CN108595980A - A kind of commodity trace to the source information guard method and device - Google Patents

A kind of commodity trace to the source information guard method and device Download PDF

Info

Publication number
CN108595980A
CN108595980A CN201810411525.2A CN201810411525A CN108595980A CN 108595980 A CN108595980 A CN 108595980A CN 201810411525 A CN201810411525 A CN 201810411525A CN 108595980 A CN108595980 A CN 108595980A
Authority
CN
China
Prior art keywords
commodity
goods
batch
merkle
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810411525.2A
Other languages
Chinese (zh)
Other versions
CN108595980B (en
Inventor
元家昕
余小平
谢文峰
李俊
杨德利
夏榕泽
汪浩
甄健鹏
莫志伟
姚雄祖
吴鑫潮
区嘉权
邹加雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Pinwei Software Co Ltd
Original Assignee
Guangzhou Pinwei Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Pinwei Software Co Ltd filed Critical Guangzhou Pinwei Software Co Ltd
Priority to CN201810411525.2A priority Critical patent/CN108595980B/en
Publication of CN108595980A publication Critical patent/CN108595980A/en
Application granted granted Critical
Publication of CN108595980B publication Critical patent/CN108595980B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Medical Informatics (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of commodity trace to the source information guard method and device, including:Obtain in same batch of goods the commodity sign of every commodity and the circulation information of the batch of goods;Merkle trees are generated according to the circulation information of the commodity sign of every commodity in same batch of goods and the batch of goods;The corresponding cryptographic Hash of the root node of merkle trees is deposited in publicly-owned chain, remaining node of merkle trees and path are deposited in alliance's chain.The present invention provides a kind of commodity trace to the source information guard method and device, just and not rewritable can be disclosed by realizing information of tracing to the source, while protect businessman's privacy.

Description

A kind of commodity trace to the source information guard method and device
Technical field
The present invention relates to electronic transaction technical field more particularly to a kind of commodity trace to the source information guard method and device.
Background technology
With the raising of the level of consumption of people and the mature of e-commerce technology, people buy the channel of commodity The pattern under line with dual development on line is converted to from entity patterns under original line, virtual shopping has progressed into people's The computer network purchase system based on e-commerce such as daily life, such as internet shopping, electronic emporium.
Commodity are traced to the source exactly tracks and records the essential information and circulation process of each product since source.Consumer passes through After items scanning anti-counterfeiting mark, the information of typing before the product can be inquired, to trust purchase.Block chain is born Anti-tamper characteristic, is particularly suitable for the information of tracing to the source of storage commodity, and industry class product of much tracing to the source all simultaneously uses block Chain technology.
Current a variety of class products of tracing to the source are all based on alliance's chain, although the private data of businessman can be protected preferably, Consumer can not directly verify, and third-party monitoring mechanism is needed to supervise, and consumer wishes that the information of tracing to the source of commodity can disclose Just and not rewritable, it is, therefore, desirable to provide a kind of commodity are traced to the source, the guard method of information and device are to realize letter of tracing to the source Breath can disclose just and not rewritable, while protect businessman's privacy.
Invention content
The present invention provides a kind of commodity trace to the source information guard method and device, realize trace to the source information can disclose public affairs Just and not rewritable, while protecting businessman's privacy.
A kind of guard method for information of tracing to the source the present invention provides commodity, including:
Obtain in same batch of goods the commodity sign of every commodity and the circulation information of the batch of goods;
It is generated according to the circulation information of the commodity sign of every commodity in same batch of goods and the batch of goods Merkle trees;
The corresponding cryptographic Hash of the root node of merkle trees is deposited in publicly-owned chain, remaining node of merkle trees and path It deposits in alliance's chain.
Optionally, it is given birth to according to the circulation information of the commodity sign of every commodity in same batch of goods and the batch of goods It is specifically included at merkle trees:
The left subtree of merkle trees is generated according to the commodity sign of every commodity in same batch of goods;
The right subtree of merkle trees is generated according to the circulation information of the batch of goods.
Optionally, the left subtree for merkle trees being generated according to the commodity sign of every commodity in same batch of goods specifically wraps It includes:
Using the commodity sign of sole product in same batch of goods as a leaf node of the left subtree of merkle trees, Generate the commodity sign merkle subtrees for the leaf node for including preset quantity, wherein commodity sign merkle subtrees are The left subtree of merkle trees, and if the actual quantity of sole product is less than preset quantity in the batch of goods, generate random Data fill the leaf node for null value in commodity sign merkle subtrees.
Optionally, obtain in same batch of goods every commodity commodity sign and the batch of goods circulation information it Before further include:
The commodity sign of every commodity is endorsed by the private key of manufacturer.
Optionally, obtain in same batch of goods every commodity commodity sign and the batch of goods circulation information it Before further include:
The circulation information of the batch of goods is endorsed by the private key of logistics initiator.
A kind of protective device for information of tracing to the source the present invention provides commodity, including:
Acquiring unit, the circulation of commodity sign and the batch of goods for obtaining in same batch of goods every commodity Information;
Merkle tree generation units, for according to every commodity in same batch of goods commodity sign and the batch quotient The circulation information of product generates merkle trees;
Storage unit, for the corresponding cryptographic Hash of the root node of merkle trees to be deposited in publicly-owned chain, merkle trees Remaining node and path are deposited in alliance's chain.
Optionally, Merkle trees generation unit specifically includes:
Left subtree generates subelement, for generating merkle trees according to the commodity sign of every commodity in same batch of goods Left subtree;
Right subtree generates subelement, the right subtree for generating merkle trees according to the circulation information of the batch of goods.
Optionally, left subtree generate subelement, be additionally operable to using the commodity sign of sole product in same batch of goods as One leaf node of the left subtree of merkle trees generates commodity sign merkle for the leaf node for including preset quantity Tree, wherein commodity sign merkle subtrees are the left subtree of merkle trees, and if in the batch of goods sole product reality Border quantity is less than preset quantity, then generates the leaf node for null value in random data filling commodity sign merkle subtrees.
A kind of protective device for information of tracing to the source the present invention provides commodity, including:
Memory, for storing instruction;
Processor, is coupled to the memory, and the processor is configured as holding based on the instruction that the memory stores Row realizes any one of them method as above.
The present invention provides a kind of computer readable storage medium, the computer-readable recording medium storage has computer Instruction, realizes any one of them method as above when described instruction is executed by processor.
As can be seen from the above technical solutions, the present invention has the following advantages:
A kind of guard method for information of tracing to the source the present invention provides commodity, including:Obtain every quotient in same batch of goods The circulation information of the commodity sign of product and the batch of goods;According to the commodity sign of every commodity in same batch of goods and institute The circulation information for stating batch of goods generates merkle trees;The corresponding cryptographic Hash of the root node of merkle trees is deposited in into publicly-owned chain In, remaining node of merkle trees and path are deposited in alliance's chain.
In the present invention, by the circulation information of the commodity sign of every commodity in a batch of goods and the batch of goods with The form of merkle trees is stored to alliance's chain and publicly-owned chain, and the corresponding cryptographic Hash of root node of wherein merkle trees is deposited in Among publicly-owned chain, ensure that it can not be distorted and without alliance's credit endorsement, connection is deposited in remaining node of merkle trees and path Among alliance's chain, the privacy of businessman is protected, and using the zero-knowledge proof characteristic of merkle trees, commodity can be got by program The corresponding cryptographic Hash of node in necessary path carries out verification of tracing to the source, and is carried out with the root node for the merkle trees being stored in publicly-owned chain Compare and complete commodity and trace to the source verification, just and not rewritable can be disclosed by realizing information of tracing to the source, while protect businessman hidden It is private.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without having to pay creative labor, may be used also for those of ordinary skill in the art To obtain other attached drawings according to these attached drawings.
Fig. 1 be a kind of commodity provided by the invention trace to the source information guard method a flow diagram;
Fig. 2 is merkle tree construction schematic diagrames;
Fig. 3 be a kind of commodity provided by the invention trace to the source information guard method another flow diagram;
Fig. 4 be a kind of commodity provided by the invention trace to the source information protective device first structural schematic diagram;
Fig. 5 be a kind of commodity provided by the invention trace to the source information protective device second structural schematic diagram;
Fig. 6 be a kind of commodity provided by the invention trace to the source information protective device third structural schematic diagram.
Specific implementation mode
An embodiment of the present invention provides a kind of commodity trace to the source information guard method and device, realizing information of tracing to the source can Just and not rewritable is disclosed, while protecting businessman's privacy.
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field All other embodiment that those of ordinary skill is obtained without making creative work, belongs to protection of the present invention Range.
It please refers to Fig.1 and Fig. 2, a kind of one embodiment for the guard method of information of tracing to the source the present invention provides commodity is wrapped It includes:
101, the commodity sign of every commodity and the circulation information of the batch of goods are obtained in same batch of goods;
It should be noted that in same batch of goods every commodity commodity sign be unique mark, commodity dispatch from the factory when with Machine generates, and same batch of goods do not represent commodity and produced as same batch, but the circulation information of same batch of goods is identical and only One, by logistics, initiator provides, such as batch A commodity are distributed to terminal C by manufacturer B, then is batch A quotient by manufacturer B Product provide first-class transfering the letter breath, and batch A commodity distributions to warehouse D, are then provided the by terminal C by terminal C for batch A commodity Second-rate transfering the letter breath.
102, it is generated according to the circulation information of the commodity sign of every commodity in same batch of goods and the batch of goods Merkle trees;
It should be noted that as shown in Fig. 2, obtain in same batch of goods every commodity commodity sign and described batch After the circulation information of secondary commodity, believed according to the circulation of the commodity sign of every commodity in same batch of goods and the batch of goods Breath generates merkle trees, and merkle trees have zero-knowledge proof characteristic, can be in the value for all nodes for not returning to merkle trees Under the premise of, the validity of verify data, in the present embodiment, if user needs to carry out commodity and traces to the source verification, it is only necessary to according to list The commodity sign of part commodity using specific software operation and is searched the merkle trees where the commodity, and is obtained and the commodity The cryptographic Hash of the cryptographic Hash of the node in commodity sign necessity path and the root node of the merkle trees where the commodity, according to must The cryptographic Hash of the root node of merkle trees where wanting the cryptographic Hash in path to calculate the commodity, by the merkle trees being calculated The cryptographic Hash of root node is compared with the cryptographic Hash of the root node of the merkle trees where the commodity got, judges the quotient The positive moral character of product.
103, the corresponding cryptographic Hash of the root node of merkle trees is deposited in publicly-owned chain, remaining node of merkle trees and Path is deposited in alliance's chain;
It should be noted that after generating merkle trees, the corresponding cryptographic Hash of the root node of merkle trees is deposited in into public affairs Have in chain, remaining node of merkle trees and path are deposited in alliance's chain, since alliance's chain is built by different organisations and institutions Vertical to form, different roles possesses different data permissions, guarantee pair while capable of protecting the privacy of the merchandise news of businessman The supervision of data, consumer can not deduce complete data, and consumer can pass through the soft of offer while receiving commodity Part is passed to printed in the commodity packaging and associated commodity sign of merchandise news, the service acquisition provided by alliance's chain to this The information of commodity sign interdependent node is verified the cryptographic Hash of commodity after calculating, can not be usurped with being stored on publicly-owned chain The corresponding cryptographic Hash of root node of the merkle trees changed is compared to judge whether commodity are certified products.
In the embodiment of the present invention, by the circulation information of the commodity sign of every commodity in a batch of goods and the batch of goods It is stored in the form of merkle trees to alliance's chain and publicly-owned chain, the corresponding cryptographic Hash storage of root node of wherein merkle trees Among publicly-owned chain, ensure that it can not be distorted and without alliance's credit endorsement, remaining node of merkle trees and path are deposited in Among alliance's chain, the privacy of businessman is protected, and using the zero-knowledge proof characteristic of merkle trees, quotient can be got by program The corresponding cryptographic Hash of node in product necessity path carries out verification of tracing to the source, with the root nodes of the merkle trees being stored in publicly-owned chain into Row relatively completes commodity and traces to the source verification, and just and not rewritable can be disclosed by realizing information of tracing to the source, while protect businessman Privacy.
Be above to a kind of commodity provided by the invention trace to the source information guard method the explanation that carries out of one embodiment, A kind of trace to the source another embodiment of guard method of information of commodity provided by the invention will be illustrated below.
Referring to Fig. 3, a kind of another embodiment for the guard method of information of tracing to the source the present invention provides commodity, including:
201, the commodity sign of every commodity is endorsed by the private key of manufacturer;
It should be noted that in order to ensure that the data source header information of commodity sign can not distort, to the commodity of sole product The private key that mark carries out manufacturer is endorsed processing.
202, the circulation information of the batch of goods is endorsed by the private key of logistics initiator;
It should be noted that further ensure that the circulation process of commodity can not distort, the circulation to same batch of goods The private key that information carries out logistics initiator is endorsed processing.
203, the commodity sign of every commodity and the circulation information of the batch of goods are obtained in same batch of goods;
It should be noted that in same batch of goods every commodity commodity sign be unique mark, commodity dispatch from the factory when with Machine generates, and same batch of goods do not represent commodity and produced as same batch, but the circulation information of same batch of goods is identical and only One, by logistics, initiator provides, such as batch A commodity are distributed to terminal C by manufacturer B, then is batch A quotient by manufacturer B Product provide first-class transfering the letter breath, and batch A commodity distributions to warehouse D, are then provided the by terminal C by terminal C for batch A commodity Second-rate transfering the letter breath.
204, using the commodity sign of sole product in same batch of goods as a leaf of the left subtree of merkle trees Node generates the commodity sign merkle subtrees for the leaf node for including preset quantity, wherein commodity sign merkle subtrees are For the left subtree of merkle trees, and if the actual quantity of sole product is less than preset quantity in the batch of goods, generate with Machine data fill the leaf node for null value in commodity sign merkle subtrees;
It should be noted that merkle trees are divided into left subtree and right subtree, it according to Fig.2, will be in same batch of goods A leaf node of the commodity sign of sole product as the left subtree of merkle trees, to generate the leaf including preset quantity The leaf node of the commodity sign merkle subtrees of node, the i.e. left subtree of merkle trees, preset quantity can ensure generation The number of plies all same of the left subtree of merkle trees can prevent user from extrapolating a batch by returning to the depth of merkle trees The substantially quantity of commodity, the sensitive informations such as inventory to know businessman.
If the actual quantity of sole product is less than preset quantity in a batch, random data filling commodity sign is generated It is the leaf node of null value in merkle subtrees, generates and other batch of subuniform commodity sign merkle subtree;
It, will first as unit of preset quantity if the actual quantity of sole product is higher than preset quantity in a batch The batch is divided into multiple batches to generate commodity sign merkle subtrees, equally, if single-piece when being divided to the last one batch The actual quantity of commodity is less than preset quantity, is solved according to above-mentioned method.
205, the right subtree of merkle trees is generated according to the circulation information of the batch of goods;
It should be noted that generating the right subtree and commodity mark of merkle trees according to the circulation information of the batch of goods Know merkle subtrees and collectively form merkle trees, the corresponding cryptographic Hash of root node of merkle trees is commodity sign merkle The corresponding cryptographic Hash of root node of tree and the corresponding cryptographic Hash of root node of the right subtree of merkle trees are calculated by hash function It obtains.
206, the corresponding cryptographic Hash of the root node of merkle trees is deposited in publicly-owned chain, remaining node of merkle trees and Path is deposited in alliance's chain.
It should be noted that after generating merkle trees, the corresponding cryptographic Hash of the root node of merkle trees is deposited in into public affairs Have in chain, remaining node of merkle trees and path are deposited in alliance's chain, since alliance's chain is built by different organisations and institutions Vertical to form, different roles possesses different data permissions, guarantee pair while capable of protecting the privacy of the merchandise news of businessman The supervision of data, consumer can not deduce complete data, and consumer can pass through the soft of offer while receiving commodity Part is passed to printed in the commodity packaging and associated commodity sign of merchandise news, the service acquisition provided by alliance's chain to this The information of commodity sign interdependent node is verified the cryptographic Hash of commodity after calculating, can not be usurped with being stored on publicly-owned chain The corresponding cryptographic Hash of root node of the merkle trees changed is compared to judge whether commodity are certified products.
In the embodiment of the present invention, by the circulation information of the commodity sign of every commodity in a batch of goods and the batch of goods It is stored in the form of merkle trees to alliance's chain and publicly-owned chain, the corresponding cryptographic Hash storage of root node of wherein merkle trees Among publicly-owned chain, ensure that it can not be distorted and without alliance's credit endorsement, remaining node of merkle trees and path are deposited in Among alliance's chain, the privacy of businessman is protected, and using the zero-knowledge proof characteristic of merkle trees, quotient can be got by program The corresponding cryptographic Hash of node in product necessity path carries out verification of tracing to the source, with the root nodes of the merkle trees being stored in publicly-owned chain into Row relatively completes commodity and traces to the source verification, and just and not rewritable can be disclosed by realizing information of tracing to the source, while protect businessman Privacy is further endorsed the commodity sign of every commodity by the private key of manufacturer, the circulation information of the batch of goods It is endorsed by the private key of logistics initiator, ensures that source data and circulation process can not distort, and identify by affixed merchandise The depth of merkle subtrees prevents user from extrapolating the substantially quantity of a batch of goods by returning to the depth of merkle trees, The sensitive informations such as the inventory to know businessman.
Be above to a kind of commodity provided by the invention trace to the source information guard method saying of carrying out of another embodiment It is bright, a kind of trace to the source one embodiment of protective device of information of commodity provided by the invention will be illustrated below.
Referring to Fig. 4, a kind of one embodiment for the protective device of information of tracing to the source the present invention provides commodity, including:
Acquiring unit 401, commodity sign and the batch of goods for obtaining in same batch of goods every commodity Circulate information;
Merkle trees generation unit 402, for according to the commodity sign of every commodity in same batch of goods and described batch The circulation information of secondary commodity generates merkle trees;
Storage unit 403, for the corresponding cryptographic Hash of the root node of merkle trees to be deposited in publicly-owned chain, merkle trees Remaining node and path deposit in alliance's chain.
Be above to a kind of commodity provided by the invention trace to the source information protective device saying of carrying out of one embodiment It is bright, a kind of trace to the source second embodiment of protective device of information of commodity provided by the invention will be illustrated below.
Referring to Fig. 5, a kind of second embodiment of the protective device of information of tracing to the source the present invention provides commodity, including:
First encryption unit 501, for the commodity sign of every commodity to be endorsed by the private key of manufacturer;
Second encryption unit 502, for the circulation information of the batch of goods to be endorsed by the private key of logistics initiator;
Acquiring unit 503, commodity sign and the batch of goods for obtaining in same batch of goods every commodity Circulate information;
Merkle trees generation unit 504, for according to the commodity sign of every commodity in same batch of goods and described batch The circulation information of secondary commodity generates merkle trees;
Merkle trees generation unit 504 specifically includes:
Left subtree generates subelement 5041, for being generated according to the commodity sign of every commodity in same batch of goods The left subtree of merkle trees;
Left subtree generate subelement 5041, be additionally operable to using the commodity sign of sole product in same batch of goods as One leaf node of the left subtree of merkle trees generates commodity sign merkle for the leaf node for including preset quantity Tree, wherein commodity sign merkle subtrees are the left subtree of merkle trees, and if in the batch of goods sole product reality Border quantity is less than preset quantity, then generates the leaf node for null value in random data filling commodity sign merkle subtrees;
Right subtree generates subelement 5042, the right son for generating merkle trees according to the circulation information of the batch of goods Tree;
Storage unit 505, for the corresponding cryptographic Hash of the root node of merkle trees to be deposited in publicly-owned chain, merkle trees Remaining node and path deposit in alliance's chain.
Be above to a kind of commodity provided by the invention trace to the source information protective device saying of carrying out of second embodiment It is bright, a kind of the trace to the source third embodiment of protective device of information of commodity provided by the invention will be illustrated below.
As shown in fig. 6, a kind of third embodiment for the protective device of information of tracing to the source the present invention provides commodity, including:
Memory 601, for storing instruction;
Processor 602 is coupled to memory 601, and it is real that processor 602 is configured as the instruction execution stored based on memory The method that now any embodiment is related to such as in Fig. 1 or Fig. 3.
As shown in fig. 6, commodity are traced to the source, the protective device of information further includes communication interface 603, for being carried out with miscellaneous equipment Information exchange.The device further includes bus 604 simultaneously, and processor 602, communication interface 603 and memory 601 pass through bus 604 complete mutual communication.
Memory 601 can include high-speed RAM memory, also can further include nonvolatile memory (non-volatile Memory), a for example, at least magnetic disk storage.Memory 601 can also be memory array.Memory 601 be also possible to by Piecemeal, and block can be combined into virtual volume by certain rule.
In addition, processor 602 section Yan Shi, mono- central processor CPU, or can be application-specific integrated circuit ASIC (application specific integrated circuit), or be arranged to implement the one of the embodiment of the present invention A or multiple integrated circuits.
Be above to a kind of commodity provided by the invention trace to the source information protective device saying of carrying out of third embodiment It is bright, a kind of one embodiment of computer readable storage medium provided by the invention will be illustrated below.
A kind of one embodiment of computer readable storage medium provided by the invention, computer-readable recording medium storage There is computer instruction, the method that any embodiment is related in such as Fig. 1 or Fig. 3 is realized when described instruction is executed by processor.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, device or unit It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before Stating embodiment, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding The technical solution recorded in each embodiment is stated to modify or equivalent replacement of some of the technical features;And these Modification or replacement, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution.

Claims (10)

  1. The guard method of information 1. a kind of commodity are traced to the source, which is characterized in that including:
    Obtain in same batch of goods the commodity sign of every commodity and the circulation information of the batch of goods;
    Merkle trees are generated according to the circulation information of the commodity sign of every commodity in same batch of goods and the batch of goods;
    The corresponding cryptographic Hash of the root node of merkle trees is deposited in publicly-owned chain, remaining node of merkle trees and path storage In alliance's chain.
  2. The guard method of information 2. commodity according to claim 1 are traced to the source, which is characterized in that according to every in same batch of goods The circulation information of the commodity sign of commodity and the batch of goods generates merkle trees and specifically includes:
    The left subtree of merkle trees is generated according to the commodity sign of every commodity in same batch of goods;
    The right subtree of merkle trees is generated according to the circulation information of the batch of goods.
  3. The guard method of information 3. commodity according to claim 2 are traced to the source, which is characterized in that according to every in same batch of goods The left subtree that the commodity sign of commodity generates merkle trees specifically includes:
    Using the commodity sign of sole product in same batch of goods as a leaf node of the left subtree of merkle trees, generate The commodity sign merkle subtrees of leaf node including preset quantity, wherein commodity sign merkle subtrees are merkle The left subtree of tree, and if in the batch of goods sole product actual quantity be less than preset quantity, generate random data and fill out Fill the leaf node for null value in commodity sign merkle subtrees.
  4. The guard method of information 4. commodity according to claim 3 are traced to the source, which is characterized in that obtain in same batch of goods Further include before the commodity sign of every commodity and the circulation information of the batch of goods:
    The commodity sign of every commodity is endorsed by the private key of manufacturer.
  5. The guard method of information 5. commodity according to claim 4 are traced to the source, which is characterized in that obtain in same batch of goods Further include before the commodity sign of every commodity and the circulation information of the batch of goods:
    The circulation information of the batch of goods is endorsed by the private key of logistics initiator.
  6. The protective device of information 6. a kind of commodity are traced to the source, which is characterized in that including:
    Acquiring unit, the circulation letter of commodity sign and the batch of goods for obtaining in same batch of goods every commodity Breath;
    Merkle tree generation units, for according to the commodity signs of every commodity in same batch of goods and the batch of goods The information that circulates generates merkle trees;
    Storage unit, for the corresponding cryptographic Hash of the root node of merkle trees to be deposited in publicly-owned chain, merkle trees remaining Node and path are deposited in alliance's chain.
  7. The protective device of information 7. commodity according to claim 6 are traced to the source, feature exist, and Merkle tree generation units are specific Including:
    Left subtree generates subelement, the left side for generating merkle trees according to the commodity sign of every commodity in same batch of goods Subtree;
    Right subtree generates subelement, the right subtree for generating merkle trees according to the circulation information of the batch of goods.
  8. The protective device of information 8. commodity according to claim 7 are traced to the source, which is characterized in that left subtree generates subelement, It is additionally operable to using the commodity sign of sole product in same batch of goods as a leaf node of the left subtree of merkle trees, it is raw At the commodity sign merkle subtrees of the leaf node including preset quantity, wherein commodity sign merkle subtrees are The left subtree of merkle trees, and if the actual quantity of sole product is less than preset quantity in the batch of goods, generate random Data fill the leaf node for null value in commodity sign merkle subtrees.
  9. The protective device of information 9. a kind of commodity are traced to the source, which is characterized in that including:
    Memory, for storing instruction;
    Processor is coupled to the memory, and it is real that the processor is configured as the instruction execution stored based on the memory The now method as described in any one of claim 1 to 5.
  10. 10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to It enables, the method as described in any one of claim 1 to 5 is realized when described instruction is executed by processor.
CN201810411525.2A 2018-05-02 2018-05-02 Method and device for protecting commodity traceability information Active CN108595980B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810411525.2A CN108595980B (en) 2018-05-02 2018-05-02 Method and device for protecting commodity traceability information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810411525.2A CN108595980B (en) 2018-05-02 2018-05-02 Method and device for protecting commodity traceability information

Publications (2)

Publication Number Publication Date
CN108595980A true CN108595980A (en) 2018-09-28
CN108595980B CN108595980B (en) 2023-01-24

Family

ID=63620592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810411525.2A Active CN108595980B (en) 2018-05-02 2018-05-02 Method and device for protecting commodity traceability information

Country Status (1)

Country Link
CN (1) CN108595980B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109377244A (en) * 2018-10-24 2019-02-22 武汉珞樱联创信息科技有限公司 A kind of quick traceability system of food and method based on multichain interconnection block chain network
CN109508905A (en) * 2018-12-18 2019-03-22 深圳壹账通智能科技有限公司 Drug monitoring and managing method and device, storage medium and server based on block chain
CN109741078A (en) * 2018-12-28 2019-05-10 广东长盈科技股份有限公司 One kind is towards retrospective Internet of Things storage system and method
CN110119763A (en) * 2019-04-16 2019-08-13 福建天晴数码有限公司 Logistic regression data optimization methods, storage medium based on Merkel's tree thought
CN110688377A (en) * 2019-08-30 2020-01-14 阿里巴巴集团控股有限公司 Method and device for updating state Merck tree
CN111080311A (en) * 2019-10-24 2020-04-28 广州运通链达金服科技有限公司 Commodity tracing method and device based on block chain
CN111967028A (en) * 2020-08-04 2020-11-20 中国科学院上海微系统与信息技术研究所 Data interaction system
CN112632060A (en) * 2020-08-31 2021-04-09 上海墨珩网络科技有限公司 Block chain based hierarchical traceability batch information recording method and device
US10992459B2 (en) 2019-08-30 2021-04-27 Advanced New Technologies Co., Ltd. Updating a state Merkle tree
CN113382005A (en) * 2021-06-10 2021-09-10 南京财经大学 Traceable logistics method with privacy protection and traceable logistics system
CN117875990A (en) * 2024-03-13 2024-04-12 贵州省畜牧兽医研究所 Honey tracing method and system based on blockchain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138478A (en) * 2015-07-28 2015-12-09 哈尔滨工程大学 Memory integrity protection method employing unbalanced hash tree mode
CN106372533A (en) * 2016-09-14 2017-02-01 中国银联股份有限公司 Block chain technology-based content storage method
CN107122985A (en) * 2017-05-09 2017-09-01 广东工业大学 A kind of agricultural-product supply-chain traceability system based on Internet of Things and block chain
US20170262862A1 (en) * 2015-12-21 2017-09-14 Mohamed Alaa Aljawhari Method and apparatus for managing and providing provenance of product using blockchain
CN107657460A (en) * 2017-09-08 2018-02-02 众安信息技术服务有限公司 A kind of tobacco based on block chain is false proof and source tracing method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138478A (en) * 2015-07-28 2015-12-09 哈尔滨工程大学 Memory integrity protection method employing unbalanced hash tree mode
US20170262862A1 (en) * 2015-12-21 2017-09-14 Mohamed Alaa Aljawhari Method and apparatus for managing and providing provenance of product using blockchain
CN106372533A (en) * 2016-09-14 2017-02-01 中国银联股份有限公司 Block chain technology-based content storage method
CN107122985A (en) * 2017-05-09 2017-09-01 广东工业大学 A kind of agricultural-product supply-chain traceability system based on Internet of Things and block chain
CN107657460A (en) * 2017-09-08 2018-02-02 众安信息技术服务有限公司 A kind of tobacco based on block chain is false proof and source tracing method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
肖丽 等: "基于区块链技术的中药溯源体系研究", 《时珍国医国药》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109377244B (en) * 2018-10-24 2022-04-15 武汉珞樱联创信息科技有限公司 Food fast traceability system and method based on multi-chain interconnection block chain network
CN109377244A (en) * 2018-10-24 2019-02-22 武汉珞樱联创信息科技有限公司 A kind of quick traceability system of food and method based on multichain interconnection block chain network
CN109508905A (en) * 2018-12-18 2019-03-22 深圳壹账通智能科技有限公司 Drug monitoring and managing method and device, storage medium and server based on block chain
CN109741078A (en) * 2018-12-28 2019-05-10 广东长盈科技股份有限公司 One kind is towards retrospective Internet of Things storage system and method
CN110119763A (en) * 2019-04-16 2019-08-13 福建天晴数码有限公司 Logistic regression data optimization methods, storage medium based on Merkel's tree thought
CN110688377A (en) * 2019-08-30 2020-01-14 阿里巴巴集团控股有限公司 Method and device for updating state Merck tree
CN110688377B (en) * 2019-08-30 2020-07-17 阿里巴巴集团控股有限公司 Method and device for updating state Merck tree
US10992459B2 (en) 2019-08-30 2021-04-27 Advanced New Technologies Co., Ltd. Updating a state Merkle tree
CN111080311A (en) * 2019-10-24 2020-04-28 广州运通链达金服科技有限公司 Commodity tracing method and device based on block chain
CN111080311B (en) * 2019-10-24 2024-04-26 广州运通链达金服科技有限公司 Commodity tracing method and device based on blockchain
CN111967028A (en) * 2020-08-04 2020-11-20 中国科学院上海微系统与信息技术研究所 Data interaction system
CN111967028B (en) * 2020-08-04 2021-05-25 中国科学院上海微系统与信息技术研究所 Data interaction system
CN112632060A (en) * 2020-08-31 2021-04-09 上海墨珩网络科技有限公司 Block chain based hierarchical traceability batch information recording method and device
CN112632060B (en) * 2020-08-31 2022-10-11 上海墨珩网络科技有限公司 Block chain based hierarchical traceability batch information recording method and device
CN113382005A (en) * 2021-06-10 2021-09-10 南京财经大学 Traceable logistics method with privacy protection and traceable logistics system
CN113382005B (en) * 2021-06-10 2023-09-29 南京财经大学 Traceable logistics method with privacy protection function and traceable logistics system with same
CN117875990A (en) * 2024-03-13 2024-04-12 贵州省畜牧兽医研究所 Honey tracing method and system based on blockchain

Also Published As

Publication number Publication date
CN108595980B (en) 2023-01-24

Similar Documents

Publication Publication Date Title
CN108595980A (en) A kind of commodity trace to the source information guard method and device
EP3720045B1 (en) Blockchain-based data verification method and apparatus
US11562451B1 (en) Apparatus for proportional calculation regarding non-fungible tokens
US20160269182A1 (en) METHOD AND APPARATUS FOR PROVIDING A UNIVERSAL DETERMINISTICALLY REPRODUCIBLE CRYPTOGRAPHIC KEY-PAIR REPRESENTATION FOR ALL SKUs, SHIPPING CARTONS, AND ITEMS
CN111105236A (en) Realization algorithm of non-homogeneity evidence
CN108009810A (en) A kind of Trusted Digital transaction in assets method
CN206422795U (en) O f chain product information system based on third party's CA system authentications
CN109255056B (en) Data reference processing method, device, equipment and storage medium of block chain
CN106203919A (en) Run through the book keeping operation formula commodity counterfeit prevention source tracing method of supply chain
WO2019246399A1 (en) Digital ledger for unique item ids with ownership
US11037147B2 (en) Money transfer fraud prevention methods and systems
JP2001312680A (en) Method for electronic commerce and data base
CN112862502A (en) Authentication and transaction tracing method, system and storage medium based on block chain
CN107704546A (en) Page configuration method and server
US8886684B2 (en) Apparatus and method for managing register of unique identifiers
CN111881482B (en) User identity privacy encryption method based on block chain technology
CN109903055A (en) Merchandise control method, apparatus, computer installation and storage medium
CN105593876B (en) Validation in serialized streams
CN107770165A (en) The method and apparatus that a kind of analog machine sends request
CN112070567A (en) Quality control system based on block chain and control method thereof
CN109409115A (en) A kind of encryption and decryption method and relevant apparatus
JP2020197937A (en) Authenticity determining apparatus, authenticity determining system, and authenticity determining method
CN114140133B (en) Method for processing tracing data
RU2322692C1 (en) Method for identification and accounting of movement of marked objects and informational system for realization of the method
CN110474763B (en) Chain-based identity protection method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant