CN108924167A - A kind of network that can not be distorted based on block chain is set a question and answer method - Google Patents
A kind of network that can not be distorted based on block chain is set a question and answer method Download PDFInfo
- Publication number
- CN108924167A CN108924167A CN201811037460.6A CN201811037460A CN108924167A CN 108924167 A CN108924167 A CN 108924167A CN 201811037460 A CN201811037460 A CN 201811037460A CN 108924167 A CN108924167 A CN 108924167A
- Authority
- CN
- China
- Prior art keywords
- answer
- server
- question
- terminal
- answering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000008569 process Effects 0.000 claims abstract description 15
- 230000005540 biological transmission Effects 0.000 claims abstract description 5
- 238000012545 processing Methods 0.000 claims abstract description 4
- 238000012795 verification Methods 0.000 claims description 7
- 238000013507 mapping Methods 0.000 claims description 3
- 238000012360 testing method Methods 0.000 claims description 2
- 230000008901 benefit Effects 0.000 description 5
- 230000004044 response Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
- G06Q50/205—Education administration or guidance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Computer Hardware Design (AREA)
- Educational Technology (AREA)
- Educational Administration (AREA)
- Mathematical Optimization (AREA)
- Databases & Information Systems (AREA)
- Pure & Applied Mathematics (AREA)
- Medical Informatics (AREA)
- Bioethics (AREA)
- Mathematical Analysis (AREA)
- Algebra (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of networks that can not be distorted based on block chain to set a question and answer method, belongs to Internet technical field.The method comprising the steps of:Before examination, answer person's registration is carried out, the terminal of answer person automatically generates a pair of of public and private key using elliptic curve and terminal retains private key, and public key broadcasts are to other terminal and servers in network;When answering, server of setting a question reads exam pool table, obtains topic at random, forms examination paper message;It after terminal receives the topic message being verified, answers, after answer, to avoid revealing answer in the transmission, answer person is by the private key encryption of answer server and hash forms answer ciphertext;Effective answer is obtained out by server, is decoded with the answer of the private key pair encryption of oneself, and final answer and processing are obtained, and sets a question and the message of answer process will all be stored in a manner of block chain.The present invention can record all processes from setting a question answer, guarantee that the process of answering can be recalled but not distort.
Description
Technical Field
The invention relates to a method for giving questions and answering questions of a network which cannot be tampered based on a block chain, and belongs to the technical field of the Internet.
Background
The existing information examination system manages the examination process based on a centralized processor, cannot effectively prevent the confidentiality of examination contents and the protection of the validity and integrity of examination answer information, and is driven by the benefit of examination scores, so that benefit relatives are easily induced to maliciously tamper data in a mode of intercepting and modifying inter-network messages during the examination or a mode of modifying a central database after the examination.
Disclosure of Invention
In view of the above, the present invention provides a method for making and answering a question on a network that cannot be tampered based on a block chain.
The purpose of the invention is realized by the following technical scheme:
a network question making and answering method which can not be tampered based on a block chain is characterized in that: the method utilizes a data encryption algorithm of a block chain to ensure that test data is real and effective and is not tampered, and specifically comprises the following steps:
s1: before the examination begins, the answering person is registered, and the terminal of the answering person automatically generates a pair of public and private keys Puk by using an elliptic curve algorithmiAnd PrkiThe terminal retains private key PrkiPublic key PukiBroadcast to other terminals and servers in the network, wherein i represents a different terminal;
the question server also generates a set of key pairs PukServerAnd PrkServerAnd Puk is then addedServerBroadcasting and sending to all answer terminals;
before answering, the server and all terminals carry out hash mapping on the received public key to form a short address corresponding to the public key, and the short address is stored in a database of the server and all terminals to form a dictionary: DICT { SAi→Puki};
Cnt represents original text content, and the properties of public key encryption private key decryption and private key encryption public key decryption of a public private key are represented as follows:
verifying the validity of one operation in the later period according to the property;
s2: when answering begins, the question server reads the question table, randomly obtains the questions in the question table and forms a question message, and the message contains { question Exm, server short address SAServerAnd server signature Sig }; wherein,
Sig=Prkserver(hash(Exm))
Broadcasting to all nodes, all terminals passing through server short address SAServerFinding the server public key PukServerThen, using public key to verify whether the title content is valid, and verifying equation PukServerIf yes, carrying out consensus operation through the block chain, and recording examination question message blocks into the block chain;
s3: after receiving the question message passing the verification, the terminal starts answering, and after answering, in order to avoid revealing the answer of the terminal in transmission, the answer is encrypted by a private key of the server and has a hash to form an answer ciphertext as shown in the formula:
Ct=Pukserver(Ans)
Then composing answer message { answer ciphertext Ct, terminal short address SAiTerminal signature SigiTherein Sigi=Prki(hash (ct)) broadcasting to other terminals in the whole network; after other terminals receive the broadcast, the validity of the answer is verified, firstly, according to the terminal short address SAiPublic key Puk of question finding and answering terminaliThen, whether the terminal signatures are consistent is verified through the block chain network consensus, namely
Puki(Sigi)=hash(Ct)
If the verification is successful, the answer is really the answer of the answerer, and finally the message is recorded into the block chain;
s4: and finally, the server acquires the effective answer, decodes the encrypted answer by using the private key of the server, and Prk is obtained according to the formula AnsServer(Ct) solving the final answer content, obtaining the final answer and processing;
all terminals of each question and answer participate in the consensus of the block chain, all processes from question giving to answer are recorded, and an independent terminal is difficult to pass through the consensus to modify a certain question or answer record, so that the answering process can be traced back without being tampered.
Further, in step S2, the consensus operation selects POS (proof of work), POW (proof of stock), PBFT (Practical Byzantine fault tolerance algorithm), or DPOS (demagneted proof of authority) according to the requirement.
The invention has the beneficial effects that:
(1) the invention uses the block chain, the public and private key pair and the operation terminal to realize the record of the questions and the answers which can not be falsified;
(2) the question server of the invention ensures that the questions are complete and correct and cannot be modified by others by signing the questions;
(3) the answering terminal of the invention encrypts the message by using the public key of the server and signs the message, thereby ensuring that the answer is not leaked in the transmission and can not be modified by other people;
(4) the server and the terminal form a block chain network, and the title and answer information is linked to form a tamper-resistant traceable historical certificate.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof.
Drawings
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail with reference to the accompanying drawings, in which:
FIG. 1 is a schematic view of the work flow of an answering terminal in the registration of an answerer according to the present invention;
FIG. 2 is a schematic diagram of the work flow of the question server in the answerer registration according to the present invention;
FIG. 3 is a flow chart illustrating the formation of a pre-answer dictionary in accordance with the present invention;
FIG. 4 is a process of verifying each node at the beginning of the reply of the present invention;
FIG. 5 is a block chain process for writing title information at the beginning of answering according to the present invention;
FIG. 6 is a verification process for each node in response to the present invention;
FIG. 7 is a process of writing topic information into a block chain in response according to the present invention;
FIG. 8 is a flowchart illustrating an answer obtaining process according to the present invention.
Detailed Description
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be understood that the preferred embodiments are illustrative of the invention only and are not limiting upon the scope of the invention.
The invention utilizes the data encryption algorithm of the block chain to ensure that the examination data is real and effective and is not falsified, and generally comprises the following steps:
s1: before the examination begins, the answering person is registered, and the terminal of the answering person automatically generates a pair of public and private keys Puk by using an elliptic curve algorithmiAnd PrkiThe terminal retains private key PrkiPublic key PukiBroadcast to other terminals and servers in the network, where i denotes a different terminal, as shown in fig. 1.
The question server also generates a set of key pairs PukServerAnd PrkServerAnd Puk is then addedServerThe broadcast is sent to all answering terminals as shown in fig. 2.
Before answering, the server and all terminals carry out hash mapping on the received public key to form a short address corresponding to the public key, and the short address is stored in a database of the server and all terminals to form a dictionary: DICT { SAi→PukiAs shown in fig. 3.
If Cnt is used to represent the original text content, the properties of public key encryption and private key decryption of the public and private keys and private key encryption and public key decryption can be simply expressed as:
according to the property, the legality of one operation can be conveniently verified at the later stage.
S2: when answering begins, the question server reads the question table, randomly obtains the questions in the question table, and forms a question message, wherein the message mainly comprises { question Exm, server short address SAServerThe server signature Sig },
wherein
Sig=PrkServer(hash(Exm))
Broadcasting to all nodes, all terminals passing through server short address SAServerFinding the server public key PukServerThen use the public keyVerifying whether the title content is valid, and verifying an equation:
Pukserver(Sig)=hash(Exm)
And if so, performing consensus operation through the block chain, and recording the examination question message output block into the block chain. (the consensus mechanism can be selected POS (proof of work), POW (proof of stock), PBFT (Practical Byzantine Fault Tolerance) or DPOS (delegatedpro work proof) according to the requirement, as shown in fig. 4 and 5.
S3: after receiving the question message passing the verification, the terminal starts answering, and after answering, in order to avoid revealing the answer of the terminal in transmission, the answer is encrypted by a private key of the server and has a hash to form an answer ciphertext as shown in the formula:
Ct=Pukserver(Ans)
Then composing answer message { answer ciphertext Ct, terminal short address SAiTerminal signature SigiTherein Sigi=Prki(hash (ct)) broadcasting to other terminals in the whole network; after other terminals receive the broadcast, the validity of the answer is verified, firstly, according to the terminal short address SAiPublic key Puk of question finding and answering terminaliThen, whether the terminal signatures are consistent is verified through the block chain network consensus, namely
Puki(Sigi)=hash(Ct)
If the verification is successful, the answer is really made by the answerer, and finally, the message is recorded into the block chain, as shown in fig. 6 and 7.
S4: finally, the server obtains the effective answer, decodes the encrypted answer by the private key thereof, and decodes the encrypted answer according to a formula
Ans=PrkServer(Ct)
And solving the final answer content, acquiring the final answer and processing the final answer, as shown in fig. 8.
Because all terminals of each question and answer participate in the consensus of the block chain, all processes from question making to answer are recorded, and an independent terminal is difficult to cross the consensus, a certain question or answer record is modified, so that the answering process can be traced back and cannot be tampered.
Finally, the above embodiments are only intended to illustrate the technical solutions of the present invention and not to limit the present invention, and although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions, and all of them should be covered by the claims of the present invention.
Claims (2)
1. A network question making and answering method which can not be tampered based on a block chain is characterized in that: the method utilizes a data encryption algorithm of a block chain to ensure that test data is real and effective and is not tampered, and specifically comprises the following steps:
s1: before the examination begins, the answering person is registered, and the terminal of the answering person automatically generates a pair of public and private keys Puk by using an elliptic curve algorithmiAnd PrkiThe terminal retains private key PrkiPublic key PukiBroadcast to other terminals and servers in the network, where i denotes different terminalsA terminal;
the question server also generates a set of key pairs PukServerAnd PrkServerAnd Puk is then addedServerBroadcasting and sending to all answer terminals;
before answering, the server and all terminals carry out hash mapping on the received public key to form a short address corresponding to the public key, and the short address is stored in a database of the server and all terminals to form a dictionary: DICT { SAi→Puki};
Cnt represents original text content, and the properties of public key encryption private key decryption and private key encryption public key decryption of a public private key are represented as follows:
verifying the validity of one operation in the later period according to the property;
s2: when answering begins, the question server reads the question table, randomly obtains the questions in the question table and forms a question message, and the message contains { question Exm, server short address SAServerAnd server signature Sig }; wherein,
Sig=Prkserver(hash(Exm))
Broadcasting to all nodes, all terminals passing through server short address SAServerFinding the server public key PukServerThen, using public key to verify whether the title content is valid, and verifying equation PukServerIf yes, carrying out consensus operation through the block chain, and recording examination question message blocks into the block chain;
s3: after receiving the question message passing the verification, the terminal starts answering, and after answering, in order to avoid revealing the answer of the terminal in transmission, the answer is encrypted by a private key of the server and has a hash to form an answer ciphertext as shown in the formula:
Ct=Pukserver(Ans)
Then composing answer message { answer ciphertext Ct, terminal short address SAiTerminal signature SigiTherein Sigi=Prki(hash (Ct)) to other terminals of the whole networkEnd broadcasting; after other terminals receive the broadcast, the validity of the answer is verified, firstly, according to the terminal short address SAiPublic key Puk of question finding and answering terminaliThen, whether the terminal signatures are consistent is verified through the block chain network consensus, namely
Puki(Sigi)=hash(Ct)
If the verification is successful, the answer is really the answer of the answerer, and finally the message is recorded into the block chain;
s4: and finally, the server acquires the effective answer, decodes the encrypted answer by using the private key of the server, and Prk is obtained according to the formula AnsServer(Ct) solving the final answer content, obtaining the final answer and processing;
all terminals of each question and answer participate in the consensus of the block chain, all processes from question giving to answer are recorded, and an independent terminal is difficult to pass through the consensus to modify a certain question or answer record, so that the answering process can be traced back without being tampered.
2. The method according to claim 1, wherein the method comprises: in step S2, the consensus operation selects POS (Proof of Work), POW (Proof of stock), PBFT (Practical Byzantine Fault Tolerance algorithm), or DPOS (freed Proof of commission rights) according to the requirement.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811037460.6A CN108924167B (en) | 2018-09-06 | 2018-09-06 | Block chain-based network question setting and answering method incapable of being tampered |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811037460.6A CN108924167B (en) | 2018-09-06 | 2018-09-06 | Block chain-based network question setting and answering method incapable of being tampered |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108924167A true CN108924167A (en) | 2018-11-30 |
CN108924167B CN108924167B (en) | 2020-12-01 |
Family
ID=64406932
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811037460.6A Active CN108924167B (en) | 2018-09-06 | 2018-09-06 | Block chain-based network question setting and answering method incapable of being tampered |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108924167B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109785200A (en) * | 2019-01-03 | 2019-05-21 | 中国联合网络通信集团有限公司 | It answers questions method, equipment and storage medium |
CN111212122A (en) * | 2019-12-25 | 2020-05-29 | 新疆天池能源有限责任公司 | Answer record data storage and analysis system and method based on block chain |
CN112069815A (en) * | 2020-09-04 | 2020-12-11 | 平安科技(深圳)有限公司 | Answer selection method and device for idiom filling-in-blank question and computer equipment |
CN112418853A (en) * | 2020-09-22 | 2021-02-26 | 上海哔哩哔哩科技有限公司 | Transaction data encryption method and device based on block chain |
CN112765580A (en) * | 2021-01-22 | 2021-05-07 | 电子科技大学 | Method and system for protecting and preventing repudiation of examination questions in online examination |
CN113177866A (en) * | 2021-04-08 | 2021-07-27 | 中国南方电网有限责任公司超高压输电公司南宁局 | Evaluation system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916246A (en) * | 2014-03-31 | 2014-07-09 | 中国科学院软件研究所 | Method and system for preventing cheating during examination based on trusted computing |
CN104539424A (en) * | 2014-12-18 | 2015-04-22 | 广东讯飞启明科技发展有限公司 | Tamper-proof examinee data transmission method |
CN105844559A (en) * | 2016-03-28 | 2016-08-10 | 青岛大学 | Examination method based on mobile terminal |
CN106339639A (en) * | 2016-08-30 | 2017-01-18 | 弗洛格(武汉)信息科技有限公司 | Credit score management method and system based on block chain |
WO2017090329A1 (en) * | 2015-11-24 | 2017-06-01 | ソニー株式会社 | Information processing device, information processing method, and program |
CN107832907A (en) * | 2017-09-25 | 2018-03-23 | 中央财经大学 | Students ' behavior information authentication system based on block chain technology |
CN108305194A (en) * | 2017-12-22 | 2018-07-20 | 广州网才信息技术有限公司 | Examination cloud platform system based on block chain |
CN108434745A (en) * | 2018-03-27 | 2018-08-24 | 北京知道创宇信息技术有限公司 | Game data processing method and system |
-
2018
- 2018-09-06 CN CN201811037460.6A patent/CN108924167B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916246A (en) * | 2014-03-31 | 2014-07-09 | 中国科学院软件研究所 | Method and system for preventing cheating during examination based on trusted computing |
CN104539424A (en) * | 2014-12-18 | 2015-04-22 | 广东讯飞启明科技发展有限公司 | Tamper-proof examinee data transmission method |
WO2017090329A1 (en) * | 2015-11-24 | 2017-06-01 | ソニー株式会社 | Information processing device, information processing method, and program |
CN105844559A (en) * | 2016-03-28 | 2016-08-10 | 青岛大学 | Examination method based on mobile terminal |
CN106339639A (en) * | 2016-08-30 | 2017-01-18 | 弗洛格(武汉)信息科技有限公司 | Credit score management method and system based on block chain |
CN107832907A (en) * | 2017-09-25 | 2018-03-23 | 中央财经大学 | Students ' behavior information authentication system based on block chain technology |
CN108305194A (en) * | 2017-12-22 | 2018-07-20 | 广州网才信息技术有限公司 | Examination cloud platform system based on block chain |
CN108434745A (en) * | 2018-03-27 | 2018-08-24 | 北京知道创宇信息技术有限公司 | Game data processing method and system |
Non-Patent Citations (1)
Title |
---|
张建华等: "基于联盟区块链的命题教师信用信息管理平台 ", 《电脑编程技巧与维护》 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109785200A (en) * | 2019-01-03 | 2019-05-21 | 中国联合网络通信集团有限公司 | It answers questions method, equipment and storage medium |
CN111212122A (en) * | 2019-12-25 | 2020-05-29 | 新疆天池能源有限责任公司 | Answer record data storage and analysis system and method based on block chain |
CN112069815B (en) * | 2020-09-04 | 2023-01-17 | 平安科技(深圳)有限公司 | Answer selection method and device for idiom filling-in-blank question and computer equipment |
KR20220031857A (en) * | 2020-09-04 | 2022-03-14 | 핑 안 테크놀로지 (썬전) 컴퍼니 리미티드 | How to choose the answer to the word parentheses problem, device and computer equipment |
JP2022530689A (en) * | 2020-09-04 | 2022-06-30 | 平安科技(深▲せん▼)有限公司 | How to choose an answer to a fill-in-the-blank idiom question, equipment and computer equipment |
CN112069815A (en) * | 2020-09-04 | 2020-12-11 | 平安科技(深圳)有限公司 | Answer selection method and device for idiom filling-in-blank question and computer equipment |
JP7418704B2 (en) | 2020-09-04 | 2024-01-22 | 平安科技(深▲せん▼)有限公司 | Methods, devices and computer equipment for selecting answers to fill-in-the-blank idiom questions |
US12008319B2 (en) | 2020-09-04 | 2024-06-11 | Ping An Technology (Shenzhen) Co., Ltd. | Method and apparatus for selecting answers to idiom fill-in-the-blank questions, and computer device |
KR102688187B1 (en) | 2020-09-04 | 2024-07-24 | 핑 안 테크놀로지 (썬전) 컴퍼니 리미티드 | Answer selection device and computer equipment for parenthesis insertion problem |
CN112418853A (en) * | 2020-09-22 | 2021-02-26 | 上海哔哩哔哩科技有限公司 | Transaction data encryption method and device based on block chain |
CN112765580A (en) * | 2021-01-22 | 2021-05-07 | 电子科技大学 | Method and system for protecting and preventing repudiation of examination questions in online examination |
CN112765580B (en) * | 2021-01-22 | 2022-09-13 | 电子科技大学 | Method and system for protecting and preventing repudiation of examination questions in online examination |
CN113177866A (en) * | 2021-04-08 | 2021-07-27 | 中国南方电网有限责任公司超高压输电公司南宁局 | Evaluation system |
CN113177866B (en) * | 2021-04-08 | 2024-01-02 | 中国南方电网有限责任公司超高压输电公司南宁局 | Evaluation system |
Also Published As
Publication number | Publication date |
---|---|
CN108924167B (en) | 2020-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108924167B (en) | Block chain-based network question setting and answering method incapable of being tampered | |
CN109785494B (en) | Traceable anonymous electronic voting method based on block chain | |
CN107403303B (en) | Signing method of electronic contract system based on block chain deposit certificate | |
CN107231351B (en) | Electronic certificate management method and related equipment | |
CN112688786B (en) | Evidence construction and real-name identity authentication method based on block chain | |
CN110224993B (en) | Responsibility pursuing anonymous electronic voting method and system based on block chain | |
US5420927A (en) | Method for certifying public keys in a digital signature scheme | |
CN112487778A (en) | Multi-user online signing system and method | |
Li et al. | An unlinkable authenticated key agreement with collusion resistant for VANETs | |
TW202001658A (en) | Method and apparatus for obtaining input of secure multiparty computation protocol | |
JP2001202013A (en) | Anonymous participation authority control system | |
CN108121498A (en) | The method and apparatus that a kind of learning records based on block chain technology preserve | |
CN111835526B (en) | Method and system for generating anonymous credential | |
CN108924107A (en) | A kind of block chain tele-medicine data call can verify that method | |
CN111460482B (en) | Block chain-based number shaking method and device | |
Dreier et al. | Formal analysis of electronic exams | |
Zhu et al. | Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework | |
CN112396421A (en) | Identity authentication system and method based on block chaining-through card | |
CN112002436A (en) | Block chain-based medical question answering method, device and medium | |
CN108876375B (en) | Block chain real name participation method and system | |
CN113497823B (en) | Labor service subcontracting personnel management system based on block chain | |
CN108777673A (en) | One kind carrying out Bidirectional identity authentication method in block chain | |
JP2001036521A (en) | Electronic certificate issue system, electronic certificate authentication system, method for issuing electronic certificate, method for authenticating electronic certificate and recording medium | |
CN111680331B (en) | System and method for managing length-checking mailbox based on block chain | |
CN113779637B (en) | Attribute data processing method, attribute data processing device, attribute data processing equipment and attribute data processing medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |