CN110569643A - traffic management method and device based on block chain network - Google Patents

traffic management method and device based on block chain network Download PDF

Info

Publication number
CN110569643A
CN110569643A CN201910854912.8A CN201910854912A CN110569643A CN 110569643 A CN110569643 A CN 110569643A CN 201910854912 A CN201910854912 A CN 201910854912A CN 110569643 A CN110569643 A CN 110569643A
Authority
CN
China
Prior art keywords
information
traffic
user
traffic information
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910854912.8A
Other languages
Chinese (zh)
Inventor
崔冉
申子熹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910854912.8A priority Critical patent/CN110569643A/en
Publication of CN110569643A publication Critical patent/CN110569643A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • G06Q50/40
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention provides a traffic management method, a device, electronic equipment and a storage medium based on a block chain network, wherein the method comprises the following steps: receiving identity information of a user, authenticating the identity information, and storing the identity information of the user in a block chain network after the authentication is passed; receiving traffic information, and authenticating a user submitting the traffic information according to the identity information stored in the block chain network; carrying out traffic violation examination on the traffic information submitted by the authenticated user to obtain an examination result of the traffic information; storing the traffic information and the auditing results in the block chain network, and associating the auditing results with the corresponding user identity information respectively; and returning the auditing result to the corresponding user client. By the method and the device, the traceability of the traffic violation information can be ensured, and the reliability of a traffic management process is improved.

Description

Traffic management method and device based on block chain network
Technical Field
the present invention relates to the field of blockchain and traffic management technologies, and in particular, to a method and an apparatus for traffic management based on a blockchain network, an electronic device, and a storage medium.
Background
with the popularization and the increase of the number of vehicles, the attention of traffic management is increased, wherein the recording of traffic violation behaviors and the corresponding penalty of the vehicle in violation are currently the commonly adopted traffic management methods.
In the related technology, the monitoring mode of the traffic violation mainly comprises the steps of capturing vehicles running on a road without rules (such as running a red light, running in the wrong direction, pressing a line, illegally dropping the head and the like) by a law enforcement capturing camera, and uploading the captured vehicles to a traffic management department to serve as reliable evidence of the off-site traffic enforcement.
however, the deployment cost of the technology is too high, the coverage area is limited, for example, the snapshot can be performed only at some traffic intersections, the traffic violation cannot be comprehensively monitored, and meanwhile, the reliability cannot be guaranteed because the snapshot data is dependent on network transmission and is easily influenced by environmental factors.
Disclosure of Invention
The embodiment of the invention provides a traffic management method, a traffic management device, electronic equipment and a storage medium based on a block chain network, which can be used for comprehensively and credibly auditing traffic violation.
The technical scheme of the embodiment of the invention is realized as follows:
The embodiment of the invention provides a traffic management method based on a block chain network, which comprises the following steps:
Receiving identity information of a user, authenticating the identity information, and storing the identity information of the user in a block chain network after the authentication is passed;
Receiving traffic information, and authenticating a user submitting the traffic information according to the identity information stored in the block chain network;
Carrying out traffic violation examination on the traffic information submitted by the authenticated user to obtain an examination result of the traffic information;
storing the traffic information and the auditing results in the block chain network, and associating the auditing results with the corresponding user identity information respectively;
And returning the auditing result to the corresponding user client.
The embodiment of the invention provides a traffic management device based on a block chain network, which comprises:
The identity authentication module is used for receiving identity information of a user, authenticating the identity information and storing the identity information of the user in a block chain network after the authentication is passed;
The traffic authentication module is used for receiving traffic information and authenticating a user submitting the traffic information according to the identity information stored in the block chain network;
the auditing module is used for auditing the traffic violation of the traffic information submitted by the authenticated user to obtain an auditing result of the traffic information;
The association module is used for storing the traffic information and the audit result in the block chain network and associating the audit result with the corresponding identity information of the user respectively;
And the returning module is used for returning the auditing result to the client of the corresponding user.
In the above scheme, the identity authentication module is further configured to invoke an interface of an identity verification function mechanism to verify the identity information of the user; and when the interface obtains the confirmation that the authentication is passed, storing the hash value of the original data of the user identity or the original data representing the user identity in the blockchain network.
in the foregoing solution, the identity authentication module is further configured to send the user identity information to a node belonging to an identity information verification function mechanism in the block chain network, so that the node generates a new block based on the received user identity information, and when the identity information in the new block is verified to obtain a consensus, the new block that obtains the consensus is added to the tail of the block chain.
in the above scheme, the auditing module is further configured to identify a vehicle identifier, a vehicle behavior, time information, and location information in the traffic information; when the vehicle behavior is determined to be not in accordance with the traffic regulations, generating an auditing result representing the traffic information violation based on the vehicle identification, the vehicle behavior, the information, the location information and the violation type; when the vehicle behavior is determined to be in accordance with the traffic regulations, generating an audit result representing that the traffic information is not violated based on the vehicle identification, the vehicle behavior, the information, the location information, and the type of non-violation.
In the above scheme, the association module is further configured to determine a hash value of the traffic information and a hash value of the audit result, and store the hash value of the traffic information and the hash value of the audit result in a block chain network; or storing the traffic information and the original data of the auditing result in the block chain network.
In the above scheme, the association module is further configured to send the traffic information and the audit result to a node belonging to a traffic violation audit function mechanism in the block chain network, so that the node generates a new block based on the received traffic information and the audit result, and when a consensus is verified for the traffic information and the audit result in the new block, the new block that has the consensus is added to the tail of the block chain.
In the above scheme, the association module is further configured to receive a transaction identifier, which is returned by the blockchain network and stores the identity information of the user; and associating the transaction identification of the identity information of the user with the corresponding auditing result.
In the above solution, the apparatus further includes a violation query module, configured to respond to a violation query request, where the violation query request includes identity information of a requesting user; inquiring traffic information corresponding to the identity information stored in the block chain network according to the identity information of the requesting user; returning a violation query result according to the queried traffic information; or responding to a violation query request, wherein the violation query request comprises a vehicle identifier to be queried; inquiring traffic information of the corresponding vehicle identification stored in the block chain network according to the vehicle identification to be inquired; and returning a violation query result according to the queried traffic information.
In the above scheme, the device further includes a credit sending module, configured to send a credit that can be redeemed from inside the blockchain network or outside the blockchain network to the user when the traffic information submitted by the user is checked as a traffic violation, so that the user redeems a virtual asset according to the obtained credit.
An embodiment of the present invention provides an electronic device, including:
A memory for storing executable instructions;
And the processor is used for realizing the traffic management method based on the block chain network provided by the embodiment of the invention when the executable instructions stored in the memory are executed.
The embodiment of the invention provides a storage medium, which stores executable instructions and is used for causing a processor to execute the executable instructions so as to realize the traffic management method based on a block chain network provided by the embodiment of the invention.
The embodiment of the invention has the following beneficial effects:
the traffic violation audit is carried out by using the traffic information uploaded by the authenticated user in the block chain network, and the user can snapshot the traffic information at any time and any place to submit the traffic violation audit, so that the coverage area of the traffic violation audit is not restricted by the deployment position of the camera, the traffic enforcement coverage area is obviously improved, the deployment cost is reduced, and the incidence rate of traffic violation behaviors can be reduced; reliable storage and reliable tracing of traffic information and audit results are achieved through a block chain network.
Drawings
Fig. 1 is a schematic architecture diagram of a traffic management system based on a blockchain network according to an embodiment of the present invention;
Fig. 2 is a functional architecture diagram of a blockchain network according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a trusted law enforcement back office according to an embodiment of the present invention;
Fig. 4 is a schematic flowchart of a traffic management method based on a blockchain network according to an embodiment of the present invention;
Fig. 5 is a schematic flowchart of a traffic management method based on a blockchain network according to an embodiment of the present invention;
Fig. 6 is a schematic flowchart of a traffic management method based on a blockchain network according to an embodiment of the present invention;
fig. 7 is a schematic node diagram of a blockchain network in the traffic management system based on the blockchain network according to the embodiment of the present invention;
Fig. 8 is a flowchart illustrating a traffic management method based on a blockchain network according to an embodiment of the present invention;
Fig. 9A, 9B, and 9C are schematic application scenarios of the traffic management method based on the blockchain network according to the embodiment of the present invention.
Detailed Description
in order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail with reference to the accompanying drawings, the described embodiments should not be construed as limiting the present invention, and all other embodiments obtained by a person of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
in the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
In the description that follows, references to the terms "first \ second \ third" are intended merely to distinguish similar objects and do not denote a particular order, but rather are to be understood that the terms "first \ second \ third" may be interchanged under certain circumstances or sequences of events to enable embodiments of the invention described herein to be practiced in other than those illustrated or described herein.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein is for the purpose of describing embodiments of the invention only and is not intended to be limiting of the invention.
Before further detailed description of the embodiments of the present invention, terms and expressions mentioned in the embodiments of the present invention are explained, and the terms and expressions mentioned in the embodiments of the present invention are applied to the following explanations.
1) Transactions (transactions), equivalent to the computer term "Transaction," include operations that need to be committed to a blockchain network for execution and do not refer solely to transactions in the context of commerce, which embodiments of the present invention follow in view of the convention colloquially used in blockchain technology.
for example, a deployment (deployment) transaction is used to install a specified smart contract to a node in a blockchain network and is ready to be invoked; the Invoke (Invoke) transaction is used to append records of the transaction in the blockchain by invoking the smart contract and to perform operations on the state database of the blockchain, including update operations (including adding, deleting, and modifying key-value pairs in the state database) and query operations (i.e., querying key-value pairs in the state database).
2) a Block chain (Blockchain) is a storage structure for encrypted, chained transactions formed from blocks (blocks).
for example, the header of each block may include hash values of all transactions in the block, and also include hash values of all transactions in the previous block, so as to achieve tamper resistance and forgery resistance of the transactions in the block based on the hash values; newly generated transactions, after being filled into the tiles and passing through the consensus of nodes in the blockchain network, are appended to the end of the blockchain to form a chain growth.
3) A Blockchain Network (Blockchain Network) incorporates new blocks into a set of nodes of a Blockchain in a consensus manner.
4) ledger (legger) is a general term for blockchains (also called Ledger data) and state databases synchronized with blockchains.
Wherein, the blockchain records the transaction in the form of a file in a file system; the state database records the transactions in the blockchain in the form of different types of Key (Key) Value pairs for supporting fast query of the transactions in the blockchain.
5) Intelligent Contracts (Smart Contracts), also known as chain codes (chaincodes) or application codes, are programs deployed in nodes of a blockchain network, and the nodes execute the intelligent Contracts called in received transactions to perform operations of updating or querying key-value data of a state database.
6) Consensus (Consensus), a process in a blockchain network, is used to agree on transactions in a block among a plurality of nodes involved, the agreed block is to be appended to the end of the blockchain, and the mechanisms for achieving Consensus include Proof of workload (PoW, Proof of Work), Proof of rights and interests (PoS, Proof of equity (DPoS), Proof of granted of shares (DPoS), Proof of Elapsed Time (PoET, Proof of Elapsed Time), and so on.
An exemplary application of the blockchain network provided by the embodiment of the present invention is described below, referring to fig. 1, fig. 1 is a schematic architecture diagram of a traffic management system 100 based on the blockchain network provided by the embodiment of the present invention, where the traffic management system 100 includes a blockchain network 200 (exemplarily shown to include a node 210-1 to a node 210-3), a trusted law enforcement background 300, and clients 400/410, which are described below respectively.
the type of blockchain network 200 is flexible and may be, for example, any of a public chain, a private chain, or a federation chain. Taking a public link as an example, a client running on an electronic device (e.g., a user terminal and a server) of any service agent can access the blockchain network 200 without authorization; taking a federation chain as an example, a client operated by an electronic device (e.g., a terminal/server) under the jurisdiction of a service entity after obtaining authorization may access the blockchain network 200, and at this time, the service entity becomes a special node in the blockchain network 200, i.e., a client node.
note that the client node may provide only functionality that supports the initiation of transactions by the business entity (e.g., for uplink storage of data or for querying of data on the chain), and may be implemented by default or selectively (e.g., depending on the specific business requirements of the business entity) for the functionality of the conventional (native) node 210 of the blockchain network 200, such as the ranking functionality, consensus services, ledger functionality, etc., described below. Therefore, the data and the service processing logic of the service subject can be migrated into the block chain network 200 to the maximum extent, and the credibility and traceability of the data and service processing process are realized through the block chain network 200.
Blockchain network 200 receives a submitted transaction from a business entity (e.g., trusted law enforcement backend 300 shown in fig. 1), executes the transaction to update or query the ledger, and displays various intermediate or final results of the executed transaction in a user interface of the client.
An exemplary application of the blockchain network is described below with an example of a service agent accessing the blockchain network to implement traffic management.
referring to fig. 1, trusted law enforcement back office 300 may access blockchain network 200 after authorization is obtained. The user registers identity information through the client 400, and the identity information of the user is sent to the trusted law enforcement background 300; the trusted law enforcement backend 300 verifies the identity information of the user, and after the verification is passed, the trusted law enforcement backend 300 generates a transaction corresponding to the updating operation/the query operation according to the identity information of the user/the identity information query request of the user, an intelligent contract required to be called for realizing the updating operation/the query operation and parameters transmitted to the intelligent contract are specified in the transaction, the transaction also carries a digital signature signed by the trusted law enforcement backend 300 (for example, a summary of the transaction is encrypted by using a private key in a digital certificate of the trusted law enforcement backend 300), and the transaction is broadcasted to the blockchain network 200.
when the node 210 in the blockchain network 200 receives the transaction, the digital signature carried by the transaction is verified, after the digital signature is successfully verified, whether the trusted law enforcement background 300 has the transaction authority is determined according to the identity information of the trusted law enforcement background 300 carried in the transaction, and the transaction failure is caused by the verification failure of any one of the digital signature and the authority verification. After successful verification, node 210 signs its own digital signature (e.g., by encrypting the digest of the transaction using the private key of node 210-1) and continues to broadcast in blockchain network 200.
After the node 210 with the sorting function in the blockchain network 200 receives the transaction successfully verified, the transaction is filled into a new block and broadcasted to the node providing the consensus service in the blockchain network 200.
The node 210 providing the consensus service in the blockchain network 200 performs the consensus process of verifying the new block to reach agreement, the node 210 providing the ledger function appends the new block to the tail of the blockchain, and performs the transaction in the new block: for the transaction of submitting the updated user identity information, updating the key value pair corresponding to the user identity information in the state database; and for the transaction of inquiring the identity information of the user, inquiring the key value pair corresponding to the identity information of the user from the state database, and returning an inquiry result.
then, the user uploads the traffic information to the trusted law enforcement background 300 through the client 400, the trusted law enforcement background 300 authenticates the user submitting the traffic information according to the identity information stored in the blockchain network 200, and performs traffic violation verification on the traffic information submitted by the authenticated user to obtain a verification result of the traffic information. The trusted law enforcement background 300 generates a transaction corresponding to the updating operation/the query operation according to the traffic information/the traffic information query request and the audit information/the audit information query request, specifies an intelligent contract required to be called for realizing the updating operation/the query operation and parameters transmitted to the intelligent contract in the transaction, carries a digital signature signed by the trusted law enforcement background 300, and broadcasts the transaction to the blockchain network 200.
When the node 210 in the blockchain network 200 receives the transaction, the digital signature carried by the transaction is verified, after the digital signature is successfully verified, whether the trusted law enforcement background 300 has the transaction authority is determined according to the identity information of the trusted law enforcement background 300 carried in the transaction, and the transaction failure is caused by the verification failure of any one of the digital signature and the authority verification. After successful verification, node 210 signs its own digital signature (e.g., by encrypting the digest of the transaction using the private key of node 210-1) and continues to broadcast in blockchain network 200.
After the node 210 with the sorting function in the blockchain network 200 receives the transaction successfully verified, the transaction is filled into a new block and broadcasted to the node providing the consensus service in the blockchain network 200.
the node 210 providing the consensus service in the blockchain network 200 performs the consensus process on the new block to reach an agreement, the node 210 providing the ledger function appends the new block to the tail of the blockchain, and performs the transaction in the new block: updating key value pairs corresponding to the traffic information/audit results in the account book database for the transaction of submitting the updated traffic information/audit results; and for the transaction of inquiring the traffic information/the checking result, inquiring the key value pair corresponding to the traffic information/the checking result from the account book database, and returning the inquiring result.
the trusted law enforcement background 300 receives a transaction identifier which is returned by the blockchain network 200 and stores the identity information of the user; and associating the transaction identifier of the identity information of the user with the corresponding auditing result, and returning the auditing result to the corresponding user through the client 400.
It is understood that the type of data that can be queried/updated by the service entity in the blockchain network 200 may be implemented by restricting the authority of the transaction that can be initiated by the service entity, for example, when the trusted law enforcement backend 300 has the authority to initiate the transaction for querying traffic information, the user may send a violation query request to the trusted law enforcement backend 300 through the client 410, and generate a transaction broadcast for querying the violation request by the trusted law enforcement backend 300 into the blockchain network 200, so as to obtain corresponding traffic information from the blockchain network 200.
as an example, the client 400 and the client 410 described above may have both a function of uploading traffic information and a function of querying a violation record; the client 400 and the client 410 may also be clients with different functions, for example, the client 400 has a function of uploading traffic information, and the client 410 has a function of querying violation records).
An exemplary functional architecture of a block chain network provided in an embodiment of the present invention is described below, referring to fig. 2, fig. 2 is a functional architecture schematic diagram of a block chain network 200 provided in an embodiment of the present invention, which includes an application layer 201, a consensus layer 202, a network layer 203, a data layer 204, and a resource layer 205, which are described below respectively.
The resource layer 205 encapsulates computing, storage, and communication resources that implement each node 210 in the blockchain network 200, such as computing, storage, and communication resources in computers, servers/clusters, and clouds, abstracts and provides a uniform interface to the data layer 204 to shield the underlying hardware implementing the resource layer 205 from differences.
The computing resources include various forms of processors such as a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), and a Field-Programmable Gate Array (FPGA).
the storage resources include various types of storage media such as various volatile memories and nonvolatile memories. The nonvolatile Memory may be a Read Only Memory (ROM) or a Programmable Read-Only Memory (PROM). Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory.
The communication resources include various links for communication between nodes 210 of the blockchain network, between the blockchain network 200 and the traffic master.
The data layer 204 encapsulates various data structures that implement the ledger, including blockchains implemented in files in a file system, state databases of the key-value type, and presence certificates (e.g., hash trees of transactions in blocks).
The network layer 203 encapsulates the functions of a Point-to-Point (P2P) network protocol, a data propagation mechanism and a data verification mechanism, an access authentication mechanism and service agent identity management.
Wherein the P2P network protocol implements communication between nodes 210 in the blockchain network 200, the data propagation mechanism ensures propagation of transactions in the blockchain network 200, and the data verification mechanism implements reliability of data transmission between nodes 210 based on cryptography methods (e.g., digital certificates, digital signatures, public/private key pairs); the access authentication mechanism is used for authenticating the identity of the service subject added into the block chain network 200 according to an actual service scene, and endowing the service subject with the authority of accessing the block chain network 200 when the authentication is passed; the business entity identity management is used to store the identity of the business entity that is allowed to access blockchain network 200, as well as the permissions (e.g., the types of transactions that can be initiated).
The consensus layer 202 encapsulates the functions of the mechanism for the nodes 210 in the blockchain network 200 to agree on a block (i.e., a consensus mechanism), transaction management, and ledger management.
The consensus mechanism comprises consensus algorithms such as POS, POW and DPOS, and the pluggable consensus algorithm is supported.
The transaction management is configured to verify a digital signature carried in the transaction received by the node 210, verify identity information of the service entity, and determine whether the node has an authority to perform the transaction (read related information from the identity management of the service entity) according to the identity information; for the service agents authorized to access the blockchain network 200, the service agents all have digital certificates issued by the certificate authority, and the service agents sign the submitted transactions by using private keys in the digital certificates of the service agents, so that the legal identities of the service agents are declared.
Account book management: for maintaining blockchains and state databases. For the block with the consensus, adding the block to the tail of the block chain; and executing the transaction in the acquired consensus block, updating the key-value pairs in the state database when the transaction comprises an updating operation, inquiring the key-value pairs in the state database when the transaction comprises an inquiring operation, and returning an inquiring result to the business body. Supporting query operations for multiple dimensions of a state database, comprising: querying the chunk based on the chunk sequence number (e.g., hash value of the transaction); inquiring the block according to the block hash value; inquiring a block according to the transaction serial number; inquiring the transaction according to the transaction serial number; inquiring account data of a business main body according to an account (serial number) of the business main body; and inquiring the block chain in the channel according to the channel name.
The application layer 201 encapsulates various services that the blockchain network can implement, including tracing, crediting, and verifying transactions.
An exemplary structure of a blockchain management platform provided by the embodiment of the present invention is described below, referring to fig. 3, fig. 3 is a schematic structural diagram of a trusted law enforcement backend 300 for traffic management provided by the embodiment of the present invention, where the trusted law enforcement backend 300 shown in fig. 3 includes: at least one processor 310, memory 350, and at least one network interface 320 and user interface 330. The various components in the trusted law enforcement back office 300 are coupled together by a bus system 340. It will be appreciated that the bus system 340 is used to enable communications among the components connected. The bus system 340 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 340 in fig. 3.
The Processor 310 may be an integrated circuit chip having Signal processing capabilities, such as a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like, wherein the general purpose Processor may be a microprocessor or any conventional Processor, or the like.
The memory 350 may be removable, non-removable, or a combination thereof. Exemplary hardware devices include solid state memory, hard disk drives, optical disk drives, and the like. Memory 350 optionally includes one or more storage devices physically located remote from processor 310.
The memory 350 may include either volatile memory or nonvolatile memory, and may also include both volatile and nonvolatile memory. The nonvolatile memory may be a Read Only Memory (ROM), and the volatile memory may be a Random Access Memory (RAM). The memory 350 described in embodiments of the invention is intended to comprise any suitable type of memory.
In some embodiments, memory 350 is capable of storing data, examples of which include programs, modules, and data structures, or subsets or supersets thereof, as exemplified below, to support various operations.
An operating system 351 including system programs for processing various basic system services and performing hardware-related tasks, such as a framework layer, a core library layer, a driver layer, etc., for implementing various basic services and processing hardware-based tasks;
a network communication module 352 for communicating to other computing devices via one or more (wired or wireless) network interfaces 420, exemplary network interfaces 420 including: bluetooth, wireless compatibility authentication (WiFi), and Universal Serial Bus (USB), etc.;
a presentation module 353 for enabling presentation of information (e.g., a user interface for operating peripherals and displaying content and information) via one or more output devices 331 (e.g., a display screen, speakers, etc.) associated with the user interface 330;
An input processing module 354 for detecting one or more user inputs or interactions from one of the one or more input devices 332 and translating the detected inputs or interactions.
In some embodiments, the traffic management device based on the blockchain network provided by the embodiment of the present invention may be implemented in a software manner, and fig. 3 illustrates a traffic management device 355 based on the blockchain network, which may be a software in the form of a program, a plug-in, and the like, stored in the memory 350, and includes the following software modules: the identity authentication module 3551, the traffic authentication module 3552, the audit module 3553, the association module 3554, and the return module 3555 are logical and thus may be arbitrarily combined or further separated depending on the functionality implemented. The functions of the respective modules will be explained below.
In other embodiments, the traffic management Device based on the blockchain network according to embodiments of the present invention may be implemented In hardware, for example, the traffic management Device based on the blockchain network according to embodiments of the present invention may be a processor In the form of a hardware decoding processor, which is programmed to perform the traffic management method based on the blockchain network according to embodiments of the present invention, for example, the processor In the form of the hardware decoding processor may employ one or more Application Specific Integrated Circuits (ASICs), DSPs, Programmable Logic Devices (PLDs), Complex Programmable Logic Devices (CPLDs), Field Programmable Gate Arrays (FPGAs), or other electronic elements.
The following describes an embodiment of the present invention in further detail with reference to the accompanying drawings. Referring to fig. 4, fig. 4 is a flowchart illustrating a traffic management method based on a blockchain network according to an embodiment of the present invention, and will be described with reference to the steps shown in fig. 4.
In step S101, the trusted law enforcement background receives identity information of a user sent by a client.
In some embodiments, the user registers personal identity information in the client, and the trusted law enforcement back office receives the identity information of the user sent by the client, wherein the identity information of the user may include: name, resident identification number, mobile phone number, home address, vehicle identification belonging to the user, face information of the user and the like.
In step S102, the trusted law enforcement back office authenticates the identity information of the user.
In some embodiments, the trusted law enforcement back office may invoke an interface of an authentication function (e.g., a household authority) to verify the identity information of the user.
as an example, the trusted law enforcement back office 300 may invoke an interface of a household management department, which verifies the identity information by querying the identity information of the user stored by the household management department, for example: and verifying whether the name uploaded by the user corresponds to the resident identification number one by one, and when the name uploaded by the user corresponds to the resident identification number, the trusted law enforcement background 300 can obtain the confirmation that the authentication is passed from the interface of the household registration management department.
In step S103, the trusted law enforcement back office stores the identity information of the user in the blockchain network after the authentication is passed.
In some embodiments, the blockchain network is a public chain, and before step S102, the trusted law enforcement back office may directly access the blockchain network, and the trusted law enforcement back office may freely participate in reading and writing data on the chain.
In other embodiments, the blockchain network is a federation chain, and before step S102, the trusted law enforcement back office requests access to the blockchain network, and receives a digital certificate assigned by the blockchain network to the trusted law enforcement back office, where the digital certificate is used to sign a digital signature with identity information for a user to be sent, so as to declare the identity information of the trusted law enforcement back office to the blockchain network.
as an example, the trusted law enforcement back office 300 generates a key pair by itself, where the key pair includes a public key and a private key, and sends the generated public key to the blockchain network 200, so that a node in the blockchain network 200 having a Certificate Authority (CA) function, that is, the CA node, sends a digital Certificate including the public key to the trusted law enforcement back office 300, where the digital Certificate carries a digital signature signed by the CA node for the public key and the identity information of the trusted law enforcement back office 300, and the digital signature is obtained by the CA node by encrypting with its private key, the public key of the trusted law enforcement back office 300, and the identity information. When the trusted law enforcement background 300 subsequently sends identity information to the blockchain network 200, the trusted law enforcement background carries the digital certificate issued by the CA node. For the digital signature of the information to be saved, after receiving the information, the nodes in the blockchain network 200 sequentially verify the digital certificate and the digital signature to determine the identity of the trusted law enforcement background 300 that sent the information to be saved and the reliability of the information to be saved. When the verification is successful, the information to be saved is saved in the blockchain network 200. When the authentication fails, a denial message (e.g., lack of authority) is returned to the trusted law enforcement back office 300, wherein the trusted law enforcement back office 300 may be a node belonging to a traffic authority (e.g., a traffic police center, a police department of provincial or prefectural municipality, etc.).
Of course, the above-mentioned CA node may also be replaced with a CA authority of a third party.
in some embodiments, the trusted law enforcement back office invokes an interface of an authentication function (e.g., a household management department) to authenticate the identity information of the user; when the interface is confirmed to pass the authentication, the hash value of the original data of the user identity or the original data representing the user identity is stored in the blockchain network.
In some embodiments, the trusted law enforcement back office sends the user identity information to a node belonging to the authentication function in the blockchain network, so that the node of the authentication function generates a new block based on the received user identity information, and when a consensus is obtained for authentication of the identity information in the new block (e.g., whether there is a record of a corresponding user, no traffic violation record, no bad credit record), the new block with the obtained consensus is added to the tail of the blockchain maintained by the node belonging to the authentication function. The nodes of the non-identity information verification functional mechanism in the blockchain network can synchronize blockchains only with the nodes of the traffic violation verification functional mechanism without participating in the node consensus process of the traffic violation verification functional mechanism. Therefore, the deployment cost of the non-identity information verification functional mechanism is reduced, and the network complexity is reduced.
In step S104, the trusted law enforcement back office receives the traffic information sent by the client.
In some embodiments, when the user finds that the vehicle has a traffic violation, the user may acquire traffic information through the client and send the traffic information to the trusted law enforcement background, where the traffic information may include data such as video, photos, or words.
As an example, when a user finds an illegal vehicle, such as illegal parking, reverse running, red light running, and the like, the user may use the client 400 to perform 360-degree shooting with reference to illegal shooting standards under the condition of ensuring the security of the user, the client 400 may automatically add information watermarks such as time and position to the shot video to ensure the legality/compliance of the shot video, and finally the user uploads the shot video to the trusted law enforcement background through the client.
In step S105, the trusted law enforcement back office authenticates the user submitting the traffic information according to the stored identity information in the blockchain network.
In some embodiments, the trusted law enforcement background acquires identity information of a user submitting traffic information, verifies the identity information of the user submitting the traffic information according to the identity information which is stored in the blockchain network and passes authentication, and passes authentication when the identity information of the user submitting the traffic information belongs to the identity information which is stored in the blockchain network and passes authentication; and when the identity information of the user submitting the traffic information does not belong to the stored identity information which passes the authentication in the blockchain network, the authentication does not pass.
The embodiment of the invention can ensure high reliability of the traffic information submitted by the user by authenticating the user submitting the traffic information, and can save auditing resources when the traffic information is audited for traffic violation in the follow-up process.
In step S106, the trusted law enforcement background performs a traffic violation audit on the traffic information submitted by the authenticated user, so as to obtain an audit result of the traffic information.
in some embodiments, the trusted law enforcement back office identifies vehicle identification, vehicle behavior, time information, and location information in the traffic information; when the vehicle behavior is determined to be not in accordance with the traffic regulations, generating an auditing result representing the violation of the traffic information based on the vehicle identification, the vehicle behavior, the information, the location information and the violation type; and when the vehicle behavior is determined to be in accordance with the traffic regulations, generating an auditing result representing that the traffic information is not violated based on the vehicle identification, the vehicle behavior, the information, the location information and the type of non-violation.
As an example, the trusted law enforcement back office 300 may extract information such as vehicle identification, vehicle behavior, time and location from traffic information submitted by authenticated users through artificial intelligence and deep image recognition technology. When the vehicle behavior does not conform to the traffic regulations (such as illegal parking, inverse traveling and red light running, and the like), generating an auditing result representing the violation of the traffic information; when the vehicle behavior conforms to the traffic regulations, an audit result is generated which indicates that the traffic information does not violate the regulations.
In step S107, the trusted law enforcement back office saves the traffic information and the audit result in the blockchain network.
In some embodiments, the hash value of the traffic information and the hash value of the audit result are determined, and the hash value of the traffic information and the hash value of the audit result are stored in the block chain network; or, storing the traffic information and the original data of the auditing result in the block chain network.
According to the embodiment of the invention, when the traffic information and the auditing result data volume are small, the original data of the traffic information and the original data of the auditing result are stored in the block chain network, so that the stored data can be conveniently read subsequently; when the traffic information and the audit result have large data volume, the hash value of the traffic information and the hash value of the audit result are stored in the block chain network, so that the storage space of the block chain network can be saved.
In some embodiments, the traffic information and the audit result are sent to a node belonging to a traffic violation audit function in the blockchain network, so that the node generates a new block based on the received traffic information and the audit result, and when a consensus is verified for the traffic information and the audit result in the new block, the consensus-obtained new block is added to the tail of the maintained blockchain. The nodes of the non-traffic violation auditing function mechanism in the blockchain network can synchronize blockchains only with the nodes of the identity information verification mechanism without participating in the node consensus process of the identity information verification mechanism. Therefore, the deployment cost of the non-traffic violation auditing functional mechanism is reduced, and the network complexity is reduced.
In step S108, the trusted law enforcement background associates the audit results with the corresponding identity information of the user respectively.
In some embodiments, the trusted law enforcement back office receives a transaction identifier, returned by the blockchain network, storing identity information of the user; and associating the transaction identification of the identity information of the user with the corresponding auditing result. The transaction identifier storing the identity information of the user may be a hash of a transaction in which the blockchain network stores the identity information of the user. For example, as shown in fig. 9C, there will be a hash of each corresponding transaction in the blockchain network, where the hash of the transaction is a character string composed of 64-bit characters and has uniqueness, for example: 0x28b87aa213f3a591bf8e8c05b3af3939e0e6219d204e5451e63c398a1f6b 2228.
In step S109, the trusted law enforcement back returns the audit result to the client of the corresponding user.
In some embodiments, the trusted law enforcement back office returns the audit result of the traffic information to the client of the corresponding user according to the information that the audit result is associated with the identity information of the corresponding user, and when the traffic information submitted by the user is audited as a traffic violation, the trusted law enforcement back office may send the audit result to the user and, at the same time, may send, to the user, a credit that can be redeemed for rights and interests from within the blockchain network or outside the blockchain network.
in some embodiments, in step S106, when the vehicle behavior does not conform to the traffic regulations (e.g., parking violation, backward traveling, running red light violation, etc.), and the trusted law enforcement back office generates an audit result representing the violation of the traffic information, the trusted law enforcement back office determines the vehicle identifier in the traffic information and invokes an interface of a traffic management department, and the traffic management department determines personal information (e.g., name, mobile phone number, identification number, etc.) of the vehicle owner corresponding to the vehicle identifier in the traffic information according to the vehicle identifier stored by the traffic management department. The credible law enforcement background can acquire the personal information of the owner of the illegal vehicle from the traffic management department, and then inform the owner of the payment of fine and other matters of the illegal vehicle through short messages or telephones according to the personal information of the owner. Moreover, the related payment record information of the vehicle owner may also be saved in the blockchain network, and the related payment record information saved in the blockchain network may be used as a reference of a credit investigation institution (for example, the credit investigation structure may be accessed in the blockchain network, and used as an observation node to acquire the related payment record information).
Taking the client 400 and the client 410 as different clients as an example to explain the process of querying the violation record, referring to fig. 5, fig. 5 is a flowchart of the traffic management method based on the blockchain network according to the embodiment of the present invention, and based on fig. 4, after step S109, steps S110 to S112 may be included.
in step S110, the trusted law enforcement back office responds to the violation query request.
By way of example, when a user sends a violation query request to trusted law enforcement backend 300 through client 410, the violation query request may include: identity information of the requesting user and/or a vehicle identification of the requesting user.
In step S111, the trusted law enforcement back office queries the traffic information stored in the blockchain network.
As an example, when the identity information of the requesting user is included in the violation query request, the trusted law enforcement backend 300 queries the traffic information corresponding to the identity information stored in the blockchain network 200 according to the identity information of the requesting user.
as an example, when the violation inquiry request includes the vehicle identifier to be inquired, the trusted law enforcement back office 300 inquires the traffic information of the corresponding vehicle identifier stored in the blockchain network 200 according to the vehicle identifier to be inquired.
In step S112, the trusted law enforcement back office returns the violation query result according to the queried traffic information.
As an example, the trusted law enforcement back office 300 sends queried traffic information to the corresponding client 410, where the queried traffic information includes information such as vehicle identification, vehicle behavior, time and place. When the user does not recognize the queried traffic information, the trusted law enforcement back office 300 can be applied for a review through the client 410. When a user applies for a review (without approval for the queried traffic information) to the trusted law enforcement background 300 through the client 410, the trusted law enforcement background 300 verifies the traffic information queried by the user for the review of the user, and re-audits the traffic information queried by the user, and if the audit result of the traffic information queried by the user changes, the trusted law enforcement platform 300 needs to re-submit the changed audit result to the blockchain network 200.
Referring to fig. 6, fig. 6 is a flowchart illustrating a traffic management method based on a blockchain network according to an embodiment of the present invention, and based on fig. 4, step S113 may be included after step S108.
In step S113, when the traffic information submitted by the user is checked as a traffic violation, the trusted law enforcement back office sends the user credits that can be redeemed for rights and interests from within the blockchain network or outside of the blockchain network.
As an example, when the traffic information submitted by the user is checked to be a traffic violation, the trusted law enforcement back office sends a credit (which may be a blockchain credit) that can be redeemed for rights and interests from the blockchain network to the user, wherein a node belonging to the credit exchange mechanism accesses the blockchain network, owns the observation node, and when the user submits the traffic information and the checking result is saved in the blockchain network, the credit exchange mechanism can query the information. When the user has redeemed an entitlement through the client to the points redemption mechanism, the points redemption mechanism may submit a transaction (an update operation that gives the user the points) to the blockchain network.
As an example, when the traffic information submitted by the user is reviewed as a traffic violation, the trusted law enforcement back office sends the user credits that can be redeemed for equity from outside the blockchain network. The block chain network does not include nodes belonging to the point exchange mechanism, and the point exchange mechanism cannot interact with the block chain network but can interact with a trusted law enforcement background. When the user has redeemed the equity to the points redemption mechanism through the client, the points redemption mechanism may send an instruction to the trusted law enforcement back office to reduce the user's points.
As an example, the user sends a point exchange request to a point exchange mechanism through the client, and the point exchange mechanism returns the user the benefits provided by the point exchange mechanism according to the points of the user, such as discount coupons, cash vouchers, tokens and the like, such as electronic coupons, commodity electronic exchange coupons and food electronic exchange coupons.
In the following, an exemplary application of the embodiments of the present invention in a practical application scenario will be described.
In the related technology, traffic management is mainly carried out by taking a snapshot of vehicles violating the road through a law enforcement snapshot camera and a traffic police, then uploading the vehicle violating the road to a traffic management department, and finally auditing violation information through manual registration.
However, the traffic management in the related art has several problems: firstly, the deployment cost is too high, the coverage area is limited, the snapshot can be carried out only at some traffic intersections, and the traffic violation occurrence rate cannot be well reduced. Secondly, the dependence on the network is too high, the network is easily influenced by environmental factors, and the phenomenon that the network cannot work normally occurs.
in view of the above problems, an embodiment of the present invention provides a traffic management method based on a block chain network, where citizens (i.e. the above-mentioned users) register and authenticate with real names on a client, and the client synchronizes with a national time service center in real time. When a vehicle violation behavior occurs, under the condition of ensuring the safety of the citizen, the citizen refers to the camera shooting standard through the mobile phone client, carries out 360-degree violation field camera shooting, extracts the data characteristics in the video through a technical means, and simultaneously records the occurrence time, space, position and other information in detail. And the illegal information (namely the traffic information) is subjected to uplink storage through a block chain technology, so that traceability and tamper resistance are realized.
Referring to fig. 7, fig. 7 is a schematic node diagram of a blockchain network in a traffic management system based on a blockchain network according to an embodiment of the present invention, which will be described in detail with reference to fig. 7.
According to different business scenes, a plurality of different accounts are supported, and the block chain nodes can be selected to join in a group according to business relations and participate in the data sharing and consensus process of the corresponding accounts. A mechanism A, B, C in fig. 7 represents a participant (e.g., a traffic police center, a police department, an operator or platform organization, etc.) in the traffic management system based on the blockchain network, and nodes (nodes 0 to 5 are exemplarily shown in fig. 7) may represent consensus nodes or observation nodes, wherein the consensus nodes may participate in data synchronization in the blockchain network, and the observation nodes can only inquire data in the blockchain network and cannot participate in data synchronization in the blockchain network. The consensus node and the observation node may be selected according to traffic requirements, for example: the node attributed to the traffic violation review function described above may be a consensus node.
Referring to fig. 8, fig. 8 is a schematic flowchart of a traffic management method based on a blockchain network according to an embodiment of the present invention. The description will be made in conjunction with the respective steps.
In step S201, a citizen (i.e., the user) inputs personal identity information on a trusted mobile phone client (i.e., the client 400), where the identity information includes information such as a real name, a gender, a mobile phone number, an identification number, a home address, and the like, and performs real-name authentication.
In step S202, the trusted mobile phone client uploads the information to the trusted law enforcement background for registration and storage.
In step S203, the trusted law enforcement background encrypts and uploads citizen information to be stored on the trusted block chain platform (i.e., the block chain network), so as to ensure that the privacy of the user is not leaked and ensure the security of the citizen privacy.
In step S204, when illegal vehicles, such as illegal parking and driving in the wrong direction, occur, and the citizen can ensure his own security, the trusted mobile phone client is turned on.
In step S205, citizens use the trusted mobile phone client to perform 360-degree shooting with reference to illegal shooting standards, and the trusted mobile phone client will automatically add information watermarks such as time and location to the shot video to ensure legal compliance of the shot video.
In step S206, the citizen uploads the captured video to the trusted law enforcement background through the trusted mobile phone client.
in step S207, the trusted law enforcement back office may extract information such as vehicle information, time, and location in the video through artificial intelligence and depth image recognition technology, and determine and confirm the violation of the vehicle.
In step S208, the trusted law enforcement background returns the result of the determination to the trusted mobile phone client of the citizen, and rewards the behavior of reporting the violation, such as points, so as to encourage the citizen to actively participate in the behavior of reporting the violation by the citizen, thereby improving the enthusiasm of citizen participation.
in step S209, the trusted law enforcement background uploads the determination result and the traffic information to the trusted block link platform for storage, so as to facilitate the retrenching of the illegal vehicle, and notifies the illegal vehicle of payment of fines and other items through a short message or a telephone.
Referring to fig. 9A, 9B, and 9C, fig. 9A, 9B, and 9C are schematic application scenarios of the transportation management method based on the blockchain network according to the embodiment of the present invention, where fig. 9A and 9B are display diagrams of a User Interface (UI) Interface of the trusted mobile phone client in fig. 8, and fig. 9C is a browsing diagram of transportation data of the blockchain network.
continuing with fig. 3, an exemplary structure of the blockchain network based traffic management device 355 implemented as software modules provided by the embodiment of the present invention is described, and in some embodiments, as shown in fig. 3, the software modules stored in the blockchain network based traffic management device 355 of the memory 350 may include: an identity authentication module 3551, a traffic authentication module 3552, an audit module 3553, an association module 3554, and a return module 3555.
the identity authentication module is used for receiving identity information of a user, authenticating the identity information and storing the identity information of the user in a block chain network after the authentication is passed;
the traffic authentication module is used for receiving traffic information and authenticating a user submitting the traffic information according to the identity information stored in the block chain network;
the auditing module is used for auditing the traffic violation of the traffic information submitted by the authenticated user to obtain an auditing result of the traffic information;
the association module is used for storing the traffic information and the audit result in the block chain network and associating the audit result with the corresponding identity information of the user respectively;
And the returning module is used for returning the auditing result to the client of the corresponding user.
In some embodiments, the identity authentication module is further configured to invoke an interface of an identity verification function to verify the identity information of the user; and when the interface obtains the confirmation that the authentication is passed, storing the hash value of the original data of the user identity or the original data representing the user identity in the blockchain network.
In some embodiments, the identity authentication module is further configured to send the user identity information to a node belonging to an identity information verification function in the blockchain network, so that the node generates a new block based on the received user identity information, and when a consensus is obtained through verification on the identity information in the new block, the new block with the consensus is added to the tail of the blockchain.
In some embodiments, the auditing module is further configured to identify vehicle identification, vehicle behavior, time information, and location information in the traffic information; when the vehicle behavior is determined to be not in accordance with the traffic regulations, generating an auditing result representing the traffic information violation based on the vehicle identification, the vehicle behavior, the information, the location information and the violation type; when the vehicle behavior is determined to be in accordance with the traffic regulations, generating an audit result representing that the traffic information is not violated based on the vehicle identification, the vehicle behavior, the information, the location information, and the type of non-violation.
In some embodiments, the association module is further configured to determine a hash value of the traffic information and a hash value of the audit result, and store the hash value of the traffic information and the hash value of the audit result in a blockchain network; or storing the traffic information and the original data of the auditing result in the block chain network.
In some embodiments, the association module is further configured to send the traffic information and the audit result to a node belonging to a traffic violation audit function in the blockchain network, so that the node generates a new block based on the received traffic information and the audit result, and when a consensus is verified for the traffic information and the audit result in the new block, add the new block with the consensus to the tail of the blockchain.
In some embodiments, the association module is further configured to receive a transaction identifier returned by the blockchain network and storing the identity information of the user; and associating the transaction identification of the identity information of the user with the corresponding auditing result.
In some embodiments, the apparatus further comprises a violation query module to respond to a violation query request, wherein the violation query request includes identity information of a requesting user; inquiring traffic information corresponding to the identity information stored in the block chain network according to the identity information of the requesting user; returning a violation query result according to the queried traffic information; or responding to a violation query request, wherein the violation query request comprises a vehicle identifier to be queried; inquiring traffic information of the corresponding vehicle identification stored in the block chain network according to the vehicle identification to be inquired; and returning a violation query result according to the queried traffic information.
in some embodiments, the apparatus further comprises a credit sending module, configured to send credits that can be redeemed for equity from within the blockchain network or outside of the blockchain network to the user when the traffic information submitted by the user is approved as a traffic violation, so that the user redeems virtual assets according to the obtained credits.
It should be noted that, for inexhaustible technical details in the traffic management device based on the blockchain network provided by the embodiment of the present invention, the explanation of any one of the drawings in fig. 4 to 9 can be understood.
Embodiments of the present invention provide a storage medium storing executable instructions, where the executable instructions are stored, and when executed by a processor, will cause the processor to execute a traffic management method based on a blockchain network according to an embodiment of the present invention, for example, the traffic management method based on a blockchain network as shown in any one of fig. 4 to 6.
in some embodiments, the storage medium may be memory such as FRAM, ROM, PROM, EPROM, EEPROM, flash memory, magnetic surface memory, optical disk, or CD-ROM; or may be various devices including one or any combination of the above memories.
In some embodiments, executable instructions may be written in any form of programming language (including compiled or interpreted languages), in the form of programs, software modules, scripts or code, and may be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
By way of example, executable instructions may correspond, but do not necessarily have to correspond, to files in a file system, may be stored in a portion of a file that holds other programs or data, e.g., in one or more scripts in a HyperText markup Language (H TML) document, in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub-programs, or portions of code).
By way of example, executable instructions may be deployed to be executed on one computing device or on multiple computing devices at one site or distributed across multiple sites and interconnected by a communication network.
In summary, in view of the above problems, the embodiments provided in the present invention have the following advantages:
1) By storing the identity information of the user, the traffic information and the auditing result of the traffic information, which are related in the traffic management process, into the blockchain network, and based on the characteristics of decentralized, distributed storage and non-falsification of the blockchain network, the whole process of traffic violation can be traced according to the information stored in the blockchain network, the violation of the violation vehicle is guaranteed to be real, the legal effect is achieved, the traffic enforcement coverage area is wide, the deployment cost is reduced, and the occurrence rate of the traffic violation is reduced.
2) By authenticating the user submitting the traffic information, the reliability of the traffic information submitted by the user can be ensured to be high, and the auditing resources can be saved when traffic violation auditing is carried out on the traffic information in the follow-up process.
3) All data are oriented to all participants, and the possibility of official dark box operation is avoided.
4) A credible platform is provided, so that the illegal behavior of the illegal vehicle can be guaranteed to be real and have legal effectiveness.
5) The citizen can participate in the report as a traffic participant at the same time, and the traffic safety awareness of the citizen can be greatly improved. And the traffic risk is reduced.
6) The cost of the traffic department for the violation is reduced.
The above description is only an example of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, and improvement made within the spirit and scope of the present invention are included in the protection scope of the present invention.

Claims (10)

1. A traffic management method based on a block chain network is characterized by comprising the following steps:
Receiving identity information of a user, authenticating the identity information, and storing the identity information of the user in a block chain network after the authentication is passed;
Receiving traffic information, and authenticating a user submitting the traffic information according to the identity information stored in the block chain network;
carrying out traffic violation examination on the traffic information submitted by the authenticated user to obtain an examination result of the traffic information;
Storing the traffic information and the auditing results in the block chain network, and associating the auditing results with the corresponding user identity information respectively;
and returning the auditing result to the client of the corresponding user.
2. The method of claim 1, wherein the authenticating the identity information comprises:
Calling an interface of an identity authentication function mechanism to authenticate the identity information of the user;
The step of storing the identity information of the user in the blockchain network after the authentication is passed includes:
and when the interface obtains the confirmation that the authentication is passed, storing the hash value of the original data of the user identity or the original data representing the user identity in the blockchain network.
3. the method according to claim 1 or 2, wherein the storing the identity information of the user in a blockchain network comprises:
Sending the user identity information to a node belonging to an identity information verification function mechanism in the block chain network so as to enable the user identity information to be transmitted to the node
The node generates a new block based on the received user identity information, and when identity information in the new block is verified to obtain consensus, the new block with the consensus is added to the tail of the block chain.
4. The method according to claim 1 or 2, wherein the performing a traffic violation review on the traffic information submitted by the authenticated user to obtain a review result of the traffic information comprises:
Identifying vehicle identification, vehicle behavior, time information and location information in the traffic information;
When the vehicle behavior is determined to be not in accordance with the traffic regulations, generating an auditing result representing the traffic information violation based on the vehicle identification, the vehicle behavior, the information, the location information and the violation type;
And when the vehicle behavior is determined to be in accordance with the traffic regulations, generating an auditing result representing that the traffic information is not violated based on the vehicle identification, the vehicle behavior, the information, the location information and the non-violated information.
5. The method of claim 1, wherein the saving the traffic information and the audit result in the blockchain network comprises:
determining the hash value of the traffic information and the hash value of the audit result, and storing the hash value of the traffic information and the hash value of the audit result in a block chain network; alternatively, the first and second electrodes may be,
and storing the traffic information and the original data of the auditing result in the block chain network.
6. the method according to claim 1, 2 or 5, wherein the saving the traffic information and the audit result in the blockchain network comprises:
Sending the traffic information and the auditing result to a node belonging to a traffic violation auditing functional organization in the block chain network so as to enable the node to be used for auditing the traffic violation functional organization
The node generates a new block based on the received traffic information and the audit result, and when a consensus is verified for the traffic information and the audit result in the new block, the new block with the consensus is added to the tail of the block chain.
7. The method according to claim 1, 2 or 5, wherein the associating the respective audit results with the identity information of the corresponding users comprises:
Receiving a transaction identifier which is returned by the blockchain network and corresponds to the identity information of the user;
And associating the transaction identification of the identity information of the user with the corresponding auditing result.
8. The method of claim 1, 2 or 5, further comprising:
Responding to a violation query request, and querying traffic information corresponding to identity information stored in the block chain network according to the identity information included in the violation query request; returning a violation query result according to the queried traffic information;
Alternatively, the first and second electrodes may be,
Responding to a violation query request, and querying traffic information of a corresponding vehicle identifier stored in the block chain network according to the vehicle identifier to be queried, which is included in the violation query request; and returning a violation query result according to the queried traffic information.
9. The method of claim 1, 2 or 5, further comprising:
when the traffic information submitted by the user through the client is checked as a traffic violation, sending a credit to the client of the user, wherein the credit can be exchanged from the block chain network or the outside of the block chain network, so that the credit can be exchanged to the client of the user, and the client can be used for processing the credit
And the client of the user exchanges the rights and interests according to the obtained points.
10. a blockchain network-based traffic management apparatus, the apparatus comprising:
The identity authentication module is used for receiving identity information of a user, authenticating the identity information and storing the identity information of the user in a block chain network after the authentication is passed;
the traffic authentication module is used for receiving traffic information and authenticating a user submitting the traffic information according to the identity information stored in the block chain network;
The auditing module is used for auditing the traffic violation of the traffic information submitted by the authenticated user to obtain an auditing result of the traffic information;
the association module is used for storing the traffic information and the audit result in the block chain network and associating the audit result with the corresponding identity information of the user respectively;
And the returning module is used for returning the auditing result to the client of the corresponding user.
CN201910854912.8A 2019-09-10 2019-09-10 traffic management method and device based on block chain network Pending CN110569643A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910854912.8A CN110569643A (en) 2019-09-10 2019-09-10 traffic management method and device based on block chain network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910854912.8A CN110569643A (en) 2019-09-10 2019-09-10 traffic management method and device based on block chain network

Publications (1)

Publication Number Publication Date
CN110569643A true CN110569643A (en) 2019-12-13

Family

ID=68778991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910854912.8A Pending CN110569643A (en) 2019-09-10 2019-09-10 traffic management method and device based on block chain network

Country Status (1)

Country Link
CN (1) CN110569643A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111241592A (en) * 2019-12-30 2020-06-05 航天信息股份有限公司 Business registration method and system based on block chain technology
CN111652630A (en) * 2020-05-29 2020-09-11 北京瑞华赢科技发展有限公司 System and method for verifying validity of electronic waybill of bus
CN111985733A (en) * 2020-09-10 2020-11-24 湖北蔚蓝通用航空科技股份有限公司 Pilot skill full life cycle management system based on block chain
CN112364020A (en) * 2020-11-04 2021-02-12 中国银联股份有限公司 Data storage method and alliance chain system
CN112491829A (en) * 2020-11-13 2021-03-12 中移雄安信息通信科技有限公司 MEC platform identity authentication method and device based on 5G core network and block chain
CN112802340A (en) * 2020-12-31 2021-05-14 深圳云天励飞技术股份有限公司 Vehicle driving data processing method and system and related device
CN113538180A (en) * 2021-07-16 2021-10-22 广州好易电子联行服务有限公司 Management platform for processing traffic violation information and management method thereof
CN113591137A (en) * 2021-09-29 2021-11-02 深圳时空云科技有限公司 Block chain-based management method and device
CN114900321A (en) * 2022-07-14 2022-08-12 云上人和物联科技有限公司 Autonomous real-name electronic identity certificate generation system and method

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111241592A (en) * 2019-12-30 2020-06-05 航天信息股份有限公司 Business registration method and system based on block chain technology
CN111652630A (en) * 2020-05-29 2020-09-11 北京瑞华赢科技发展有限公司 System and method for verifying validity of electronic waybill of bus
CN111985733B (en) * 2020-09-10 2021-05-25 湖北蔚蓝通用航空科技股份有限公司 Pilot skill full life cycle management system based on block chain
CN111985733A (en) * 2020-09-10 2020-11-24 湖北蔚蓝通用航空科技股份有限公司 Pilot skill full life cycle management system based on block chain
CN112364020A (en) * 2020-11-04 2021-02-12 中国银联股份有限公司 Data storage method and alliance chain system
CN112364020B (en) * 2020-11-04 2024-03-22 中国银联股份有限公司 Data storage method and alliance chain system
CN112491829A (en) * 2020-11-13 2021-03-12 中移雄安信息通信科技有限公司 MEC platform identity authentication method and device based on 5G core network and block chain
CN112491829B (en) * 2020-11-13 2023-04-28 中移雄安信息通信科技有限公司 MEC platform identity authentication method and device based on 5G core network and blockchain
CN112802340A (en) * 2020-12-31 2021-05-14 深圳云天励飞技术股份有限公司 Vehicle driving data processing method and system and related device
CN113538180A (en) * 2021-07-16 2021-10-22 广州好易电子联行服务有限公司 Management platform for processing traffic violation information and management method thereof
CN113591137A (en) * 2021-09-29 2021-11-02 深圳时空云科技有限公司 Block chain-based management method and device
CN114900321A (en) * 2022-07-14 2022-08-12 云上人和物联科技有限公司 Autonomous real-name electronic identity certificate generation system and method
CN114900321B (en) * 2022-07-14 2022-10-14 云上人和物联科技有限公司 Autonomous real-name electronic identity certificate generation system and method

Similar Documents

Publication Publication Date Title
CN110569643A (en) traffic management method and device based on block chain network
CN110532323B (en) Student identity information processing method and device in block chain network, electronic equipment and storage medium
US11496312B2 (en) Collecting surveys with secure identities via a blockchain
CN108650270B (en) Data sharing method and system based on alliance chain and incentive mechanism
CN109478298B (en) Method and system for realizing block chain
CN110599213B (en) Article management method and device based on blockchain network and electronic equipment
CN110597832A (en) Government affair information processing method and device based on block chain network, electronic equipment and storage medium
CN110569674A (en) Block chain network-based authentication method and device
CN110516474A (en) User information processing method, device, electronic equipment and storage medium in block chain network
CN110598434B (en) House information processing method and device based on blockchain network, electronic equipment and storage medium
TWI746399B (en) Information reading and writing method and device based on blockchain
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
CN110599697A (en) Vehicle sharing method, device and equipment based on block chain and storage medium
CN113256297B (en) Data processing method, device and equipment based on block chain and readable storage medium
WO2023005838A1 (en) Data sharing method and electronic device
CN110597908A (en) Credit investigation recording method, device and storage medium based on block chain
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN114207613A (en) Techniques for an energized intrusion detection system
CN111311259A (en) Bill processing method, device, terminal and computer readable storage medium
CN112600830B (en) Service data processing method and device, electronic equipment and storage medium
Klopfenstein et al. " Worth one minute": An anonymous rewarding platform for crowd-sensing systems
CN113779637B (en) Attribute data processing method, attribute data processing device, attribute data processing equipment and attribute data processing medium
CN111178896B (en) Bus taking payment method, device and storage medium
US11782823B2 (en) Automatically capturing weather data during engineering tests
CN111062497A (en) Property management method, platform and storage medium based on block chain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination