CN115567540A - Online learning evaluation method and system based on block chain technology - Google Patents
Online learning evaluation method and system based on block chain technology Download PDFInfo
- Publication number
- CN115567540A CN115567540A CN202211191390.6A CN202211191390A CN115567540A CN 115567540 A CN115567540 A CN 115567540A CN 202211191390 A CN202211191390 A CN 202211191390A CN 115567540 A CN115567540 A CN 115567540A
- Authority
- CN
- China
- Prior art keywords
- evaluation
- user
- information
- block chain
- online learning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The application provides an online learning evaluation method and system based on a block chain technology, and relates to the field of block chains. An online learning evaluation method and system based on a block chain technology comprises the following steps: the learning platform establishes a basic block chain and writes all learning contents into the block chain; the user finishes registration through real-name authentication, a pair of public and private keys is generated through hash function operation, the private key is held by the user, and the public key is sent to the online learning platform; a user issues an evaluation and signs the evaluation through a private key; after receiving the evaluation, the platform decrypts through the public key to obtain the evaluation information, and then encrypts through the public key after replying the evaluation information, and the user decrypts through the private key to obtain the information after receiving the evaluation information. A pair of public and private keys can be generated through hash function operation, and the evaluation information is protected and encrypted by the public and private keys, so that the evaluation information is real and effective and cannot be tampered. In addition, the application also provides an online learning evaluation method and system based on the block chain technology.
Description
Technical Field
The application relates to the field of block chains, in particular to an online learning evaluation method and system based on a block chain technology.
Background
The online learning platform can provide resources for learners to learn autonomously, but the rapid development of the online learning platform has a plurality of defects, and through data statistics and analysis results of the evaluation of the platform by users, improvement suggestions of the platform can be obtained, so that the online learning platform has great value for subsequent business development of the online learning platform. However, if a user of the platform submits evaluation on the platform on the online learning platform in a real-name manner, although the authenticity of the evaluation can be provided, the privacy of the user is exposed, and therefore the authenticity of the evaluation of the user needs to be ensured and the privacy of the user also needs to be protected. Due to the non-tampering security and the non-traceable anonymity, the blockchain technology can share data in an encrypted state and can protect the data privacy security. The technology is an online learning evaluation platform constructed by technologies such as a distributed structure of a block chain, a Hash function asymmetric encryption algorithm and the like.
The specific implementation process of the online learning evaluation method comprises four main steps: (1) Establishing a basic block chain by a platform, and writing all learning contents into the block chain; (2) The user completes registration through authentication of an official real-name authentication system, and generates a pair of public and private keys through hash function operation, wherein the private key is held by the user, and the public key is sent to the online learning platform; (3) A user issues an evaluation after online learning, and signs the evaluation through a private key; (4) After receiving the evaluation, the platform decrypts through the received public key to obtain evaluation information, if the evaluation information is replied, the evaluation information is encrypted through the public key and then sent to the user, and the user decrypts through the private key after receiving the evaluation information to obtain reply information. By the technology, authenticity of user evaluation and privacy of the user can be guaranteed, and the user evaluation can be prevented from being tampered.
Disclosure of Invention
The application aims to provide an online learning evaluation method based on a block chain technology, which can generate a pair of public and private keys through hash function operation, and protect and encrypt evaluation information by using the public and private keys, so that the evaluation information is real and effective and cannot be tampered.
Another objective of the present application is to provide an online learning evaluation system based on a blockchain technology, which is capable of operating an online learning evaluation method based on a blockchain technology.
In a first aspect, an embodiment of the present application provides an online learning evaluation method based on a block chain technique, which includes establishing a basic block chain for an online learning platform, and writing all learning contents into the block chain; the user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, wherein the private key is held by the user, and the public key is sent to the online learning platform; a user issues an evaluation, and signs the evaluation through a private key; and after receiving the evaluation, the platform decrypts through the public key to obtain the evaluation information, and encrypts through the public key after replying the evaluation information, and the user decrypts through the private key to obtain the information after receiving the evaluation information.
In some embodiments of the present application, the establishing a basic blockchain by the online learning platform, and writing all learning contents into the blockchain includes: and constructing a basic block, arranging a main control node to connect the basic block to form a block chain, and arranging a storage node, thereby completing the construction of the running frame of the block chain distributed online learning platform system. And storing the learning content data to the storage node of the block chain, generating corresponding index data, and controlling the storage node by the master control node of the block chain after the blocking storage is completed.
In some embodiments of the present application, the user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, where the private key is held by the user, and the public key is sent to the online learning platform, including: the method comprises the steps that a user submits a real-name authentication request to an official real-name authentication system, wherein the real-name authentication request at least comprises a user block chain account number identification and user data to be authenticated, the block chain account number identification corresponds to a storage block in a block chain, the user data to be authenticated is stored in the storage block, whether original data matched with the data to be authenticated exist in a database of the real-name authentication system or not is verified, and if the original data are verified to pass, the authentication request passes. A pair of public and private keys is generated by using an asymmetric encryption algorithm and bound with a user account, the user account is a public key address, and user identity data cannot be deduced through the public key address due to the characteristic of a hash function, so that the user is in an anonymous state before actively disclosing identity information.
In some embodiments of the present application, the issuing an evaluation by the user and signing the evaluation by a private key includes: and generating a hash value by the evaluation operation data of the user, including the content, the times and the time related information through a hash function algorithm, uploading the hash value to the block chain, and encrypting the hash value through a private key.
In some embodiments of the present application, after receiving the evaluation, the platform decrypts through a public key to obtain evaluation information, encrypts the reply evaluation information through the public key, and decrypts through a private key after receiving by a user to obtain information, including: the platform decrypts the received hash value information through a public key to obtain the related information of the evaluation content, the evaluation times and the evaluation time of the user, if the platform has reply information to the evaluation, the reply information can be written into the block chain after being encrypted through the public key, and the user decrypts through a private key after receiving the reply information.
In a second aspect, an embodiment of the present application provides an online learning evaluation system based on a block chain technology, which includes a registration module, configured to register user information through an official real-name authentication system; the evaluation module is used for issuing evaluation by a user and signing the evaluation through a private key; and the reply receiving module is used for decrypting by the public key to obtain the evaluation information after the platform receives the evaluation, encrypting the reply evaluation information by the public key, and decrypting by the private key to obtain the information after the user receives the reply evaluation information.
In some embodiments of the present application, the above includes: at least one memory for storing computer instructions; at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to: the device comprises a registration module, an evaluation module and a reply receiving module.
In a third aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a method as any one of online learning evaluation methods based on a block chain technique.
Compared with the prior art, the embodiment of the application has at least the following advantages or beneficial effects:
the core technical means of the invention is to generate a public and private key for a user through a hash function algorithm of a block chain, and encrypt evaluation and recovery information by utilizing the public and private key, thereby hiding user real-name registration information data and ensuring the authenticity and effectiveness of the evaluation and recovery information. Due to the fact that the block chain is not capable of being tampered with and the block chain is incapable of being tracked, user information is safer, user evaluation and platform reply information can be effectively and pertinently protected, and objective and reliable user evaluation is guaranteed. The invention solves the problems of false and counterfeit evaluation information of the user without the real name and leakage of personal privacy information of the user without the real name in the traditional evaluation system, and improves the safety of information data in the online learning evaluation system. Therefore, the real-name information of the user is not disclosed, and the information is ensured not to be falsified by a verification mode of encryption and decryption of the public and private keys.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic diagram illustrating steps of an online learning evaluation method based on a block chain technique according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating detailed steps of an online learning evaluation method based on a block chain technology according to an embodiment of the present application;
fig. 3 is a schematic diagram of an online learning evaluation system module based on a block chain technique according to an embodiment of the present disclosure;
fig. 4 is an electronic device according to an embodiment of the present disclosure.
Icon: 10-a registration module; 20-an evaluation module; 30-receiving a reply module; 101-a memory; 102-a processor; 103-communication interface.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
It is to be noted that the term "comprises," "comprising," or any other variation thereof is intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments and features of the embodiments described below can be combined with one another without conflict.
Example 1
Referring to fig. 1, fig. 1 is a schematic diagram illustrating steps of an online learning evaluation method based on a block chain technique according to an embodiment of the present application, which is shown as follows:
step S100, establishing a basic block chain by an online learning platform, and writing all learning contents into the block chain;
in some embodiments, a basic block is constructed in the first step of establishing a basic block chain, then a main control node is set, the basic blocks are connected through the main control node to form the block chain, and a storage node is set on the block chain, so that the construction of the block chain distributed online learning platform system operation framework is completed. After the frame is constructed, learning content data need to be stored in the storage nodes of the block chain, index data corresponding to the learning content is generated again, the index data are stored in a blocking mode, the storage nodes are controlled through the main control nodes of the block chain, and therefore the building of the basic block chain of the online learning platform is completed.
Step S110, a user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, wherein the private key is held by the user, and the public key is sent to an online learning platform;
in some embodiments, the user real-name registration is that a user submits a real-name authentication request to an official real-name authentication system, wherein the real-name authentication request at least comprises a user block chain account number identifier and user data to be real-name authenticated, the block chain account number identifier corresponds to a storage block in a block chain, the user data to be real-name authenticated is stored in the storage block, whether original data matched with the data to be real-name authenticated exists in a database of the real-name authentication system is verified, and if the verification is passed, the authentication request is passed. And then, a pair of public and private keys is generated for the user by using an asymmetric encryption algorithm, the public and private keys are bound with a user account, the private key is held by the user, the public key is sent to an online learning platform, the user account is a public key address, and the identity data of the user cannot be deduced through the public key address due to the characteristic of a hash function, so that the user is in an anonymous state before actively disclosing the identity information.
Step S120, the user issues an evaluation and signs the evaluation through a private key;
in some embodiments, the user issues an evaluation on the online learning platform, and the evaluation operation data of the user, including the content, the number of times and the relevant information of time, is generated by a hash function algorithm, uploaded to the block chain, and encrypted by a private key. Therefore, the evaluation information is prevented from being tampered, and meanwhile, the privacy of the evaluation information is guaranteed.
Step S130, after receiving the evaluation, the platform decrypts through the public key to obtain the evaluation information, and then encrypts through the public key after replying the evaluation information, and the user decrypts through the private key to obtain the information after receiving the evaluation information.
In some embodiments, the platform decrypts the received hash value evaluation information by using a public key sent by the user to obtain the information related to the evaluation content, the evaluation times and the evaluation time of the user. If the platform has reply information for the evaluation, the reply information can be written into the block chain after being encrypted by a public key, and the reply information is obtained by the user through private key decryption after receiving the reply information.
Example 2
Referring to fig. 2, fig. 2 is a detailed step diagram of an online learning evaluation method based on a block chain technique according to an embodiment of the present disclosure, which is shown as follows:
step S200, constructing a basic block, arranging a main control node to connect the basic block to form a block chain, and arranging a storage node.
Step S210, storing the learning content data to the storage node of the block chain, generating corresponding index data, and completing the block storage.
Step S220, the user submits a real-name authentication request to the official real-name authentication system.
Step S230, a pair of public and private keys is generated by using an asymmetric encryption algorithm, and is bound with the user account, where the private key is held by the user, and the public key is sent to the online learning platform.
And step S240, generating a hash value by the evaluation operation data information of the user through a hash function algorithm, uploading the hash value to the block chain, and encrypting the hash value through a private key.
And step S250, the platform decrypts the received hash value information through a public key to obtain the evaluation information of the user, if the platform replies to the evaluation information, the evaluation information can be written into the block chain after being encrypted through the public key, and the user decrypts through a private key after receiving the evaluation information to obtain the reply information.
In some embodiments, when a user issues an evaluation on an online learning platform, the evaluation information needs to be generated into a hash value, the evaluation information is encrypted by a private key and then written into a block chain, then the platform decrypts the received encrypted hash value data by a public key to obtain the evaluation information, then the reply information is encrypted by the public key and then written into the block chain, and the user decrypts the received reply information by the private key to obtain the reply information. The method comprises the following steps:
generating a hash value by relevant information including content, times and time of evaluation operation data of a user through a hash function algorithm, writing the hash value into a block chain, and encrypting the hash value through a private key;
the platform decrypts the received hash value information through a public key to obtain the related information of the evaluation content, the evaluation times and the evaluation time of the user;
and the platform encrypts the evaluated reply information through the public key and writes the encrypted reply information into the block chain, and the user decrypts the encrypted reply information through the private key after receiving the encrypted reply information to obtain the platform reply information.
Example 3
Referring to fig. 3, fig. 3 is a schematic diagram of an online learning evaluation system module based on a block chain technique according to an embodiment of the present application, which is shown as follows:
a registration module 10 for registering user information through an official real-name authentication system;
the evaluation module 20 is used for the user to issue the evaluation and sign the evaluation through a private key;
and the receiving and replying module 30 is used for decrypting by the public key to obtain the evaluation information after the platform receives the evaluation, encrypting by the public key to reply the evaluation information, and decrypting by the private key to obtain the information after the platform receives the evaluation information.
As shown in fig. 4, an embodiment of the present application provides an electronic device, which includes a memory 101 for storing one or more programs; a processor 102. The one or more programs, when executed by the processor 102, implement the method of any of the first aspects as described above.
Also included is a communication interface 103, with the memory 101, processor 102, and communication interface 103 being electrically connected to each other, directly or indirectly, to enable transfer or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory 101 may be used to store software programs and modules, and the processor 102 executes the software programs and modules stored in the memory 101 to thereby execute various functional applications and data processing. The communication interface 103 may be used for communicating signaling or data with other node devices.
The Memory 101 may be, but is not limited to, a Random Access Memory 101 (RAM), a Read Only Memory 101 (ROM), a Programmable Read Only Memory 101 (PROM), an Erasable Read Only Memory 101 (EPROM), an electrically Erasable Read Only Memory 101 (EEPROM), and the like.
The processor 102 may be an integrated circuit chip having signal processing capabilities. The Processor 102 may be a general-purpose Processor 102, including a Central Processing Unit (CPU) 102, a Network Processor 102 (NP), and the like; but may also be a Digital Signal processor 102 (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware components.
In the embodiments provided in the present application, it should be understood that the disclosed method and system can be implemented in other ways. The method and system embodiments described above are merely illustrative and, for example, the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
In another aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by the processor 102, implements the method according to any one of the first aspect described above. The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory 101 (ROM), a Random Access Memory 101 (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In summary, according to the online learning evaluation method and system based on the blockchain technology provided by the embodiment of the application, a public and private key is generated for a user through a hash function algorithm of the blockchain, and the evaluation and recovery information is encrypted by using the public and private key, so that the real-name registration information data of the user is concealed, and the authenticity and effectiveness of the evaluation and recovery information are ensured. Due to the fact that the block chain is not capable of being tampered with and the block chain is incapable of being tracked, user information is safer, user evaluation and platform reply information can be effectively and pertinently protected, and objective and reliable user evaluation is guaranteed. The invention solves the problems of false forgery of the evaluation information of the user without real name and leakage of the personal privacy information of the user with real name in the traditional evaluation system, and improves the safety of the information data in the online learning evaluation system. Therefore, the real-name information of the user is not disclosed, and the information is ensured not to be falsified by a verification mode of encryption and decryption of the public and private keys.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Claims (10)
1. An online learning evaluation method based on a block chain technology is characterized by comprising the following steps:
establishing a basic block chain by an online learning platform, and writing all learning contents into the block chain;
the user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, wherein the private key is held by the user, and the public key is sent to the online learning platform;
a user issues an evaluation and signs the evaluation through a private key;
and after receiving the evaluation, the platform decrypts through the public key to obtain the evaluation information, and encrypts through the public key after replying the evaluation information, and the user decrypts through the private key to obtain the information after receiving the evaluation information.
2. The method as claimed in claim 1, wherein the online learning platform establishes a basic blockchain, and writes all learning contents into the blockchain, and the method comprises:
and constructing a basic block, arranging a main control node to connect the basic block to form a block chain, and arranging a storage node, thereby completing the construction of the running framework of the block chain distributed online learning platform system.
3. The method as claimed in claim 1, wherein the online learning platform establishes a basic blockchain, and writes all learning contents into the blockchain, and the method comprises:
and storing the learning content data to the storage nodes of the block chain, generating corresponding index data and controlling the storage nodes by the main control node of the block chain after the block chain storage is completed.
4. The method as claimed in claim 1, wherein the user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, the private key is held by the user, and the public key is sent to the online learning platform, comprising:
the method comprises the steps that a user submits a real-name authentication request to an official real-name authentication system, wherein the real-name authentication request at least comprises a user block chain account identification and user data to be authenticated, the block chain account identification corresponds to a storage block in a block chain, the user data to be authenticated is stored in the storage block, whether original data matched with the data to be authenticated exist in a database of the real-name authentication system or not is verified, and if the original data are verified to pass, the authentication request passes.
5. The method as claimed in claim 1, wherein the user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, the private key is held by the user, and the public key is sent to the online learning platform, comprising:
a pair of public and private keys is generated by using an asymmetric encryption algorithm and is bound with a user account, the user account is a public key address, and user identity data cannot be deduced through the public key address due to the characteristic of a hash function, so that the user is in an anonymous state before actively disclosing identity information.
6. The method for online learning and evaluation based on blockchain technology of claim 1, wherein the user issues an evaluation and signs the evaluation with a private key, comprising:
and generating a hash value by the evaluation operation data of the user, including content, times and time related information through a hash function algorithm, uploading the hash value to the block chain, and encrypting the hash value through a private key.
7. The method as claimed in claim 1, wherein the platform decrypts to obtain the evaluation information through a public key after receiving the evaluation, encrypts the reply evaluation information through the public key, and decrypts to obtain the information through a private key after receiving the reply evaluation information, and the method comprises:
the platform decrypts the received hash value information through a public key to obtain the related information of the evaluation content, the evaluation times and the evaluation time of the user, if the platform has reply information to the evaluation, the reply information can be written into the block chain after being encrypted through the public key, and the user decrypts through a private key after receiving the reply information.
8. An online learning evaluation system based on a block chain technology is applied to a server, and the system comprises:
the registration module is used for registering user information through an official real-name authentication system;
the evaluation module is used for issuing evaluation by a user and signing the evaluation through a private key;
and the reply receiving module is used for decrypting by the public key to obtain the evaluation information after the platform receives the evaluation, encrypting the reply evaluation information by the public key, and decrypting by the private key to obtain the information after the user receives the reply evaluation information.
9. The system of claim 8, wherein the system comprises:
at least one memory for storing computer instructions;
at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to perform: the device comprises a registration module, an evaluation module and a reply receiving module.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211191390.6A CN115567540A (en) | 2022-09-28 | 2022-09-28 | Online learning evaluation method and system based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211191390.6A CN115567540A (en) | 2022-09-28 | 2022-09-28 | Online learning evaluation method and system based on block chain technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115567540A true CN115567540A (en) | 2023-01-03 |
Family
ID=84743855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211191390.6A Pending CN115567540A (en) | 2022-09-28 | 2022-09-28 | Online learning evaluation method and system based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115567540A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115829729A (en) * | 2023-02-14 | 2023-03-21 | 四川华西集采电子商务有限公司 | Supply chain financial credit evaluation system and method based on three-chain architecture |
-
2022
- 2022-09-28 CN CN202211191390.6A patent/CN115567540A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115829729A (en) * | 2023-02-14 | 2023-03-21 | 四川华西集采电子商务有限公司 | Supply chain financial credit evaluation system and method based on three-chain architecture |
CN115829729B (en) * | 2023-02-14 | 2023-05-02 | 四川华西集采电子商务有限公司 | Three-chain architecture-based supply chain financial credit evaluation system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108111314B (en) | Method and equipment for generating and verifying digital certificate | |
US11245524B2 (en) | Binding of decentralized identifiers to verified claims | |
CN110046996B (en) | Data processing method and device | |
CN101107611B (en) | Private and controlled ownership sharing method, device and system | |
CN107770159B (en) | Vehicle accident data recording method and related device and readable storage medium | |
CN106789090A (en) | Public key infrastructure system and semi-random participating certificate endorsement method based on block chain | |
CN111784001B (en) | Model training method and device and computer readable storage medium | |
CN108389059A (en) | Digital copyrighted work protection, transaction and distributing method based on ownership and system | |
KR20210040078A (en) | Systems and methods for safe storage services | |
CN109905360B (en) | Data verification method and terminal equipment | |
CN110096903B (en) | Asset verification method based on block chain and block chain network system | |
CN105518687A (en) | Secure data storage | |
CN106326763A (en) | Method and device for obtaining electronic file | |
Abbade et al. | Blockchain applied to vehicular odometers | |
US7739500B2 (en) | Method and system for consistent recognition of ongoing digital relationships | |
CN115242383A (en) | Block chain-based data right multiparty sharing management method | |
CN115567540A (en) | Online learning evaluation method and system based on block chain technology | |
CN113722749A (en) | Data processing method and device for block chain BAAS service based on encryption algorithm | |
CN113779637B (en) | Attribute data processing method, attribute data processing device, attribute data processing equipment and attribute data processing medium | |
CN114240399A (en) | Government affair data processing method and system based on block chain platform | |
Verma et al. | Applications of Data Security and Blockchain in Smart City Identity Management | |
Al-Ghaili et al. | Security factors based evaluation of verification algorithm for an IoT access system | |
CN111460466A (en) | Block chain-based electronic ticket management method, device and medium | |
Al-Ghaili et al. | Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications | |
Sayyad et al. | Voting Using Blockchain Technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |