CN115567540A - Online learning evaluation method and system based on block chain technology - Google Patents

Online learning evaluation method and system based on block chain technology Download PDF

Info

Publication number
CN115567540A
CN115567540A CN202211191390.6A CN202211191390A CN115567540A CN 115567540 A CN115567540 A CN 115567540A CN 202211191390 A CN202211191390 A CN 202211191390A CN 115567540 A CN115567540 A CN 115567540A
Authority
CN
China
Prior art keywords
evaluation
user
information
block chain
online learning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211191390.6A
Other languages
Chinese (zh)
Inventor
史宇
胡东辉
王辉
张重德
王方
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei University of Technology
Original Assignee
Hefei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei University of Technology filed Critical Hefei University of Technology
Priority to CN202211191390.6A priority Critical patent/CN115567540A/en
Publication of CN115567540A publication Critical patent/CN115567540A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The application provides an online learning evaluation method and system based on a block chain technology, and relates to the field of block chains. An online learning evaluation method and system based on a block chain technology comprises the following steps: the learning platform establishes a basic block chain and writes all learning contents into the block chain; the user finishes registration through real-name authentication, a pair of public and private keys is generated through hash function operation, the private key is held by the user, and the public key is sent to the online learning platform; a user issues an evaluation and signs the evaluation through a private key; after receiving the evaluation, the platform decrypts through the public key to obtain the evaluation information, and then encrypts through the public key after replying the evaluation information, and the user decrypts through the private key to obtain the information after receiving the evaluation information. A pair of public and private keys can be generated through hash function operation, and the evaluation information is protected and encrypted by the public and private keys, so that the evaluation information is real and effective and cannot be tampered. In addition, the application also provides an online learning evaluation method and system based on the block chain technology.

Description

Online learning evaluation method and system based on block chain technology
Technical Field
The application relates to the field of block chains, in particular to an online learning evaluation method and system based on a block chain technology.
Background
The online learning platform can provide resources for learners to learn autonomously, but the rapid development of the online learning platform has a plurality of defects, and through data statistics and analysis results of the evaluation of the platform by users, improvement suggestions of the platform can be obtained, so that the online learning platform has great value for subsequent business development of the online learning platform. However, if a user of the platform submits evaluation on the platform on the online learning platform in a real-name manner, although the authenticity of the evaluation can be provided, the privacy of the user is exposed, and therefore the authenticity of the evaluation of the user needs to be ensured and the privacy of the user also needs to be protected. Due to the non-tampering security and the non-traceable anonymity, the blockchain technology can share data in an encrypted state and can protect the data privacy security. The technology is an online learning evaluation platform constructed by technologies such as a distributed structure of a block chain, a Hash function asymmetric encryption algorithm and the like.
The specific implementation process of the online learning evaluation method comprises four main steps: (1) Establishing a basic block chain by a platform, and writing all learning contents into the block chain; (2) The user completes registration through authentication of an official real-name authentication system, and generates a pair of public and private keys through hash function operation, wherein the private key is held by the user, and the public key is sent to the online learning platform; (3) A user issues an evaluation after online learning, and signs the evaluation through a private key; (4) After receiving the evaluation, the platform decrypts through the received public key to obtain evaluation information, if the evaluation information is replied, the evaluation information is encrypted through the public key and then sent to the user, and the user decrypts through the private key after receiving the evaluation information to obtain reply information. By the technology, authenticity of user evaluation and privacy of the user can be guaranteed, and the user evaluation can be prevented from being tampered.
Disclosure of Invention
The application aims to provide an online learning evaluation method based on a block chain technology, which can generate a pair of public and private keys through hash function operation, and protect and encrypt evaluation information by using the public and private keys, so that the evaluation information is real and effective and cannot be tampered.
Another objective of the present application is to provide an online learning evaluation system based on a blockchain technology, which is capable of operating an online learning evaluation method based on a blockchain technology.
In a first aspect, an embodiment of the present application provides an online learning evaluation method based on a block chain technique, which includes establishing a basic block chain for an online learning platform, and writing all learning contents into the block chain; the user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, wherein the private key is held by the user, and the public key is sent to the online learning platform; a user issues an evaluation, and signs the evaluation through a private key; and after receiving the evaluation, the platform decrypts through the public key to obtain the evaluation information, and encrypts through the public key after replying the evaluation information, and the user decrypts through the private key to obtain the information after receiving the evaluation information.
In some embodiments of the present application, the establishing a basic blockchain by the online learning platform, and writing all learning contents into the blockchain includes: and constructing a basic block, arranging a main control node to connect the basic block to form a block chain, and arranging a storage node, thereby completing the construction of the running frame of the block chain distributed online learning platform system. And storing the learning content data to the storage node of the block chain, generating corresponding index data, and controlling the storage node by the master control node of the block chain after the blocking storage is completed.
In some embodiments of the present application, the user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, where the private key is held by the user, and the public key is sent to the online learning platform, including: the method comprises the steps that a user submits a real-name authentication request to an official real-name authentication system, wherein the real-name authentication request at least comprises a user block chain account number identification and user data to be authenticated, the block chain account number identification corresponds to a storage block in a block chain, the user data to be authenticated is stored in the storage block, whether original data matched with the data to be authenticated exist in a database of the real-name authentication system or not is verified, and if the original data are verified to pass, the authentication request passes. A pair of public and private keys is generated by using an asymmetric encryption algorithm and bound with a user account, the user account is a public key address, and user identity data cannot be deduced through the public key address due to the characteristic of a hash function, so that the user is in an anonymous state before actively disclosing identity information.
In some embodiments of the present application, the issuing an evaluation by the user and signing the evaluation by a private key includes: and generating a hash value by the evaluation operation data of the user, including the content, the times and the time related information through a hash function algorithm, uploading the hash value to the block chain, and encrypting the hash value through a private key.
In some embodiments of the present application, after receiving the evaluation, the platform decrypts through a public key to obtain evaluation information, encrypts the reply evaluation information through the public key, and decrypts through a private key after receiving by a user to obtain information, including: the platform decrypts the received hash value information through a public key to obtain the related information of the evaluation content, the evaluation times and the evaluation time of the user, if the platform has reply information to the evaluation, the reply information can be written into the block chain after being encrypted through the public key, and the user decrypts through a private key after receiving the reply information.
In a second aspect, an embodiment of the present application provides an online learning evaluation system based on a block chain technology, which includes a registration module, configured to register user information through an official real-name authentication system; the evaluation module is used for issuing evaluation by a user and signing the evaluation through a private key; and the reply receiving module is used for decrypting by the public key to obtain the evaluation information after the platform receives the evaluation, encrypting the reply evaluation information by the public key, and decrypting by the private key to obtain the information after the user receives the reply evaluation information.
In some embodiments of the present application, the above includes: at least one memory for storing computer instructions; at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to: the device comprises a registration module, an evaluation module and a reply receiving module.
In a third aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a method as any one of online learning evaluation methods based on a block chain technique.
Compared with the prior art, the embodiment of the application has at least the following advantages or beneficial effects:
the core technical means of the invention is to generate a public and private key for a user through a hash function algorithm of a block chain, and encrypt evaluation and recovery information by utilizing the public and private key, thereby hiding user real-name registration information data and ensuring the authenticity and effectiveness of the evaluation and recovery information. Due to the fact that the block chain is not capable of being tampered with and the block chain is incapable of being tracked, user information is safer, user evaluation and platform reply information can be effectively and pertinently protected, and objective and reliable user evaluation is guaranteed. The invention solves the problems of false and counterfeit evaluation information of the user without the real name and leakage of personal privacy information of the user without the real name in the traditional evaluation system, and improves the safety of information data in the online learning evaluation system. Therefore, the real-name information of the user is not disclosed, and the information is ensured not to be falsified by a verification mode of encryption and decryption of the public and private keys.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic diagram illustrating steps of an online learning evaluation method based on a block chain technique according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating detailed steps of an online learning evaluation method based on a block chain technology according to an embodiment of the present application;
fig. 3 is a schematic diagram of an online learning evaluation system module based on a block chain technique according to an embodiment of the present disclosure;
fig. 4 is an electronic device according to an embodiment of the present disclosure.
Icon: 10-a registration module; 20-an evaluation module; 30-receiving a reply module; 101-a memory; 102-a processor; 103-communication interface.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
It is to be noted that the term "comprises," "comprising," or any other variation thereof is intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments and features of the embodiments described below can be combined with one another without conflict.
Example 1
Referring to fig. 1, fig. 1 is a schematic diagram illustrating steps of an online learning evaluation method based on a block chain technique according to an embodiment of the present application, which is shown as follows:
step S100, establishing a basic block chain by an online learning platform, and writing all learning contents into the block chain;
in some embodiments, a basic block is constructed in the first step of establishing a basic block chain, then a main control node is set, the basic blocks are connected through the main control node to form the block chain, and a storage node is set on the block chain, so that the construction of the block chain distributed online learning platform system operation framework is completed. After the frame is constructed, learning content data need to be stored in the storage nodes of the block chain, index data corresponding to the learning content is generated again, the index data are stored in a blocking mode, the storage nodes are controlled through the main control nodes of the block chain, and therefore the building of the basic block chain of the online learning platform is completed.
Step S110, a user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, wherein the private key is held by the user, and the public key is sent to an online learning platform;
in some embodiments, the user real-name registration is that a user submits a real-name authentication request to an official real-name authentication system, wherein the real-name authentication request at least comprises a user block chain account number identifier and user data to be real-name authenticated, the block chain account number identifier corresponds to a storage block in a block chain, the user data to be real-name authenticated is stored in the storage block, whether original data matched with the data to be real-name authenticated exists in a database of the real-name authentication system is verified, and if the verification is passed, the authentication request is passed. And then, a pair of public and private keys is generated for the user by using an asymmetric encryption algorithm, the public and private keys are bound with a user account, the private key is held by the user, the public key is sent to an online learning platform, the user account is a public key address, and the identity data of the user cannot be deduced through the public key address due to the characteristic of a hash function, so that the user is in an anonymous state before actively disclosing the identity information.
Step S120, the user issues an evaluation and signs the evaluation through a private key;
in some embodiments, the user issues an evaluation on the online learning platform, and the evaluation operation data of the user, including the content, the number of times and the relevant information of time, is generated by a hash function algorithm, uploaded to the block chain, and encrypted by a private key. Therefore, the evaluation information is prevented from being tampered, and meanwhile, the privacy of the evaluation information is guaranteed.
Step S130, after receiving the evaluation, the platform decrypts through the public key to obtain the evaluation information, and then encrypts through the public key after replying the evaluation information, and the user decrypts through the private key to obtain the information after receiving the evaluation information.
In some embodiments, the platform decrypts the received hash value evaluation information by using a public key sent by the user to obtain the information related to the evaluation content, the evaluation times and the evaluation time of the user. If the platform has reply information for the evaluation, the reply information can be written into the block chain after being encrypted by a public key, and the reply information is obtained by the user through private key decryption after receiving the reply information.
Example 2
Referring to fig. 2, fig. 2 is a detailed step diagram of an online learning evaluation method based on a block chain technique according to an embodiment of the present disclosure, which is shown as follows:
step S200, constructing a basic block, arranging a main control node to connect the basic block to form a block chain, and arranging a storage node.
Step S210, storing the learning content data to the storage node of the block chain, generating corresponding index data, and completing the block storage.
Step S220, the user submits a real-name authentication request to the official real-name authentication system.
Step S230, a pair of public and private keys is generated by using an asymmetric encryption algorithm, and is bound with the user account, where the private key is held by the user, and the public key is sent to the online learning platform.
And step S240, generating a hash value by the evaluation operation data information of the user through a hash function algorithm, uploading the hash value to the block chain, and encrypting the hash value through a private key.
And step S250, the platform decrypts the received hash value information through a public key to obtain the evaluation information of the user, if the platform replies to the evaluation information, the evaluation information can be written into the block chain after being encrypted through the public key, and the user decrypts through a private key after receiving the evaluation information to obtain the reply information.
In some embodiments, when a user issues an evaluation on an online learning platform, the evaluation information needs to be generated into a hash value, the evaluation information is encrypted by a private key and then written into a block chain, then the platform decrypts the received encrypted hash value data by a public key to obtain the evaluation information, then the reply information is encrypted by the public key and then written into the block chain, and the user decrypts the received reply information by the private key to obtain the reply information. The method comprises the following steps:
generating a hash value by relevant information including content, times and time of evaluation operation data of a user through a hash function algorithm, writing the hash value into a block chain, and encrypting the hash value through a private key;
the platform decrypts the received hash value information through a public key to obtain the related information of the evaluation content, the evaluation times and the evaluation time of the user;
and the platform encrypts the evaluated reply information through the public key and writes the encrypted reply information into the block chain, and the user decrypts the encrypted reply information through the private key after receiving the encrypted reply information to obtain the platform reply information.
Example 3
Referring to fig. 3, fig. 3 is a schematic diagram of an online learning evaluation system module based on a block chain technique according to an embodiment of the present application, which is shown as follows:
a registration module 10 for registering user information through an official real-name authentication system;
the evaluation module 20 is used for the user to issue the evaluation and sign the evaluation through a private key;
and the receiving and replying module 30 is used for decrypting by the public key to obtain the evaluation information after the platform receives the evaluation, encrypting by the public key to reply the evaluation information, and decrypting by the private key to obtain the information after the platform receives the evaluation information.
As shown in fig. 4, an embodiment of the present application provides an electronic device, which includes a memory 101 for storing one or more programs; a processor 102. The one or more programs, when executed by the processor 102, implement the method of any of the first aspects as described above.
Also included is a communication interface 103, with the memory 101, processor 102, and communication interface 103 being electrically connected to each other, directly or indirectly, to enable transfer or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory 101 may be used to store software programs and modules, and the processor 102 executes the software programs and modules stored in the memory 101 to thereby execute various functional applications and data processing. The communication interface 103 may be used for communicating signaling or data with other node devices.
The Memory 101 may be, but is not limited to, a Random Access Memory 101 (RAM), a Read Only Memory 101 (ROM), a Programmable Read Only Memory 101 (PROM), an Erasable Read Only Memory 101 (EPROM), an electrically Erasable Read Only Memory 101 (EEPROM), and the like.
The processor 102 may be an integrated circuit chip having signal processing capabilities. The Processor 102 may be a general-purpose Processor 102, including a Central Processing Unit (CPU) 102, a Network Processor 102 (NP), and the like; but may also be a Digital Signal processor 102 (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware components.
In the embodiments provided in the present application, it should be understood that the disclosed method and system can be implemented in other ways. The method and system embodiments described above are merely illustrative and, for example, the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
In another aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by the processor 102, implements the method according to any one of the first aspect described above. The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory 101 (ROM), a Random Access Memory 101 (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In summary, according to the online learning evaluation method and system based on the blockchain technology provided by the embodiment of the application, a public and private key is generated for a user through a hash function algorithm of the blockchain, and the evaluation and recovery information is encrypted by using the public and private key, so that the real-name registration information data of the user is concealed, and the authenticity and effectiveness of the evaluation and recovery information are ensured. Due to the fact that the block chain is not capable of being tampered with and the block chain is incapable of being tracked, user information is safer, user evaluation and platform reply information can be effectively and pertinently protected, and objective and reliable user evaluation is guaranteed. The invention solves the problems of false forgery of the evaluation information of the user without real name and leakage of the personal privacy information of the user with real name in the traditional evaluation system, and improves the safety of the information data in the online learning evaluation system. Therefore, the real-name information of the user is not disclosed, and the information is ensured not to be falsified by a verification mode of encryption and decryption of the public and private keys.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. An online learning evaluation method based on a block chain technology is characterized by comprising the following steps:
establishing a basic block chain by an online learning platform, and writing all learning contents into the block chain;
the user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, wherein the private key is held by the user, and the public key is sent to the online learning platform;
a user issues an evaluation and signs the evaluation through a private key;
and after receiving the evaluation, the platform decrypts through the public key to obtain the evaluation information, and encrypts through the public key after replying the evaluation information, and the user decrypts through the private key to obtain the information after receiving the evaluation information.
2. The method as claimed in claim 1, wherein the online learning platform establishes a basic blockchain, and writes all learning contents into the blockchain, and the method comprises:
and constructing a basic block, arranging a main control node to connect the basic block to form a block chain, and arranging a storage node, thereby completing the construction of the running framework of the block chain distributed online learning platform system.
3. The method as claimed in claim 1, wherein the online learning platform establishes a basic blockchain, and writes all learning contents into the blockchain, and the method comprises:
and storing the learning content data to the storage nodes of the block chain, generating corresponding index data and controlling the storage nodes by the main control node of the block chain after the block chain storage is completed.
4. The method as claimed in claim 1, wherein the user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, the private key is held by the user, and the public key is sent to the online learning platform, comprising:
the method comprises the steps that a user submits a real-name authentication request to an official real-name authentication system, wherein the real-name authentication request at least comprises a user block chain account identification and user data to be authenticated, the block chain account identification corresponds to a storage block in a block chain, the user data to be authenticated is stored in the storage block, whether original data matched with the data to be authenticated exist in a database of the real-name authentication system or not is verified, and if the original data are verified to pass, the authentication request passes.
5. The method as claimed in claim 1, wherein the user completes registration through real-name authentication, and generates a pair of public and private keys through hash function operation, the private key is held by the user, and the public key is sent to the online learning platform, comprising:
a pair of public and private keys is generated by using an asymmetric encryption algorithm and is bound with a user account, the user account is a public key address, and user identity data cannot be deduced through the public key address due to the characteristic of a hash function, so that the user is in an anonymous state before actively disclosing identity information.
6. The method for online learning and evaluation based on blockchain technology of claim 1, wherein the user issues an evaluation and signs the evaluation with a private key, comprising:
and generating a hash value by the evaluation operation data of the user, including content, times and time related information through a hash function algorithm, uploading the hash value to the block chain, and encrypting the hash value through a private key.
7. The method as claimed in claim 1, wherein the platform decrypts to obtain the evaluation information through a public key after receiving the evaluation, encrypts the reply evaluation information through the public key, and decrypts to obtain the information through a private key after receiving the reply evaluation information, and the method comprises:
the platform decrypts the received hash value information through a public key to obtain the related information of the evaluation content, the evaluation times and the evaluation time of the user, if the platform has reply information to the evaluation, the reply information can be written into the block chain after being encrypted through the public key, and the user decrypts through a private key after receiving the reply information.
8. An online learning evaluation system based on a block chain technology is applied to a server, and the system comprises:
the registration module is used for registering user information through an official real-name authentication system;
the evaluation module is used for issuing evaluation by a user and signing the evaluation through a private key;
and the reply receiving module is used for decrypting by the public key to obtain the evaluation information after the platform receives the evaluation, encrypting the reply evaluation information by the public key, and decrypting by the private key to obtain the information after the user receives the reply evaluation information.
9. The system of claim 8, wherein the system comprises:
at least one memory for storing computer instructions;
at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to perform: the device comprises a registration module, an evaluation module and a reply receiving module.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202211191390.6A 2022-09-28 2022-09-28 Online learning evaluation method and system based on block chain technology Pending CN115567540A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211191390.6A CN115567540A (en) 2022-09-28 2022-09-28 Online learning evaluation method and system based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211191390.6A CN115567540A (en) 2022-09-28 2022-09-28 Online learning evaluation method and system based on block chain technology

Publications (1)

Publication Number Publication Date
CN115567540A true CN115567540A (en) 2023-01-03

Family

ID=84743855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211191390.6A Pending CN115567540A (en) 2022-09-28 2022-09-28 Online learning evaluation method and system based on block chain technology

Country Status (1)

Country Link
CN (1) CN115567540A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115829729A (en) * 2023-02-14 2023-03-21 四川华西集采电子商务有限公司 Supply chain financial credit evaluation system and method based on three-chain architecture

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115829729A (en) * 2023-02-14 2023-03-21 四川华西集采电子商务有限公司 Supply chain financial credit evaluation system and method based on three-chain architecture
CN115829729B (en) * 2023-02-14 2023-05-02 四川华西集采电子商务有限公司 Three-chain architecture-based supply chain financial credit evaluation system and method

Similar Documents

Publication Publication Date Title
CN108111314B (en) Method and equipment for generating and verifying digital certificate
US11245524B2 (en) Binding of decentralized identifiers to verified claims
CN110046996B (en) Data processing method and device
CN101107611B (en) Private and controlled ownership sharing method, device and system
CN107770159B (en) Vehicle accident data recording method and related device and readable storage medium
CN106789090A (en) Public key infrastructure system and semi-random participating certificate endorsement method based on block chain
CN111784001B (en) Model training method and device and computer readable storage medium
CN108389059A (en) Digital copyrighted work protection, transaction and distributing method based on ownership and system
KR20210040078A (en) Systems and methods for safe storage services
CN109905360B (en) Data verification method and terminal equipment
CN110096903B (en) Asset verification method based on block chain and block chain network system
CN105518687A (en) Secure data storage
CN106326763A (en) Method and device for obtaining electronic file
Abbade et al. Blockchain applied to vehicular odometers
US7739500B2 (en) Method and system for consistent recognition of ongoing digital relationships
CN115242383A (en) Block chain-based data right multiparty sharing management method
CN115567540A (en) Online learning evaluation method and system based on block chain technology
CN113722749A (en) Data processing method and device for block chain BAAS service based on encryption algorithm
CN113779637B (en) Attribute data processing method, attribute data processing device, attribute data processing equipment and attribute data processing medium
CN114240399A (en) Government affair data processing method and system based on block chain platform
Verma et al. Applications of Data Security and Blockchain in Smart City Identity Management
Al-Ghaili et al. Security factors based evaluation of verification algorithm for an IoT access system
CN111460466A (en) Block chain-based electronic ticket management method, device and medium
Al-Ghaili et al. Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Sayyad et al. Voting Using Blockchain Technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination