CN116866349A - Behavior trace construction method and system based on blockchain - Google Patents

Behavior trace construction method and system based on blockchain Download PDF

Info

Publication number
CN116866349A
CN116866349A CN202310990913.1A CN202310990913A CN116866349A CN 116866349 A CN116866349 A CN 116866349A CN 202310990913 A CN202310990913 A CN 202310990913A CN 116866349 A CN116866349 A CN 116866349A
Authority
CN
China
Prior art keywords
user
node
block
data
service data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310990913.1A
Other languages
Chinese (zh)
Inventor
张锦喜
叶亚芳
黄睿
陈志伟
叶灏文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Zhuoqi Cloud Chain Technology Co ltd
Original Assignee
Guangdong Zhuoqi Cloud Chain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Zhuoqi Cloud Chain Technology Co ltd filed Critical Guangdong Zhuoqi Cloud Chain Technology Co ltd
Priority to CN202310990913.1A priority Critical patent/CN116866349A/en
Publication of CN116866349A publication Critical patent/CN116866349A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a behavior trace construction method based on a block chain, which comprises the following steps: the node user signs the business data by using the user digital certificate; the node writes the user signature information and the service data into a block together, and the block represents different versions of the service data; and reading the blocks on the chain, and constructing behavior traces of users on the service data according to the user signature information in the blocks. The method provided by the application utilizes the user digital certificate of the node user to endorse the data, ensures the uniqueness and the authenticity of the user identity, builds the behavior trace of individuals and organizations, meets the requirements of real service better than the prior art which only depends on the construction method of machine credit trace, can completely acquire the change history of service data by other users or platforms, realizes comprehensive data tracing, builds reliable behavior trace based on the change history, and further can build the relationship graph of the node user, so that the data analysis and the mining are more efficient and reliable.

Description

Behavior trace construction method and system based on blockchain
Technical Field
The application belongs to the field of behavior trace construction, and particularly relates to a block chain-based behavior trace construction method and system.
Background
Traditional digital signature processes use the private key of the signer to sign a file, and others use the public key of the signer to verify the validity of the signature, but this approach does not provide complete endorsement evidence of the signature process. Signing endorsements on blockchains are a common digital signature scheme at present, which combines the characteristics of digital signatures and blockchains, and can form a continuous endorsement chain, but most of the current blockchain endorsements directly link data results or sign endorse data through machine consensus, so that the actual behaviors of individuals and organizations in actual social activities cannot be reflected, and effective actual business endorsements cannot be provided for the authenticity of the data.
Disclosure of Invention
Based on the method and the system, the real behaviors of the real activities are considered, so that the real behaviors are organically related to the data endorsement process.
In a first aspect, the present application provides a method for constructing a behavior trace based on a blockchain, including:
the node user signs the business data by using the user digital certificate;
the node writes the user signature information and the service data into a block together, and the block represents different versions of the service data;
and reading the blocks on the chain, and constructing behavior traces of users on the service data according to the user signature information in the blocks.
Further, the node user signing the service data using the user digital certificate comprises:
the node user signs the business data by using a private key corresponding to the user digital certificate;
the public key of the user's digital certificate is broadcast to other node users in the chain for verification of the user's signature information.
Further, the node writing the user signature information and the service data together into the block includes:
responding to an update request of a node user for service data by the node;
receiving user signature information;
transaction data is generated according to the user signature information and the business data and written into the block.
Further, the node writing the user signature information and the service data together into the block further comprises:
collecting signature time and signature place of a user signature;
transaction data is generated and written into the block according to the user signature information, the signature time, the signature place and the business data.
Further, the method further comprises the steps of:
the node signs the transaction data using the node digital certificate and packages the transaction signature into a chunk.
Further, the method further comprises the steps of:
and constructing a behavior map of each node user on the chain based on the behavior trace and the service data.
In a second aspect, the present application provides a blockchain-based behavior trace construction system, including a first node and a second node;
the first node is used for responding to the signature of the node user on the service data, writing the user signature information and the service data into the block together, wherein the node user signs the service data by using the user digital certificate, and the block represents different versions of the service data;
the second node is used for reading the block on the chain and constructing the behavior trace of the user on the service data according to the user signature information in the block.
Further, when the first node writes the user signature information and the service data into the block together, the following process is further executed:
responding to an update request of a node user for service data;
receiving user signature information;
transaction data is generated according to the user signature information and the business data and written into the block.
Further, when the first node writes the user signature information and the service data into the block together, the following process is further executed:
collecting signature time and signature place corresponding to the user signature;
transaction data is generated and written into the block according to the user signature information, the signature time, the signature place and the business data.
Further, the first node is further configured to sign the transaction data using the node digital certificate and package the transaction signature into a block.
Further, the second node is further configured to construct a behavior profile of each node user on the chain based on the behavior trace and the service data.
In a third aspect, the present application provides an electronic device comprising a memory and a processor;
the memory is used for storing programs;
the processor is used for executing the program to realize each step of the block chain-based behavior trace construction method.
In a seventh aspect, the present application provides a readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the blockchain-based behavior trace construction method described above.
Compared with the prior art, the application has the following beneficial effects:
the application provides a behavior trace construction method based on a blockchain, which utilizes a user digital certificate of a node user to endorse data, ensures the uniqueness and the authenticity of user identities, constructs behavior traces of individuals and organizations, and meets the requirements of real business more than the construction method which relies on machine credit traces in the prior art; the behavior information of the user and the business data are written into the blockchain together for storage, so that the change record of the business data cannot be tampered, other users or platforms can completely acquire the change history of the business data, comprehensive data tracing is realized, reliable behavior traces are built based on the change history, and further, a relationship map of the node users can be built, so that data analysis and mining are more efficient and reliable.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
FIG. 1 is a block chain system architecture diagram provided in embodiment 1 of the present application;
FIG. 2 is a flowchart of an embodiment of a blockchain-based behavior trace construction method provided in embodiment 2 of the present application;
FIG. 3 is a schematic illustration of one embodiment of the trace of build behavior provided in example 3 of the present application;
FIG. 4 is a schematic illustration of another embodiment of the trace of build behavior provided in example 4 of the present application;
FIG. 5 is a schematic illustration of one embodiment of the construction behavior pattern provided in embodiment 4 of the present application;
FIG. 6 is a block chain based behavior trace building system block diagram provided by an embodiment of the present application;
FIG. 7 is a block chain based behavior trace building system block diagram illustrating an embodiment of the present application;
fig. 8 is a schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Example 1
Fig. 1 is a block chain system architecture diagram disclosed in this embodiment, and it should be noted that fig. 1 is only a system architecture diagram disclosed in some embodiments of the present application, and other schematic diagrams obtained by optimizing or deforming based on fig. 1 are all within the protection scope of the present application.
The system architecture shown in fig. 1 comprises a plurality of nodes, n nodes are shown in the figure, the nodes can be interconnected through a network, the nodes can be represented as servers, intermediate devices, terminal devices and the like, and each node can provide data transceiving service of the internet of things for the rest nodes in the coverage area of the network. Typically, a node corresponds to one or more users, and the node responds to a request or a trigger instruction of the user to complete the behavior trace construction based on the service data.
Example 2
Based on the system architecture of fig. 1, fig. 2 shows an embodiment flow of a blockchain-based behavior trace construction method according to an embodiment of the present application, including:
and S11, signing the service data by the node user by using the user digital certificate.
Specifically, the node user holds a unique personal digital identity different from the machine digital certificate, and the user digital certificate of the node user is issued by an organization or a chain where the node user belongs to, so that the uniqueness and privacy of the identity of the node user on the chain are ensured.
In a further embodiment, the digital user certificate may be generated by using a cryptography technique, for example, in a public-private key pair manner, the private key is held by the node user, the public key is broadcast on the chain, the node user signs the service data by using the private key corresponding to the digital user certificate, and other users on the chain can verify the authenticity and validity of the signature of the current node user by using the corresponding public key.
And S12, the node writes the user signature information and the service data into the block together, wherein the block represents different versions of the service data.
Specifically, each node on the chain receives and verifies an update request of the node user for the service data, generates blockchain transaction data with the service data by user signature information provided by the node user, and stores the transaction data on the blockchain as historical traces of the data. The personal identity information is introduced by using the user digital certificate, so that the data endorsement process corresponds to the actual behavior, and the personal actual behavior is organically related to the data endorsement process.
In a further embodiment, the node may collect signature time and signature place corresponding to the user signature, generate transaction data according to the user signature information, the signature time, the signature place and the service data, and write the transaction data into the block, so as to ensure that the space-time background of the data is matched with the real service activity, and the service data will obtain more real and reliable endorsement trace.
In a further embodiment, the nodes also use the machine digital certificates to endorse and sign the transaction data, so that each transaction has a unique blockchain transaction record and is jointly verified and stored by a plurality of nodes, thereby ensuring the security and tamper resistance of the data.
Since each change of the data record corresponds to a unique blockchain transaction, there may be multiple versions of the data change trace, and the transaction information may be distributed over multiple blocks, forming a chained transaction data change history.
S13, reading the blocks on the chain, and constructing behavior traces of users on the service data according to the user signature information in the blocks.
When a node user on the chain reads the data on the chain, the data change trace including, for example, the identity information, time, place and the like of the participating user can be acquired, so that a clear user behavior trace is constructed, and the user can accurately know the change process of the data.
In a further embodiment, the node user information based on the behavior trace can also construct a knowledge graph comprising multiple items of information such as the participating user, the space-time background and the event, and the graph can reflect the relationship and the behavior trace among the participants more truly and credibly, which further supports the deep utilization and mining of the data and provides a richer and reliable data basis for the application in various fields.
The knowledge graph can be established by adopting various conventional graph construction models or methods, and the application is not limited in any way.
Example 3
Referring to fig. 3, the above behavior trace construction method is further described by taking the initiation application form as an example.
The Zhang III and Li IV in FIG. 3 are members of the same organization, which constructs the connection of each member node based on the blockchain, and each member holds a unique user digital certificate for signing and endorsing when the on-chain business data is changed.
In the example of fig. 3, the form application is created by the third party, the first party applies for the form and agrees, the content of the form application forms service data, the digital certificate of the Zhang Sanyong user signs the form, and then the node where the third party is located records the identity information, the event, the initiation time and the initiation place of the third party, generates the transaction 5532 illustrated in fig. 3 with the data content of the form application, writes the transaction data into a block together with other transaction data, and generates a block 609. Similarly, a form initiated by four pairs of Zhang Sans is initially verified, the form is signed and a transaction 6703 is generated, written to block with other transaction data, and block 617 is generated. Blocks 609 and 617 together form a change history for the form application on the blockchain, and ordered blocks on the chain can be regarded as different versions of the form application, from which information such as identity information, signature time, signature place, etc. of Zhang three and Li four can be obtained when the on-chain user reads the on-chain data, thereby constructing a behavior trace of the business data of the form application.
Example 4
FIG. 4 illustrates, on the basis of FIG. 3, the process of building behavioral traces for a form application from blocks of a blockchain. As shown in fig. 4, a form application is created for Zhang San, a four-in-one form application is first reviewed, a five-in-one form application is reviewed, three persons sign endorsed on the form by using own user digital certificates respectively at a capital company, a capital company and a Guangzhou headquarter, different block transactions are correspondingly generated by the nodes where the three persons are located, the block transactions are written into different blocks and stored on a chain, the different block transactions reflect the signing endorsement behaviors of the three persons on the form application, the ordered blocks on the chain reflect different versions of the form application, for example, the block generated by the node where Zhang Sanis located corresponds to the form for initiating the application, the block generated by the node where Lisi is located corresponds to the form for applying with the signature of the four-in-one primary nuclei, and the block generated by the node where Wang is located corresponds to the form for signing the application on the basis of the four-in-one primary nuclei. The information is extracted from the three blocks to construct the behavior trace of the form, and the behavior trace intuitively reflects the real business behavior of the three persons on the same form in different time and space as shown in the right part of fig. 4.
In a more specific example aspect, nodes where Zhang three, li four and Wang five are located can also use node digital certificates (i.e. machine digital certificates) to endorse forms and generate transactions which are different from the three-person signature and write into blocks together with other transaction data, so that service data is doubly protected by a trust chain of real behaviors and a machine trust chain, and is different from the traditional single-chain form only with the machine trust chain.
The scheme provided by the embodiment can start from any version of the business data and inquire out the participants of the business data and the corresponding behaviors of the participants.
Referring to fig. 5, a process of expanding and constructing a complete system-wide behavior graph based on behavior traces of users and service data on a chain is shown, and still taking Zhang san, li san and Wang san as examples, the behavior traces of other service data in which three persons participate can be constructed from different blocks constructed by different users, besides the behavior traces of the same service data in which three persons participate, based on block chain data. As shown in fig. 5, the king five initiates other form applications in addition to checking the form application initiated by Zhang san, and is initially checked by the buddha's warrior; the other form applications initiated by Zhang San are initially examined by the King Kong, so that the complete behavior patterns of different business data participated by the users on the chain can be constructed according to the transaction blocks recorded with different user signature endorsements on the chain.
Example 5
Based on the network topology shown in embodiment 1, the embodiment of the present application further provides a system for constructing a behavior trace based on a blockchain, which includes a first node and a second node, where the first node is a node where a user is located on a chain, and the second node may be a node where a user is located on a chain, or may be a server, a terminal device, or the like, which has a function of managing a node where a user is located on a chain, and fig. 6 and fig. 7 respectively illustrate different embodiments of the system.
The first node is configured to respond to the signature of the node user on the service data, and complete each step of generating the transaction data and the block in each embodiment.
The second node is used for reading the block on the chain and constructing the behavior trace of the user on the service data according to the user signature information in the block. It is easy to understand that the second node here may be a node where other users on the chain are located, or may be a manager that uses a server or terminal device to read data on the chain to construct a service trace.
Another aspect of the present disclosure provides an electronic device according to an embodiment of the present disclosure, and fig. 8 shows a hardware block diagram of the electronic device. Referring to fig. 8, the hardware structure of the electronic device may include: at least one processor 1, at least one communication interface 2, at least one memory 3 and at least one communication bus 4;
in the embodiment of the application, the number of the processor 1, the communication interface 2, the memory 3 and the communication bus 4 is at least one, and the processor 1, the communication interface 2 and the memory 3 complete the communication with each other through the communication bus 4;
processor 1 may be a central processing unit CPU, or a specific integrated circuit ASIC (Application Specific Integrated Circuit), or one or more integrated circuits configured to implement embodiments of the present application, etc.;
the memory 3 may comprise a high-speed RAM memory, and may further comprise a non-volatile memory (non-volatile memory) or the like, such as at least one magnetic disk memory;
wherein the memory stores a program, the processor is operable to invoke the program stored in the memory, the program operable to: and realizing each processing flow in the block chain-based behavior trace construction scheme.
Another aspect of the present specification provides a storage medium according to an embodiment of the present application, the storage medium storing a program adapted to be executed by a processor, the program being configured to: and realizing each processing flow in the block chain-based behavior trace construction scheme.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the sub-steps or stages are performed necessarily occur sequentially, but may be performed alternately or alternately with at least some of the other steps or sub-steps of other steps.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the application has been described in detail with reference to the foregoing embodiments, those skilled in the art will appreciate that: the technical scheme described in the foregoing embodiments can be modified or some of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (13)

1. A blockchain-based behavior trace construction method, comprising:
the node user signs the business data by using the user digital certificate;
the node writes the user signature information and the service data into a block together, and the block represents different versions of the service data;
and reading the blocks on the chain, and constructing behavior traces of users on the service data according to the user signature information in the blocks.
2. The blockchain-based behavior trace construction method of claim 1, wherein the node user signing business data using a user digital certificate comprises:
the node user signs the business data by using a private key corresponding to the user digital certificate;
the public key of the user digital certificate is broadcast to other node users on the chain for verification of user signature information.
3. The blockchain-based behavior trace construction method of claim 1, wherein the node writing the user signature information and the service data together into the block comprises:
responding to an update request of a node user for service data by the node;
receiving user signature information;
transaction data is generated according to the user signature information and the business data and written into the block.
4. A blockchain-based behavior trace construction method as in claim 1 or 3, wherein the node writing the user signature information with the business data into the block further comprises:
collecting signature time and signature place of a user signature;
and generating transaction data according to the user signature information, the signature time, the signature place and the service data, and writing the transaction data into a block.
5. A blockchain-based behavior trace construction method according to claim 1 or 3, characterized in that the method further comprises:
the node signs the transaction data using the node digital certificate and packages the transaction signature into a chunk.
6. The blockchain-based behavior trace construction method of claim 1, further comprising:
and constructing a behavior map of each node user on the chain based on the behavior trace and the service data.
7. A behavior trace construction system based on a block chain, which is characterized by comprising a first node and a second node;
the first node is used for responding to the signature of the node user on the service data, writing the user signature information and the service data into a block together, the node user signs the service data by using a user digital certificate, and the block represents different versions of the service data;
the second node is used for reading the block on the chain and constructing the behavior trace of the user on the service data according to the user signature information in the block.
8. The blockchain-based behavior trace construction system of claim 7, wherein when the first node writes the user signature information with the service data into the block, the following process is performed:
responding to an update request of a node user for service data;
receiving user signature information;
transaction data is generated according to the user signature information and the business data and written into the block.
9. The blockchain-based behavior trace construction system of claim 7 or 8, wherein when the first node writes the user signature information and the service data together into the block, the following procedure is further performed:
collecting signature time and signature place of a user signature;
and generating transaction data according to the user signature information, the signature time, the signature place and the service data, and writing the transaction data into a block.
10. The blockchain-based behavioral trace construction system of claim 7 wherein the first node is further configured to sign the transaction data using a node digital certificate and package the transaction signature into a block.
11. The blockchain-based behavior trace construction system of claim 7, wherein the second node is further configured to construct a behavior profile for each node user on the chain based on the behavior trace and the business data.
12. An electronic device comprising a memory and a processor;
the memory is used for storing programs;
the processor is configured to execute the program to implement the blockchain-based behavior trace construction method according to any one of claims 1 to 6.
13. A readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the blockchain-based behavior trace construction method of any of claims 1-6.
CN202310990913.1A 2023-08-08 2023-08-08 Behavior trace construction method and system based on blockchain Pending CN116866349A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310990913.1A CN116866349A (en) 2023-08-08 2023-08-08 Behavior trace construction method and system based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310990913.1A CN116866349A (en) 2023-08-08 2023-08-08 Behavior trace construction method and system based on blockchain

Publications (1)

Publication Number Publication Date
CN116866349A true CN116866349A (en) 2023-10-10

Family

ID=88232361

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310990913.1A Pending CN116866349A (en) 2023-08-08 2023-08-08 Behavior trace construction method and system based on blockchain

Country Status (1)

Country Link
CN (1) CN116866349A (en)

Similar Documents

Publication Publication Date Title
Syed et al. A comparative analysis of blockchain architecture and its applications: Problems and recommendations
TWI703853B (en) User identity authentication method and device in network
Shrimali et al. Blockchain state-of-the-art: architecture, use cases, consensus, challenges and opportunities
US20220263671A1 (en) Data processing method, apparatus, and device, blockchain system, and computer-readable storage medium
Wu et al. A comprehensive survey of blockchain: From theory to IoT applications and beyond
US20200382326A1 (en) Digital certificate verification method and apparatus, computer device, and storage medium
US11757643B2 (en) System and method for authenticating user identity
US11170092B1 (en) Document authentication certification with blockchain and distributed ledger techniques
CN110226177B (en) Method for providing payment gateway service using UTXO-based protocol and server using the same
CN112307455B (en) Identity authentication method and device based on block chain and electronic equipment
WO2020051710A1 (en) System and process for managing digitized security tokens
ul Hassan et al. Blockchain and the future of the internet: a comprehensive review
CN110048851B (en) Method and device for generating and verifying multilayer linkable ring signature in block chain
CN109547206A (en) The processing method and relevant apparatus of digital certificate
CN111383114A (en) Asset information management method and device based on block chain
CN111402033A (en) Asset information management method and device based on block chain
CN110009339A (en) Data processing method and device based on block chain
Islam et al. A survey on consensus algorithms in blockchain-based applications: Architecture, taxonomy, and operational issues
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
CN109818965B (en) Personal identity verification device and method
Saleem et al. ProofChain: An X. 509-compatible blockchain-based PKI framework with decentralized trust
Ghafourian et al. Combining blockchain and biometrics: A survey on technical aspects and a first legal analysis
Liu et al. Trust as a service: building and managing trust in the internet of things
Bar et al. Confidentiality and integrity in crowdsourcing systems
CN116866349A (en) Behavior trace construction method and system based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination