CN109063432A - User behavior auditing method and device in block chain network - Google Patents

User behavior auditing method and device in block chain network Download PDF

Info

Publication number
CN109063432A
CN109063432A CN201810674989.2A CN201810674989A CN109063432A CN 109063432 A CN109063432 A CN 109063432A CN 201810674989 A CN201810674989 A CN 201810674989A CN 109063432 A CN109063432 A CN 109063432A
Authority
CN
China
Prior art keywords
behavior
unique identification
block chain
chain network
contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810674989.2A
Other languages
Chinese (zh)
Inventor
李锴
张艳菊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Lang run innovation intellectual property operation Co.,Ltd.
Original Assignee
Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chain Technology Co Ltd filed Critical Chain Technology Co Ltd
Priority to CN201810674989.2A priority Critical patent/CN109063432A/en
Publication of CN109063432A publication Critical patent/CN109063432A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Social Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides user behavior auditing method and device in a kind of block chain network, user behavior auditing method includes: the first audit request for receiving auditable unit and sending, wherein includes the corresponding target unique identification of operation behavior in first audit request;Corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein the one-to-one relationship being stored between the corresponding unique identification of operation behavior and operation detail information in the behavior contract;And the corresponding operation detail information of the target unique identification is sent to the auditable unit, so that the auditable unit audits to the operation detail information.The present invention can be realized the audit to user behavior in block chain network, and audit process is rapidly and reliably, and auditing result is accurate.

Description

User behavior auditing method and device in block chain network
Technical field
The present invention relates to block chain technical fields, and in particular to user behavior auditing method and dress in a kind of block chain network It sets.
Background technique
Block chain technology is that algorithm of knowing together with storing data, using distributed node is verified using block linked data structure Guarantee the safety of data transmission and access with more new data, in the way of cryptography, using by automatized script generation to generate The intelligent contract of code composition programs the completely new distributed basis framework and calculation of one kind with operation data.Block link network Point-to-point (P2P, the Peer To Peer) network that network is made of multiple nodes, P2P are one and operate on Transmission Control Protocol Application layer protocol, the node in block chain network is reciprocity each other, and central node is not present in network, and each node can be with Machine connects other nodes, and therefore block chain network has the characteristics that decentralization, includes multiple nodes, node in block chain network All have routing function to carry out point-to-point communication (as sent schedule of dealing) by Ethernet, part of nodes is saved as branch Point provides the service based on block chain to specific user terminal.And relevant important number of trading is stored on the node of block chain According to, it is therefore desirable to the auditing service of opening operation system on block chain node.By configuring audit strategy, auditing service can be with All users are recorded for the modification event of system.Analyze these audit logs, can with help system administrator find for The unauthorized access of system, to identify some security risks.
In the prior art, due to the anonymous characteristic of block chain network, all block chain write-in behaviour completed by trading Identity and the behavior etc. for making corresponding user do not define explicitly, this, which has resulted in block chain operation behavior, becomes to be not easy The problem of supervision, user behavior can not carry out Accurate Analysis by transaction, enables block chain network scalability, service bearer Power also will be greatly reduced.
Therefore, how user behavior audit measure in a kind of block chain network is provided, is a problem to be solved.
Summary of the invention
For the problems of the prior art, the present invention provides user behavior auditing method and dress in a kind of block chain network It sets, can be realized the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate.
In order to solve the above technical problems, the present invention the following technical schemes are provided:
In a first aspect, the present invention provides user behavior auditing method in a kind of block chain network, the user behavior audit Method includes:
Receive the first audit request that auditable unit is sent, wherein include operation behavior in first audit request Corresponding target unique identification;
Corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein the behavior The one-to-one relationship being stored in contract between the corresponding unique identification of operation behavior and operation detail information;
And the corresponding operation detail information of the target unique identification is sent to the auditable unit, so that described Auditable unit audits to the operation detail information.
In one embodiment, the user behavior auditing method further include:
Generate the unique identification of current operation behavior;
And after the completion of current operation behavior, then it is corresponding unique that the operation behavior is stored in the behavior contract Mark and operation detail information.
It is described after the completion of current operation behavior in one embodiment, then the operation behavior is stored in the behavior contract Corresponding unique identification and operation detail information, comprising:
Receive the operation requests that user sends, wherein include user account information and behavior class in the operation requests Type;
After the completion of current operation behavior, whether current operation behavior is judged according to the behavior type in the operation requests For operation behavior;
If so, storing the corresponding unique identification of the operation behavior and operation detail information to the behavior contract.
In one embodiment, before the first audit request that the reception auditable unit is sent, the user behavior audit Method further include:
Behavior contract is generated, and behavior contract is for storing between the unique identification of operation behavior and operation detail information Corresponding relationship.
In one embodiment, first audit request for receiving auditable unit transmission includes:
Receive the second audit request that auditable unit is sent, wherein include inquiry field in second audit request;
It is expert at according to the inquiry field to determine corresponding inquiry list in contract, wherein deposited in the inquiry list Contain each unique identification corresponding with the inquiry field;
The inquiry list is sent to the auditable unit, so that the auditable unit determines mesh according to the inquiry list Unique identification is marked, and transmission includes the first audit request of the target unique identification;
And receive first audit request that the auditable unit is sent.
In one embodiment, the operation detail information include: the user account information of current operation behavior, time of origin, Behavior type, operation content and operating result, and, with the associated operation behavior information of current operation behavior;
Wherein, described to occur for same user account information current with the associated operation behavior information of current operation behavior Before behavior and/or occur other operation behavior information after current behavior.
Second aspect, the present invention provide user behavior auditing method in a kind of block chain network, the user behavior audit Method includes:
The first audit request is sent to block chain network, wherein includes operation behavior pair in first audit request The target unique identification answered;
Receive the operation detail information corresponding with the target unique identification extracted in behavior contract;
And it audits to the corresponding operation detail information of the target unique identification.
It is described to include: to the first audit request of block chain network transmission in one embodiment
The second audit request is sent to block chain network, wherein includes inquiry field in second audit request;
Receive the inquiry list extracted in behavior contract that the block chain network is sent, wherein the inquiry list In be stored with each unique identification corresponding with the inquiry field;
One is selected as target unique identification in each unique identification corresponding with the inquiry field;
And the target unique identification is sent to the block chain network.
The third aspect, the present invention provide user behavior auditing system in a kind of block chain network, the user behavior audit System includes:
First audit request receiving module, for receiving the first audit request of auditable unit transmission, wherein described first It include the corresponding target unique identification of operation behavior in audit request;
Operation detail data obtaining module, for determining corresponding behaviour in behavior contract according to the target unique identification Make detail information, wherein be stored between the corresponding unique identification of operation behavior and operation detail information in the behavior contract One-to-one relationship;
Operation detail information sending module, for the corresponding operation detail information of the target unique identification to be sent to institute Auditable unit is stated, so that the auditable unit audits to the operation detail information.
In one embodiment, the user behavior auditing system further include:
Unique identification generation module, for generating the unique identification of current operation behavior;
Behavior contract update module, for after the completion of current operation behavior, then storing the behaviour in the behavior contract Make the corresponding unique identification of behavior and operation detail information.
In one embodiment, the behavior contract update module includes:
Operation requests receiving unit, for receiving the operation requests of user's transmission, wherein include in the operation requests User account information and behavior type;
Behavior contract storage unit is used for after the completion of current operation behavior, according to the behavior class in the operation requests Type judges whether current operation behavior is operation behavior;If so, by the corresponding unique identification of the operation behavior and operation detail Information is stored to the behavior contract.
In one embodiment, the user behavior auditing system further include:
Behavior contract generation module, for generating behavior contract, and behavior contract is for storing the unique of operation behavior Corresponding relationship between mark and operation detail information.
In one embodiment, the first audit request receiving module includes:
Second audit request reception unit, for receiving the second audit request of auditable unit transmission, wherein described second It include inquiry field in audit request;
List determination unit is inquired, for being expert at according to the inquiry field to determine corresponding inquiry list in contract, Wherein, each unique identification corresponding with the inquiry field is stored in the inquiry list;
List transmission unit is inquired, for the inquiry list to be sent to the auditable unit, so that the audit is single Member determines target unique identification according to the inquiry list, and transmission includes the first audit request of the target unique identification;
First audit request receiving unit, first audit request sent for receiving the auditable unit.
In one embodiment, the operation detail information include: the user account information of current operation behavior, time of origin, Behavior type, operation content and operating result, and, with the associated operation behavior information of current operation behavior;
Wherein, described to occur for same user account information current with the associated operation behavior information of current operation behavior Before behavior and/or occur other operation behavior information after current behavior.
Fourth aspect, the present invention provide a kind of electronic equipment, including first memory, first processor and are stored in first On memory and the computer program that can run on first processor, the first processor realize institute when executing described program The step of stating user behavior auditing method in block chain network.
5th aspect, the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, the calculating Machine program realizes the step of user behavior auditing method in the block chain network when being executed by first processor.
6th aspect, the present invention provide user behavior auditing system in a kind of block chain network, the user behavior audit System includes:
First audit request sending module, for sending the first audit request to block chain network, wherein described first examines It include the corresponding target unique identification of operation behavior in meter request;
Operation detail information receiving module, for receive extracted in behavior contract it is corresponding with the target unique identification Operation detail information;
Audit Module, for auditing to the corresponding operation detail information of the target unique identification.
In one embodiment, the first audit request sending module includes:
Second audit request sending module, for sending the second audit request to block chain network, wherein the second instance It include inquiry field in meter request;
List reception module is inquired, the inquiry column extracted in behavior contract sent for receiving the block chain network Table, wherein each unique identification corresponding with the inquiry field is stored in the inquiry list;
Target unique identification selecting module, in each unique identification corresponding with the inquiry field One is selected as target unique identification;
Target unique identification sending module, for the target unique identification to be sent to the block chain network.
7th aspect, the present invention provide a kind of electronic equipment, including second memory, second processor and are stored in second On memory and the computer program that can run in second processor, the second processor realize institute when executing described program In the block chain network stated the step of user behavior auditing method.
Eighth aspect, the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, the calculating The step of user behavior auditing method in the block chain network is realized when machine program is executed by second processor.
As shown from the above technical solution, the present invention provides user behavior auditing method in a kind of block chain network, passes through use Family behavior auditing method includes: the first audit request for receiving auditable unit and sending, wherein includes in first audit request There is the corresponding target unique identification of operation behavior;Determine that corresponding operation is detailed in behavior contract according to the target unique identification Feelings information, wherein one be stored in the behavior contract between the corresponding unique identification of operation behavior and operation detail information One corresponding relationship;And the corresponding operation detail information of the target unique identification is sent to the auditable unit, so that institute It states auditable unit to audit to the operation detail information, can be realized the audit to user behavior in block chain network, and examine Rapidly and reliably, auditing result is accurate for meter process, and then can carry out to behavior of the user in block chain network effectively and quasi- It really supervises, so that the data of block chain network can more manage, is controllable, is credible, can supervise and can trace to the source.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is the process signal of the first specific embodiment of the user behavior auditing method in present invention implementation one Figure.
Fig. 2 is step 400 in the user behavior auditing method in present invention implementation one and 500 flow diagram.
Fig. 3 is the process signal of second of specific embodiment of the user behavior auditing method in present invention implementation two Figure.
Fig. 4 is the process signal of the third specific embodiment of the user behavior auditing method in present invention implementation three Figure.
Fig. 5 is the behavior contract implementation procedure schematic diagram in concrete example of the present invention.
Fig. 6 is the behavior auditing process schematic in concrete example of the present invention.
Fig. 7 is in the embodiment of the present invention four for realizing user behavior auditing method in the block chain network in embodiment one Block chain network in user behavior auditing system structural schematic diagram.
Fig. 8 is in the embodiment of the present invention five for realizing user behavior auditing method in the block chain network in embodiment one Electronic equipment structural schematic diagram.
Fig. 9 is in the embodiment of the present invention seven for realizing user behavior auditing method in the block chain network in embodiment two Block chain network in user behavior auditing system structural schematic diagram.
Figure 10 is in the embodiment of the present invention eight for realizing user behavior auditing party in the block chain network in embodiment two The structural schematic diagram of the electronic equipment of method.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
The embodiment of the present invention one provides a kind of the first specific implementation of user behavior auditing method in block chain network Mode, referring to Fig. 1, the user behavior auditing method specifically includes following content:
Step 100: receiving the first audit request that auditable unit is sent, wherein include in first audit request The corresponding target unique identification of operation behavior.
In step 100, the block chain network receives the first audit request that auditable unit is sent, first audit It include the corresponding target unique identification of operation behavior in request.It is understood that the block chain network can be presented as A kind of server also may include terminal device in the hardware composition of the block chain network, in addition, the auditable unit can be with For a kind of audit center, and the audit center specifically may be a kind of server, in the hardware composition of the auditable unit It may include terminal device, the terminal device can have display function.Specifically, the terminal device may include intelligence Mobile phone, network machine top box, portable computer, desktop computer, personal digital assistant (PDA), vehicle-mounted is set Flat electronic equipment Standby, intelligent wearable device etc..Wherein, the intelligent wearable device may include smart glasses, smart watches, Intelligent bracelet etc..
The server can be communicated with the terminal device.It can be between the server and the terminal device It is communicated using any suitable network protocol, including the network protocol not yet developed in the application submitting day.The net Network agreement for example may include ICP/IP protocol, UDP/IP agreement, http protocol, HTTPS agreement etc..Certainly, the network association View for example can also include used on above-mentioned agreement RPC agreement (Remote Procedure Call Protocol, far Journey invocation of procedure agreement), REST agreement (Representational State Transfer, declarative state transfer protocol) Deng.
In the foregoing description, it includes the first of target unique identification that the auditable unit is sent to the block chain network Audit request, the block chain network receive first audit request, and read the operation behavior pair in first audit request The target unique identification answered, for executing subsequent step 200.It is understood that the target unique identification is each behaviour Make one in the corresponding unique identification of behavior, and the target unique identification is that auditable unit determines the user to audit Corresponding unique identification, wherein each operation behavior uniquely corresponds to a unique identification, that is to say, that in block In chain network, per the generation of once operation behavior, a corresponding unique identification is all generated, and unique identification can be multidigit Character composition, in a kind of citing, the unique identification can be transaction ID txid (Transaction Identifier).
It is understood that the behavior contract can be provided for for whole operations according to practical application request The corresponding unique identification of behavior and operation detail information are stored, and can be used for corresponding for one or part operation behavior Unique identification and operation detail information stored, in a kind of citing, the behavior contract be used for store transaction behavior pair The unique identification and Transaction Details information answered, the target unique identification are one in the corresponding unique identification of each trading activity It is a, and the target unique identification is that auditable unit determines unique identification corresponding to the user to audit, wherein it is described Each trading activity uniquely corresponds to a unique identification, that is to say, that in block chain network, per once trading activity Occur, all generates a corresponding unique identification.
Step 200: corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein The one-to-one relationship being stored in the behavior contract between the corresponding unique identification of operation behavior and operation detail information.
In step 200, the block chain network is closed according to behavior of the target unique identification in block chain network In about, corresponding operation detail information is extracted, and be stored between unique identification and operation detail information in the behavior contract One-to-one relationship.It is understood that the block chain network is inquired in the unique identification column in the behavior contract Unique identification identical with the target unique identification, and when inquiring the unique identification, search the corresponding operation of the mark Corresponding Transaction Details in detail information column.
In a kind of concrete example, the partial content of the behavior contract is as shown in table 1, and target unique identification is by more Position character, is denoted as txidD;The block chain network inquires txidD in the unique identification column in the behavior contract, and looks into Look for the corresponding operation detail information TD in the corresponding operation detail information column of the txidD.
Table 1
Step 300: the corresponding operation detail information of the target unique identification being sent to the auditable unit, so that institute Auditable unit is stated to audit to the operation detail information.
In step 300, the corresponding operation detail information of the target unique identification is sent to by the block chain network The auditable unit, so that the auditable unit audits to the corresponding operation detail information of the target unique identification.
It is understood that including at least in the operation detail information has: the user account information of current operation behavior, Time of origin, behavior type, transaction content and transaction results, and, with the associated operation behavior information of current operation behavior;Its In, it is described to occur before current behavior with the associated operation behavior information of current operation behavior for same user account information And/or other operation behavior information of generation after current behavior.
As can be seen from the above description, user behavior auditing method in the block chain network that the embodiment of the present invention provides, it can Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can It controls, is credible, can supervise and can trace to the source.
In a specific embodiment, the present invention also provides in user behavior auditing method in the block chain network The generation step of unique identification, referring to fig. 2, the generation step of the unique identification specifically include following content:
Step 400: generating the unique identification of current operation behavior.
Step 500: after the completion of current operation behavior, then it is corresponding only that the operation behavior is stored in the behavior contract One mark and operation detail information.
It is understood that the behavior contract is one kind of intelligent contract, it is a kind of program in machine code finished writing in advance, is One service, and behavior contract externally provide have interface.Wherein, the step 500 specifically includes following content:
Step 501: receiving the operation requests that user sends, wherein include user account information in the operation requests And behavior type.
In step 501, user sends transaction request to the block chain network, and the block chain network receives transaction and asks It asks, and reads user account information and behavior type in the transaction request.
Step 502: after the completion of current operation behavior, current operation being judged according to the behavior type in the operation requests Whether behavior is operation behavior;If so, storing the corresponding unique identification of the operation behavior and operation detail information to described Behavior contract.
In step 400 and 500, user initiates operation requests in block chain network, and block chain network generates current corresponding Operation behavior unique identification, and trigger other intelligent contracts of corresponding non-behavior contract in the block chain network, and Afterwards, the operation behavior of user is completed via other corresponding intelligent contracts, and triggers behavior contract after the completion of the behavior, so that Behavior contract stores the unique identification and operation detail information of current operation behavior.
In the foregoing description, it is corresponding after the block chain network generates the currently unique identification of corresponding operation behavior Other intelligent contracts of non-behavior contract also store the unique identification of the operation behavior.
In a kind of specific implementation, after the completion of current operation behavior, block chain network is deposited using distributed account book Store up the corresponding unique identification of each operation behavior and operation detail information.And behavior contract can also be carried out selectively Storage, and the storage of the selection is the behavior type based on operation behavior, if current operation behavior is trading activity;It will be somebody's turn to do The corresponding unique identification of trading activity and Transaction Details information are stored to the distributed account book, also will be corresponding by the trading activity Unique identification and Transaction Details information store to the behavior contract, to improve subsequent audit efficiency.
In the foregoing description, the behavior type of the operation behavior specifically can wrap containing: user's registration (usrReg), use (usrInfo) is inquired at family, user updates (usrUpdate), user's history change record inquiry (usrHistory), password modification (pwdChange), password (pwdReset), cryptographic check (pwdVerify), user's audit (usrReview), comprehensive system are reset There is (usrExist), user list (usrList), assets additional issue (astAdd), assets contracting in meter inquiry (usrAudit), user Hair (astSub), distribution deposit card (astPublish), level-one distribution audit (astIssue), assets details inquire (astInfo), Assets issue status inquiry (astStatus), transaction (astTrade), inquiry into balance (astAmount), transaction audit (astAudit), data deposit card (rcpBuild), deposit card inquiry (rcpInfo) and deposit the behaviors such as results true (rcpVerify).
Wherein, the operation behavior for belonging to type of transaction includes: assets issue additional (astAdd), assets contracting hair (astSub), Card (astPublish), level-one distribution audit (astIssue), assets details inquiry (astInfo), assets distribution shape are deposited in distribution State inquires (astStatus), transaction (astTrade), inquiry into balance (astAmount) and transaction audit (astAudit).
That is, if the behavior type of current operation behavior is a certain kind in above-mentioned type of transaction, behavior contract The current corresponding unique identification of operation behavior and operation detail information are stored.
Wherein, the user account information of operation behavior, time of origin, behavior type, operation content and operating result, with And with the associated operation behavior information of current operation behavior;Wherein, the described and associated operation behavior information of current operation behavior Occur before current behavior and/or occur other operation behaviors letter after current behavior for same user account information Breath.
In a specific embodiment, the present invention also provides in user behavior auditing method in the block chain network The behavior contract generation step of the step 000 executed before step 100, the behavior contract generation step specifically include in following Hold:
Step 000: generating behavior contract, and behavior contract is used to store the unique identification and operation detail of operation behavior Corresponding relationship between information.
In the foregoing description, user initiates operation requests in block chain network, and block chain network generates current corresponding behaviour Make the unique identification of behavior, and triggers other intelligent contracts of corresponding non-behavior contract in the block chain network, and wherein Other intelligent contracts of non-behavior contract include at least and have identity contract, transaction in assets contract and deposit positive contract, and identity is closed About, transaction in assets contract and positive contract is deposited respectively with the corresponding relationship of the behavior type of operation behavior referring to table 2.
Table 2
As can be seen from the above description, user behavior auditing method in the block chain network that the embodiment of the present invention provides, block All operations of chain are all completed by trading, and can extend many business conducts, the specific business form of expression based on transaction It for the management of user, asset management, deposits and demonstrate,proves management etc., the main object of the present invention is by behavior contract monitor audit block chain Transaction business behavior in network makes the data of block chain network that can more manage, is controllable, is credible, can supervise and can trace to the source.
In a specific embodiment, the present invention also provides walk in user behavior auditing method in the block chain network Rapid 100 specific embodiment, the step 100 specifically include following content:
Step 101: receiving the second audit request that auditable unit is sent, wherein include in second audit request Inquire field.
Step 102: be expert at according to the inquiry field to determine corresponding inquiry list in contract, wherein the inquiry Each unique identification corresponding with the inquiry field is stored in list.
Step 103: the inquiry list being sent to the auditable unit, so that the auditable unit is arranged according to the inquiry Table determines target unique identification, and transmission includes the first audit request of the target unique identification.
Step 104: receiving first audit request that the auditable unit is sent.
In the foregoing description, the present invention also provides block chain network in user behavior auditing method, can be single in audit Member can not clearly need the user of audit for unique identification when, provide a kind of ambiguity matching way, i.e. auditable unit can be with It include that whole unique identifications of this field are looked into obtain only by a certain part field in the unique identification known List is ask, and finds target unique identification corresponding to the user that need to be audited in the inquiry list, so that of the invention User behavior auditing method is more intelligent in the block chain network, can satisfy the facilitation demand of auditable unit.
The embodiment of the present invention two provides a kind of second of specific implementation of user behavior auditing method in block chain network Mode, referring to Fig. 3, the user behavior auditing method specifically includes following content:
Step A00: the first audit request is sent to block chain network, wherein include behaviour in first audit request Make the corresponding target unique identification of behavior.
In step A00, the auditable unit sends the first audit request to block chain network, and the block chain network connects The first audit request that auditable unit is sent is received, includes that the corresponding target of operation behavior is uniquely marked in first audit request Know.
Step B00: the operation detail information corresponding with the target unique identification extracted in behavior contract is received.
In step B00, the determination in behavior contract is corresponding according to the target unique identification for the block chain network Operation detail information, and the corresponding operation detail information of the target unique identification is sent to the auditable unit, it is described to examine It counts unit and receives operation detail information corresponding with the target unique identification.
It is understood that including at least in the operation detail information has: the user account information of current operation behavior, Time of origin, behavior type, operation content and operating result, and, with the associated operation behavior information of current operation behavior;Its In, it is described to occur before current behavior with the associated operation behavior information of current operation behavior for same user account information And/or other operation behavior information of generation after current behavior.
Step C00: it audits to the corresponding operation detail information of the target unique identification.
As can be seen from the above description, user behavior auditing method in the block chain network that the embodiment of the present invention provides, it can Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can It controls, is credible, can supervise and can trace to the source.
In a specific embodiment, the present invention also provides walk in user behavior auditing method in the block chain network The specific embodiment of rapid A00, the step A00 specifically include following content:
Step A01: the second audit request is sent to block chain network, wherein include to look into second audit request Ask field.
Step A02: the inquiry list extracted in behavior contract that the block chain network is sent is received, wherein described Each unique identification corresponding with the inquiry field is stored in inquiry list.
Step A03: in each unique identification corresponding with the inquiry field one is selected as target only One mark.
Step A04: the target unique identification is sent to the block chain network.
In the foregoing description, the present invention also provides block chain network in user behavior auditing method, can be single in audit Member can not clearly need the user of audit for unique identification when, provide a kind of ambiguity matching way, i.e. auditable unit can be with It include that whole unique identifications of this field are looked into obtain only by a certain part field in the unique identification known List is ask, and finds target unique identification corresponding to the user that need to be audited in the inquiry list, so that of the invention User behavior auditing method is more intelligent in the block chain network, can satisfy the facilitation demand of auditable unit.
The embodiment of the present invention three provides a kind of the third specific implementation of user behavior auditing method in block chain network Mode participates in Fig. 4, and the user behavior auditing method specifically includes following content:
S1: deployment block platform chain and the behavior type for determining operation behavior, and, behavior contract is generated and stores, and Behavior contract is used to store the corresponding relationship between the unique identification of operation behavior and operation detail information.
S2: starting the behavior contract, and, other intelligent contracts, wherein other described intelligent contracts include at least: Identity contract deposits card contract and transaction in assets contract.
S3: block chain network receives the operation requests that user sends, and generates unique corresponding unique with the operation requests Mark, wherein include user account information and behavior type in the operation requests.
S4: block chain network triggers other intelligence of corresponding non-behavior contract according to the behavior type of the operation requests Energy contract, to complete operation behavior, wherein other intelligent contracts in the corresponding non-behavior contract, which also store the operation, asks Seek corresponding unique identification.
S5: after current operation behavior completion, the distributed account book storage current operation behavior of the block chain is corresponding The unique identification information and operation detail information.
S6: triggering the behavior contract, so that the corresponding unique mark of behavior contract storage current operation behavior Know information and operation detail information.
S7: auditable unit sends the first audit request to block chain network, wherein includes in first audit request The corresponding target unique identification of operation behavior.
S8: block chain network receives the first audit request that auditable unit is sent.
S9: block chain network determines corresponding operation detail information according to the target unique identification in behavior contract.
S10: the corresponding operation detail information of the target unique identification is sent to the auditable unit by block chain network.
S11: auditable unit receives operation detail information corresponding with the target unique identification.
S12: auditable unit audits to the corresponding operation detail information of the target unique identification.
As can be seen from the above description, user behavior auditing method in the block chain network that the embodiment of the present invention provides, it can Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can It controls, is credible, can supervise and can trace to the source.
In a kind of specific application example, user behavior auditing method is specifically included in following in the block chain network Hold:
(1) behavior type is defined;
When generation user's registration, data deposit the operation of the blocks chains such as card, a block chain transaction, this transaction interface can be submitted Type definition is registration or deposits card operation, trades after running succeeded, can inspire behavior contract execution, behavior contract will record this All information of secondary block chain operation;
(2) behavior contract and transaction are bound one by one, each trade fair generate a unique txid (trade id, This txid is generated by way of sha256, this txid ensure that the uniqueness of id in chain, is safeguarded by block chain frame, this friendship Easy id user bound behavior in block chain network, specific manifestation form are as follows: txid=detail (transaction id=behavior details);
(3) that user of behavior detail records, at what time, done what operation, what operation content is, operation knot Fruit is what what, operation associated behavior be;
(4) behavior record permanently cannot will be deleted and be distorted once record in block chain, and can by txid into The permanent audit of row.
Wherein, behavior contract is specifically defined form as shown in the program in table 3:
Table 3
Wherein, behavior contract implementation procedure is as shown in figure 5, behavior auditing process is as shown in Figure 6.
As can be seen from the above description, user behavior auditing method in the block chain network that the embodiment of the present invention provides, it can Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can It controls, is credible, can supervise and can trace to the source.
The embodiment of the present invention four provides user behavior in a kind of block chain network that can be realized in embodiment one The first specific embodiment of user behavior auditing system in the block chain network of auditing method, referring to Fig. 7, user's row Executing subject for auditing system is block chain network, and the user behavior auditing system specifically includes following content:
First audit request receiving module 10, for receiving the first audit request of auditable unit transmission, wherein described the It include the corresponding target unique identification of operation behavior in one audit request.
Operation detail data obtaining module 20, for determination to be corresponding in behavior contract according to the target unique identification Operation detail information, wherein be stored in the behavior contract the corresponding unique identification of operation behavior and operation detail information it Between one-to-one relationship.
Operation detail information sending module 30, for the corresponding operation detail information of the target unique identification to be sent to The auditable unit, so that the auditable unit audits to the operation detail information.
The embodiment of user behavior auditing system specifically can be used for executing above-mentioned in block chain network provided by the present application The process flow of the embodiment of user behavior systems approach to an audit in block chain network, details are not described herein for function, Ke Yican According to the detailed description of above method embodiment.
As can be seen from the above description, user behavior auditing system in the block chain network that the embodiment of the present invention provides, it can Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can It controls, is credible, can supervise and can trace to the source.
In a specific embodiment, the user behavior auditing system also specifically includes following content:
Unique identification generation module 40, for generating the unique identification of current operation behavior.
Behavior contract update module 50, for after the completion of current operation behavior, then storage should in the behavior contract The corresponding unique identification of operation behavior and operation detail information.
The behavior contract update module 50 specifically includes following content:
Operation requests receiving unit 51, for receiving the operation requests of user's transmission, wherein include in the operation requests There are user account information and behavior type.
Behavior contract storage unit 52 is used for after the completion of current operation behavior, according to the behavior in the operation requests Type judges whether current operation behavior is operation behavior;If so, the corresponding unique identification of the operation behavior and operation is detailed Feelings information is stored to the behavior contract.
The user behavior auditing system also specifically includes following content:
Behavior contract generation module 00, for generating behavior contract, and behavior contract is for storing operation behavior only Corresponding relationship between one mark and operation detail information.
Wherein, the first audit request receiving module 10 includes:
Second audit request reception unit 11, for receiving the second audit request of auditable unit transmission, wherein described the It include inquiry field in two audit requests.List determination unit 12 is inquired, for being expert at according to the inquiry field for contract The corresponding inquiry list of middle determination, wherein be stored in the inquiry list it is corresponding with the inquiry field it is each it is described only One mark.
List transmission unit 13 is inquired, for the inquiry list to be sent to the auditable unit, so that the audit Unit determines target unique identification according to the inquiry list, and transmission includes the first audit request of the target unique identification.
First audit request receiving unit 14, first audit request sent for receiving the auditable unit.
The operation detail information includes: the user account information of current operation behavior, time of origin, behavior type, behaviour Make content and operating result, and, with the associated operation behavior information of current operation behavior;Wherein, described and current operation row For associated operation behavior information be same user account information occur before current behavior and/or occur current line for it Other operation behavior information afterwards.
As can be seen from the above description, user behavior auditing system in the block chain network that the embodiment of the present invention provides, it can Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can It controls, is credible, can supervise and can trace to the source.
In a specific embodiment, the present invention also provides for realizing above-described embodiment one, embodiment two or reality The electronic equipment of user behavior auditing method in the block chain network in example three is applied, and the electronic equipment can specifically include storage Device, processor and storage on a memory and the computer program that can run on a processor, the processor execution journey The step of user behavior auditing method in the block chain network in embodiment one, embodiment two or embodiment three is realized when sequence. Specifically it is illustrated respectively with embodiment five and embodiment eight.The offer of embodiments herein five can be realized above-described embodiment one In block chain network in user behavior auditing method a kind of electronic equipment of Overall Steps specific embodiment, referring to figure 8, the electronic equipment specifically includes following content:
First processor (processor) 1001, the 1002, first communication interface of first memory (memory) (Communications Interface) 1003 and the first bus 1004;
Wherein, the first processor 1001, first memory 1002, the first communication interface 1003 are total by described first Line 1004 completes mutual communication;First communication interface 1003 is for realizing user terminal, block chain network and audit Information transmission between the relevant devices such as unit;
The first processor 1001 is used to call the computer program in the first memory 1002, the processor The Overall Steps in above-described embodiment one are realized when executing the computer program, for example, the processor executes the calculating Following step is realized when machine program:
Step 100: receiving the first audit request that auditable unit is sent, wherein include in first audit request The corresponding target unique identification of operation behavior.
Step 200: corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein The one-to-one relationship being stored in the behavior contract between the corresponding unique identification of operation behavior and operation detail information.
Step 300: the corresponding operation detail information of the target unique identification being sent to the auditable unit, so that institute Auditable unit is stated to audit to the operation detail information.
As can be seen from the above description, the electronic equipment that the embodiment of the present invention provides, can be realized and use in block chain network The audit of family behavior, and audit process is rapidly and reliably, auditing result is accurate, and then can be to user in block chain network Behavior is efficiently and accurately supervised, so that the data of block chain network can more manage, is controllable, is credible, can supervise and can trace back Source.
In a specific embodiment, the present invention also provides for realizing above-described embodiment one, embodiment two or reality The computer readable storage medium for applying user behavior auditing method in the block chain network in example three, is stored thereon with computer journey Sequence realizes the block in embodiment one, embodiment two or embodiment three when the computer program is executed by processor In chain network the step of user behavior auditing method.Specifically it is illustrated respectively with embodiment six and embodiment nine.
Embodiments herein six provides user behavior audit in the block chain network that can be realized in above-described embodiment one A kind of computer readable storage medium of Overall Steps in method is stored with computer journey on the computer readable storage medium Sequence, the computer program realize the Overall Steps of above-described embodiment one when being executed by first processor, for example, first processing Device realizes following step when executing the computer program:
Step 100: receiving the first audit request that auditable unit is sent, wherein include in first audit request The corresponding target unique identification of operation behavior.
Step 200: corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein The one-to-one relationship being stored in the behavior contract between the corresponding unique identification of operation behavior and operation detail information.
Step 300: the corresponding operation detail information of the target unique identification being sent to the auditable unit, so that institute Auditable unit is stated to audit to the operation detail information.
As can be seen from the above description, the computer readable storage medium that the embodiment of the present invention provides, can be realized to block The audit of user behavior in chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be to user in block Behavior in chain network is efficiently and accurately supervised so that the data of block chain network can more manage, is controllable, is credible, can It supervises and can trace to the source.
The embodiment of the present invention seven provides user behavior in a kind of block chain network that can be realized in embodiment two The first specific embodiment of user behavior auditing system in the block chain network of auditing method, referring to Fig. 9, user's row Executing subject for auditing system is block chain network, and the user behavior auditing system specifically includes following content:
First audit request sending module A0, for sending the first audit request to block chain network, wherein described first It include the corresponding target unique identification of operation behavior in audit request.
The first audit request sending module A0 is specifically included:
Second audit request sending module A1, for sending the second audit request to block chain network, wherein described second It include inquiry field in audit request.
List reception modules A 2 is inquired, the inquiry extracted in behavior contract sent for receiving the block chain network List, wherein each unique identification corresponding with the inquiry field is stored in the inquiry list.
Target unique identification selecting module A3, in each unique identification corresponding with the inquiry field In select one as target unique identification.
Target unique identification sending module A4, for the target unique identification to be sent to the block chain network.
Operation detail information receiving module B0 extracting with the target unique identification pair for receiving in behavior contract The operation detail information answered.
Audit Module C0, for auditing to the corresponding operation detail information of the target unique identification.
The embodiment of user behavior auditing system specifically can be used for executing above-mentioned in block chain network provided by the present application The process flow of the embodiment of user behavior systems approach to an audit in block chain network in embodiment two, function is herein no longer It repeats, is referred to the detailed description of above method embodiment.
As can be seen from the above description, user behavior auditing system in the block chain network that the embodiment of the present invention provides, it can Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can It controls, is credible, can supervise and can trace to the source.
Embodiments herein eight provides user behavior audit in the block chain network that can be realized in above-described embodiment two The specific embodiment of a kind of electronic equipment of Overall Steps in method, referring to Figure 10, the electronic equipment specifically includes as follows Content:
Second processor (processor) 1201, the 1202, second communication interface of second memory (memory) (Communications Interface) 1203 and the second bus 1204;
Wherein, the second processor 1201, second memory 1202, the second communication interface 1203 are total by described second Line 1204 completes mutual communication;Second communication interface 1203 is for realizing user terminal, block chain network and audit Information transmission between the relevant devices such as unit;
The second processor 1201 is used to call the computer program in the second memory 1202, the processor The Overall Steps in above-described embodiment one are realized when executing the computer program, for example, the processor executes the calculating Following step is realized when machine program:
Step A00: the first audit request is sent to block chain network, wherein include behaviour in first audit request Make the corresponding target unique identification of behavior.
Step B00: the operation detail information corresponding with the target unique identification extracted in behavior contract is received.
Step C00: it audits to the corresponding operation detail information of the target unique identification.
As can be seen from the above description, the electronic equipment that the embodiment of the present invention provides, can be realized and use in block chain network The audit of family behavior, and audit process is rapidly and reliably, auditing result is accurate, and then can be to user in block chain network Behavior is efficiently and accurately supervised, so that the data of block chain network can more manage, is controllable, is credible, can supervise and can trace back Source.
Embodiments herein nine provides user behavior audit in the block chain network that can be realized in above-described embodiment two A kind of computer readable storage medium of Overall Steps in method is stored with computer journey on the computer readable storage medium Sequence, the computer program realize the Overall Steps of above-described embodiment two when being executed by second processor, for example, the second processing Device realizes following step when executing the computer program:
Step A00: the first audit request is sent to block chain network, wherein include behaviour in first audit request Make the corresponding target unique identification of behavior.
Step B00: the operation detail information corresponding with the target unique identification extracted in behavior contract is received.
Step C00: it audits to the corresponding operation detail information of the target unique identification.
As can be seen from the above description, the computer readable storage medium that the embodiment of the present invention provides, can be realized to block The audit of user behavior in chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be to user in block Behavior in chain network is efficiently and accurately supervised so that the data of block chain network can more manage, is controllable, is credible, can It supervises and can trace to the source.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages, The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller Device: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc. Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (18)

1. user behavior auditing method in a kind of block chain network, which is characterized in that the user behavior auditing method includes:
Receive the first audit request that auditable unit is sent, wherein include that operation behavior is corresponding in first audit request Target unique identification;
Corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein the behavior contract In be stored with one-to-one relationship between the corresponding unique identification of operation behavior and operation detail information;
And the corresponding operation detail information of the target unique identification is sent to the auditable unit, so that the audit Unit audits to the operation detail information.
2. user behavior auditing method according to claim 1, which is characterized in that the user behavior auditing method also wraps It includes:
Generate the unique identification of current operation behavior;
And after the completion of current operation behavior, then the corresponding unique identification of the operation behavior is stored in the behavior contract With operation detail information.
3. user behavior auditing method according to claim 2, which is characterized in that described to be completed in current operation behavior Afterwards, then the corresponding unique identification of the operation behavior and operation detail information are stored in the behavior contract, comprising:
Receive the operation requests that user sends, wherein include user account information and behavior type in the operation requests;
After the completion of current operation behavior, judge whether current operation behavior is behaviour according to the behavior type in the operation requests Make behavior;
If so, storing the corresponding unique identification of the operation behavior and operation detail information to the behavior contract.
4. user behavior auditing method according to claim 1, which is characterized in that sent in the reception auditable unit Before first audit request, the user behavior auditing method further include:
Behavior contract is generated, and behavior contract is used to store pair between the unique identification of operation behavior and operation detail information It should be related to.
5. user behavior auditing method according to claim 1, which is characterized in that for receiving auditable unit and sending One audit request packet includes:
Receive the second audit request that auditable unit is sent, wherein include inquiry field in second audit request;
It is expert at according to the inquiry field to determine corresponding inquiry list in contract, wherein be stored in the inquiry list Each unique identification corresponding with the inquiry field;
The inquiry list is sent to the auditable unit, so that the auditable unit determines target only according to the inquiry list One mark, and transmission includes the first audit request of the target unique identification;
And receive first audit request that the auditable unit is sent.
6. user behavior auditing method according to claim 1, which is characterized in that the operation detail information includes: to work as User account information, time of origin, behavior type, operation content and the operating result of preceding operation behavior, and, with current operation The associated operation behavior information of behavior;
Wherein, described to occur for same user account information in current behavior with the associated operation behavior information of current operation behavior Before and/or occur other operation behavior information after current behavior.
7. user behavior auditing method in a kind of block chain network, which is characterized in that the user behavior auditing method includes:
The first audit request is sent to block chain network, wherein includes that operation behavior is corresponding in first audit request Target unique identification;
Receive the operation detail information corresponding with the target unique identification extracted in behavior contract;
And it audits to the corresponding operation detail information of the target unique identification.
8. user behavior auditing method according to claim 7, which is characterized in that described to send first to block chain network Audit request includes:
The second audit request is sent to block chain network, wherein includes inquiry field in second audit request;
Receive the inquiry list extracted in behavior contract that the block chain network is sent, wherein deposit in the inquiry list Contain each unique identification corresponding with the inquiry field;
One is selected as target unique identification in each unique identification corresponding with the inquiry field;
And the target unique identification is sent to the block chain network.
9. user behavior auditing system in a kind of block chain network, which is characterized in that the user behavior auditing system includes:
First audit request receiving module, for receiving the first audit request of auditable unit transmission, wherein first audit It include the corresponding target unique identification of operation behavior in request;
Operation detail data obtaining module, for determining that corresponding transaction is detailed in behavior contract according to the target unique identification Feelings information, wherein one be stored in the behavior contract between the corresponding unique identification of operation behavior and Transaction Details information One corresponding relationship;
Transaction Details information sending module, for the corresponding Transaction Details information of the target unique identification to be sent to described examine Unit is counted, so that the auditable unit audits to the Transaction Details information.
10. user behavior auditing system according to claim 9, which is characterized in that the user behavior auditing system is also Include:
Unique identification generation module, for generating the unique identification of current operation behavior;
Behavior contract update module, for after the completion of current operation behavior, then storing the operation row in the behavior contract For corresponding unique identification and operation detail information.
11. user behavior auditing system according to claim 10, which is characterized in that the behavior contract update module packet It includes:
Operation requests receiving unit, for receiving the operation requests of user's transmission, wherein include user in the operation requests Account information and behavior type;
Behavior contract storage unit, for being sentenced after the completion of current operation behavior according to the behavior type in the operation requests Whether disconnected current operation behavior is operation behavior;If so, by the corresponding unique identification of the operation behavior and operation detail information It stores to the behavior contract.
12. user behavior auditing system according to claim 9, which is characterized in that the user behavior auditing system is also Include:
Behavior contract generation module, for generating behavior contract, and behavior contract is used to store the unique identification of operation behavior Corresponding relationship between operation detail information.
13. user behavior auditing system according to claim 9, which is characterized in that first audit request receives mould Block includes:
Second audit request reception unit, for receiving the second audit request of auditable unit transmission, wherein second audit It include inquiry field in request;
List determination unit is inquired, determines corresponding inquiry list in contract for being expert at according to the inquiry field, wherein Each unique identification corresponding with the inquiry field is stored in the inquiry list;
List transmission unit is inquired, for the inquiry list to be sent to the auditable unit, so that the auditable unit root Target unique identification is determined according to the inquiry list, and transmission includes the first audit request of the target unique identification;
First audit request receiving unit, first audit request sent for receiving the auditable unit.
14. user behavior auditing system according to claim 9, which is characterized in that
The operation detail information include: the user account information of current operation behavior, time of origin, behavior type, in operation Appearance and operating result, and, with the associated operation behavior information of current operation behavior;
Wherein, described to occur for same user account information in current behavior with the associated operation behavior information of current operation behavior Before and/or occur other operation behavior information after current behavior.
15. user behavior auditing system in a kind of block chain network, which is characterized in that the user behavior auditing system includes:
First audit request sending module, for sending the first audit request to block chain network, wherein first audit is asked It include the corresponding target unique identification of operation behavior in asking;
Operation detail information receiving module, for receiving the behaviour corresponding with the target unique identification extracted in behavior contract Make detail information;
Audit Module, for auditing to the corresponding operation detail information of the target unique identification.
16. user behavior auditing system according to claim 15, which is characterized in that first audit request sends mould Block includes:
Second audit request sending module, for sending the second audit request to block chain network, wherein second audit is asked It include inquiry field in asking;
List reception module is inquired, the inquiry list extracted in behavior contract sent for receiving the block chain network, Wherein, each unique identification corresponding with the inquiry field is stored in the inquiry list;
Target unique identification selecting module, for selecting it in each unique identification corresponding with the inquiry field One is used as target unique identification;
Target unique identification sending module, for the target unique identification to be sent to the block chain network.
17. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor realizes block chain as claimed in any one of claims 1 to 6 when executing described program In network the step of user behavior auditing method, alternatively, the processor realizes claim 7 or 8 institutes when executing described program In the block chain network stated the step of user behavior auditing method.
18. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of processor realizes user behavior auditing method in block chain network as claimed in any one of claims 1 to 6 when executing, or Person realizes user behavior auditing party in block chain network described in claim 7 or 8 when the computer program is executed by processor The step of method.
CN201810674989.2A 2018-06-27 2018-06-27 User behavior auditing method and device in block chain network Withdrawn CN109063432A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810674989.2A CN109063432A (en) 2018-06-27 2018-06-27 User behavior auditing method and device in block chain network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810674989.2A CN109063432A (en) 2018-06-27 2018-06-27 User behavior auditing method and device in block chain network

Publications (1)

Publication Number Publication Date
CN109063432A true CN109063432A (en) 2018-12-21

Family

ID=64821218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810674989.2A Withdrawn CN109063432A (en) 2018-06-27 2018-06-27 User behavior auditing method and device in block chain network

Country Status (1)

Country Link
CN (1) CN109063432A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112152797A (en) * 2020-08-26 2020-12-29 西安电子科技大学 Block chain remote data auditing and monitoring method and system, computer equipment and terminal
CN113536342A (en) * 2021-07-06 2021-10-22 招商银行股份有限公司 Block chain-based evidence storage management method, system, program product and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017011601A1 (en) * 2015-07-14 2017-01-19 Fmr Llc Computationally efficient transfer processing, auditing, and search apparatuses, methods and systems
CN107707410A (en) * 2017-10-26 2018-02-16 上海点融信息科技有限责任公司 Configure method, information processor and the readable storage medium storing program for executing of system audit service
CN107832907A (en) * 2017-09-25 2018-03-23 中央财经大学 Students ' behavior information authentication system based on block chain technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017011601A1 (en) * 2015-07-14 2017-01-19 Fmr Llc Computationally efficient transfer processing, auditing, and search apparatuses, methods and systems
CN107832907A (en) * 2017-09-25 2018-03-23 中央财经大学 Students ' behavior information authentication system based on block chain technology
CN107707410A (en) * 2017-10-26 2018-02-16 上海点融信息科技有限责任公司 Configure method, information processor and the readable storage medium storing program for executing of system audit service

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
章宁等: "一种基于区块链的个人隐私信保护机制", 《计算机应用》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112152797A (en) * 2020-08-26 2020-12-29 西安电子科技大学 Block chain remote data auditing and monitoring method and system, computer equipment and terminal
CN112152797B (en) * 2020-08-26 2021-09-17 西安电子科技大学 Block chain remote data auditing and monitoring method and system, computer equipment and terminal
CN113536342A (en) * 2021-07-06 2021-10-22 招商银行股份有限公司 Block chain-based evidence storage management method, system, program product and storage medium
CN113536342B (en) * 2021-07-06 2024-03-26 招商银行股份有限公司 Block chain-based certificate management method, system, program product and storage medium

Similar Documents

Publication Publication Date Title
CN109150607A (en) Classification management-control method and device for block chain network
CN110417558A (en) Verification method and device, the storage medium and electronic device of signature
CN108898390A (en) Intelligent contract call method and device, electronic equipment based on block chain
CN108932297A (en) A kind of data query, data sharing method, device and equipment
CN107392040A (en) A kind of method and device for checking of knowing together
CN107196900A (en) A kind of method and device for verification of knowing together
CN108537063A (en) A kind of method, apparatus and equipment of data storage
Moustafa et al. Trustworthy stigmergic service compositionand adaptation in decentralized environments
CN108173706A (en) Service marker method, apparatus and equipment under a kind of multiservice system
CN105981331A (en) An entity handle registry to support traffic policy enforcement
CN109426732A (en) A kind of data processing method and device
CN110472974A (en) Assets transfer method, apparatus and system based on block chain intelligence contract
CN108765159A (en) A kind of cochain based on block chain and condition processing method, device and interacted system
CN109547488A (en) A kind of trust data calculating and exchange system based on alliance's block chain
CN109146638A (en) The recognition methods of abnormal financial transaction group and device
CN109582452A (en) A kind of container dispatching method, dispatching device and electronic equipment
CN109117608A (en) A kind of data processing method, device and relevant device
CN110009336A (en) Evidence collecting method and device based on block chain
CN110503435A (en) Transaction method for early warning, device and equipment based on block chain
CN109389386A (en) A kind of barcode scanning control method, apparatus and system
CN110263580A (en) Data processing method, device and block chain node based on block chain
CN110262775A (en) Business rule generation method and device
CN110278255A (en) A kind of method and device of the Internet of Things IOT communication between devices based on block chain
CN109063432A (en) User behavior auditing method and device in block chain network
CN109003090A (en) risk control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210121

Address after: 215163 No. 9 Xuesen Road, Science and Technology City, Suzhou High-tech Zone, Jiangsu Province

Applicant after: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Address before: 100034 4008, 4 floor, 9 building, 56 half moon street, Xicheng District, Beijing.

Applicant before: SINOCHAIN TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
WW01 Invention patent application withdrawn after publication

Application publication date: 20181221

WW01 Invention patent application withdrawn after publication