CN113255009A - Learning data authentication method based on block chain - Google Patents
Learning data authentication method based on block chain Download PDFInfo
- Publication number
- CN113255009A CN113255009A CN202110516206.XA CN202110516206A CN113255009A CN 113255009 A CN113255009 A CN 113255009A CN 202110516206 A CN202110516206 A CN 202110516206A CN 113255009 A CN113255009 A CN 113255009A
- Authority
- CN
- China
- Prior art keywords
- data
- information
- learning
- authentication method
- method based
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000011156 evaluation Methods 0.000 claims description 11
- 238000012545 processing Methods 0.000 claims description 5
- 230000002457 bidirectional effect Effects 0.000 claims description 4
- 230000008901 benefit Effects 0.000 abstract description 3
- 230000008520 organization Effects 0.000 abstract description 3
- 230000005540 biological transmission Effects 0.000 abstract 1
- 230000010354 integration Effects 0.000 abstract 1
- 230000006872 improvement Effects 0.000 description 9
- 230000000052 comparative effect Effects 0.000 description 5
- 238000012360 testing method Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 239000008358 core component Substances 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
- G06Q50/205—Education administration or guidance
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- Marketing (AREA)
- Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- General Business, Economics & Management (AREA)
- Educational Administration (AREA)
- Educational Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Primary Health Care (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Software Systems (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to the technical field of block chains, in particular to a learning data authentication method based on a block chain. The method comprises the steps of intelligent contract handling, personnel related information input in a system, remote calling, personnel related information transmission to a learning center, user management, relevant personnel information introduction into a corresponding learning organization, node management, operation on the personnel related information through corresponding nodes, distributed storage, personnel related information storage, block chain and personnel related information integration to form an information chain. The learning data authentication method based on the block chain has the advantages of small information redundancy and flexible system operation.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a learning data authentication method based on a block chain.
Background
The occupational skill evaluation refers to prediction of occupational positioning of a person and suitable occupational types and characters and the like through some tests, and belongs to a tendency test, which is also called as an occupational ability tendency test.
Disclosure of Invention
The present invention is directed to a learning data authentication method based on a block chain, so as to solve the problems in the background art.
In order to achieve the above object, one of the objects of the present invention is to provide a learning data authentication method based on a block chain, including the following steps:
s1, conducting intelligent contract handling, and inputting relevant information of personnel in the system;
s2, remote calling is carried out, and the related information of the personnel is transmitted to the learning center;
s3, managing by users, and importing the information of related personnel into corresponding learning organizations;
s4, managing nodes, and operating the personnel related information by adopting corresponding nodes;
s5, storing relevant information of personnel in a distributed mode;
and S6, integrating the related information of the personnel to form an information chain.
As a further improvement of the present technical solution, in S1, the intelligent contract transaction includes the following steps:
s1.1, auditing by a user, and auditing identity information of the user;
s1.2, registering a user, and setting an account according to related information of the user;
s1.3, recording results, and recording learning data of the account;
s1.4, writing in courses, namely writing in the types and names of the online learning courses of the account;
s1.5, course evaluation, namely, recording the completion quality and evaluation of relevant courses of the account;
and S1.6, course query, and query of course data related to the account.
As a further improvement of the present technical solution, in S4, the node management includes: the system comprises a CA node, an ENdorse node and an Order node, wherein the CA node is responsible for managing and issuing a digital certificate to ensure that data are accurate and correct, the ENdorse node is responsible for carrying out data signing to enable the data to be authoritative, the Order node is responsible for channel creation and channel configuration updating, and the fairness and the credibility of an authentication result can be improved by adopting the CA node.
As a further improvement of the technical scheme, the learning center is bidirectionally connected with the ENdorse node, the intelligent contract transaction is connected with the Oeder node, and data can be changed, so that the flexibility of the system is improved.
As a further improvement of the present technical solution, in S5, the distributed storage architecture is composed of three parts: the system comprises a client, a metadata server and a data server;
the client side is responsible for sending read-write requests and caching file metadata and file data;
the metadata server is responsible for managing metadata and processing the request of the client and is a core component of the whole system;
the data server is responsible for storing file data and ensuring the availability and integrity of the data.
As a further improvement of the present technical solution, in S5, the distributed storage information is divided into three categories, that is, student information data, course information data, and learning achievement data.
As a further improvement of the technical solution, in S6, the blockchain includes a plurality of modules, the student information data and the corresponding modules form a student information chain, the course information data and the corresponding modules form a course information chain, and the achievement data and the corresponding modules form an achievement information chain.
As a further improvement of the present technical solution, the module includes a previous chunk hash value, a current hash value, a timestamp, and a random number.
As a further improvement of the technical solution, in S6, the data structure of the distributed storage adopts a Merkle tree structure, the leaf nodes of the Merkle tree store hash values of the data information, the non-leaf nodes store hash values obtained by performing hash calculation on a combination of all the leaf nodes below the leaf nodes, a change in any data in the block may cause a change in the Merkle tree structure, and the Merkle tree structure may greatly reduce the calculation amount of the data in the process of verification and comparison of the transaction information.
As a further improvement of the technical solution, the learning data authentication method adopts a "master-slave multi-chain" architecture, which can prevent data loss of a single host, improve data security, implement data classification storage, and reduce redundancy of block information.
Compared with the prior art, the invention has the beneficial effects that:
1. in the learning data authentication method based on the block chain, a distributed storage architecture consists of three parts: the client, the metadata server and the data server have the advantage that the performance and the capacity can be simultaneously expanded.
2. In the learning data authentication method based on the block chain, the calculation amount of data can be greatly reduced by adopting a Merkle tree structure.
3. In the learning data authentication method based on the block chain, the data loss of a single host can be prevented by adopting a master-slave multi-chain structure, the safety of the data is improved, the classified storage of the data is realized, and the redundancy of block information can be reduced.
Drawings
Fig. 1 is a schematic view of the entire structure of embodiment 1.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", and the like, indicate orientations and positional relationships based on those shown in the drawings, and are used only for convenience of description and simplicity of description, and do not indicate or imply that the equipment or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be considered as limiting the present invention.
Embodiment 1 a learning data authentication method based on a block chain, including:
intelligent contract handling
Personnel-related information is entered in the system.
(1) User checking, namely checking the identity information of the user;
(2) registering a user, and setting an account according to related information of the user;
(3) the method comprises the following steps of (1) performing achievement input, and inputting learning data of an account;
(4) writing in courses, namely writing in the types and names of the online learning courses of the account;
(5) course evaluation, namely, inputting the completion quality and evaluation of relevant courses of the account;
(6) and course query, namely querying relevant course data of the account.
Second, remote calling
And transmitting the information related to the personnel to a learning center for management and classification.
Third, user management
And importing the related personnel information into the corresponding learning organization.
Four, node management
And operating the personnel related information by adopting the corresponding node.
The node management comprises the following steps: the CA node is responsible for managing and issuing a digital certificate to ensure that data are accurate and error-free, the ENdorse node is responsible for data signing to enable the data to be authoritative, and the Order node is responsible for channel creation and channel configuration updating operations.
The learning center is connected with the ENdorse node in a bidirectional mode, the intelligent contract processing is connected with the Oeder node, and data can be changed, so that the flexibility of the system is improved.
Five, distributed storage
And storing the information related to the personnel.
The distributed storage architecture consists of three parts: the system comprises a client, a metadata server and a data server;
the client side is responsible for sending read-write requests and caching file metadata and file data;
the metadata server is responsible for managing metadata and processing the request of the client and is a core component of the whole system;
the data server is responsible for storing file data and ensuring the availability and integrity of the data.
The distributed storage information is divided into three categories, namely student information data, course information data and learning achievement data.
Sixth, block chain
And integrating the related information of the personnel to form an information chain.
The block chain comprises a plurality of modules, the student information data and the corresponding modules form a student information chain, the course information data and the corresponding modules form a course information chain, and the achievement data and the corresponding modules form an achievement information chain.
The module includes a previous chunk hash value, a current hash value, a timestamp, and a random number.
The distributed storage data structure adopts a Merkle tree structure, leaf nodes of the Merkle tree store hash values of data information, non-leaf nodes store hash values obtained by performing hash calculation on combinations of all the leaf nodes below the leaf nodes, the Merkle tree structure can be changed due to the change of any data in a block, and the Merkle tree structure can greatly reduce the calculation amount of the data in the process of verification and comparison of transaction information.
The learning data authentication method adopts a 'master-slave multi-chain' framework, can prevent the data loss of a single host, improves the safety of the data, realizes the classified storage of the data and can reduce the redundancy of block information.
Comparative example 1 a learning data authentication method based on a blockchain, comprising:
intelligent contract handling
Personnel-related information is entered in the system.
(1) User checking, namely checking the identity information of the user;
(2) registering a user, and setting an account according to related information of the user;
(3) the method comprises the following steps of (1) performing achievement input, and inputting learning data of an account;
(4) writing in courses, namely writing in the types and names of the online learning courses of the account;
(5) course evaluation, namely, inputting the completion quality and evaluation of relevant courses of the account;
(6) and course query, namely querying relevant course data of the account.
Second, remote calling
And transmitting the information related to the personnel to a learning center for management and classification.
Third, user management
And importing the related personnel information into the corresponding learning organization.
Four, store
And storing the information related to the personnel.
The stored information is divided into three categories, namely student information data, course information data and learning achievement data.
Five, block chain
And integrating the related information of the personnel to form an information chain.
The block chain comprises a plurality of modules, the student information data and the corresponding modules form a student information chain, the course information data and the corresponding modules form a course information chain, and the achievement data and the corresponding modules form an achievement information chain.
The module includes a previous chunk hash value, a current hash value, a timestamp, and a random number.
Experimental example 1
In the learning data authentication method based on the block chain, the method has higher system operation flexibility and short learning data authentication time, can promote the bidirectional evaluation of online learning achievement and course quality, and the inventor performs the following tests in order to verify the related technical scheme:
comparing the actual operation time of the learning data authentication method based on the block chain in the above example 1 and the actual operation time of the learning data authentication method based on the block chain in the comparative example 1, the learning data authentication method in the example 1 is adopted in the group A, the learning data authentication method in the comparative example 1 is adopted in the group B, the input operation is simultaneously carried out, and the time consumed by comparing the two methods is compared, and the structure is as follows:
time/S required to be consumed | |
Example 1 | 86 |
Comparative example 1 | 350 |
As can be seen from table 1, the learning data authentication method based on the blockchain provided in embodiment 1 of the present invention is shorter in learning data authentication time compared to comparative example 1, and thus it can be shown that the learning data authentication method based on the blockchain has higher system operation flexibility and can promote the bidirectional evaluation of the online learning result and the course quality.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (9)
1. A learning data authentication method based on a block chain is characterized by comprising the following steps:
s1, conducting intelligent contract handling, and inputting relevant information of personnel in the system;
s2, remote calling is carried out, and the related information of the personnel is transmitted to the learning center;
s3, managing by users, and importing the information of related personnel into corresponding learning organizations;
s4, managing nodes, and operating the personnel related information by adopting corresponding nodes;
s5, storing relevant information of personnel in a distributed mode;
and S6, integrating the related information of the personnel to form an information chain.
2. The learning data authentication method based on the block chain according to claim 1, characterized in that: in S1, the intelligent contract transaction includes the following steps:
s1.1, auditing by a user, and auditing identity information of the user;
s1.2, registering a user, and setting an account according to related information of the user;
s1.3, recording results, and recording learning data of the account;
s1.4, writing in courses, namely writing in the types and names of the online learning courses of the account;
s1.5, course evaluation, namely, recording the completion quality and evaluation of relevant courses of the account;
and S1.6, course query, and query of course data related to the account.
3. The learning data authentication method based on the block chain according to claim 1, characterized in that: in S4, the node management includes: the system comprises a CA node, an ENdorse node and an Order node, wherein the CA node is responsible for managing and issuing a digital certificate to ensure that data are accurate and correct, the ENdorse node is responsible for signing data to enable the data to be authoritative, and the Order node is responsible for channel creation and channel configuration updating operations.
4. The learning data authentication method based on the block chain according to claim 3, characterized in that: the learning center is connected with the ENdorse node in a bidirectional mode, the intelligent contract processing is connected with the Oeder node, and data can be changed.
5. The learning data authentication method based on the block chain according to claim 1, characterized in that: in S5, the distributed storage architecture is composed of three parts: the system comprises a client, a metadata server and a data server;
the client side is responsible for sending read-write requests and caching file metadata and file data;
the metadata server is responsible for managing metadata and processing the request of the client;
the data server is responsible for storing file data.
6. The learning data authentication method based on the block chain according to claim 1, characterized in that: in S5, the distributed storage information is divided into three categories, that is, student information data, course information data, and learning achievement data.
7. The learning data authentication method based on the block chain according to claim 6, characterized in that: in S6, the student information data and the corresponding module form a student information chain, the course information data and the corresponding module form a course information chain, and the achievement data and the corresponding module form an achievement information chain.
8. The learning data authentication method based on the block chain according to claim 7, characterized in that: the module includes a previous chunk hash value, a current hash value, a timestamp, and a random number.
9. The learning data authentication method based on the block chain according to claim 1, characterized in that: in S6, the data structure of distributed storage adopts a Merkle tree structure, where leaf nodes of the Merkle tree store hash values of data information, and non-leaf nodes store hash values obtained by performing hash calculation on a combination of all leaf nodes below the leaf nodes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110516206.XA CN113255009A (en) | 2021-05-12 | 2021-05-12 | Learning data authentication method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110516206.XA CN113255009A (en) | 2021-05-12 | 2021-05-12 | Learning data authentication method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113255009A true CN113255009A (en) | 2021-08-13 |
Family
ID=77222959
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110516206.XA Pending CN113255009A (en) | 2021-05-12 | 2021-05-12 | Learning data authentication method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113255009A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113704722A (en) * | 2021-10-27 | 2021-11-26 | 湖南和信安华区块链科技有限公司 | Collaborative education platform based on block chain |
-
2021
- 2021-05-12 CN CN202110516206.XA patent/CN113255009A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113704722A (en) * | 2021-10-27 | 2021-11-26 | 湖南和信安华区块链科技有限公司 | Collaborative education platform based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109791591B (en) | Method and system for identity and credential protection and verification via blockchain | |
AU2022200535B2 (en) | Method and system for blockchain variant using digital signatures | |
CN107580022B (en) | Data sharing system and method | |
CN111177797B (en) | Block chain-based data processing method and device and electronic equipment | |
WO2019074584A1 (en) | Method and system for interacting public and private blockchains with controlled participation | |
CN109428886A (en) | For carrying out the method and system of comment verifying and confidence level scoring via block chain | |
CN109062936B (en) | Data query method, computer readable storage medium and terminal equipment | |
CN110264325A (en) | A kind of invoice checking method and device based on block chain | |
CN115186304B (en) | Transaction data verification method and system based on block chain | |
CN113255009A (en) | Learning data authentication method based on block chain | |
CN115099681B (en) | Library management system and method based on block chain | |
WO2021000645A1 (en) | Contract generation method and apparatus based on data crawling and computer device | |
US20200153630A1 (en) | Method and system for quantum-resistant hashing scheme | |
CN112488834B (en) | Node management method, node management device, electronic equipment and readable storage medium | |
CN111737342A (en) | Government integrity archive management system based on block chain | |
CN110533393A (en) | Educational information storage method, equipment and medium | |
CN110704454B (en) | Report data acquisition system and method | |
CN113128188A (en) | Bank payroll generation method, device and medium | |
CN116055051A (en) | Data processing method based on block chain network and related equipment | |
CN114721582A (en) | Information sharing method and device and related equipment | |
CN107659654B (en) | The efficient method and device of calling to account of cloudy data integrity damage based on prestige | |
CN110471928B (en) | Data circulation system | |
CN116346355A (en) | Block chain digital identity processing method, device and system | |
CN116846748A (en) | Network configuration management method and related device | |
CN116546036A (en) | Multi-index weight coefficient and special node determining method and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |