thinks this node institute simultaneously When the block of generation is effective, block is just allowed to be connected in block chain.
Here, verify that the effective method of the current block can include:It is in the block that node does not preserve received area At least one learning records, and node determines that received area all learning records in the block are all effective.
In an optional embodiment, node is determining to preserve received area's at least one second cryptographic Hash in the block When, it determines to preserve received area at least one learning records in the block;Otherwise, it determines received area is not preserved At least one learning records in the block.That is, on each node, judge whether to search for from existing block chain To the cryptographic Hash identical with the second cryptographic Hash preserved in received block, if search in received block The identical cryptographic Hash of at least one second cryptographic Hash, then existing block chain save received area in the block at least one A learning records;The block for illustrating to receive at this time may be block after being tampered or since sender's error causes Repetition send etc..And then the node for sending the block can be reminded to reaffirm the block or ignore received area Block.
In another optional embodiment, node determines that i-th learning records can effectively wrap in received block It includes:Node obtains corresponding i-th of the signature of i-th learning records in received block, and using default public key to i-th Signature is decrypted to obtain cryptographic Hash A;I-th learning records progress the first Hash operation generation cryptographic Hash B, i are taken again It is less than the integer of N more than 0, N is the number of current block learning record, and the default public key is:The default private key Corresponding public key;When the cryptographic Hash A is equal to cryptographic Hash B, node determines that i-th learning records are effective.
By above-mentioned block generation method and block verification method, the learning records quilt of learner can be effectively avoided It steals or distorts, so as to ensure the authenticity of learner's whole life cycle learning record.
In the embodiment of the present invention, at least one learning records in the study stage of learner are obtained;To what is obtained Learning records carry out the first Hash operation and generate corresponding first cryptographic Hash;Using default private key to first cryptographic Hash into Row encryption generates corresponding signature;Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash;By described Two cryptographic Hash and the learning records obtained are saved in current block.It in this way, can be by each study stage of learner All learning records be stored in corresponding block, then these blocks are added to block chain according to the time sequencing of generation In, which can preserve the global learning record of learner's whole life cycle, ensure that learner's learning records Integrality and security.
Second embodiment
In order to more embody the purpose of the present invention, on the basis of first embodiment of the invention, established for learner big It is further illustrated exemplified by study stage corresponding block.
Fig. 6 is the flow chart of the second embodiment of the method preserved the present invention is based on the learning records of block chain technology, should Method includes:
Step 600:Universities and colleges where learner obtain the right that block is established for learner, and are established for learner and work as proparea Block.
In this step, universities and colleges where learner are established before block currently to learn personnel, it is necessary to first verify learner's body The authenticity of part information, if the identity of learner is true, it is also necessary to which the identity information of learner is supplied to it by place universities and colleges His node, other nodes are secondary verify and confirm after, universities and colleges where allowing establish the area in current study stage for the learner Block.Here, other nodes can include:The school learnt before educational management department, learner or unit etc..
Illustratively, for learner when having just enter into university, place universities and colleges need the individual currently provided according to learner Archives establish the corresponding block of university stage for learner.Place universities and colleges, can be from learner's current block before block is established Identity information, rewards and punishments information etc. of learner is obtained on chain, compared with the Profile provided with learner after, such as Fruit information is coincide, and can prove the authenticity of learner's identity;Then universities and colleges were once learned to education department and the student where The identity information that the school practised sends the learner carries out secondary verification, the school that education department and the student once learnt Can secondary verification be carried out to pupilage by identical method, verify that the identity of learner can effectively prevent and distort shelves Case or forger, so as to effectively ensure the authenticity of student information, prevent to the distorting of the learning records of learner, Situations such as replacing, increasing.Universities and colleges establish block for learner where can allowing after other node verification information truths.
Step 601:Obtain the learning records list of learner.
It is understood that place universities and colleges are obtained after establishing the right of block for learner, the learner can be based on During university preservation in need learning records, generate the learning records list of learner, learning records list be deposited into and is worked as In preceding block.
Here, learning records list can include:Learner's essential information, learning time, study place, school grade, prize Punish situation and other information.
Illustratively, place universities and colleges can be total by all learning records of the upper halves of learner when the new term begins for every halves The learning records list of upper halves is generated after knot, which can be:Score of each subject list, foreign language grade examination achievement Single, prize-winning certificate, participation activity detail etc..Learning records list is saved in the block of learner again.
In this step, in order to ensure learner information is tampered in source, school needs that special personnel is specified to carry out typing The learning records list of learner, and audit crew is appointed to examine the learning records list of typing, after examining qualification, just may be used It is operated with carrying out following preserve.
Step 602:First time Hash operation is carried out to learning records list and generates corresponding first cryptographic Hash.
Preferably, in order to enable the confidentiality of the first cryptographic Hash arrived is stronger, learning records list can be given to add random number The first cryptographic Hash is generated by hash algorithm again afterwards.
Step 603:The first cryptographic Hash is encrypted the corresponding signature of generation using the private key of place universities and colleges.
It is understood that the first cryptographic Hash is encrypted the corresponding signature of generation in the private key of place universities and colleges, so do Purpose be:Other nodes can verify the authenticity of the learning records preserved in current block by the public key of the universities and colleges.
Step 604:Second of Hash operation is carried out to signature and generates corresponding second cryptographic Hash.
Step 605:Second cryptographic Hash and corresponding learning records list are saved in current block.
Step 606:Whether the learning tasks of university stage are completed;If so, perform step 607;If not, return to step 601。
Step 607:The foundation of current block is completed, and to other all node broadcasts current blocks.
In this step, complete current block foundation further include the setting to the block head of current block so as to establish with it is upper The connection of one block.
Step 608:Judge whether current block is effective;If so, perform step 609;If not, perform step 610.
In this step, after all nodes receive current block, if there is at least M node verification to work as in all nodes Preceding block is effective, and current block is added in block chain, and M takes the integer more than 0.Such as there are at least 12 sections in 20 nodes Point verification current block is effective, just allows current block being added in block chain.
The verification effective method of current block can include:Educational management department, other schools or unit can be by sentencing Whether the received block that breaks is already present in current block chain, if so, the possibility for illustrating the block is deceptive information Or the school during block is established there are the possibility of maloperation, determine that current block is invalid;If not, judge to be connect again Area's each the learning records list in the block received whether be where the original learning records list that provides of universities and colleges, if so, Assert that current block is effective;If not, determine that current block is invalid.
Step 609:Current block is connected to the end of current block chain, forms new block chain.
In the specific implementation, the learning records for the learner that can also be recorded according to current block, default evaluation rule It extracts relevant information and profile's evaluation is carried out to learner, then all profiles to obtaining evaluate and carry out individual always Knot, the finally personal summary by the learner and all profiles evaluation are saved in the evaluation block chain pre-established.Its In, evaluation block chain can be the summary information for being used to preserve learner's difference study stage that responsible educational institution establishes, with Just the study condition in objective appraisal learner difference study stage and personal touch are learner future school work direction and cause The foundation of the offers such as direction reference.
Illustratively, default evaluation rule can be:By extracting each section's school grade of learner, learner is analyzed The study subject be good at or be bad at;By learner's rewards and punishments situation, the learning state of learner or personal love are analyzed It is good;According to existing vocational evaluation test order, the keyword message of needs can also be obtained, so as to draw suitable learner's Learning areas etc..
Step 610:Refusal current block is connected in current block chain.
Preferably, refusal current block be connected in the block chain of learner after, can also remind universities and colleges' current block without Effect, please reaffirm block information.
3rd embodiment
For the method for the embodiment of the present invention, the embodiment of the present invention additionally provides a kind of study note based on block chain technology Record the device preserved.Fig. 7 is that the composition structure for the device that learning records of the embodiment of the present invention based on block chain technology preserve is shown It is intended to, as shown in fig. 7, the device includes:Described device includes:Acquisition module 700, the first computing module 701, encrypting module 702nd, the second computing module 703 and preserving module 704;Wherein,
Acquisition module 700, for obtaining at least one learning records in learner study stage.
First computing module 701, for the learning records obtained to be carried out with the first Hash operation generation corresponding first Cryptographic Hash.
Encrypting module 702, for first cryptographic Hash being encrypted using default private key the corresponding signature of generation.
Second computing module 703 carries out the second Hash operation to the signature and generates corresponding second cryptographic Hash.
Second cryptographic Hash and the learning records obtained are saved in current block by preserving module 704.
Preferably, the default private key can include:The private key of school or the private of educational management department where learner Key.
Described device further includes:Link block;Link block, for not being first of learner in the current block During habit stage corresponding block, current block block corresponding with upper one study stage is connected, generates new block Chain.
Described device further includes:Sending module and processing module.
Sending module, for after second cryptographic Hash and the learning records that are obtained are saved in current block, to All nodes send current block.
Processing module, for when determining that at least current block described in M node verification is effective, the current block to be added Enter into block chain.
Processing module specifically for not preserving received area's at least one learning records in the block in node, and saves Point determines that received area's all learning records in the block are all effective, determines that the verification current block is effective.
Optionally, processing module:Received area in the block at least one second is not preserved specifically for the node Cryptographic Hash determines that the node does not preserve received area's at least one learning records in the block.
Optionally, processing module, specifically for determining that i-th learning records is effective in received block, including:Node Obtain corresponding i-th of the signature of i-th learning records in received block, and signed to i-th using default public key into Row decryption obtains cryptographic Hash A;Again i-th learning records are carried out with the generation of the first Hash operation cryptographic Hash B, i and takes small more than 0 In the integer of N, N is the number of current block learning record, and the default public key is:The corresponding public affairs of the default private key Key;When the cryptographic Hash A is equal to cryptographic Hash B, node determines that i-th learning records are effective.
In practical applications;Wherein, acquisition module 700, the first computing module 701, encrypting module 702, the second computing mould Block 703 and preserving module 704 can by be located in terminal device central processing unit (Central Processing Unit, CPU), microprocessor (Micro Processor Unit, MPU), digital signal processor (Digital Signal Processor, DSP) or the realizations such as field programmable gate array (Field Programmable Gate Array, FPGA).
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, the shape of the embodiment in terms of hardware embodiment, software implementation or combination software and hardware can be used in the present invention Formula.Moreover, the present invention can be used can use storage in one or more computers for wherein including computer usable program code The form for the computer program product that medium is implemented on (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided The processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices is generated for real The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction generation being stored in the computer-readable memory includes referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to generate computer implemented processing, so as in computer or The instruction offer performed on other programmable devices is used to implement in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (12)

1. a kind of method that learning records based on block chain technology preserve, which is characterized in that the described method includes:
Obtain at least one learning records in the study stage of learner;
First Hash operation is carried out to the learning records obtained and generates corresponding first cryptographic Hash;
First cryptographic Hash is encrypted using default private key the corresponding signature of generation;
Second Hash operation is carried out to the signature and generates corresponding second cryptographic Hash;
Second cryptographic Hash and the learning records obtained are saved in current block.
2. according to the method described in claim 1, it is characterized in that, the default private key includes:School where learner Private key or the private key of educational management department.
3. according to the method described in claim 1, it is characterized in that, by second cryptographic Hash and the learning records that are obtained After being saved in current block, the method further includes:The current block is not the first study stage corresponding area of learner During block, current block block corresponding with upper one study stage is connected, generates new block chain.
4. according to the method described in claim 3, it is characterized in that, the current block includes:Block head and block body;
Correspondingly, it is described that second cryptographic Hash and the learning records obtained are saved in current block and included:By described in Second cryptographic Hash and the learning records obtained are saved in the block body of current block;
It is described to include current block block connection corresponding with a upper study stage:By the block of the current block Head is established with a upper block and connected, and the block head of the current block preserves the index information to a upper block.
5. according to the method described in claim 1, it is characterized in that, by second cryptographic Hash and the learning records that are obtained After being saved in current block, the method further includes:Current block is sent to all nodes, has at least M section in all nodes When point verifies that the current block is effective, the current block is added in block chain, M takes the integer more than 0.
6. according to the method described in claim 5, it is characterized in that, the verification current block effectively includes:Node is not Received area's at least one learning records in the block are preserved, and node determines received area all learning records in the block All effectively.
7. according to the method described in claim 6, it is characterized in that, the method further includes:The node, which does not preserve, to be received Area's at least one second cryptographic Hash in the block arrived determines that the node does not preserve received area's at least one in the block Practise record.
8. according to the method described in claim 6, it is characterized in that, node determines i-th learning records in received block Effectively, including:Node obtains corresponding i-th of the signature of i-th learning records in received block, and uses default public key I-th of signature is decrypted to obtain cryptographic Hash A;Again i-th learning records are carried out with the first Hash operation generation Hash Value B, i take the integer for being less than N more than 0, and N is the number of current block learning record, and the default public key is:It is described default The corresponding public key of private key;
When the cryptographic Hash A is equal to cryptographic Hash B, node determines that i-th learning records are effective.
9. the device that a kind of learning records based on block chain technology preserve, which is characterized in that described device includes:Obtain mould Block, the first computing module, encrypting module, the second computing module and preserving module;Wherein,
Acquisition module, for obtaining at least one learning records in learner study stage;
First computing module generates corresponding first cryptographic Hash for carrying out the first Hash operation to the learning records obtained;
Encrypting module, for first cryptographic Hash being encrypted using default private key the corresponding signature of generation;
Second computing module carries out the second Hash operation to the signature and generates corresponding second cryptographic Hash;
Second cryptographic Hash and the learning records obtained are saved in current block by preserving module.
10. device according to claim 9, which is characterized in that the default private key includes:School where learner Private key or the private key of educational management department.
11. device according to claim 9, which is characterized in that described device further includes:Link block;The connection mould Block, during for not being the first study stage corresponding block of learner in the current block, by the current block with it is upper The corresponding block connection of one study stage, generates new block chain.
12. device according to claim 9, which is characterized in that described device further includes:Sending module and processing module;
The sending module, for after second cryptographic Hash and the learning records that are obtained are saved in current block, to All nodes send current block;
The processing module, for when determining that at least current block described in M node verification is effective, the current block to be added Enter into block chain.
CN201611069627.8A 2016-11-28 2016-11-28 The method and apparatus that a kind of learning records based on block chain technology preserve Pending CN108121498A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611069627.8A CN108121498A (en) 2016-11-28 2016-11-28 The method and apparatus that a kind of learning records based on block chain technology preserve

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611069627.8A CN108121498A (en) 2016-11-28 2016-11-28 The method and apparatus that a kind of learning records based on block chain technology preserve

Publications (1)

Publication Number Publication Date
CN108121498A true CN108121498A (en) 2018-06-05

Family

ID=62224416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611069627.8A Pending CN108121498A (en) 2016-11-28 2016-11-28 The method and apparatus that a kind of learning records based on block chain technology preserve

Country Status (1)

Country Link
CN (1) CN108121498A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108831524A (en) * 2018-06-07 2018-11-16 赛飞特工程技术集团有限公司 Laborer occupational health management system based on block chain technology
CN108846293A (en) * 2018-06-12 2018-11-20 北京阿尔山金融科技有限公司 Resume information generation method and device
CN109146404A (en) * 2018-07-16 2019-01-04 付坤元 A kind of machine examination data processing method and system based on block chain technology
CN109165134A (en) * 2018-07-16 2019-01-08 付坤元 Machine examination data processing method and system based on block chain technology
CN109241756A (en) * 2018-08-20 2019-01-18 深圳市腾讯网络信息技术有限公司 Data processing method, system, server and medium based on block chain
CN109271801A (en) * 2018-09-25 2019-01-25 宁波弘讯科技股份有限公司 Injecting products approaches to IM, server, injection molding machine based on block chain
CN109299058A (en) * 2018-11-06 2019-02-01 北京新唐思创教育科技有限公司 Academic storage method, academic querying method and computer storage medium
CN109447858A (en) * 2018-09-21 2019-03-08 牛雨丝 A kind of ubiquitous academic environment construction method based on block chain
CN109658297A (en) * 2018-10-15 2019-04-19 广东工业大学 A kind of colleges and universities' study track block catenary system
CN109831501A (en) * 2019-01-30 2019-05-31 京东数字科技控股有限公司 Information dispensing method and system based on block chain
CN110008287A (en) * 2019-03-28 2019-07-12 广州番禺职业技术学院 A kind of learning life information recording method based on block chain
CN111159746A (en) * 2019-12-31 2020-05-15 北京嗨学网教育科技股份有限公司 Learning behavior data storage method and device based on block chain technology
CN111914429A (en) * 2020-08-12 2020-11-10 国网河北省电力有限公司培训中心 Power simulation training learning data management system and method based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106130738A (en) * 2016-08-25 2016-11-16 杭州天谷信息科技有限公司 A kind of block catenary system supporting the close algorithm of state

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology
CN106130738A (en) * 2016-08-25 2016-11-16 杭州天谷信息科技有限公司 A kind of block catenary system supporting the close algorithm of state

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
中国区块链应用研究中心: "《图解区块链》", 31 July 2016, 首都经贸大学出版社 *
梅海涛 等: "区块链的产业现状、存在问题和政策建议", 《中国知网》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108831524A (en) * 2018-06-07 2018-11-16 赛飞特工程技术集团有限公司 Laborer occupational health management system based on block chain technology
CN108846293A (en) * 2018-06-12 2018-11-20 北京阿尔山金融科技有限公司 Resume information generation method and device
CN109146404A (en) * 2018-07-16 2019-01-04 付坤元 A kind of machine examination data processing method and system based on block chain technology
CN109165134A (en) * 2018-07-16 2019-01-08 付坤元 Machine examination data processing method and system based on block chain technology
CN109241756B (en) * 2018-08-20 2020-01-31 深圳市腾讯网络信息技术有限公司 Data processing method, system, server and medium based on block chain
CN109241756A (en) * 2018-08-20 2019-01-18 深圳市腾讯网络信息技术有限公司 Data processing method, system, server and medium based on block chain
CN109447858A (en) * 2018-09-21 2019-03-08 牛雨丝 A kind of ubiquitous academic environment construction method based on block chain
CN109271801A (en) * 2018-09-25 2019-01-25 宁波弘讯科技股份有限公司 Injecting products approaches to IM, server, injection molding machine based on block chain
CN109658297A (en) * 2018-10-15 2019-04-19 广东工业大学 A kind of colleges and universities' study track block catenary system
CN109299058A (en) * 2018-11-06 2019-02-01 北京新唐思创教育科技有限公司 Academic storage method, academic querying method and computer storage medium
CN109299058B (en) * 2018-11-06 2021-04-09 北京新唐思创教育科技有限公司 Academic calendar storage method, academic calendar query method and computer storage medium
CN109831501A (en) * 2019-01-30 2019-05-31 京东数字科技控股有限公司 Information dispensing method and system based on block chain
CN110008287A (en) * 2019-03-28 2019-07-12 广州番禺职业技术学院 A kind of learning life information recording method based on block chain
CN111159746A (en) * 2019-12-31 2020-05-15 北京嗨学网教育科技股份有限公司 Learning behavior data storage method and device based on block chain technology
CN111914429A (en) * 2020-08-12 2020-11-10 国网河北省电力有限公司培训中心 Power simulation training learning data management system and method based on block chain

Similar Documents

Publication Publication Date Title
CN108121498A (en) The method and apparatus that a kind of learning records based on block chain technology preserve
Gingerich et al. Seeing the ‘black box’differently: assessor cognition from three research perspectives
Hatfield Virtuous human hacking: The ethics of social engineering in penetration-testing
Adebayo et al. E-exams system for Nigerian universities with emphasis on security and result integrity
CN109801043A (en) Life cycle learning records authentication device and authentication method based on block chain
Green Redistricting transparency
Ayasrah et al. Blockchain-based student assessment and evaluation: a secure and transparent approach in jordan's tertiary institutions
El Koshiry et al. Unlocking the power of blockchain in education: An overview of innovations and outcomes
Younis et al. The use of computer games for teaching and learning cybersecurity in higher education institutions
Rodchua Effective tools and strategies to promote academic integrity in e-learning
Dawson Cybersecurity: the next academic integrity frontier
CN114170045A (en) Safety education training system based on block chain
Isbell et al. Software engineering of machine learning systems
Al Yousufi et al. Tracking Students’ Progress using Big Data Analytics to enhance student’s Employability: A Review
Liao et al. Research on the trusted online examination systems
Henderi et al. A bitcoin blockchain-based educational digital assets management system
Kostopoulos et al. Blockchain Technology as an Asset for Innovative Educational Applications: A Systematic Review
Hjelmås et al. Full-spectrum information security education: integrating B. Sc., M. Sc., and Ph. D. programs
Yesmin et al. Pandemic effect on education system among university students
AbuMansour Proposed bio-authentication system for question bank in learning management systems
Rife Improving Information Security Awareness Training Through Real-Time Simulation Augmentation
Nag et al. A Conceptual Learning Framework of Cybersecurity Education for Military and Law Enforcement: Workforce Development
Kuznetsova et al. Analysis of Information Risks and Strategies for Protecting Schoolchildren from the Negative Consequences of Digitalization of Education
Wisher et al. Verifying the Learner in distance learning
Baneres Anonymity Privacy filter to assure that an identity is not identifiable within a given set. Anti-plagiarism tool Computer program aimed to detect plagiarism between doc-uments. Assistive technology comprises assistive, adaptive and rehabilitative devices or

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180605

RJ01 Rejection of invention patent application after publication