CN111754658A - Training management method and device and electronic equipment - Google Patents
Training management method and device and electronic equipment Download PDFInfo
- Publication number
- CN111754658A CN111754658A CN202010629790.5A CN202010629790A CN111754658A CN 111754658 A CN111754658 A CN 111754658A CN 202010629790 A CN202010629790 A CN 202010629790A CN 111754658 A CN111754658 A CN 111754658A
- Authority
- CN
- China
- Prior art keywords
- node
- training
- blockchain
- network
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012549 training Methods 0.000 title claims abstract description 310
- 238000007726 management method Methods 0.000 title claims abstract description 76
- 230000003993 interaction Effects 0.000 claims abstract description 101
- 238000000034 method Methods 0.000 claims abstract description 60
- 230000002452 interceptive effect Effects 0.000 claims abstract description 37
- 230000004044 response Effects 0.000 claims abstract description 18
- 230000006870 function Effects 0.000 claims description 22
- 238000012790 confirmation Methods 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 15
- 230000015654 memory Effects 0.000 claims description 8
- 230000008859 change Effects 0.000 claims description 6
- 238000013507 mapping Methods 0.000 claims description 4
- 230000007474 system interaction Effects 0.000 claims description 3
- 230000000875 corresponding effect Effects 0.000 description 38
- 238000010586 diagram Methods 0.000 description 25
- 230000008569 process Effects 0.000 description 18
- 230000006399 behavior Effects 0.000 description 14
- 238000004891 communication Methods 0.000 description 9
- 238000003032 molecular docking Methods 0.000 description 9
- 238000003860 storage Methods 0.000 description 8
- 238000012795 verification Methods 0.000 description 8
- 230000001815 facial effect Effects 0.000 description 6
- 210000001503 joint Anatomy 0.000 description 6
- 230000009471 action Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 230000007613 environmental effect Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 238000004080 punching Methods 0.000 description 2
- 239000000758 substrate Substances 0.000 description 2
- 208000033748 Device issues Diseases 0.000 description 1
- 108010001267 Protein Subunits Proteins 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 238000009472 formulation Methods 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 238000004804 winding Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/109—Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/1091—Recording time for administrative or management purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/12—Hotels or restaurants
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
- G06Q50/205—Education administration or guidance
- G06Q50/2057—Career enhancement or continuing education service
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00904—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Human Resources & Organizations (AREA)
- Tourism & Hospitality (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Educational Administration (AREA)
- Marketing (AREA)
- Educational Technology (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Primary Health Care (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Human Computer Interaction (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present disclosure provides a training management method, an apparatus, a system and an electronic device, the method is applied to a blockchain network, the blockchain network comprises a first sub-network composed of at least one first node and a second sub-network composed of a plurality of second nodes, the method comprises: the first node responds to the acquired privacy attribute information of the user, broadcasts the privacy attribute information of the user to a first sub-network so as to publish the privacy attribute information of the user to a first block chain; the second node broadcasts the interactive event to a second sub-network in response to the authentication result of the interactive event between the second node and the node of the internet of things being passed, so that the interactive event is issued to a second blockchain, and training management based on the second blockchain is facilitated; and the authentication result is obtained by authenticating the second node corresponding to the interaction event by the node of the Internet of things based on the privacy attribute information contained in the first block chain.
Description
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a training management method and apparatus, and an electronic device.
Background
Training is an important way to improve the skill level of members of an organization, and the like. When training is held, various scenes that internal and external students of an enterprise participate in training, training in different places, on-line registration and the like are often met.
In the course of implementing the disclosed concept, the inventors found that the related art has at least the following problems: training students frequently use passwords for authentication, and more links of process interaction are provided, so that the labor cost and the time cost of training are higher.
Disclosure of Invention
One aspect of the present disclosure provides a training management method applied to a blockchain network including a first sub-network composed of at least one first node and a second sub-network composed of a plurality of second nodes, the method may include: the first node responds to the acquired privacy attribute information of the user, broadcasts the privacy attribute information of the user to a first sub-network so as to publish the privacy attribute information of the user to a first block chain; the second node broadcasts the interactive event to a second sub-network in response to the authentication result of the interactive event between the second node and the node of the internet of things being passed, so that the interactive event is issued to a second blockchain, and training management based on the second blockchain is facilitated; and the authentication result is obtained by authenticating the second node corresponding to the interaction event by the node of the Internet of things based on the privacy attribute information contained in the first block chain.
One aspect of the present disclosure provides a training management method, which is applied to an internet of things node that supports an authentication function, and includes: the method comprises the steps of obtaining privacy attribute information of a user from a first blockchain, wherein the first blockchain is maintained by a first sub-network of a blockchain network; responding to an interaction event between a second node of a second sub-network of the blockchain network and the node of the Internet of things, authenticating the second node corresponding to the interaction event by the node of the Internet of things based on the privacy attribute information to obtain an authentication result, so that the second node issues the interaction event to a second blockchain when the authentication result is passed, and training management is conveniently carried out based on the second blockchain; wherein the second blockchain is maintained by the second sub-network.
Another aspect of the present disclosure provides a training management apparatus applied to a blockchain network including a first sub-network composed of at least one first node and a second sub-network composed of a plurality of second nodes, the apparatus including: the system comprises a first publishing module and a second publishing module. The first publishing module is used for the first node to respond to the acquired privacy attribute information of the user and broadcast the privacy attribute information of the user to the first sub-network so as to publish the privacy attribute information of the user to the first block chain, wherein the authentication result is obtained by authenticating a second node corresponding to the interaction event by the node of the internet of things based on the privacy attribute information contained in the first block chain; the second publishing module is used for broadcasting the interaction event to the second sub-network by the second node in response to the authentication result of the interaction event between the second node and the node of the internet of things being passed so as to publish the interaction event to the second blockchain, so that training management based on the second blockchain is facilitated.
Another aspect of the present disclosure provides a training management device, which is applied to an internet of things node, where the internet of things node supports an authentication function, and the device includes: the device comprises an attribute information acquisition module and an authentication module. The attribute information acquisition module is used for acquiring privacy attribute information of a user from a first block chain, and the first block chain is maintained by a first sub-network of a block chain network; the authentication module is used for responding to an interaction event between a second node of a second sub-network of the blockchain network and the internet of things node, the internet of things node authenticates the second node corresponding to the interaction event based on the privacy attribute information to obtain an authentication result, so that the second node issues the interaction event to the second blockchain when the authentication result is passed, training management based on the second blockchain is facilitated, and the second blockchain is maintained by the second sub-network.
Another aspect of the present disclosure provides a training management system, including: block chain accounting module, intelligent control module. The block chain accounting module is used for maintaining a first block chain and a second block chain, setting and executing an intelligent contract, wherein the first block chain is maintained by a first sub-network of a block chain network, and the second block chain is maintained by a second sub-network of the block chain network; the intelligent control module is used for managing the nodes of the Internet of things based on the first block chain.
Another aspect of the present disclosure provides an electronic device including: memory, a processor and a computer program stored on the memory and executable on the processor for implementing the method as described above when the processor executes the computer program.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
According to the embodiment of the disclosure, the privacy attribute information of the user is maintained by constructing the first block chain, the identity verification of the student in the training process and the recording of all training interaction events are realized by constructing the second block chain, the automation of the full process of non-interactive training of the student is facilitated, the multi-party communication links of training the student, the training sponsor and the training contractor are reduced, and the training in an enterprise is supported to the maximum extent. And then effectively improved because of the student frequently uses password etc. to carry out authentication, the mutual link of flow is more, leads to the problem that human cost and time cost are high, helps promoting student's training experience simultaneously, promotes the training effect.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically illustrates a schematic diagram of an application scenario suitable for a training management method, apparatus and electronic device according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates an exemplary system architecture of an application training management method, apparatus, according to an embodiment of the disclosure;
FIG. 3 schematically illustrates a flow diagram of a training management method according to an embodiment of the disclosure;
FIG. 4 schematically illustrates a schematic diagram of updating privacy attribute information, according to an embodiment of the disclosure;
FIG. 5 schematically shows a schematic diagram of an interaction event according to an embodiment of the present disclosure;
FIG. 6 schematically illustrates a flow diagram of a training management method according to another embodiment of the disclosure;
FIG. 7 schematically shows a schematic diagram of an interaction event according to another embodiment of the present disclosure;
FIG. 8 schematically illustrates a block diagram of a training management apparatus according to an embodiment of the disclosure;
FIG. 9 schematically illustrates a block diagram of a training management apparatus according to another embodiment of the present disclosure;
FIG. 10 schematically illustrates a block diagram of a training management system according to an embodiment of the disclosure;
FIG. 11 schematically illustrates a logic diagram for a training management method according to an embodiment of the disclosure; and
fig. 12 schematically illustrates a block diagram of an electronic device suitable for implementing a training management method according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In order to facilitate understanding of the technical solution of the present disclosure, a training scenario and problems thereof in the related art are first described.
Taking colleges of enterprises as an example for explanation, scenes that students inside and outside enterprises participate in training, training in different places, online registration and the like at the same time are often encountered, and all of the scenes involve the problems that the training students frequently use passwords for authentication, the colleges of enterprises need to manage students inside and outside the enterprises, the process interaction links are more, and the like, so that more human resources and unnecessary time cost are consumed. Specifically, the training management method in the related art may cause the following problems.
In one aspect, a business hosting a university of a business has its own manpower management system and stores information about employees of the business, but does not synchronize information with a system associated with a training base of a university of the business, so that the training students need to prove their identities many times during a training process carried out by the training base.
In one aspect, in the related enterprise face-to-face training process, whether a login password is frequently used in registration or a plurality of trainees fill in personal information each time for a training undertaking, a plurality of efforts of the trainees are consumed, and a large amount of manpower resources are consumed by a training sponsor and the training undertaking to arrange the information of the trainees and the like.
In one aspect, if a college of enterprises is holding a large range of training classes, involving a case of remote training check-in, the time cost and labor cost spent on the check-in of the trainees is high. Meanwhile, the student needs to keep the door card and record the room number and other information by himself, and if the door card is lost, the student also needs to pay for the room number and other information.
In one aspect, for the enterprise training administration department to know the real-time dynamics of the training class, such as the registration condition, the check-in condition, the class student composition, etc. of the students, or the related statistical data of the training class, the students need to be supervised to upload the related information, and the manpower resources of the host or the contractor are consumed to perform information arrangement. In addition, the scattered management of the data causes the subsequent related auditing work to become complicated.
In one aspect, in the related art, for the reimbursement process after the training in the different places, the training students can bring the paper invoices or the self-stored electronic invoices back to the institutions where the paper invoices or the self-stored electronic invoices are placed for reimbursement, so that the convenience of reimbursement of the students is reduced.
In one aspect, the support of corresponding platforms and tools is not available in the face-to-face training process, the part of data cannot be shared and butted with other systems in an enterprise, and an off-line data island is formed.
The embodiment of the disclosure provides a training management method and device and electronic equipment. The method may be applied to a blockchain network comprising a first sub-network consisting of at least one first node and a second sub-network consisting of a plurality of second nodes, the method may comprise a first publishing process and a second publishing process. In a first publishing process, the first node broadcasts the privacy attribute information of the user to the first sub-network in response to the acquired privacy attribute information of the user, so as to publish the privacy attribute information of the user to the first blockchain. And then entering a second issuing process, wherein the second node broadcasts the interactive event to a second sub-network in response to the authentication result of the interactive event between the second node and the node of the internet of things being passed, so as to issue the interactive event to a second block chain, and training management based on the second block chain is facilitated. And the authentication result is obtained by authenticating the second node corresponding to the interaction event by the node of the Internet of things based on the privacy attribute information contained in the first block chain.
According to the training management method, the training management device, the training management system and the electronic equipment based on the blockchain technology, the first blockchain and the second blockchain are constructed to complete the butt joint of staff information and existing human resource systems of enterprises when a face-to-face is trained, so that the identity of a student in a university training base of the enterprise can be conveniently verified, and all training interaction events can be conveniently counted and recorded. The automation of training students to enter the whole process without interaction is realized by means of terminal equipment of the Internet of things such as a face recognition access control system and a Bluetooth door lock. Through the hierarchical design, the system is in butt joint with platform tools such as an existing training system and an existing electronic invoice system of an enterprise in an information interface mode, and the functions of closed-loop circulation of staff behavior data and convenience for sales reporting of training students are achieved. By the butt joint with the existing system in the enterprise, the multi-party communication links of trainees, trainees and trainees are reduced, and the training in the enterprise is supported to the maximum extent.
Fig. 1 schematically illustrates an application scenario applicable to a training management method, apparatus and electronic device according to an embodiment of the disclosure.
As shown in fig. 1, the XX training center is a training university established by the XX corporation, which may include a plurality of training classrooms (an open training classroom, a training result examination classroom, a business etiquette training classroom, a production management training classroom, a financial training classroom, etc.) for different training courses, respectively. Of course, a training classroom may be used to train multiple training classes, and is not limited herein. In addition, in order to facilitate the training of foreign students, a lodging hotel and the like can be set in the training center. In order to improve property safety, information safety and the like of a training center and facilitate training and examination of students, when the students enter different training classrooms or participate in different training courses, the students need to perform identity authentication, sign in and the like through passwords, signatures and the like, inconvenience is brought to the students, and meanwhile, the labor resources and time cost are possibly too high.
Fig. 2 schematically illustrates an exemplary system architecture of an application training management method, apparatus, according to an embodiment of the disclosure. It should be noted that fig. 2 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 2, the application scenario illustrates a Blockchain Network (Blockchain Network)200, the Blockchain Network 200 being a set of nodes that execute a given Blockchain protocol. The entire network orchestrates and coordinates the operations each user does in the network in a fully federated, decentralized, and distributed manner.
The blockchain node may have downloaded thereon an associated blockchain application (e.g., cryptocurrency software, training management software, etc.) to participate in the computers of the peer-to-peer network. The types of blockchain nodes may include full nodes, light nodes, simple Payment Verification nodes (SPVs), and the like.
The characteristics of all the nodes in the blockchain node may include: the computers participating in the blockchain network are located equal to each other. The purpose of the SPV node is to verify whether a transaction is uplink and multiple confirmations are made. The light node is used for locally storing transaction data related to the light node, and aims to not only verify transactions, but also manage information such as asset income, payment and the like of the light node. Common points of SPV nodes and light nodes: it is not necessary to save all the data locally. SPV is payment verification (simple) that verifies whether the transaction is being verified by consensus of other nodes, i.e., whether to uplink (e.g., how many confirmations are verified).
And transaction verification (complex), including account balance verification, double flower judgment, etc., is performed by the whole node. The full nodes store the full amount of data, so that the full nodes occupy larger storage space compared with the light nodes.
As shown in FIG. 2, the block chain network 200 may include nodes 201-206, and at least some of the nodes 201-206 commonly maintain a block chain (Blockchain). The nodes 201-206 may be various computing nodes with the same or different computing capabilities, such as a personal computer, a network server, a database server, a smart phone, and so on, which are not limited herein. Any two of the nodes 201-206 may communicate point-to-point.
A Block chain is a distributed database of blocks (blocks) linked in chronological order by hash pointers. Blocks of the block chain are added according to the time sequence, when a preset condition is met, each node in the block chain network allows a current node to create the block and add the block into the block chain, and the added block is used as the current latest block on the block chain. At a particular time, the current latest block obtained from the block chain by the node maintaining the same block chain is the same. One blockchain network may maintain one blockchain, or may maintain multiple blockchains at the same time, for example, fig. 2 maintains blockchains 211 and 212 at the same time, and different blockchains may be maintained by a network formed by the same nodes in the blockchains, or different sub-networks formed by at least some different nodes in the blockchain network may be maintained separately. For example, a blockchain network composed of non-user terminal devices may be maintained for blockchains related to private information, such as by a server cluster to reduce the risk of leakage of user private information. For another example, a blockchain network formed by user terminals can maintain blockchains that do not relate to private information, which helps to better utilize the resources of the user terminals and reduce the consumption of server resources.
It should be understood that the size and type of the blockchain network, the number of nodes, the length of the blockchain, the number of blocks, etc. in fig. 2 are merely illustrative. According to actual needs, there may be any size and type of blockchain network, any number of nodes, any length of blockchain, any number of blocks, etc., and this is not a limitation here.
FIG. 3 schematically illustrates a flow diagram of a training management method according to an embodiment of the disclosure. The procedure may be applicable to a blockchain network, which may include a first sub-network consisting of at least one first node and a second sub-network consisting of a plurality of second nodes.
As shown in fig. 3, the method may include the following operations S301 to S303.
In operation S301, the first node broadcasts the privacy attribute information of the user to the first sub-network in response to the acquired privacy attribute information of the user to publish the privacy attribute information of the user to the first blockchain.
The privacy attribute information of the user refers to information that is legal in the system and used for representing the identity of the user, and may include one or more of the name, the job number, the mobile phone number, the certificate number, the mailbox address, the bank card number, the user terminal identifier, the component identifier of the user terminal, the terminal identifier, the bluetooth identifier, and the like of the user, for example.
Since the user privacy attribute information should not be obtained by users other than the user itself to reduce the risk of privacy information disclosure, each server of the server cluster may serve as a blockchain node of the blockchain network that maintains the blockchain. Thus, the first node of the first sub-network may be a server of a server cluster, the first node may be a full node, and may be configured to maintain the first blockchain or maintain both the first blockchain and the second blockchain.
Wherein tiles of the first blockchain may contain privacy attribute information for at least one trained class student. For example, the first blockchain may store privacy attribute information of only one trained class student, and may also store privacy attribute information of a plurality of or all trained class students. For example, some trainees may need to participate in multiple training shifts, with trainees in different training shifts differing at least in part. When the privacy attribute information of trainees of multiple training classes is stored in the first blockchain, the first blockchain can be suitable for the multiple training classes, the situation that one blockchain needs to be constructed for each training class is avoided, and the difficulty in maintaining the blockchains is reduced.
In one embodiment, the privacy attribute information of the user may be obtained in at least one of the following ways. The first sub-network is also connected to an external network, for example, to obtain privacy attribute information of the user from the external network. As another example, the first sub-network obtains privacy attribute information of the user from at least a portion of the second nodes of the second sub-network.
For example, the external network may be an intranet, the internet, etc., so as to facilitate direct downloading of trainee information including at least a part of trainee from the external network, and the trainee information may include therein trainee privacy information, such as biometric information of the trainee (e.g., facial photograph, fingerprint feature, iris feature, etc.), personal terminal identification (e.g., Media access control Address, MAC Address, terminal bluetooth device ID, etc.) and the like, which may characterize the identity of the user.
For another example, the trainee can log in the system in the form of a web page using a personal terminal or a shared computer, and then enter personal information in the system by himself, so as to add the privacy attribute information of the user to the blockchain.
In addition, when the privacy attribute information of the trainee is changed, if the trainee has performed face-lifting or personal terminal replacement in the near future, the privacy attribute information needs to be changed in time so as to authenticate the trainee based on the changed privacy attribute information.
Specifically, the method may further include the following operations. In response to a change in the privacy attribute information of the user, the first node hash-serializes the changed privacy attribute information of the user to generate an update block, and publishes the update block to the first blockchain.
Fig. 4 schematically shows a schematic diagram of updating privacy attribute information according to an embodiment of the present disclosure.
As shown in fig. 4, the block before the latest block includes the privacy attribute information of zhang san (for example, zhang san, photo 1 of zhang san, bluetooth ID 1, etc.), and when the privacy attribute information of zhang san is changed, the latest block may include the privacy attribute information of zhang san (for example, zhang san, photo 2 of zhang san, bluetooth ID 2, etc.) after the change. And the public and private key pair included in the private attribute information of Zhang III before the change and the public and private key pair included in the private attribute information of Zhang III after the change can be the same.
In operation S303, the second node broadcasts the interactivity event to the second sub-network in response to the authentication result of the interactivity event between the second node and the node of the internet of things being passed, so as to publish the interactivity event to the second blockchain, thereby facilitating training management based on the second blockchain.
And the authentication result is obtained by authenticating the second node corresponding to the interaction event by the node of the Internet of things based on the privacy attribute information contained in the first block chain.
The internet of things node can be an internet of things terminal device with an authentication function, such as a face recognition check-in device, a network access device (such as a bluetooth device and a near field recognition device), an intelligent door lock device, a fingerprint check-in device, an intelligent sound box, an intelligent home device, a voiceprint recognition check-in device and the like. These devices may interact with the user or the user's personal terminal and may also authenticate the user, such as whether the trainee may participate in a training course held in the current classroom, whether the trainee may enter a room in the hotel, etc. Accordingly, the interaction events between the second node and the nodes of the internet of things include, but are not limited to: card-reading sign-in, face recognition sign-in, door lock unlocking and the like.
In one embodiment, the tiles of the second blockchain contain interaction events of all second nodes corresponding to all trainees in a training shift and nodes of the internet of things. Therefore, the personal terminals of all students in a training class can be used as the second nodes of the second sub-network, the personal terminals of a plurality of students can store the interactive events of all students in the same training class together, the risk of cheating by modifying card punching events and the like of the students and the risk of losing interactive event information can be reduced, and the resource consumption of the server can be reduced. The second node may be a light node.
FIG. 5 schematically shows a schematic diagram of an interaction event according to an embodiment of the disclosure.
As shown in fig. 5, when the user carries a mobile phone to access a certain access control, the bluetooth module of the mobile phone of the user communicates with the bluetooth module of the control device of the access control, the control device of the access control matches the determined bluetooth device ID in the first block chain by using the bluetooth device ID determined during interaction, if a matching result exists, the authentication is passed, and the access control door is opened. For another example, the control module of the access control uses the bluetooth device ID determined during interaction to match among the bluetooth device IDs of all students in the course to be performed, and if there is a matching result, the authentication is passed, and the access control door is opened.
As another example, the second node issues an environmental information collection event (e.g., a location event) and environmental information (e.g., coordinates or classroom identification, etc.) to the second word network in response to meeting a check-in condition for the smart contract (e.g., the smart contract specifies that the XX trainee should be located at the XX coordinate (the coordinate of a particular classroom) for the XX time period, then the coordinates at which the second node is located are collected for the XX time period to determine whether the trainee is participating in the training and successfully checked in when fitting into the contract).
In one embodiment, the second node issues the interactive event on the second sub-network to realize uplink of the interactive event, and the second node is required to perform private key signature on the interactive event, where the private key may be generated by the first node for each student respectively, and is used to prove the identity of the student, encrypt and decrypt the interactive event, perform private key signature on the record of the interactive event, and the like. Specifically, the first node generates a public and private key pair for the second node corresponding to the privacy attribute information of the user, so that the second node performs private key signature on the interaction event related to the second node.
In one embodiment, the user may query the training shift information on a second node (personal terminal). For example, the second node obtains training shift information from the second blockchain in response to a user query operation. Therefore, the convenience of trainees participating in training can be improved, and information such as a course schedule, a classroom in which a course is located, the duration of the course, a course examination mode, course teaching materials, course teachers and the like can be conveniently searched.
In one embodiment, the recording of the first interactivity event in the second blockchain may be recorded by the first node. Specifically, the first tile of the second blockchain includes training shift information issued by the first user. The tiles of the second blockchain also include training shift confirmation information issued by the second user for the training shift information. Wherein the first user may be a training sponsor employee and the second user may be a training contractor employee. The first user and the second user can log in the blockchain application on the first node by using own accounts respectively to execute the operation. For example, the first user publishes training class related information after completing selection of training resources in an optional training classroom for an optional time period. And after the second user checks the training class information issued by the first user, clicking confirmation on the basis of confirming that the training resources have no problem. This facilitates the publishing of confirmed training class information for trainees to learn training related information.
In another embodiment, the method may further include the following operations. And when the second node determines that the interaction event related to the second node meets the specific condition of the intelligent contract based on the second block chain, executing an operation corresponding to the specific condition. The intelligent contract may be set by the first user, such as what condition is met by the trainee to meet the training qualification. For example, the requirement for opening the door may be satisfied when the condition is satisfied. For example, smart contracts include, but are not limited to: a room entering a designated room number (a smart door lock of the room is opened) in a first time period, an entrance guard of a designated classroom or the like is opened in a second time period, and the location in a third time period is within a designated coordinate range or the like.
For example, the specific condition includes a training end condition. Accordingly, performing an operation corresponding to a specific condition may include: when the training end condition is met, the second node calls a bill interface provided by the first node to acquire a training related bill, and signs and broadcasts the training related bill by using a private key. Therefore, the operation convenience of procedures such as reimbursement of the trainees on the expenses generated by training is improved.
According to the block chain-based training management method provided by the embodiment of the disclosure, by constructing the first block chain for personnel information and the second block chain for interactive events, students can conveniently perform identity verification and statistics and recording of all training related interactive events in a training base, multi-party communication links of the trainees, the training sponsor and the training contractor are reduced, and training in enterprises is supported to the maximum extent.
FIG. 6 schematically illustrates a flow diagram of a training management method according to another embodiment of the disclosure. The training management method is applied to the nodes of the Internet of things, and the nodes of the Internet of things support the authentication function.
As shown in fig. 6, the training management method may include operations S601 to S603.
In operation S601, privacy attribute information of a user is acquired from a first blockchain, which is maintained by a first sub-network of a blockchain network.
In this embodiment, the first node may send the privacy attribute information of the user to the second node. As for the internet of things terminal having the bluetooth module, the privacy attribute information of the user may be the bluetooth device ID of the trainee. For an internet of things terminal with a face recognition function, the privacy attribute information of the user can be a required face image. This facilitates authentication of the user initiating the interactivity event by the second node.
In operation S603, in response to an interaction event between a second node of a second sub-network of the blockchain network and a node of the internet of things, the node of the internet of things authenticates the second node corresponding to the interaction event based on the privacy attribute information to obtain an authentication result, so that the second node issues the interaction event to the second blockchain when the authentication result passes, thereby facilitating training management based on the second blockchain. Wherein the second blockchain is maintained by the second sub-network.
In one embodiment, the internet of things node supports terminal authentication. Accordingly, the privacy attribute information includes a mapping relationship between the user name and the terminal identification. For example, the internet of things node may determine, based on the mapping relationship, whether the privacy attribute information included in the first blockchain of the terminal device currently initiating the interaction is successfully matched. If the matching is successful, the name of the student to which the terminal equipment which currently initiates the interaction belongs can be determined based on the mapping relation.
In one embodiment, the internet of things node supports biometric identification. Accordingly, the method may further include the following operations.
Firstly, the node of the internet of things sends an event notification aiming at an interactive event to be issued to a first node, wherein the interactive event to be issued is an event that the biological identification result of the interactive event is passed.
Then, the first node responds to the event notification, and sends an interaction event issuing instruction to a second node corresponding to the interaction event to be issued, so that the second node signs the interaction event to be issued based on a private key and issues the interaction event to the second block chain, wherein the private key is generated by the first node for a user corresponding to the second node.
Since the user terminal (second node) of the trainee does not know that the user is authenticated by face recognition when the user is authenticated by face recognition. At this time, in order to facilitate issuing the event for authenticating the face recognition to the second blockchain, the first node of the blockchain network may be first notified by the node of the internet of things: and the XX student successfully identifies the XX Internet of things equipment. The first node, in response to receiving the notification, may send an interactivity event issuance instruction to a second node corresponding to the XX student. This allows the second node to sign and publish the interaction event to be published (an event for which facial recognition is authenticated) to the second blockchain based on the private key. Thus, interaction events such as facial recognition that are not authenticated by the second node may be included on the second blockchain.
FIG. 7 schematically shows a schematic diagram of an interaction event according to another embodiment of the present disclosure.
As shown in fig. 7, the third student needs to authenticate and punch a card before entering the training classroom. When Zhang three stands in front of the facial recognition device, the facial recognition device recognizes that the user is Zhang three, which is a student included in the first blockchain, and at this time, the entrance guard is opened so as to be passed through by the Zhang three. At this time, the facial recognition event is not recorded in the second block chain, and the card punching action is not completed. The face recognition device may notify the first node (server) of the present face recognition event and the recognition result, the first node sends a face recognition event issue instruction to a second node corresponding to zhang san, and the second node performs private key signature on the face recognition event in response to receiving the face recognition event issue instruction, and then issues to the second sub-network to record the face recognition event and the result thereof on the second block chain.
In another embodiment, to facilitate the training of the sponsor or the training contractor to learn about the training, the method may further comprise the following operations. And after obtaining the authentication result, the Internet of things node sends the authentication result to the first node. Therefore, the first node can respond to the query instruction of the user at any time to query the training condition of the current or specified time period without filling the relevant information by each student.
According to the training management method based on the blockchain, the building and the operation of the blockchain are realized by adopting a computer language capable of carrying out logic operation on digital equipment such as a mobile terminal and a computer server, and training student information and training interaction events in a training link are recorded. The method has the advantages that the logic management of the Internet of things equipment such as the face recognition access control system and the Bluetooth door lock can be realized by adopting the computer language, the student is assisted to check in, and the link of the student for non-interactive face-giving training check-in is completed. By adopting a computer language capable of operating a foreground display page and background logic application of a personal terminal, the information interface of the system is connected with the information interface of the existing system, and the problems of data isolated island and complicated training and reimbursement are solved. Thereby completing the construction of the whole training management system.
Another aspect of the disclosure provides a training management apparatus.
Fig. 8 schematically illustrates a block diagram of a training management apparatus according to an embodiment of the present disclosure.
As shown in fig. 8, the training management apparatus 800 is applied to a blockchain network including a first sub-network composed of at least one first node and a second sub-network composed of a plurality of second nodes, and the apparatus 800 may include a first distribution module 810 and a second distribution module 820.
The first publishing module 810 is configured to, by the first node, respond to the obtained privacy attribute information of the user, broadcast the privacy attribute information of the user to the first sub-network, so as to publish the privacy attribute information of the user to the first blockchain, where an authentication result is obtained by authenticating, by the node of the internet of things, the second node corresponding to the interaction event based on the privacy attribute information included in the first blockchain.
The second publishing module 820 is configured to broadcast, by the second node, the interactivity event to the second sub-network in response to the authentication result of the interactivity event between the second node and the node of the internet of things being passed, so as to publish the interactivity event to the second blockchain, so as to facilitate training management based on the second blockchain.
Fig. 9 schematically illustrates a block diagram of a training management apparatus according to another embodiment of the present disclosure.
As shown in fig. 9, the training management apparatus 900 is applied to a node of the internet of things, the node of the internet of things supports an authentication function, and the apparatus 900 may include an attribute information obtaining module 910 and an authentication module 920.
The attribute information obtaining module 910 is configured to obtain privacy attribute information of a user from a first blockchain, where the first blockchain is maintained by a first sub-network of a blockchain network.
The authentication module 920 is configured to respond to an interaction event between a second node of a second sub-network of the blockchain network and a node of the internet of things, where the node of the internet of things authenticates the second node corresponding to the interaction event based on the privacy attribute information to obtain an authentication result, so that the second node issues the interaction event to the second blockchain when the authentication result passes, which is convenient for training management based on the second blockchain, where the second blockchain is maintained by the second sub-network.
The operations that the first publishing module 810, the second publishing module 820, the attribute information obtaining module 910, and the authentication module 920 may execute may refer to the contents of the above related method embodiments, and are not described herein again.
FIG. 10 schematically illustrates a block diagram of a training management system according to an embodiment of the disclosure.
As shown in fig. 10, the training management system 1000 may include: a blockchain accounting module 1010 and an intelligent control module 1020.
The blockchain accounting module 1010 is configured to maintain a first blockchain maintained by a first sub-network of the blockchain network and a second blockchain maintained by a second sub-network of the blockchain network, and set and execute an intelligent contract.
The intelligent control module 1020 is configured to manage the internet of things nodes based on the first block chain.
Further, the system 1000 may further include: a user interaction module and/or an interface module.
The user interaction module is used for realizing the system interaction function of the user.
The interface module is used for providing at least one of the following interfaces: and the interface is connected with a human resource system, and the second node registration information collection interface or the bill interface.
In one embodiment, the blockchain accounting module 1010 synchronizes the human resource system of the enterprise at regular time through the interface module, obtains relevant information of each employee, including face information, identity information, position information, student mobile terminal information, and the like, generates a unique public and private key pair for each employee, and issues the corresponding information to the first blockchain. For students outside the enterprise, personal and collective entry entries are provided in the user interaction module, and necessary information is collected and published to the first blockchain during entry. The training host selects the enterprise university training base through the user interaction module to hold the training class within a selectable time period, the training host confirms through the user interaction module, and meanwhile, the system automatically notifies the target training student and sends the relevant information of the target student through the intelligent control module, so that the student can conveniently go to the training base to check in. The student enters the training base after the identity of the student is confirmed through the recorded face information, and the Bluetooth door lock of the distributed room is opened through the mobile terminal Bluetooth device to enter the training base. When the user goes to a target classroom for training, the user can check in according to the modes of terminal positioning and the like. When certain conditions are met, the preset training intelligent contract is called to be executed. After the training class is finished, the interface module automatically connects the electronic invoice system, and sends the invoice information to the training student terminal after the invoice information is processed, so as to finish the training. All training events automatically use the personal private key to complete digital signature distribution to the second block chain, and the trainee terminal corresponding to the training class automatically completes verification and consensus identification of the training events through the public key of the trainee who distributes the training events, so that chain winding actions of interactive events are completed.
Specifically, the user interaction module is used for completing system interaction functions of various users. The training sponsor can select the available time period through the module to set the training class. The training trainees can receive training information through the module. The training contractor can confirm and synchronize the relevant information of the training class through the module. Such training interaction events are issued to the blockchain accounting module 1010 by the private key of the corresponding action initiator in combination with the digital signature algorithm.
And a blockchain accounting module 1010 for recording the personnel information and the uplink of the training interaction event information and setting and executing a training intelligent contract. The module is used for connecting an internal human resource system and an external student registration entry in the user interaction module, and collecting necessary personnel information to generate a public and private key pair of each student. And after necessary processes are completed for personnel information and training interaction events, the uplink is permitted to be released. By constructing the intelligent contract function in the module, the internal training rules of the enterprise university are deployed on the block chain in an intelligent contract form, so that the training management department and the training students can conveniently know whether the training requirements are met in real time.
And the intelligent control module 1020 is used for managing and collecting information of required internet of things equipment in the training base of the college enterprises. According to training information set by a training sponsor, the module synchronously acquires privacy attribute information of students and automatically allocates rooms, and sends the information to face recognition access control equipment, room Bluetooth door locks and other equipment of a training base. After the college unblanked through entrance guard, completion bluetooth, information automatic collection gathered. And publishes such training interaction events on blockchain accounting module 1010.
The interface module is used for butting an internal human resource system of an enterprise, providing an entry for collecting entry of a student outside the enterprise together with the user interaction module, butting an existing system such as an electronic invoice system and the like, and achieving the purpose of data sharing. The module is linked with a human resource system periodically, and necessary information fields of internal and external employees of an enterprise are collected for the block chain accounting module 1010 to use. Meanwhile, the electronic invoice system is docked, so that students can be conveniently trained in different places to carry out subsequent reimbursement.
In one embodiment, the user interaction module comprises a training resource query confirmation unit, an external training student registration acquisition unit of an enterprise and an intelligent equipment information display unit.
With respect to the training resource query confirmation unit, the host can view the display of the training resources (such as resources of a training time period, a training classroom, a training base and the like) to complete the selection of the training resources. The contractor can confirm the information through the unit and train the trainee to receive the corresponding notice. Meanwhile, the unit will send necessary information for training trainees to the intelligent control module 1020. The corresponding actions of the training sponsor and the undertaking are automatically generated by combining a private key and a signature algorithm, and are distributed to the interactive event chain unit in the block chain accounting module 1010.
The roll-in collection unit for the trainees outside the enterprise can roll in the roll-in collection unit for the trainees outside the enterprise and who are not trained in the human resource system inside the enterprise and enter the training base of the university of the enterprise for the first time, fill in necessary personnel information including face recognition photos, names and other information, and automatically collect the relevant information of the trainee mobile terminal, such as Bluetooth hardware and other information. The collected data is automatically recorded in the first blockchain unit in the blockchain accounting module 1010, and a corresponding public and private key pair is generated.
The intelligent equipment information display unit enables operators, namely training assistants, of a college training base of enterprises to check the condition of the intelligent equipment in time and control the service condition of the intelligent equipment (including equipment such as face recognition access control, Bluetooth door lock and intelligent robot) in real time.
In one embodiment, blockchain accounting module 1010 includes a first blockchain unit, a chain of interaction event records unit, and a training intelligent contracts unit.
The first blockchain unit is used for regularly butting the existing human resource system in an enterprise through the interface module, collecting necessary information of staff, including names, face recognition photos, held terminal Bluetooth equipment IDs and other information, and generating a unique public and private key pair for each person. Meanwhile, the user interaction module enterprise external training student registration acquisition unit acquires enterprise external student information according to the same standard to generate a unique public and private key pair. The unit can set access authority, and students can only check own private keys and cannot access private keys of other people.
And the interactive event record chain unit is used for recording the host, the contractor, the student and all related training interactive events. Such as various interactive events like the host issuing training notifications, the contractor receiving confirmations, trainee sign-in, etc. Each action is signed by a respective private key and a corresponding signature algorithm (such as an elliptic curve encryption algorithm) and then is issued to the outside, the training class related personnel and the mobile terminal of the class student can be automatically verified by the public key of the issuer, and after the verification conditions are met and the consensus is formed, the corresponding behavior block is recorded on the unit. For the student reimbursement scene, the unit can be connected with an external electronic invoice system through an interface module, automatically generates an invoice and records the invoice on a chain.
And the intelligent contract training unit is used for forming an intelligent contract according to the training rules in the enterprise university, and when the training interaction events on the interaction event record chain unit meet corresponding conditions, the intelligent contract is automatically executed without the participation of a third party, and the training trainees see the execution results without consulting again. For example, after the students meet the number of days of check-in, check-in and training check-in at the same time, the intelligent contract automatically generates the training completion of the students and can acquire the corresponding training points in the university of enterprises.
In one embodiment, the intelligent control module 1020 includes an intelligent device issuing information unit and an intelligent device information collecting unit.
The intelligent device issues the training trainee list issued by the information issuing unit according to the training resource query and confirmation unit of the user interaction module and the enterprise internal and external trainee list provided by the enterprise external training trainee registration acquisition unit of the user interaction module, and issues the related information of the trainee to intelligent devices such as a face recognition entrance guard, a Bluetooth door lock and the like, so that the trainee can conveniently check in.
The intelligent device information collection unit collects relevant information according to interaction conditions of the student and the intelligent device, such as behaviors of face entrance guard recognition, Bluetooth door lock opening and the like. And synchronized to the chain of interactivity event records unit of the blockchain accounting module 1010.
In one embodiment, the interface module comprises a human resource system docking unit and an electronic invoice system docking unit.
The human resource system docking unit is responsible for timing and synchronizing contents such as human resource system personnel increment information and personnel information change conditions, and uploading the information to the first block chain unit of the block chain accounting module 1010, so that the first block chain unit can generate a public key and private key pair and record information changes related to internal and external students of an enterprise.
The electronic invoice system docking unit is used for docking with an external electronic invoice system, and when trainees finish training and pay, electronic invoices can be automatically generated, so that the trainees can conveniently return to the institution to reimburse. After the electronic invoice is issued, the training interaction event information is automatically signed and recorded on the interaction event record chain unit of the block chain accounting module 1010.
Specifically, the first blockchain unit of the blockchain accounting module 1010 acquires the necessary information related to the trainees inside and outside the enterprise through two ways, and generates a unique public and private key for each trainee after acquisition, so as to provide a basis for subsequent signature and other people consensus confirmation after transaction. The host, the undertaking and the training trainees issue training, receive training notification and know training behaviors of the training trainees when the trainees train at the college enterprise training base through the interactive event record chain unit of the user interaction module and the blockchain accounting module 1010. The intelligent control module 1020 and the related intelligent devices of the internet of things help students to complete the links that the students originally need to consume a lot of human resources to carry out a lot of interaction to complete, such as check-in, training sign-in and the like in the training base of the university of enterprises. After each trainee completes the corresponding training interaction event, the intelligent contract unit of the block chain accounting module 1010 is set, and then contracts are automatically executed, so that the training management department and the trainee can know whether the training requirement is completed or not conveniently. And finally, the interface module electronic invoice system docking unit completes the generation of the electronic invoice and records the electronic invoice on the interaction event record chain unit of the block chain accounting module 1010, so that the whole process is completed.
FIG. 11 schematically illustrates a logic diagram for a training management method according to an embodiment of the disclosure.
As shown in fig. 11, firstly, the human resource system docking unit of the interface module synchronously obtains the relevant information of the enterprise employees in the internal human resource system of the enterprise in a form of accessing through the timing interface, including names, department information, face identification information, bluetooth ID information of the mobile terminal, and the like.
Then, the information related to the trainees outside the enterprise is collected through the entry collecting unit of the trainees outside the enterprise of the user interaction module (the collected information field can be the same as the information field of the trainees inside the enterprise).
Then, a unique public and private key pair is generated for each student after information collection, and the generated blocks after information hash serialization are issued on the first blockchain unit of the blockchain accounting module 1010. The inventory learner does not need to generate a public and private key pair again, and if the information changes, the blocks generated after the hash serialization is carried out again after the acquisition are issued to the first blockchain unit of the blockchain accounting module 1010. And the latest block recorded information is used as the standard.
The training sponsor may then publish the training class related information after completing the selection of the training resources in the optional training class for an optional time period using the training resource query validation unit of the user interaction module. Meanwhile, after the system is issued, signature is automatically carried out by combining a private key of a sponsor issuer and a signature algorithm, and the signature is issued to the interactive event record chain unit of the block chain accounting module 1010.
And then, after the training contractor, namely the operator of the enterprise university training base, checks the training class information issued by the training contractor through the training resource inquiry and confirmation unit of the user interaction module, and clicks and confirms the training resource inquiry and confirmation unit of the user interaction module on the basis of confirming that the training resource has no any problem. The system automatically applies the private key of the carrier operator to perform signature by combining a signature algorithm, and the signature is issued to the interactive event record chain unit of the block chain accounting module 1010.
Then, the intelligent device issuing information unit of the intelligent control module 1020 issues the information related to the training trainee to the intelligent device of the internet of things related to the training base of the university of the enterprise. For example, the face recognition access control system acquires face recognition information of trainees in class training in a target time period, so that the trainees can conveniently brush faces and enter a college enterprise training base; the Bluetooth intelligent door lock in each room can acquire the Bluetooth ID information of the mobile terminal of the training class trainee in the corresponding target time period, so that the trainee can conveniently live in.
Next, the training trainee goes to the target business university training base within a specified time period. The face recognition access control system confirms the student who comes from the beginning according to the student face recognition information sent by the intelligent control module 1020. And if the training students are the training classes in the corresponding time period, allowing the students to enter the training base of the college enterprises. After the recognition is successful, the face recognition access control system sends the result to the intelligent control module 1020 for collection. Meanwhile, the trainee mobile terminal automatically signs through the private key of the trainee and the signature algorithm, and the identification behavior with the signature is issued to the interactive event record chain unit of the block chain accounting module 1010.
Then, after the training trainees enter the training base of the enterprise university, the check-in information is checked through the training resource inquiry and confirmation unit of the user interaction module. And the Bluetooth door lock is opened by using the Bluetooth ID information of the mobile terminal to complete check-in. And the Bluetooth door lock sends the result to the intelligent control module for summarizing. Meanwhile, the trainee mobile terminal automatically signs through the combination of the trainee private key and the signature algorithm, and the unlocking behavior with the signature is issued to the interactive event record chain unit of the block chain accounting module 1010.
Then, when training is carried out, the trainees confirm the training classroom information through the training resource inquiry and confirmation unit of the user interaction module, move to the target time period, and complete training check-in by combining with corresponding check-in technology. Meanwhile, the trainee mobile terminal automatically signs through the private key of the trainee and the signature algorithm, and the sign-in behavior with the signature is issued to the interactive event record chain unit of the block chain accounting module 1010.
Then, when the behaviors of a certain training student are accumulated to meet the requirements of the intelligent training contracts made in advance, the intelligent training contracts are automatically executed. For example, when the trainee completes the check-in of the training base of the enterprise university and the check-in of all target courses, the trainee completes the training of the training class, and the corresponding training score can be recorded in the personal file of the trainee. The specific intelligent contract formulation can be parameterized and improved according to the college enterprise training rules or the relevant regulations of the corresponding training classes.
And then, after the trainees finish the training activities required by the training classes, the electronic invoice system docking unit of the interface module is automatically invoked, and an electronic invoice is automatically generated according to the docking of the trainees and the training generated money to an external electronic invoice system. When the student checks the confirmation and invoice reimbursement. The trainee mobile terminal automatically signs through the trainee private key and the signature algorithm, and corresponding behaviors with the signatures are issued to the interaction event record chain unit of the block chain accounting module 1010.
The block chain-based training management system provided by the embodiment of the disclosure provides an intelligent solution for a whole set of enterprises and universities during organization training, wherein the intelligent solution is used for performing personnel information management, personnel behavior recording, training sponsor statistics on training conditions, and students can finish various scenes such as training base check-in and training check-in without interaction. The intelligent, automatic and password-free interaction of the enterprise university training management is enhanced, the efficiency of training organization is improved, and the user experience of training students is improved.
In one aspect, the barrier of the original human resource management system information and the enterprise university training base system is broken through the realization of the block chain digital identity and the combination of intelligent equipment, and the training students go to the training base without manually proving the identities of the training students for many times, so that the human resources are further saved.
In one aspect, the information related to trainees is recorded through the first blockchain, the trainees do not need to frequently use system login passwords, the information is accurately and conveniently stored and recorded, and the energy of a plurality of trainees is not needed to be consumed.
In one aspect, through the introduction of intelligent equipment of the Internet of things, unnecessary multi-interaction links such as original training attendance, original door card record room numbers and the like, unnecessary queuing waiting time and the like are effectively compressed, and a large amount of human resources are saved. If the automation of training students to enter the whole process without interaction is realized by means of new products of the Internet of things such as a face recognition access control system, a Bluetooth door lock and the like.
In one aspect, the record of the relevant training behaviors of the students is recorded through the interaction event chain, so that the information statistics of a training management department is facilitated, the automatic management is realized, and meanwhile, the compliance check of a follow-up audit department is facilitated due to the non-falsification characteristic of the block chain. By combining with the training intelligent contract, both a training sponsor and a trainee can know the training completion condition at the first time, and communication time and human resources are not wasted due to multi-party confirmation.
In one aspect, the training and reimbursement automation is realized by the aid of hierarchical design and the mode of information interfaces to be in butt joint with platform tools such as existing training systems and electronic invoice systems of enterprises, and the problem that the reimbursement link time is increased due to the fact that students do not know reimbursement processes is solved. By the butt joint with the existing system in the enterprise, the multi-party communication links of trainees, trainees and trainees are reduced, and the training in the enterprise is supported to the maximum extent.
In one aspect, training behavior data resources are collected in a statistical mode through digital management of training behaviors, data of an original enterprise university training base training user behavior data island and other systems inside an enterprise form data butt joint, and a complete data closed loop is provided for big data statistical analysis.
It should be noted that the implementation, solved technical problems, implemented functions, and achieved technical effects of each module/unit/subunit and the like in the apparatus part embodiment are respectively the same as or similar to the implementation, solved technical problems, implemented functions, and achieved technical effects of each corresponding step in the method part embodiment, and are not described herein again.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any of the first publication module 810 and the second publication module 820 may be combined and implemented in one module, or any one of the modules may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the disclosure, at least one of the first publishing module 810 and the second publishing module 820 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware by any other reasonable manner of integrating or packaging a circuit, or in any one of three implementations of software, hardware, and firmware, or in a suitable combination of any of them. Alternatively, at least one of the first publication module 810, the second publication module 820 may be at least partially implemented as a computer program module, which when executed, may perform a corresponding function.
Fig. 12 schematically illustrates a block diagram of an electronic device suitable for implementing a training management method according to an embodiment of the disclosure. The electronic device shown in fig. 12 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 12, an electronic apparatus 1200 according to an embodiment of the present disclosure includes a processor 1201, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)1202 or a program loaded from a storage section 1208 into a Random Access Memory (RAM) 1203. The processor 1201 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 1201 may also include on-board memory for caching purposes. The processor 1201 may include a single processing unit or multiple processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 1203, various programs and data necessary for the operation of the system 1200 are stored. The processor 1201, the ROM1202, and the RAM 1203 are connected to each other by a bus 1204. The processor 1201 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM1202 and/or the RAM 1203. Note that the programs may also be stored in one or more memories other than the ROM1202 and the RAM 1203. The processor 1201 may also perform various operations of method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to embodiments of the present disclosure, method flows according to embodiments of the present disclosure may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 1209, and/or installed from the removable medium 1211. The computer program, when executed by the processor 1201, performs the above-described functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It will be understood by those skilled in the art that while the present disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.
Claims (18)
1. A training management method applied to a blockchain network including a first sub-network composed of at least one first node and a second sub-network composed of a plurality of second nodes, the method comprising:
the first node responds to the acquired privacy attribute information of the user, broadcasts the privacy attribute information of the user to the first sub-network so as to publish the privacy attribute information of the user to a first block chain; and
the second node broadcasts the interaction event to the second sub-network in response to the authentication result of the interaction event between the second node and the node of the internet of things being passed, so that the interaction event is issued to a second blockchain, and training management based on the second blockchain is facilitated;
and the authentication result is obtained by the node of the internet of things authenticating the second node corresponding to the interaction event based on the privacy attribute information contained in the first block chain.
2. The method of claim 1, wherein:
blocks of the first blockchain contain privacy attribute information for at least one training class student; and
and the blocks of the second block chain comprise interaction events of all second nodes corresponding to all trainees in a training class and the nodes of the Internet of things.
3. The method of claim 1, wherein the first node generates a public-private key pair for a second node corresponding to the user's privacy attribute information such that the second node signs its own related interaction events private-key.
4. The method of any one of claims 1-3, wherein:
the first sub-network is also connected with an external network so as to acquire the privacy attribute information of the user from the external network; and/or
The first sub-network obtains privacy attribute information of a user from at least some second nodes of the second sub-network.
5. The method of any of claims 1-3, further comprising, upon the second node determining, based on the second blockchain, that an interaction event related to the second node satisfies a particular condition of a smart contract, performing an operation corresponding to the particular condition.
6. The method of claim 5, wherein the particular condition comprises a training end condition; and
the performing of the operation corresponding to the specific condition includes: when the training end condition is met, the second node calls a bill interface provided by the first node to obtain a training related bill, and signs and broadcasts the training related bill by using a private key.
7. The method of any one of claims 1-3, wherein:
the first block of the second block chain comprises training shift information issued by a first user; and
the tiles of the second blockchain also include training shift confirmation information issued by a second user for the training shift information.
8. The method of claim 7, wherein:
the second node responds to user query operation and acquires the training shift information from the second blockchain; and/or
And the second node responds to the sign-in condition meeting the intelligent contract and issues the environment information acquisition event and the environment information to the second sub-network.
9. The method of any of claims 1-3, further comprising: in response to a change in the user's privacy attribute information, the first node hash-serializes the changed user's privacy attribute information to generate an update block, and publishes the update block to the first blockchain.
10. A training management method is applied to an Internet of things node, the Internet of things node supports an authentication function, and the method comprises the following steps:
the method comprises the steps of obtaining privacy attribute information of a user from a first blockchain, wherein the first blockchain is maintained by a first sub-network of a blockchain network; and
responding to an interaction event between a second node of a second sub-network of the blockchain network and the internet of things node, authenticating the second node corresponding to the interaction event by the internet of things node based on the privacy attribute information to obtain an authentication result, so that the second node issues the interaction event to a second blockchain when the authentication result is passed, and training management is facilitated based on the second blockchain;
wherein the second blockchain is maintained by the second sub-network.
11. The method of claim 10, wherein the internet of things node supports terminal authentication; and
the privacy attribute information comprises a mapping relation between a user name and a terminal identification.
12. The method of claim 10 or 11, wherein the internet of things node supports biometric identification;
the method further comprises the following steps:
the node of the Internet of things sends an event notification aiming at the interactive event to be issued to the first node, wherein the interactive event to be issued is an event that the biological identification result of the interactive event passes; and
and the first node responds to the event notification and sends an interaction event issuing instruction to a second node corresponding to the interaction event to be issued, so that the second node signs the interaction event to be issued based on a private key and issues the interaction event to be issued to the second block chain, wherein the private key is generated by the first node for a user corresponding to the second node.
13. The method of claim 12, further comprising: and after obtaining the authentication result, the Internet of things node sends the authentication result to the first node.
14. A training management apparatus applied to a blockchain network including a first sub-network composed of at least one first node and a second sub-network composed of a plurality of second nodes, the apparatus comprising:
the first publishing module is configured to broadcast, by the first node, the privacy attribute information of the user to the first sub-network in response to the obtained privacy attribute information of the user, so as to publish the privacy attribute information of the user to a first block chain, where the authentication result is obtained by authenticating, by the internet of things node, a second node corresponding to the interaction event based on the privacy attribute information included in the first block chain; and
the second publishing module is configured to broadcast, by the second node, the interactivity event to the second sub-network in response to the authentication result of the interactivity event between the second node and the internet of things node being passed, so as to publish the interactivity event to a second blockchain, which is convenient for training management based on the second blockchain.
15. A training management device is applied to an Internet of things node, the Internet of things node supports an authentication function, and the device comprises:
the system comprises an attribute information acquisition module, a block chain management module and a block chain management module, wherein the attribute information acquisition module is used for acquiring privacy attribute information of a user from a first block chain, and the first block chain is maintained by a first sub-network of a block chain network; and
the authentication module is configured to respond to an interaction event between a second node of a second sub-network of the blockchain network and the internet of things node, where the internet of things node authenticates the second node corresponding to the interaction event based on the privacy attribute information to obtain an authentication result, so that the second node issues the interaction event to a second blockchain when the authentication result passes, which is convenient for training management based on the second blockchain, and the second blockchain is maintained by the second sub-network.
16. A training management system, comprising:
a blockchain accounting module for maintaining a first blockchain and a second blockchain, and setting and executing an intelligent contract, wherein the first blockchain is maintained by a first sub-network of a blockchain network, and the second blockchain is maintained by a second sub-network of the blockchain network; and
and the intelligent control module is used for managing the nodes of the Internet of things based on the first block chain.
17. The system of claim 16, further comprising:
the user interaction module is used for realizing the system interaction function of a user; and/or
An interface module for providing at least one of the following interfaces: and the interface is connected with a human resource system, and the second node registration information collection interface or the bill interface.
18. An electronic device, comprising: a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor when executing the computer program implementing the training management method of any of claims 1-13.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010629790.5A CN111754658B (en) | 2020-07-03 | 2020-07-03 | Training management method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010629790.5A CN111754658B (en) | 2020-07-03 | 2020-07-03 | Training management method and device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111754658A true CN111754658A (en) | 2020-10-09 |
CN111754658B CN111754658B (en) | 2023-04-07 |
Family
ID=72678863
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010629790.5A Active CN111754658B (en) | 2020-07-03 | 2020-07-03 | Training management method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111754658B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113592688A (en) * | 2021-07-30 | 2021-11-02 | 工银科技有限公司 | Diagnosis and treatment information processing method and device based on block chain and electronic equipment |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819848A (en) * | 2017-11-08 | 2018-03-20 | 济南浪潮高新科技投资发展有限公司 | A kind of internet of things equipment autonomy interconnected method based on block chain |
CN108960832A (en) * | 2018-08-09 | 2018-12-07 | 全链通有限公司 | The method for secret protection and system of block chain real name communication |
CN109086585A (en) * | 2018-07-10 | 2018-12-25 | 众安信息技术服务有限公司 | History data processing method, system and computer readable storage medium |
CN109271805A (en) * | 2018-08-10 | 2019-01-25 | 广东工业大学 | A kind of storage of data subregion, querying method and system based on block chain |
CN109447799A (en) * | 2018-10-08 | 2019-03-08 | 全链通有限公司 | Intelligent contract method of commerce and system based on block chain network |
CN109493093A (en) * | 2018-09-26 | 2019-03-19 | 百度在线网络技术(北京)有限公司 | User behavior information processing method and device based on block chain |
CN109639632A (en) * | 2018-11-02 | 2019-04-16 | 远光软件股份有限公司 | User information management method, electronic equipment and storage medium based on block chain |
CN109684878A (en) * | 2018-12-17 | 2019-04-26 | 杭州安恒信息技术股份有限公司 | One kind being based on block chain technology privacy information tamper resistant method and system |
CN110308962A (en) * | 2019-07-04 | 2019-10-08 | 明链科技(深圳)有限公司 | Manage method, electronic equipment and the medium of block chain network |
CN111125774A (en) * | 2020-03-26 | 2020-05-08 | 杭州产链数字科技有限公司 | Engineering safety supervision traceability system and method based on block chain intelligent contract |
-
2020
- 2020-07-03 CN CN202010629790.5A patent/CN111754658B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819848A (en) * | 2017-11-08 | 2018-03-20 | 济南浪潮高新科技投资发展有限公司 | A kind of internet of things equipment autonomy interconnected method based on block chain |
CN109086585A (en) * | 2018-07-10 | 2018-12-25 | 众安信息技术服务有限公司 | History data processing method, system and computer readable storage medium |
CN108960832A (en) * | 2018-08-09 | 2018-12-07 | 全链通有限公司 | The method for secret protection and system of block chain real name communication |
CN109271805A (en) * | 2018-08-10 | 2019-01-25 | 广东工业大学 | A kind of storage of data subregion, querying method and system based on block chain |
CN109493093A (en) * | 2018-09-26 | 2019-03-19 | 百度在线网络技术(北京)有限公司 | User behavior information processing method and device based on block chain |
CN109447799A (en) * | 2018-10-08 | 2019-03-08 | 全链通有限公司 | Intelligent contract method of commerce and system based on block chain network |
CN109639632A (en) * | 2018-11-02 | 2019-04-16 | 远光软件股份有限公司 | User information management method, electronic equipment and storage medium based on block chain |
CN109684878A (en) * | 2018-12-17 | 2019-04-26 | 杭州安恒信息技术股份有限公司 | One kind being based on block chain technology privacy information tamper resistant method and system |
CN110308962A (en) * | 2019-07-04 | 2019-10-08 | 明链科技(深圳)有限公司 | Manage method, electronic equipment and the medium of block chain network |
CN111125774A (en) * | 2020-03-26 | 2020-05-08 | 杭州产链数字科技有限公司 | Engineering safety supervision traceability system and method based on block chain intelligent contract |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113592688A (en) * | 2021-07-30 | 2021-11-02 | 工银科技有限公司 | Diagnosis and treatment information processing method and device based on block chain and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN111754658B (en) | 2023-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109002527B (en) | Block chain-based network examination system and method for managing network examination | |
US11205349B2 (en) | System for online automated exam proctoring | |
CN111027936B (en) | Workflow realization method, device and medium based on intelligent contract in alliance network | |
US20100145774A1 (en) | Method for voting preparation and implementation by means of an automated operational information system | |
CN104067557A (en) | Automatic provisioning of resources for meeting collaboration | |
US20150213722A1 (en) | System and method for mobile and reliable testing, voting, and/or learning | |
CN110728494A (en) | Real estate service handling method, real estate property information system and real estate property information device | |
CN106296505A (en) | Educational system information interacting method, device and system towards multiple objects | |
CN109299058A (en) | Academic storage method, academic querying method and computer storage medium | |
KR20200114188A (en) | Electronic voting method using smart contract based block chain And system | |
Al‐Hawari et al. | Integrated and secure web‐based examination management system | |
KR102223120B1 (en) | Apparatus for managing of business support of startup | |
CN112395341B (en) | Federal learning management method and system based on federal cloud cooperation network | |
CA3098665A1 (en) | Education management system and method for enabling credits to be admitted based on talents and careers and talent donation bank service provision system using the same | |
CN110557276A (en) | Block chain computer room management system based on Fabric architecture | |
CN110163603A (en) | Information Authentication method, apparatus, equipment and readable storage medium storing program for executing | |
CN111754658B (en) | Training management method and device and electronic equipment | |
US20140207508A1 (en) | System and methods for workforce exchange | |
Kalja et al. | Modernization of the e-government in Estonia | |
TWM554597U (en) | Batch loan application data processing system | |
US20220172312A1 (en) | System and method of apprenticeship program management | |
CN112835694A (en) | Inspection task processing method and device, computer equipment and storage medium | |
CN109858784A (en) | Real estate management method, device, equipment and computer readable storage medium | |
KR20210086328A (en) | PS-LTE OneID record management blockchain system by use of FIDO transaction certification | |
KR101504499B1 (en) | Method and System for Providing Talent Donate Bank Service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |