CN109063432A - User behavior auditing method and device in block chain network - Google Patents
User behavior auditing method and device in block chain network Download PDFInfo
- Publication number
- CN109063432A CN109063432A CN201810674989.2A CN201810674989A CN109063432A CN 109063432 A CN109063432 A CN 109063432A CN 201810674989 A CN201810674989 A CN 201810674989A CN 109063432 A CN109063432 A CN 109063432A
- Authority
- CN
- China
- Prior art keywords
- behavior
- unique identification
- block chain
- chain network
- contract
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Social Psychology (AREA)
- General Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides user behavior auditing method and device in a kind of block chain network, user behavior auditing method includes: the first audit request for receiving auditable unit and sending, wherein includes the corresponding target unique identification of operation behavior in first audit request;Corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein the one-to-one relationship being stored between the corresponding unique identification of operation behavior and operation detail information in the behavior contract;And the corresponding operation detail information of the target unique identification is sent to the auditable unit, so that the auditable unit audits to the operation detail information.The present invention can be realized the audit to user behavior in block chain network, and audit process is rapidly and reliably, and auditing result is accurate.
Description
Technical field
The present invention relates to block chain technical fields, and in particular to user behavior auditing method and dress in a kind of block chain network
It sets.
Background technique
Block chain technology is that algorithm of knowing together with storing data, using distributed node is verified using block linked data structure
Guarantee the safety of data transmission and access with more new data, in the way of cryptography, using by automatized script generation to generate
The intelligent contract of code composition programs the completely new distributed basis framework and calculation of one kind with operation data.Block link network
Point-to-point (P2P, the Peer To Peer) network that network is made of multiple nodes, P2P are one and operate on Transmission Control Protocol
Application layer protocol, the node in block chain network is reciprocity each other, and central node is not present in network, and each node can be with
Machine connects other nodes, and therefore block chain network has the characteristics that decentralization, includes multiple nodes, node in block chain network
All have routing function to carry out point-to-point communication (as sent schedule of dealing) by Ethernet, part of nodes is saved as branch
Point provides the service based on block chain to specific user terminal.And relevant important number of trading is stored on the node of block chain
According to, it is therefore desirable to the auditing service of opening operation system on block chain node.By configuring audit strategy, auditing service can be with
All users are recorded for the modification event of system.Analyze these audit logs, can with help system administrator find for
The unauthorized access of system, to identify some security risks.
In the prior art, due to the anonymous characteristic of block chain network, all block chain write-in behaviour completed by trading
Identity and the behavior etc. for making corresponding user do not define explicitly, this, which has resulted in block chain operation behavior, becomes to be not easy
The problem of supervision, user behavior can not carry out Accurate Analysis by transaction, enables block chain network scalability, service bearer
Power also will be greatly reduced.
Therefore, how user behavior audit measure in a kind of block chain network is provided, is a problem to be solved.
Summary of the invention
For the problems of the prior art, the present invention provides user behavior auditing method and dress in a kind of block chain network
It sets, can be realized the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate.
In order to solve the above technical problems, the present invention the following technical schemes are provided:
In a first aspect, the present invention provides user behavior auditing method in a kind of block chain network, the user behavior audit
Method includes:
Receive the first audit request that auditable unit is sent, wherein include operation behavior in first audit request
Corresponding target unique identification;
Corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein the behavior
The one-to-one relationship being stored in contract between the corresponding unique identification of operation behavior and operation detail information;
And the corresponding operation detail information of the target unique identification is sent to the auditable unit, so that described
Auditable unit audits to the operation detail information.
In one embodiment, the user behavior auditing method further include:
Generate the unique identification of current operation behavior;
And after the completion of current operation behavior, then it is corresponding unique that the operation behavior is stored in the behavior contract
Mark and operation detail information.
It is described after the completion of current operation behavior in one embodiment, then the operation behavior is stored in the behavior contract
Corresponding unique identification and operation detail information, comprising:
Receive the operation requests that user sends, wherein include user account information and behavior class in the operation requests
Type;
After the completion of current operation behavior, whether current operation behavior is judged according to the behavior type in the operation requests
For operation behavior;
If so, storing the corresponding unique identification of the operation behavior and operation detail information to the behavior contract.
In one embodiment, before the first audit request that the reception auditable unit is sent, the user behavior audit
Method further include:
Behavior contract is generated, and behavior contract is for storing between the unique identification of operation behavior and operation detail information
Corresponding relationship.
In one embodiment, first audit request for receiving auditable unit transmission includes:
Receive the second audit request that auditable unit is sent, wherein include inquiry field in second audit request;
It is expert at according to the inquiry field to determine corresponding inquiry list in contract, wherein deposited in the inquiry list
Contain each unique identification corresponding with the inquiry field;
The inquiry list is sent to the auditable unit, so that the auditable unit determines mesh according to the inquiry list
Unique identification is marked, and transmission includes the first audit request of the target unique identification;
And receive first audit request that the auditable unit is sent.
In one embodiment, the operation detail information include: the user account information of current operation behavior, time of origin,
Behavior type, operation content and operating result, and, with the associated operation behavior information of current operation behavior;
Wherein, described to occur for same user account information current with the associated operation behavior information of current operation behavior
Before behavior and/or occur other operation behavior information after current behavior.
Second aspect, the present invention provide user behavior auditing method in a kind of block chain network, the user behavior audit
Method includes:
The first audit request is sent to block chain network, wherein includes operation behavior pair in first audit request
The target unique identification answered;
Receive the operation detail information corresponding with the target unique identification extracted in behavior contract;
And it audits to the corresponding operation detail information of the target unique identification.
It is described to include: to the first audit request of block chain network transmission in one embodiment
The second audit request is sent to block chain network, wherein includes inquiry field in second audit request;
Receive the inquiry list extracted in behavior contract that the block chain network is sent, wherein the inquiry list
In be stored with each unique identification corresponding with the inquiry field;
One is selected as target unique identification in each unique identification corresponding with the inquiry field;
And the target unique identification is sent to the block chain network.
The third aspect, the present invention provide user behavior auditing system in a kind of block chain network, the user behavior audit
System includes:
First audit request receiving module, for receiving the first audit request of auditable unit transmission, wherein described first
It include the corresponding target unique identification of operation behavior in audit request;
Operation detail data obtaining module, for determining corresponding behaviour in behavior contract according to the target unique identification
Make detail information, wherein be stored between the corresponding unique identification of operation behavior and operation detail information in the behavior contract
One-to-one relationship;
Operation detail information sending module, for the corresponding operation detail information of the target unique identification to be sent to institute
Auditable unit is stated, so that the auditable unit audits to the operation detail information.
In one embodiment, the user behavior auditing system further include:
Unique identification generation module, for generating the unique identification of current operation behavior;
Behavior contract update module, for after the completion of current operation behavior, then storing the behaviour in the behavior contract
Make the corresponding unique identification of behavior and operation detail information.
In one embodiment, the behavior contract update module includes:
Operation requests receiving unit, for receiving the operation requests of user's transmission, wherein include in the operation requests
User account information and behavior type;
Behavior contract storage unit is used for after the completion of current operation behavior, according to the behavior class in the operation requests
Type judges whether current operation behavior is operation behavior;If so, by the corresponding unique identification of the operation behavior and operation detail
Information is stored to the behavior contract.
In one embodiment, the user behavior auditing system further include:
Behavior contract generation module, for generating behavior contract, and behavior contract is for storing the unique of operation behavior
Corresponding relationship between mark and operation detail information.
In one embodiment, the first audit request receiving module includes:
Second audit request reception unit, for receiving the second audit request of auditable unit transmission, wherein described second
It include inquiry field in audit request;
List determination unit is inquired, for being expert at according to the inquiry field to determine corresponding inquiry list in contract,
Wherein, each unique identification corresponding with the inquiry field is stored in the inquiry list;
List transmission unit is inquired, for the inquiry list to be sent to the auditable unit, so that the audit is single
Member determines target unique identification according to the inquiry list, and transmission includes the first audit request of the target unique identification;
First audit request receiving unit, first audit request sent for receiving the auditable unit.
In one embodiment, the operation detail information include: the user account information of current operation behavior, time of origin,
Behavior type, operation content and operating result, and, with the associated operation behavior information of current operation behavior;
Wherein, described to occur for same user account information current with the associated operation behavior information of current operation behavior
Before behavior and/or occur other operation behavior information after current behavior.
Fourth aspect, the present invention provide a kind of electronic equipment, including first memory, first processor and are stored in first
On memory and the computer program that can run on first processor, the first processor realize institute when executing described program
The step of stating user behavior auditing method in block chain network.
5th aspect, the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, the calculating
Machine program realizes the step of user behavior auditing method in the block chain network when being executed by first processor.
6th aspect, the present invention provide user behavior auditing system in a kind of block chain network, the user behavior audit
System includes:
First audit request sending module, for sending the first audit request to block chain network, wherein described first examines
It include the corresponding target unique identification of operation behavior in meter request;
Operation detail information receiving module, for receive extracted in behavior contract it is corresponding with the target unique identification
Operation detail information;
Audit Module, for auditing to the corresponding operation detail information of the target unique identification.
In one embodiment, the first audit request sending module includes:
Second audit request sending module, for sending the second audit request to block chain network, wherein the second instance
It include inquiry field in meter request;
List reception module is inquired, the inquiry column extracted in behavior contract sent for receiving the block chain network
Table, wherein each unique identification corresponding with the inquiry field is stored in the inquiry list;
Target unique identification selecting module, in each unique identification corresponding with the inquiry field
One is selected as target unique identification;
Target unique identification sending module, for the target unique identification to be sent to the block chain network.
7th aspect, the present invention provide a kind of electronic equipment, including second memory, second processor and are stored in second
On memory and the computer program that can run in second processor, the second processor realize institute when executing described program
In the block chain network stated the step of user behavior auditing method.
Eighth aspect, the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, the calculating
The step of user behavior auditing method in the block chain network is realized when machine program is executed by second processor.
As shown from the above technical solution, the present invention provides user behavior auditing method in a kind of block chain network, passes through use
Family behavior auditing method includes: the first audit request for receiving auditable unit and sending, wherein includes in first audit request
There is the corresponding target unique identification of operation behavior;Determine that corresponding operation is detailed in behavior contract according to the target unique identification
Feelings information, wherein one be stored in the behavior contract between the corresponding unique identification of operation behavior and operation detail information
One corresponding relationship;And the corresponding operation detail information of the target unique identification is sent to the auditable unit, so that institute
It states auditable unit to audit to the operation detail information, can be realized the audit to user behavior in block chain network, and examine
Rapidly and reliably, auditing result is accurate for meter process, and then can carry out to behavior of the user in block chain network effectively and quasi-
It really supervises, so that the data of block chain network can more manage, is controllable, is credible, can supervise and can trace to the source.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 is the process signal of the first specific embodiment of the user behavior auditing method in present invention implementation one
Figure.
Fig. 2 is step 400 in the user behavior auditing method in present invention implementation one and 500 flow diagram.
Fig. 3 is the process signal of second of specific embodiment of the user behavior auditing method in present invention implementation two
Figure.
Fig. 4 is the process signal of the third specific embodiment of the user behavior auditing method in present invention implementation three
Figure.
Fig. 5 is the behavior contract implementation procedure schematic diagram in concrete example of the present invention.
Fig. 6 is the behavior auditing process schematic in concrete example of the present invention.
Fig. 7 is in the embodiment of the present invention four for realizing user behavior auditing method in the block chain network in embodiment one
Block chain network in user behavior auditing system structural schematic diagram.
Fig. 8 is in the embodiment of the present invention five for realizing user behavior auditing method in the block chain network in embodiment one
Electronic equipment structural schematic diagram.
Fig. 9 is in the embodiment of the present invention seven for realizing user behavior auditing method in the block chain network in embodiment two
Block chain network in user behavior auditing system structural schematic diagram.
Figure 10 is in the embodiment of the present invention eight for realizing user behavior auditing party in the block chain network in embodiment two
The structural schematic diagram of the electronic equipment of method.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, the technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
The embodiment of the present invention one provides a kind of the first specific implementation of user behavior auditing method in block chain network
Mode, referring to Fig. 1, the user behavior auditing method specifically includes following content:
Step 100: receiving the first audit request that auditable unit is sent, wherein include in first audit request
The corresponding target unique identification of operation behavior.
In step 100, the block chain network receives the first audit request that auditable unit is sent, first audit
It include the corresponding target unique identification of operation behavior in request.It is understood that the block chain network can be presented as
A kind of server also may include terminal device in the hardware composition of the block chain network, in addition, the auditable unit can be with
For a kind of audit center, and the audit center specifically may be a kind of server, in the hardware composition of the auditable unit
It may include terminal device, the terminal device can have display function.Specifically, the terminal device may include intelligence
Mobile phone, network machine top box, portable computer, desktop computer, personal digital assistant (PDA), vehicle-mounted is set Flat electronic equipment
Standby, intelligent wearable device etc..Wherein, the intelligent wearable device may include smart glasses, smart watches, Intelligent bracelet etc..
The server can be communicated with the terminal device.It can be between the server and the terminal device
It is communicated using any suitable network protocol, including the network protocol not yet developed in the application submitting day.The net
Network agreement for example may include ICP/IP protocol, UDP/IP agreement, http protocol, HTTPS agreement etc..Certainly, the network association
View for example can also include used on above-mentioned agreement RPC agreement (Remote Procedure Call Protocol, far
Journey invocation of procedure agreement), REST agreement (Representational State Transfer, declarative state transfer protocol)
Deng.
In the foregoing description, it includes the first of target unique identification that the auditable unit is sent to the block chain network
Audit request, the block chain network receive first audit request, and read the operation behavior pair in first audit request
The target unique identification answered, for executing subsequent step 200.It is understood that the target unique identification is each behaviour
Make one in the corresponding unique identification of behavior, and the target unique identification is that auditable unit determines the user to audit
Corresponding unique identification, wherein each operation behavior uniquely corresponds to a unique identification, that is to say, that in block
In chain network, per the generation of once operation behavior, a corresponding unique identification is all generated, and unique identification can be multidigit
Character composition, in a kind of citing, the unique identification can be transaction ID txid (Transaction Identifier).
It is understood that the behavior contract can be provided for for whole operations according to practical application request
The corresponding unique identification of behavior and operation detail information are stored, and can be used for corresponding for one or part operation behavior
Unique identification and operation detail information stored, in a kind of citing, the behavior contract be used for store transaction behavior pair
The unique identification and Transaction Details information answered, the target unique identification are one in the corresponding unique identification of each trading activity
It is a, and the target unique identification is that auditable unit determines unique identification corresponding to the user to audit, wherein it is described
Each trading activity uniquely corresponds to a unique identification, that is to say, that in block chain network, per once trading activity
Occur, all generates a corresponding unique identification.
Step 200: corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein
The one-to-one relationship being stored in the behavior contract between the corresponding unique identification of operation behavior and operation detail information.
In step 200, the block chain network is closed according to behavior of the target unique identification in block chain network
In about, corresponding operation detail information is extracted, and be stored between unique identification and operation detail information in the behavior contract
One-to-one relationship.It is understood that the block chain network is inquired in the unique identification column in the behavior contract
Unique identification identical with the target unique identification, and when inquiring the unique identification, search the corresponding operation of the mark
Corresponding Transaction Details in detail information column.
In a kind of concrete example, the partial content of the behavior contract is as shown in table 1, and target unique identification is by more
Position character, is denoted as txidD;The block chain network inquires txidD in the unique identification column in the behavior contract, and looks into
Look for the corresponding operation detail information TD in the corresponding operation detail information column of the txidD.
Table 1
Step 300: the corresponding operation detail information of the target unique identification being sent to the auditable unit, so that institute
Auditable unit is stated to audit to the operation detail information.
In step 300, the corresponding operation detail information of the target unique identification is sent to by the block chain network
The auditable unit, so that the auditable unit audits to the corresponding operation detail information of the target unique identification.
It is understood that including at least in the operation detail information has: the user account information of current operation behavior,
Time of origin, behavior type, transaction content and transaction results, and, with the associated operation behavior information of current operation behavior;Its
In, it is described to occur before current behavior with the associated operation behavior information of current operation behavior for same user account information
And/or other operation behavior information of generation after current behavior.
As can be seen from the above description, user behavior auditing method in the block chain network that the embodiment of the present invention provides, it can
Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right
Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can
It controls, is credible, can supervise and can trace to the source.
In a specific embodiment, the present invention also provides in user behavior auditing method in the block chain network
The generation step of unique identification, referring to fig. 2, the generation step of the unique identification specifically include following content:
Step 400: generating the unique identification of current operation behavior.
Step 500: after the completion of current operation behavior, then it is corresponding only that the operation behavior is stored in the behavior contract
One mark and operation detail information.
It is understood that the behavior contract is one kind of intelligent contract, it is a kind of program in machine code finished writing in advance, is
One service, and behavior contract externally provide have interface.Wherein, the step 500 specifically includes following content:
Step 501: receiving the operation requests that user sends, wherein include user account information in the operation requests
And behavior type.
In step 501, user sends transaction request to the block chain network, and the block chain network receives transaction and asks
It asks, and reads user account information and behavior type in the transaction request.
Step 502: after the completion of current operation behavior, current operation being judged according to the behavior type in the operation requests
Whether behavior is operation behavior;If so, storing the corresponding unique identification of the operation behavior and operation detail information to described
Behavior contract.
In step 400 and 500, user initiates operation requests in block chain network, and block chain network generates current corresponding
Operation behavior unique identification, and trigger other intelligent contracts of corresponding non-behavior contract in the block chain network, and
Afterwards, the operation behavior of user is completed via other corresponding intelligent contracts, and triggers behavior contract after the completion of the behavior, so that
Behavior contract stores the unique identification and operation detail information of current operation behavior.
In the foregoing description, it is corresponding after the block chain network generates the currently unique identification of corresponding operation behavior
Other intelligent contracts of non-behavior contract also store the unique identification of the operation behavior.
In a kind of specific implementation, after the completion of current operation behavior, block chain network is deposited using distributed account book
Store up the corresponding unique identification of each operation behavior and operation detail information.And behavior contract can also be carried out selectively
Storage, and the storage of the selection is the behavior type based on operation behavior, if current operation behavior is trading activity;It will be somebody's turn to do
The corresponding unique identification of trading activity and Transaction Details information are stored to the distributed account book, also will be corresponding by the trading activity
Unique identification and Transaction Details information store to the behavior contract, to improve subsequent audit efficiency.
In the foregoing description, the behavior type of the operation behavior specifically can wrap containing: user's registration (usrReg), use
(usrInfo) is inquired at family, user updates (usrUpdate), user's history change record inquiry (usrHistory), password modification
(pwdChange), password (pwdReset), cryptographic check (pwdVerify), user's audit (usrReview), comprehensive system are reset
There is (usrExist), user list (usrList), assets additional issue (astAdd), assets contracting in meter inquiry (usrAudit), user
Hair (astSub), distribution deposit card (astPublish), level-one distribution audit (astIssue), assets details inquire (astInfo),
Assets issue status inquiry (astStatus), transaction (astTrade), inquiry into balance (astAmount), transaction audit
(astAudit), data deposit card (rcpBuild), deposit card inquiry (rcpInfo) and deposit the behaviors such as results true (rcpVerify).
Wherein, the operation behavior for belonging to type of transaction includes: assets issue additional (astAdd), assets contracting hair (astSub),
Card (astPublish), level-one distribution audit (astIssue), assets details inquiry (astInfo), assets distribution shape are deposited in distribution
State inquires (astStatus), transaction (astTrade), inquiry into balance (astAmount) and transaction audit (astAudit).
That is, if the behavior type of current operation behavior is a certain kind in above-mentioned type of transaction, behavior contract
The current corresponding unique identification of operation behavior and operation detail information are stored.
Wherein, the user account information of operation behavior, time of origin, behavior type, operation content and operating result, with
And with the associated operation behavior information of current operation behavior;Wherein, the described and associated operation behavior information of current operation behavior
Occur before current behavior and/or occur other operation behaviors letter after current behavior for same user account information
Breath.
In a specific embodiment, the present invention also provides in user behavior auditing method in the block chain network
The behavior contract generation step of the step 000 executed before step 100, the behavior contract generation step specifically include in following
Hold:
Step 000: generating behavior contract, and behavior contract is used to store the unique identification and operation detail of operation behavior
Corresponding relationship between information.
In the foregoing description, user initiates operation requests in block chain network, and block chain network generates current corresponding behaviour
Make the unique identification of behavior, and triggers other intelligent contracts of corresponding non-behavior contract in the block chain network, and wherein
Other intelligent contracts of non-behavior contract include at least and have identity contract, transaction in assets contract and deposit positive contract, and identity is closed
About, transaction in assets contract and positive contract is deposited respectively with the corresponding relationship of the behavior type of operation behavior referring to table 2.
Table 2
As can be seen from the above description, user behavior auditing method in the block chain network that the embodiment of the present invention provides, block
All operations of chain are all completed by trading, and can extend many business conducts, the specific business form of expression based on transaction
It for the management of user, asset management, deposits and demonstrate,proves management etc., the main object of the present invention is by behavior contract monitor audit block chain
Transaction business behavior in network makes the data of block chain network that can more manage, is controllable, is credible, can supervise and can trace to the source.
In a specific embodiment, the present invention also provides walk in user behavior auditing method in the block chain network
Rapid 100 specific embodiment, the step 100 specifically include following content:
Step 101: receiving the second audit request that auditable unit is sent, wherein include in second audit request
Inquire field.
Step 102: be expert at according to the inquiry field to determine corresponding inquiry list in contract, wherein the inquiry
Each unique identification corresponding with the inquiry field is stored in list.
Step 103: the inquiry list being sent to the auditable unit, so that the auditable unit is arranged according to the inquiry
Table determines target unique identification, and transmission includes the first audit request of the target unique identification.
Step 104: receiving first audit request that the auditable unit is sent.
In the foregoing description, the present invention also provides block chain network in user behavior auditing method, can be single in audit
Member can not clearly need the user of audit for unique identification when, provide a kind of ambiguity matching way, i.e. auditable unit can be with
It include that whole unique identifications of this field are looked into obtain only by a certain part field in the unique identification known
List is ask, and finds target unique identification corresponding to the user that need to be audited in the inquiry list, so that of the invention
User behavior auditing method is more intelligent in the block chain network, can satisfy the facilitation demand of auditable unit.
The embodiment of the present invention two provides a kind of second of specific implementation of user behavior auditing method in block chain network
Mode, referring to Fig. 3, the user behavior auditing method specifically includes following content:
Step A00: the first audit request is sent to block chain network, wherein include behaviour in first audit request
Make the corresponding target unique identification of behavior.
In step A00, the auditable unit sends the first audit request to block chain network, and the block chain network connects
The first audit request that auditable unit is sent is received, includes that the corresponding target of operation behavior is uniquely marked in first audit request
Know.
Step B00: the operation detail information corresponding with the target unique identification extracted in behavior contract is received.
In step B00, the determination in behavior contract is corresponding according to the target unique identification for the block chain network
Operation detail information, and the corresponding operation detail information of the target unique identification is sent to the auditable unit, it is described to examine
It counts unit and receives operation detail information corresponding with the target unique identification.
It is understood that including at least in the operation detail information has: the user account information of current operation behavior,
Time of origin, behavior type, operation content and operating result, and, with the associated operation behavior information of current operation behavior;Its
In, it is described to occur before current behavior with the associated operation behavior information of current operation behavior for same user account information
And/or other operation behavior information of generation after current behavior.
Step C00: it audits to the corresponding operation detail information of the target unique identification.
As can be seen from the above description, user behavior auditing method in the block chain network that the embodiment of the present invention provides, it can
Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right
Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can
It controls, is credible, can supervise and can trace to the source.
In a specific embodiment, the present invention also provides walk in user behavior auditing method in the block chain network
The specific embodiment of rapid A00, the step A00 specifically include following content:
Step A01: the second audit request is sent to block chain network, wherein include to look into second audit request
Ask field.
Step A02: the inquiry list extracted in behavior contract that the block chain network is sent is received, wherein described
Each unique identification corresponding with the inquiry field is stored in inquiry list.
Step A03: in each unique identification corresponding with the inquiry field one is selected as target only
One mark.
Step A04: the target unique identification is sent to the block chain network.
In the foregoing description, the present invention also provides block chain network in user behavior auditing method, can be single in audit
Member can not clearly need the user of audit for unique identification when, provide a kind of ambiguity matching way, i.e. auditable unit can be with
It include that whole unique identifications of this field are looked into obtain only by a certain part field in the unique identification known
List is ask, and finds target unique identification corresponding to the user that need to be audited in the inquiry list, so that of the invention
User behavior auditing method is more intelligent in the block chain network, can satisfy the facilitation demand of auditable unit.
The embodiment of the present invention three provides a kind of the third specific implementation of user behavior auditing method in block chain network
Mode participates in Fig. 4, and the user behavior auditing method specifically includes following content:
S1: deployment block platform chain and the behavior type for determining operation behavior, and, behavior contract is generated and stores, and
Behavior contract is used to store the corresponding relationship between the unique identification of operation behavior and operation detail information.
S2: starting the behavior contract, and, other intelligent contracts, wherein other described intelligent contracts include at least:
Identity contract deposits card contract and transaction in assets contract.
S3: block chain network receives the operation requests that user sends, and generates unique corresponding unique with the operation requests
Mark, wherein include user account information and behavior type in the operation requests.
S4: block chain network triggers other intelligence of corresponding non-behavior contract according to the behavior type of the operation requests
Energy contract, to complete operation behavior, wherein other intelligent contracts in the corresponding non-behavior contract, which also store the operation, asks
Seek corresponding unique identification.
S5: after current operation behavior completion, the distributed account book storage current operation behavior of the block chain is corresponding
The unique identification information and operation detail information.
S6: triggering the behavior contract, so that the corresponding unique mark of behavior contract storage current operation behavior
Know information and operation detail information.
S7: auditable unit sends the first audit request to block chain network, wherein includes in first audit request
The corresponding target unique identification of operation behavior.
S8: block chain network receives the first audit request that auditable unit is sent.
S9: block chain network determines corresponding operation detail information according to the target unique identification in behavior contract.
S10: the corresponding operation detail information of the target unique identification is sent to the auditable unit by block chain network.
S11: auditable unit receives operation detail information corresponding with the target unique identification.
S12: auditable unit audits to the corresponding operation detail information of the target unique identification.
As can be seen from the above description, user behavior auditing method in the block chain network that the embodiment of the present invention provides, it can
Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right
Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can
It controls, is credible, can supervise and can trace to the source.
In a kind of specific application example, user behavior auditing method is specifically included in following in the block chain network
Hold:
(1) behavior type is defined;
When generation user's registration, data deposit the operation of the blocks chains such as card, a block chain transaction, this transaction interface can be submitted
Type definition is registration or deposits card operation, trades after running succeeded, can inspire behavior contract execution, behavior contract will record this
All information of secondary block chain operation;
(2) behavior contract and transaction are bound one by one, each trade fair generate a unique txid (trade id,
This txid is generated by way of sha256, this txid ensure that the uniqueness of id in chain, is safeguarded by block chain frame, this friendship
Easy id user bound behavior in block chain network, specific manifestation form are as follows: txid=detail (transaction id=behavior details);
(3) that user of behavior detail records, at what time, done what operation, what operation content is, operation knot
Fruit is what what, operation associated behavior be;
(4) behavior record permanently cannot will be deleted and be distorted once record in block chain, and can by txid into
The permanent audit of row.
Wherein, behavior contract is specifically defined form as shown in the program in table 3:
Table 3
Wherein, behavior contract implementation procedure is as shown in figure 5, behavior auditing process is as shown in Figure 6.
As can be seen from the above description, user behavior auditing method in the block chain network that the embodiment of the present invention provides, it can
Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right
Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can
It controls, is credible, can supervise and can trace to the source.
The embodiment of the present invention four provides user behavior in a kind of block chain network that can be realized in embodiment one
The first specific embodiment of user behavior auditing system in the block chain network of auditing method, referring to Fig. 7, user's row
Executing subject for auditing system is block chain network, and the user behavior auditing system specifically includes following content:
First audit request receiving module 10, for receiving the first audit request of auditable unit transmission, wherein described the
It include the corresponding target unique identification of operation behavior in one audit request.
Operation detail data obtaining module 20, for determination to be corresponding in behavior contract according to the target unique identification
Operation detail information, wherein be stored in the behavior contract the corresponding unique identification of operation behavior and operation detail information it
Between one-to-one relationship.
Operation detail information sending module 30, for the corresponding operation detail information of the target unique identification to be sent to
The auditable unit, so that the auditable unit audits to the operation detail information.
The embodiment of user behavior auditing system specifically can be used for executing above-mentioned in block chain network provided by the present application
The process flow of the embodiment of user behavior systems approach to an audit in block chain network, details are not described herein for function, Ke Yican
According to the detailed description of above method embodiment.
As can be seen from the above description, user behavior auditing system in the block chain network that the embodiment of the present invention provides, it can
Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right
Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can
It controls, is credible, can supervise and can trace to the source.
In a specific embodiment, the user behavior auditing system also specifically includes following content:
Unique identification generation module 40, for generating the unique identification of current operation behavior.
Behavior contract update module 50, for after the completion of current operation behavior, then storage should in the behavior contract
The corresponding unique identification of operation behavior and operation detail information.
The behavior contract update module 50 specifically includes following content:
Operation requests receiving unit 51, for receiving the operation requests of user's transmission, wherein include in the operation requests
There are user account information and behavior type.
Behavior contract storage unit 52 is used for after the completion of current operation behavior, according to the behavior in the operation requests
Type judges whether current operation behavior is operation behavior;If so, the corresponding unique identification of the operation behavior and operation is detailed
Feelings information is stored to the behavior contract.
The user behavior auditing system also specifically includes following content:
Behavior contract generation module 00, for generating behavior contract, and behavior contract is for storing operation behavior only
Corresponding relationship between one mark and operation detail information.
Wherein, the first audit request receiving module 10 includes:
Second audit request reception unit 11, for receiving the second audit request of auditable unit transmission, wherein described the
It include inquiry field in two audit requests.List determination unit 12 is inquired, for being expert at according to the inquiry field for contract
The corresponding inquiry list of middle determination, wherein be stored in the inquiry list it is corresponding with the inquiry field it is each it is described only
One mark.
List transmission unit 13 is inquired, for the inquiry list to be sent to the auditable unit, so that the audit
Unit determines target unique identification according to the inquiry list, and transmission includes the first audit request of the target unique identification.
First audit request receiving unit 14, first audit request sent for receiving the auditable unit.
The operation detail information includes: the user account information of current operation behavior, time of origin, behavior type, behaviour
Make content and operating result, and, with the associated operation behavior information of current operation behavior;Wherein, described and current operation row
For associated operation behavior information be same user account information occur before current behavior and/or occur current line for it
Other operation behavior information afterwards.
As can be seen from the above description, user behavior auditing system in the block chain network that the embodiment of the present invention provides, it can
Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right
Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can
It controls, is credible, can supervise and can trace to the source.
In a specific embodiment, the present invention also provides for realizing above-described embodiment one, embodiment two or reality
The electronic equipment of user behavior auditing method in the block chain network in example three is applied, and the electronic equipment can specifically include storage
Device, processor and storage on a memory and the computer program that can run on a processor, the processor execution journey
The step of user behavior auditing method in the block chain network in embodiment one, embodiment two or embodiment three is realized when sequence.
Specifically it is illustrated respectively with embodiment five and embodiment eight.The offer of embodiments herein five can be realized above-described embodiment one
In block chain network in user behavior auditing method a kind of electronic equipment of Overall Steps specific embodiment, referring to figure
8, the electronic equipment specifically includes following content:
First processor (processor) 1001, the 1002, first communication interface of first memory (memory)
(Communications Interface) 1003 and the first bus 1004;
Wherein, the first processor 1001, first memory 1002, the first communication interface 1003 are total by described first
Line 1004 completes mutual communication;First communication interface 1003 is for realizing user terminal, block chain network and audit
Information transmission between the relevant devices such as unit;
The first processor 1001 is used to call the computer program in the first memory 1002, the processor
The Overall Steps in above-described embodiment one are realized when executing the computer program, for example, the processor executes the calculating
Following step is realized when machine program:
Step 100: receiving the first audit request that auditable unit is sent, wherein include in first audit request
The corresponding target unique identification of operation behavior.
Step 200: corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein
The one-to-one relationship being stored in the behavior contract between the corresponding unique identification of operation behavior and operation detail information.
Step 300: the corresponding operation detail information of the target unique identification being sent to the auditable unit, so that institute
Auditable unit is stated to audit to the operation detail information.
As can be seen from the above description, the electronic equipment that the embodiment of the present invention provides, can be realized and use in block chain network
The audit of family behavior, and audit process is rapidly and reliably, auditing result is accurate, and then can be to user in block chain network
Behavior is efficiently and accurately supervised, so that the data of block chain network can more manage, is controllable, is credible, can supervise and can trace back
Source.
In a specific embodiment, the present invention also provides for realizing above-described embodiment one, embodiment two or reality
The computer readable storage medium for applying user behavior auditing method in the block chain network in example three, is stored thereon with computer journey
Sequence realizes the block in embodiment one, embodiment two or embodiment three when the computer program is executed by processor
In chain network the step of user behavior auditing method.Specifically it is illustrated respectively with embodiment six and embodiment nine.
Embodiments herein six provides user behavior audit in the block chain network that can be realized in above-described embodiment one
A kind of computer readable storage medium of Overall Steps in method is stored with computer journey on the computer readable storage medium
Sequence, the computer program realize the Overall Steps of above-described embodiment one when being executed by first processor, for example, first processing
Device realizes following step when executing the computer program:
Step 100: receiving the first audit request that auditable unit is sent, wherein include in first audit request
The corresponding target unique identification of operation behavior.
Step 200: corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein
The one-to-one relationship being stored in the behavior contract between the corresponding unique identification of operation behavior and operation detail information.
Step 300: the corresponding operation detail information of the target unique identification being sent to the auditable unit, so that institute
Auditable unit is stated to audit to the operation detail information.
As can be seen from the above description, the computer readable storage medium that the embodiment of the present invention provides, can be realized to block
The audit of user behavior in chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be to user in block
Behavior in chain network is efficiently and accurately supervised so that the data of block chain network can more manage, is controllable, is credible, can
It supervises and can trace to the source.
The embodiment of the present invention seven provides user behavior in a kind of block chain network that can be realized in embodiment two
The first specific embodiment of user behavior auditing system in the block chain network of auditing method, referring to Fig. 9, user's row
Executing subject for auditing system is block chain network, and the user behavior auditing system specifically includes following content:
First audit request sending module A0, for sending the first audit request to block chain network, wherein described first
It include the corresponding target unique identification of operation behavior in audit request.
The first audit request sending module A0 is specifically included:
Second audit request sending module A1, for sending the second audit request to block chain network, wherein described second
It include inquiry field in audit request.
List reception modules A 2 is inquired, the inquiry extracted in behavior contract sent for receiving the block chain network
List, wherein each unique identification corresponding with the inquiry field is stored in the inquiry list.
Target unique identification selecting module A3, in each unique identification corresponding with the inquiry field
In select one as target unique identification.
Target unique identification sending module A4, for the target unique identification to be sent to the block chain network.
Operation detail information receiving module B0 extracting with the target unique identification pair for receiving in behavior contract
The operation detail information answered.
Audit Module C0, for auditing to the corresponding operation detail information of the target unique identification.
The embodiment of user behavior auditing system specifically can be used for executing above-mentioned in block chain network provided by the present application
The process flow of the embodiment of user behavior systems approach to an audit in block chain network in embodiment two, function is herein no longer
It repeats, is referred to the detailed description of above method embodiment.
As can be seen from the above description, user behavior auditing system in the block chain network that the embodiment of the present invention provides, it can
Realize the audit to user behavior in block chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be right
Behavior of the user in block chain network is efficiently and accurately supervised so that the data of block chain network can more manage, can
It controls, is credible, can supervise and can trace to the source.
Embodiments herein eight provides user behavior audit in the block chain network that can be realized in above-described embodiment two
The specific embodiment of a kind of electronic equipment of Overall Steps in method, referring to Figure 10, the electronic equipment specifically includes as follows
Content:
Second processor (processor) 1201, the 1202, second communication interface of second memory (memory)
(Communications Interface) 1203 and the second bus 1204;
Wherein, the second processor 1201, second memory 1202, the second communication interface 1203 are total by described second
Line 1204 completes mutual communication;Second communication interface 1203 is for realizing user terminal, block chain network and audit
Information transmission between the relevant devices such as unit;
The second processor 1201 is used to call the computer program in the second memory 1202, the processor
The Overall Steps in above-described embodiment one are realized when executing the computer program, for example, the processor executes the calculating
Following step is realized when machine program:
Step A00: the first audit request is sent to block chain network, wherein include behaviour in first audit request
Make the corresponding target unique identification of behavior.
Step B00: the operation detail information corresponding with the target unique identification extracted in behavior contract is received.
Step C00: it audits to the corresponding operation detail information of the target unique identification.
As can be seen from the above description, the electronic equipment that the embodiment of the present invention provides, can be realized and use in block chain network
The audit of family behavior, and audit process is rapidly and reliably, auditing result is accurate, and then can be to user in block chain network
Behavior is efficiently and accurately supervised, so that the data of block chain network can more manage, is controllable, is credible, can supervise and can trace back
Source.
Embodiments herein nine provides user behavior audit in the block chain network that can be realized in above-described embodiment two
A kind of computer readable storage medium of Overall Steps in method is stored with computer journey on the computer readable storage medium
Sequence, the computer program realize the Overall Steps of above-described embodiment two when being executed by second processor, for example, the second processing
Device realizes following step when executing the computer program:
Step A00: the first audit request is sent to block chain network, wherein include behaviour in first audit request
Make the corresponding target unique identification of behavior.
Step B00: the operation detail information corresponding with the target unique identification extracted in behavior contract is received.
Step C00: it audits to the corresponding operation detail information of the target unique identification.
As can be seen from the above description, the computer readable storage medium that the embodiment of the present invention provides, can be realized to block
The audit of user behavior in chain network, and audit process is rapidly and reliably, auditing result is accurate, and then can be to user in block
Behavior in chain network is efficiently and accurately supervised so that the data of block chain network can more manage, is controllable, is credible, can
It supervises and can trace to the source.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker
Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer
This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can
Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller
Device: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited
Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to
Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic
Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc.
Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it
The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions
For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (18)
1. user behavior auditing method in a kind of block chain network, which is characterized in that the user behavior auditing method includes:
Receive the first audit request that auditable unit is sent, wherein include that operation behavior is corresponding in first audit request
Target unique identification;
Corresponding operation detail information is determined in behavior contract according to the target unique identification, wherein the behavior contract
In be stored with one-to-one relationship between the corresponding unique identification of operation behavior and operation detail information;
And the corresponding operation detail information of the target unique identification is sent to the auditable unit, so that the audit
Unit audits to the operation detail information.
2. user behavior auditing method according to claim 1, which is characterized in that the user behavior auditing method also wraps
It includes:
Generate the unique identification of current operation behavior;
And after the completion of current operation behavior, then the corresponding unique identification of the operation behavior is stored in the behavior contract
With operation detail information.
3. user behavior auditing method according to claim 2, which is characterized in that described to be completed in current operation behavior
Afterwards, then the corresponding unique identification of the operation behavior and operation detail information are stored in the behavior contract, comprising:
Receive the operation requests that user sends, wherein include user account information and behavior type in the operation requests;
After the completion of current operation behavior, judge whether current operation behavior is behaviour according to the behavior type in the operation requests
Make behavior;
If so, storing the corresponding unique identification of the operation behavior and operation detail information to the behavior contract.
4. user behavior auditing method according to claim 1, which is characterized in that sent in the reception auditable unit
Before first audit request, the user behavior auditing method further include:
Behavior contract is generated, and behavior contract is used to store pair between the unique identification of operation behavior and operation detail information
It should be related to.
5. user behavior auditing method according to claim 1, which is characterized in that for receiving auditable unit and sending
One audit request packet includes:
Receive the second audit request that auditable unit is sent, wherein include inquiry field in second audit request;
It is expert at according to the inquiry field to determine corresponding inquiry list in contract, wherein be stored in the inquiry list
Each unique identification corresponding with the inquiry field;
The inquiry list is sent to the auditable unit, so that the auditable unit determines target only according to the inquiry list
One mark, and transmission includes the first audit request of the target unique identification;
And receive first audit request that the auditable unit is sent.
6. user behavior auditing method according to claim 1, which is characterized in that the operation detail information includes: to work as
User account information, time of origin, behavior type, operation content and the operating result of preceding operation behavior, and, with current operation
The associated operation behavior information of behavior;
Wherein, described to occur for same user account information in current behavior with the associated operation behavior information of current operation behavior
Before and/or occur other operation behavior information after current behavior.
7. user behavior auditing method in a kind of block chain network, which is characterized in that the user behavior auditing method includes:
The first audit request is sent to block chain network, wherein includes that operation behavior is corresponding in first audit request
Target unique identification;
Receive the operation detail information corresponding with the target unique identification extracted in behavior contract;
And it audits to the corresponding operation detail information of the target unique identification.
8. user behavior auditing method according to claim 7, which is characterized in that described to send first to block chain network
Audit request includes:
The second audit request is sent to block chain network, wherein includes inquiry field in second audit request;
Receive the inquiry list extracted in behavior contract that the block chain network is sent, wherein deposit in the inquiry list
Contain each unique identification corresponding with the inquiry field;
One is selected as target unique identification in each unique identification corresponding with the inquiry field;
And the target unique identification is sent to the block chain network.
9. user behavior auditing system in a kind of block chain network, which is characterized in that the user behavior auditing system includes:
First audit request receiving module, for receiving the first audit request of auditable unit transmission, wherein first audit
It include the corresponding target unique identification of operation behavior in request;
Operation detail data obtaining module, for determining that corresponding transaction is detailed in behavior contract according to the target unique identification
Feelings information, wherein one be stored in the behavior contract between the corresponding unique identification of operation behavior and Transaction Details information
One corresponding relationship;
Transaction Details information sending module, for the corresponding Transaction Details information of the target unique identification to be sent to described examine
Unit is counted, so that the auditable unit audits to the Transaction Details information.
10. user behavior auditing system according to claim 9, which is characterized in that the user behavior auditing system is also
Include:
Unique identification generation module, for generating the unique identification of current operation behavior;
Behavior contract update module, for after the completion of current operation behavior, then storing the operation row in the behavior contract
For corresponding unique identification and operation detail information.
11. user behavior auditing system according to claim 10, which is characterized in that the behavior contract update module packet
It includes:
Operation requests receiving unit, for receiving the operation requests of user's transmission, wherein include user in the operation requests
Account information and behavior type;
Behavior contract storage unit, for being sentenced after the completion of current operation behavior according to the behavior type in the operation requests
Whether disconnected current operation behavior is operation behavior;If so, by the corresponding unique identification of the operation behavior and operation detail information
It stores to the behavior contract.
12. user behavior auditing system according to claim 9, which is characterized in that the user behavior auditing system is also
Include:
Behavior contract generation module, for generating behavior contract, and behavior contract is used to store the unique identification of operation behavior
Corresponding relationship between operation detail information.
13. user behavior auditing system according to claim 9, which is characterized in that first audit request receives mould
Block includes:
Second audit request reception unit, for receiving the second audit request of auditable unit transmission, wherein second audit
It include inquiry field in request;
List determination unit is inquired, determines corresponding inquiry list in contract for being expert at according to the inquiry field, wherein
Each unique identification corresponding with the inquiry field is stored in the inquiry list;
List transmission unit is inquired, for the inquiry list to be sent to the auditable unit, so that the auditable unit root
Target unique identification is determined according to the inquiry list, and transmission includes the first audit request of the target unique identification;
First audit request receiving unit, first audit request sent for receiving the auditable unit.
14. user behavior auditing system according to claim 9, which is characterized in that
The operation detail information include: the user account information of current operation behavior, time of origin, behavior type, in operation
Appearance and operating result, and, with the associated operation behavior information of current operation behavior;
Wherein, described to occur for same user account information in current behavior with the associated operation behavior information of current operation behavior
Before and/or occur other operation behavior information after current behavior.
15. user behavior auditing system in a kind of block chain network, which is characterized in that the user behavior auditing system includes:
First audit request sending module, for sending the first audit request to block chain network, wherein first audit is asked
It include the corresponding target unique identification of operation behavior in asking;
Operation detail information receiving module, for receiving the behaviour corresponding with the target unique identification extracted in behavior contract
Make detail information;
Audit Module, for auditing to the corresponding operation detail information of the target unique identification.
16. user behavior auditing system according to claim 15, which is characterized in that first audit request sends mould
Block includes:
Second audit request sending module, for sending the second audit request to block chain network, wherein second audit is asked
It include inquiry field in asking;
List reception module is inquired, the inquiry list extracted in behavior contract sent for receiving the block chain network,
Wherein, each unique identification corresponding with the inquiry field is stored in the inquiry list;
Target unique identification selecting module, for selecting it in each unique identification corresponding with the inquiry field
One is used as target unique identification;
Target unique identification sending module, for the target unique identification to be sent to the block chain network.
17. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor
Machine program, which is characterized in that the processor realizes block chain as claimed in any one of claims 1 to 6 when executing described program
In network the step of user behavior auditing method, alternatively, the processor realizes claim 7 or 8 institutes when executing described program
In the block chain network stated the step of user behavior auditing method.
18. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
The step of processor realizes user behavior auditing method in block chain network as claimed in any one of claims 1 to 6 when executing, or
Person realizes user behavior auditing party in block chain network described in claim 7 or 8 when the computer program is executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810674989.2A CN109063432A (en) | 2018-06-27 | 2018-06-27 | User behavior auditing method and device in block chain network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810674989.2A CN109063432A (en) | 2018-06-27 | 2018-06-27 | User behavior auditing method and device in block chain network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109063432A true CN109063432A (en) | 2018-12-21 |
Family
ID=64821218
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810674989.2A Withdrawn CN109063432A (en) | 2018-06-27 | 2018-06-27 | User behavior auditing method and device in block chain network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109063432A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112152797A (en) * | 2020-08-26 | 2020-12-29 | 西安电子科技大学 | Block chain remote data auditing and monitoring method and system, computer equipment and terminal |
CN113536342A (en) * | 2021-07-06 | 2021-10-22 | 招商银行股份有限公司 | Block chain-based evidence storage management method, system, program product and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017011601A1 (en) * | 2015-07-14 | 2017-01-19 | Fmr Llc | Computationally efficient transfer processing, auditing, and search apparatuses, methods and systems |
CN107707410A (en) * | 2017-10-26 | 2018-02-16 | 上海点融信息科技有限责任公司 | Configure method, information processor and the readable storage medium storing program for executing of system audit service |
CN107832907A (en) * | 2017-09-25 | 2018-03-23 | 中央财经大学 | Students ' behavior information authentication system based on block chain technology |
-
2018
- 2018-06-27 CN CN201810674989.2A patent/CN109063432A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017011601A1 (en) * | 2015-07-14 | 2017-01-19 | Fmr Llc | Computationally efficient transfer processing, auditing, and search apparatuses, methods and systems |
CN107832907A (en) * | 2017-09-25 | 2018-03-23 | 中央财经大学 | Students ' behavior information authentication system based on block chain technology |
CN107707410A (en) * | 2017-10-26 | 2018-02-16 | 上海点融信息科技有限责任公司 | Configure method, information processor and the readable storage medium storing program for executing of system audit service |
Non-Patent Citations (1)
Title |
---|
章宁等: "一种基于区块链的个人隐私信保护机制", 《计算机应用》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112152797A (en) * | 2020-08-26 | 2020-12-29 | 西安电子科技大学 | Block chain remote data auditing and monitoring method and system, computer equipment and terminal |
CN112152797B (en) * | 2020-08-26 | 2021-09-17 | 西安电子科技大学 | Block chain remote data auditing and monitoring method and system, computer equipment and terminal |
CN113536342A (en) * | 2021-07-06 | 2021-10-22 | 招商银行股份有限公司 | Block chain-based evidence storage management method, system, program product and storage medium |
CN113536342B (en) * | 2021-07-06 | 2024-03-26 | 招商银行股份有限公司 | Block chain-based certificate management method, system, program product and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109150607A (en) | Classification management-control method and device for block chain network | |
CN110417558A (en) | Verification method and device, the storage medium and electronic device of signature | |
CN108898390A (en) | Intelligent contract call method and device, electronic equipment based on block chain | |
CN108932297A (en) | A kind of data query, data sharing method, device and equipment | |
CN107392040A (en) | A kind of method and device for checking of knowing together | |
CN107196900A (en) | A kind of method and device for verification of knowing together | |
CN108537063A (en) | A kind of method, apparatus and equipment of data storage | |
Moustafa et al. | Trustworthy stigmergic service compositionand adaptation in decentralized environments | |
CN108173706A (en) | Service marker method, apparatus and equipment under a kind of multiservice system | |
CN105981331A (en) | An entity handle registry to support traffic policy enforcement | |
CN109426732A (en) | A kind of data processing method and device | |
CN110472974A (en) | Assets transfer method, apparatus and system based on block chain intelligence contract | |
CN108765159A (en) | A kind of cochain based on block chain and condition processing method, device and interacted system | |
CN109547488A (en) | A kind of trust data calculating and exchange system based on alliance's block chain | |
CN109146638A (en) | The recognition methods of abnormal financial transaction group and device | |
CN109582452A (en) | A kind of container dispatching method, dispatching device and electronic equipment | |
CN109117608A (en) | A kind of data processing method, device and relevant device | |
CN110009336A (en) | Evidence collecting method and device based on block chain | |
CN110503435A (en) | Transaction method for early warning, device and equipment based on block chain | |
CN109389386A (en) | A kind of barcode scanning control method, apparatus and system | |
CN110263580A (en) | Data processing method, device and block chain node based on block chain | |
CN110262775A (en) | Business rule generation method and device | |
CN110278255A (en) | A kind of method and device of the Internet of Things IOT communication between devices based on block chain | |
CN109063432A (en) | User behavior auditing method and device in block chain network | |
CN109003090A (en) | risk control method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210121 Address after: 215163 No. 9 Xuesen Road, Science and Technology City, Suzhou High-tech Zone, Jiangsu Province Applicant after: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Address before: 100034 4008, 4 floor, 9 building, 56 half moon street, Xicheng District, Beijing. Applicant before: SINOCHAIN TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181221 |
|
WW01 | Invention patent application withdrawn after publication |