Nothing Special   »   [go: up one dir, main page]

CN108924167A - A kind of network that can not be distorted based on block chain is set a question and answer method - Google Patents

A kind of network that can not be distorted based on block chain is set a question and answer method Download PDF

Info

Publication number
CN108924167A
CN108924167A CN201811037460.6A CN201811037460A CN108924167A CN 108924167 A CN108924167 A CN 108924167A CN 201811037460 A CN201811037460 A CN 201811037460A CN 108924167 A CN108924167 A CN 108924167A
Authority
CN
China
Prior art keywords
answer
server
question
terminal
answering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811037460.6A
Other languages
Chinese (zh)
Other versions
CN108924167B (en
Inventor
陈�峰
吴玉海
李正道
韦吉军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guiyang Academy Of Information Technology (institute Of Software Chinese Academy Of Sciences Guiyang Branch)
Institute of Software of CAS
Original Assignee
Guiyang Academy Of Information Technology (institute Of Software Chinese Academy Of Sciences Guiyang Branch)
Institute of Software of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guiyang Academy Of Information Technology (institute Of Software Chinese Academy Of Sciences Guiyang Branch), Institute of Software of CAS filed Critical Guiyang Academy Of Information Technology (institute Of Software Chinese Academy Of Sciences Guiyang Branch)
Priority to CN201811037460.6A priority Critical patent/CN108924167B/en
Publication of CN108924167A publication Critical patent/CN108924167A/en
Application granted granted Critical
Publication of CN108924167B publication Critical patent/CN108924167B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Hardware Design (AREA)
  • Educational Technology (AREA)
  • Educational Administration (AREA)
  • Mathematical Optimization (AREA)
  • Databases & Information Systems (AREA)
  • Pure & Applied Mathematics (AREA)
  • Medical Informatics (AREA)
  • Bioethics (AREA)
  • Mathematical Analysis (AREA)
  • Algebra (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of networks that can not be distorted based on block chain to set a question and answer method, belongs to Internet technical field.The method comprising the steps of:Before examination, answer person's registration is carried out, the terminal of answer person automatically generates a pair of of public and private key using elliptic curve and terminal retains private key, and public key broadcasts are to other terminal and servers in network;When answering, server of setting a question reads exam pool table, obtains topic at random, forms examination paper message;It after terminal receives the topic message being verified, answers, after answer, to avoid revealing answer in the transmission, answer person is by the private key encryption of answer server and hash forms answer ciphertext;Effective answer is obtained out by server, is decoded with the answer of the private key pair encryption of oneself, and final answer and processing are obtained, and sets a question and the message of answer process will all be stored in a manner of block chain.The present invention can record all processes from setting a question answer, guarantee that the process of answering can be recalled but not distort.

Description

Block chain-based network question setting and answering method incapable of being tampered
Technical Field
The invention relates to a method for giving questions and answering questions of a network which cannot be tampered based on a block chain, and belongs to the technical field of the Internet.
Background
The existing information examination system manages the examination process based on a centralized processor, cannot effectively prevent the confidentiality of examination contents and the protection of the validity and integrity of examination answer information, and is driven by the benefit of examination scores, so that benefit relatives are easily induced to maliciously tamper data in a mode of intercepting and modifying inter-network messages during the examination or a mode of modifying a central database after the examination.
Disclosure of Invention
In view of the above, the present invention provides a method for making and answering a question on a network that cannot be tampered based on a block chain.
The purpose of the invention is realized by the following technical scheme:
a network question making and answering method which can not be tampered based on a block chain is characterized in that: the method utilizes a data encryption algorithm of a block chain to ensure that test data is real and effective and is not tampered, and specifically comprises the following steps:
s1: before the examination begins, the answering person is registered, and the terminal of the answering person automatically generates a pair of public and private keys Puk by using an elliptic curve algorithmiAnd PrkiThe terminal retains private key PrkiPublic key PukiBroadcast to other terminals and servers in the network, wherein i represents a different terminal;
the question server also generates a set of key pairs PukServerAnd PrkServerAnd Puk is then addedServerBroadcasting and sending to all answer terminals;
before answering, the server and all terminals carry out hash mapping on the received public key to form a short address corresponding to the public key, and the short address is stored in a database of the server and all terminals to form a dictionary: DICT { SAi→Puki};
Cnt represents original text content, and the properties of public key encryption private key decryption and private key encryption public key decryption of a public private key are represented as follows:
verifying the validity of one operation in the later period according to the property;
s2: when answering begins, the question server reads the question table, randomly obtains the questions in the question table and forms a question message, and the message contains { question Exm, server short address SAServerAnd server signature Sig }; wherein,
Sig=Prkserver(hash(Exm))
Broadcasting to all nodes, all terminals passing through server short address SAServerFinding the server public key PukServerThen, using public key to verify whether the title content is valid, and verifying equation PukServerIf yes, carrying out consensus operation through the block chain, and recording examination question message blocks into the block chain;
s3: after receiving the question message passing the verification, the terminal starts answering, and after answering, in order to avoid revealing the answer of the terminal in transmission, the answer is encrypted by a private key of the server and has a hash to form an answer ciphertext as shown in the formula:
Ct=Pukserver(Ans)
Then composing answer message { answer ciphertext Ct, terminal short address SAiTerminal signature SigiTherein Sigi=Prki(hash (ct)) broadcasting to other terminals in the whole network; after other terminals receive the broadcast, the validity of the answer is verified, firstly, according to the terminal short address SAiPublic key Puk of question finding and answering terminaliThen, whether the terminal signatures are consistent is verified through the block chain network consensus, namely
Puki(Sigi)=hash(Ct)
If the verification is successful, the answer is really the answer of the answerer, and finally the message is recorded into the block chain;
s4: and finally, the server acquires the effective answer, decodes the encrypted answer by using the private key of the server, and Prk is obtained according to the formula AnsServer(Ct) solving the final answer content, obtaining the final answer and processing;
all terminals of each question and answer participate in the consensus of the block chain, all processes from question giving to answer are recorded, and an independent terminal is difficult to pass through the consensus to modify a certain question or answer record, so that the answering process can be traced back without being tampered.
Further, in step S2, the consensus operation selects POS (proof of work), POW (proof of stock), PBFT (Practical Byzantine fault tolerance algorithm), or DPOS (demagneted proof of authority) according to the requirement.
The invention has the beneficial effects that:
(1) the invention uses the block chain, the public and private key pair and the operation terminal to realize the record of the questions and the answers which can not be falsified;
(2) the question server of the invention ensures that the questions are complete and correct and cannot be modified by others by signing the questions;
(3) the answering terminal of the invention encrypts the message by using the public key of the server and signs the message, thereby ensuring that the answer is not leaked in the transmission and can not be modified by other people;
(4) the server and the terminal form a block chain network, and the title and answer information is linked to form a tamper-resistant traceable historical certificate.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof.
Drawings
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail with reference to the accompanying drawings, in which:
FIG. 1 is a schematic view of the work flow of an answering terminal in the registration of an answerer according to the present invention;
FIG. 2 is a schematic diagram of the work flow of the question server in the answerer registration according to the present invention;
FIG. 3 is a flow chart illustrating the formation of a pre-answer dictionary in accordance with the present invention;
FIG. 4 is a process of verifying each node at the beginning of the reply of the present invention;
FIG. 5 is a block chain process for writing title information at the beginning of answering according to the present invention;
FIG. 6 is a verification process for each node in response to the present invention;
FIG. 7 is a process of writing topic information into a block chain in response according to the present invention;
FIG. 8 is a flowchart illustrating an answer obtaining process according to the present invention.
Detailed Description
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be understood that the preferred embodiments are illustrative of the invention only and are not limiting upon the scope of the invention.
The invention utilizes the data encryption algorithm of the block chain to ensure that the examination data is real and effective and is not falsified, and generally comprises the following steps:
s1: before the examination begins, the answering person is registered, and the terminal of the answering person automatically generates a pair of public and private keys Puk by using an elliptic curve algorithmiAnd PrkiThe terminal retains private key PrkiPublic key PukiBroadcast to other terminals and servers in the network, where i denotes a different terminal, as shown in fig. 1.
The question server also generates a set of key pairs PukServerAnd PrkServerAnd Puk is then addedServerThe broadcast is sent to all answering terminals as shown in fig. 2.
Before answering, the server and all terminals carry out hash mapping on the received public key to form a short address corresponding to the public key, and the short address is stored in a database of the server and all terminals to form a dictionary: DICT { SAi→PukiAs shown in fig. 3.
If Cnt is used to represent the original text content, the properties of public key encryption and private key decryption of the public and private keys and private key encryption and public key decryption can be simply expressed as:
according to the property, the legality of one operation can be conveniently verified at the later stage.
S2: when answering begins, the question server reads the question table, randomly obtains the questions in the question table, and forms a question message, wherein the message mainly comprises { question Exm, server short address SAServerThe server signature Sig },
wherein
Sig=PrkServer(hash(Exm))
Broadcasting to all nodes, all terminals passing through server short address SAServerFinding the server public key PukServerThen use the public keyVerifying whether the title content is valid, and verifying an equation:
Pukserver(Sig)=hash(Exm)
And if so, performing consensus operation through the block chain, and recording the examination question message output block into the block chain. (the consensus mechanism can be selected POS (proof of work), POW (proof of stock), PBFT (Practical Byzantine Fault Tolerance) or DPOS (delegatedpro work proof) according to the requirement, as shown in fig. 4 and 5.
S3: after receiving the question message passing the verification, the terminal starts answering, and after answering, in order to avoid revealing the answer of the terminal in transmission, the answer is encrypted by a private key of the server and has a hash to form an answer ciphertext as shown in the formula:
Ct=Pukserver(Ans)
Then composing answer message { answer ciphertext Ct, terminal short address SAiTerminal signature SigiTherein Sigi=Prki(hash (ct)) broadcasting to other terminals in the whole network; after other terminals receive the broadcast, the validity of the answer is verified, firstly, according to the terminal short address SAiPublic key Puk of question finding and answering terminaliThen, whether the terminal signatures are consistent is verified through the block chain network consensus, namely
Puki(Sigi)=hash(Ct)
If the verification is successful, the answer is really made by the answerer, and finally, the message is recorded into the block chain, as shown in fig. 6 and 7.
S4: finally, the server obtains the effective answer, decodes the encrypted answer by the private key thereof, and decodes the encrypted answer according to a formula
Ans=PrkServer(Ct)
And solving the final answer content, acquiring the final answer and processing the final answer, as shown in fig. 8.
Because all terminals of each question and answer participate in the consensus of the block chain, all processes from question making to answer are recorded, and an independent terminal is difficult to cross the consensus, a certain question or answer record is modified, so that the answering process can be traced back and cannot be tampered.
Finally, the above embodiments are only intended to illustrate the technical solutions of the present invention and not to limit the present invention, and although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions, and all of them should be covered by the claims of the present invention.

Claims (2)

1. A network question making and answering method which can not be tampered based on a block chain is characterized in that: the method utilizes a data encryption algorithm of a block chain to ensure that test data is real and effective and is not tampered, and specifically comprises the following steps:
s1: before the examination begins, the answering person is registered, and the terminal of the answering person automatically generates a pair of public and private keys Puk by using an elliptic curve algorithmiAnd PrkiThe terminal retains private key PrkiPublic key PukiBroadcast to other terminals and servers in the network, where i denotes different terminalsA terminal;
the question server also generates a set of key pairs PukServerAnd PrkServerAnd Puk is then addedServerBroadcasting and sending to all answer terminals;
before answering, the server and all terminals carry out hash mapping on the received public key to form a short address corresponding to the public key, and the short address is stored in a database of the server and all terminals to form a dictionary: DICT { SAi→Puki};
Cnt represents original text content, and the properties of public key encryption private key decryption and private key encryption public key decryption of a public private key are represented as follows:
verifying the validity of one operation in the later period according to the property;
s2: when answering begins, the question server reads the question table, randomly obtains the questions in the question table and forms a question message, and the message contains { question Exm, server short address SAServerAnd server signature Sig }; wherein,
Sig=Prkserver(hash(Exm))
Broadcasting to all nodes, all terminals passing through server short address SAServerFinding the server public key PukServerThen, using public key to verify whether the title content is valid, and verifying equation PukServerIf yes, carrying out consensus operation through the block chain, and recording examination question message blocks into the block chain;
s3: after receiving the question message passing the verification, the terminal starts answering, and after answering, in order to avoid revealing the answer of the terminal in transmission, the answer is encrypted by a private key of the server and has a hash to form an answer ciphertext as shown in the formula:
Ct=Pukserver(Ans)
Then composing answer message { answer ciphertext Ct, terminal short address SAiTerminal signature SigiTherein Sigi=Prki(hash (Ct)) to other terminals of the whole networkEnd broadcasting; after other terminals receive the broadcast, the validity of the answer is verified, firstly, according to the terminal short address SAiPublic key Puk of question finding and answering terminaliThen, whether the terminal signatures are consistent is verified through the block chain network consensus, namely
Puki(Sigi)=hash(Ct)
If the verification is successful, the answer is really the answer of the answerer, and finally the message is recorded into the block chain;
s4: and finally, the server acquires the effective answer, decodes the encrypted answer by using the private key of the server, and Prk is obtained according to the formula AnsServer(Ct) solving the final answer content, obtaining the final answer and processing;
all terminals of each question and answer participate in the consensus of the block chain, all processes from question giving to answer are recorded, and an independent terminal is difficult to pass through the consensus to modify a certain question or answer record, so that the answering process can be traced back without being tampered.
2. The method according to claim 1, wherein the method comprises: in step S2, the consensus operation selects POS (Proof of Work), POW (Proof of stock), PBFT (Practical Byzantine Fault Tolerance algorithm), or DPOS (freed Proof of commission rights) according to the requirement.
CN201811037460.6A 2018-09-06 2018-09-06 Block chain-based network question setting and answering method incapable of being tampered Active CN108924167B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811037460.6A CN108924167B (en) 2018-09-06 2018-09-06 Block chain-based network question setting and answering method incapable of being tampered

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811037460.6A CN108924167B (en) 2018-09-06 2018-09-06 Block chain-based network question setting and answering method incapable of being tampered

Publications (2)

Publication Number Publication Date
CN108924167A true CN108924167A (en) 2018-11-30
CN108924167B CN108924167B (en) 2020-12-01

Family

ID=64406932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811037460.6A Active CN108924167B (en) 2018-09-06 2018-09-06 Block chain-based network question setting and answering method incapable of being tampered

Country Status (1)

Country Link
CN (1) CN108924167B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109785200A (en) * 2019-01-03 2019-05-21 中国联合网络通信集团有限公司 It answers questions method, equipment and storage medium
CN111212122A (en) * 2019-12-25 2020-05-29 新疆天池能源有限责任公司 Answer record data storage and analysis system and method based on block chain
CN112069815A (en) * 2020-09-04 2020-12-11 平安科技(深圳)有限公司 Answer selection method and device for idiom filling-in-blank question and computer equipment
CN112418853A (en) * 2020-09-22 2021-02-26 上海哔哩哔哩科技有限公司 Transaction data encryption method and device based on block chain
CN112765580A (en) * 2021-01-22 2021-05-07 电子科技大学 Method and system for protecting and preventing repudiation of examination questions in online examination
CN113177866A (en) * 2021-04-08 2021-07-27 中国南方电网有限责任公司超高压输电公司南宁局 Evaluation system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916246A (en) * 2014-03-31 2014-07-09 中国科学院软件研究所 Method and system for preventing cheating during examination based on trusted computing
CN104539424A (en) * 2014-12-18 2015-04-22 广东讯飞启明科技发展有限公司 Tamper-proof examinee data transmission method
CN105844559A (en) * 2016-03-28 2016-08-10 青岛大学 Examination method based on mobile terminal
CN106339639A (en) * 2016-08-30 2017-01-18 弗洛格(武汉)信息科技有限公司 Credit score management method and system based on block chain
WO2017090329A1 (en) * 2015-11-24 2017-06-01 ソニー株式会社 Information processing device, information processing method, and program
CN107832907A (en) * 2017-09-25 2018-03-23 中央财经大学 Students ' behavior information authentication system based on block chain technology
CN108305194A (en) * 2017-12-22 2018-07-20 广州网才信息技术有限公司 Examination cloud platform system based on block chain
CN108434745A (en) * 2018-03-27 2018-08-24 北京知道创宇信息技术有限公司 Game data processing method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916246A (en) * 2014-03-31 2014-07-09 中国科学院软件研究所 Method and system for preventing cheating during examination based on trusted computing
CN104539424A (en) * 2014-12-18 2015-04-22 广东讯飞启明科技发展有限公司 Tamper-proof examinee data transmission method
WO2017090329A1 (en) * 2015-11-24 2017-06-01 ソニー株式会社 Information processing device, information processing method, and program
CN105844559A (en) * 2016-03-28 2016-08-10 青岛大学 Examination method based on mobile terminal
CN106339639A (en) * 2016-08-30 2017-01-18 弗洛格(武汉)信息科技有限公司 Credit score management method and system based on block chain
CN107832907A (en) * 2017-09-25 2018-03-23 中央财经大学 Students ' behavior information authentication system based on block chain technology
CN108305194A (en) * 2017-12-22 2018-07-20 广州网才信息技术有限公司 Examination cloud platform system based on block chain
CN108434745A (en) * 2018-03-27 2018-08-24 北京知道创宇信息技术有限公司 Game data processing method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张建华等: "基于联盟区块链的命题教师信用信息管理平台 ", 《电脑编程技巧与维护》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109785200A (en) * 2019-01-03 2019-05-21 中国联合网络通信集团有限公司 It answers questions method, equipment and storage medium
CN111212122A (en) * 2019-12-25 2020-05-29 新疆天池能源有限责任公司 Answer record data storage and analysis system and method based on block chain
CN112069815B (en) * 2020-09-04 2023-01-17 平安科技(深圳)有限公司 Answer selection method and device for idiom filling-in-blank question and computer equipment
KR20220031857A (en) * 2020-09-04 2022-03-14 핑 안 테크놀로지 (썬전) 컴퍼니 리미티드 How to choose the answer to the word parentheses problem, device and computer equipment
JP2022530689A (en) * 2020-09-04 2022-06-30 平安科技(深▲せん▼)有限公司 How to choose an answer to a fill-in-the-blank idiom question, equipment and computer equipment
CN112069815A (en) * 2020-09-04 2020-12-11 平安科技(深圳)有限公司 Answer selection method and device for idiom filling-in-blank question and computer equipment
JP7418704B2 (en) 2020-09-04 2024-01-22 平安科技(深▲せん▼)有限公司 Methods, devices and computer equipment for selecting answers to fill-in-the-blank idiom questions
US12008319B2 (en) 2020-09-04 2024-06-11 Ping An Technology (Shenzhen) Co., Ltd. Method and apparatus for selecting answers to idiom fill-in-the-blank questions, and computer device
KR102688187B1 (en) 2020-09-04 2024-07-24 핑 안 테크놀로지 (썬전) 컴퍼니 리미티드 Answer selection device and computer equipment for parenthesis insertion problem
CN112418853A (en) * 2020-09-22 2021-02-26 上海哔哩哔哩科技有限公司 Transaction data encryption method and device based on block chain
CN112765580A (en) * 2021-01-22 2021-05-07 电子科技大学 Method and system for protecting and preventing repudiation of examination questions in online examination
CN112765580B (en) * 2021-01-22 2022-09-13 电子科技大学 Method and system for protecting and preventing repudiation of examination questions in online examination
CN113177866A (en) * 2021-04-08 2021-07-27 中国南方电网有限责任公司超高压输电公司南宁局 Evaluation system
CN113177866B (en) * 2021-04-08 2024-01-02 中国南方电网有限责任公司超高压输电公司南宁局 Evaluation system

Also Published As

Publication number Publication date
CN108924167B (en) 2020-12-01

Similar Documents

Publication Publication Date Title
CN108924167B (en) Block chain-based network question setting and answering method incapable of being tampered
CN109785494B (en) Traceable anonymous electronic voting method based on block chain
CN107403303B (en) Signing method of electronic contract system based on block chain deposit certificate
CN107231351B (en) Electronic certificate management method and related equipment
CN112688786B (en) Evidence construction and real-name identity authentication method based on block chain
CN110224993B (en) Responsibility pursuing anonymous electronic voting method and system based on block chain
US5420927A (en) Method for certifying public keys in a digital signature scheme
CN112487778A (en) Multi-user online signing system and method
Li et al. An unlinkable authenticated key agreement with collusion resistant for VANETs
TW202001658A (en) Method and apparatus for obtaining input of secure multiparty computation protocol
JP2001202013A (en) Anonymous participation authority control system
CN108121498A (en) The method and apparatus that a kind of learning records based on block chain technology preserve
CN111835526B (en) Method and system for generating anonymous credential
CN108924107A (en) A kind of block chain tele-medicine data call can verify that method
CN111460482B (en) Block chain-based number shaking method and device
Dreier et al. Formal analysis of electronic exams
Zhu et al. Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework
CN112396421A (en) Identity authentication system and method based on block chaining-through card
CN112002436A (en) Block chain-based medical question answering method, device and medium
CN108876375B (en) Block chain real name participation method and system
CN113497823B (en) Labor service subcontracting personnel management system based on block chain
CN108777673A (en) One kind carrying out Bidirectional identity authentication method in block chain
JP2001036521A (en) Electronic certificate issue system, electronic certificate authentication system, method for issuing electronic certificate, method for authenticating electronic certificate and recording medium
CN111680331B (en) System and method for managing length-checking mailbox based on block chain
CN113779637B (en) Attribute data processing method, attribute data processing device, attribute data processing equipment and attribute data processing medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant