CN113392942A - Information verification method based on block chain, server and article node - Google Patents

Information verification method based on block chain, server and article node Download PDF

Info

Publication number
CN113392942A
CN113392942A CN202110577399.XA CN202110577399A CN113392942A CN 113392942 A CN113392942 A CN 113392942A CN 202110577399 A CN202110577399 A CN 202110577399A CN 113392942 A CN113392942 A CN 113392942A
Authority
CN
China
Prior art keywords
information
article
logistics data
server
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110577399.XA
Other languages
Chinese (zh)
Inventor
张勋
贾捷
张呈宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202110577399.XA priority Critical patent/CN113392942A/en
Publication of CN113392942A publication Critical patent/CN113392942A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The disclosure provides an information verification method, a server and an article node based on a block chain, which are applied to the server in the block chain, wherein the method comprises the following steps: receiving a service request sent by a service platform to the server, and acquiring an article identifier in the service request; acquiring pre-stored logistics data corresponding to the article identification; calculating first information according to the article identification and the logistics data; acquiring a pre-stored block number corresponding to the article identifier, and acquiring second information corresponding to the block number in a block chain; and determining whether the article identification and/or the logistics data are tampered or not according to the first information and the second information. The block chain is applied to the data acquisition process in the logistics link, so that the logistics data and the article identification are prevented from being falsified by counterfeit pirates, factories and internal management supervisors. And the block chain is used for storing and recording data, the storage, processing and transmission capabilities are not limited, and the architecture is simple.

Description

Information verification method based on block chain, server and article node
Technical Field
The disclosure belongs to the technical field of block chains, and particularly relates to an information verification method based on a block chain, a server and an article node.
Background
At the present stage, when an article works, generated data need to be transmitted to a related database or stored, and then the data are analyzed and used, so that firstly, the data are used for collecting user habits, and secondly, copyright protection is performed on a factory agent and a storage and sale link, and the authorized copyright products are prevented from being counterfeited and cracked by pirates.
But are limited by server resources, power consumption and processing capabilities, and transportation of energy provided by rechargeable batteries, sales of sensor nodes, and both storage, processing, and transmission capabilities. And the time span of the sensing data is large, so that a data encryption system requiring complex calculation and resource consumption is not suitable for a wireless sensing network. Architectures and algorithms that have particularly high performance and capacity requirements are also difficult to implement.
And secondly, the logistics data and the article identification collected in the production, transportation, sale and other links of the article can be artificially tampered and damaged. Once technical loopholes exist, the problems of technical imitation, package drop, networking cracking and the like are caused, the copyright authenticity of the building blocks cannot be verified even if a detection platform exists, and meanwhile, due to the fact that the articles are produced, transported and sold, especially under the condition that after-sales personnel, production manufacturers and agent personnel with system management authority possibly participate in counterfeiting or data addition/deletion in a centralized article industrial chain network, the logistics data and the authenticity of article identification collected in the links of article operation production, transportation, sales and the like are difficult to guarantee only by adopting traditional data protection technologies such as digital watermarks, digital signatures and the like.
Disclosure of Invention
In order to overcome the above defects in the prior art, the present disclosure provides an information verification method based on a block chain, a server, and an article node.
As a first aspect of the present disclosure, there is provided an information verification method based on a blockchain, applied to a server in the blockchain, including:
receiving a service request sent by a service platform to the server, and acquiring an article identifier in the service request;
acquiring pre-stored logistics data corresponding to the article identification;
calculating first information according to the article identification and the logistics data;
acquiring a pre-stored block number corresponding to the article identifier, and acquiring second information corresponding to the block number in a block chain;
and determining whether the article identification and/or the logistics data are tampered or not according to the first information and the second information.
Preferably, the determining whether the article identifier and/or the logistics data is tampered according to the first information and the second information includes:
in response to determining that the first information is consistent with the second information, determining that neither the item identifier nor the logistics data has been tampered with;
in response to determining that the first information is inconsistent with the second information, determining that the item identification and/or the item data is tampered.
Preferably, the calculating the first information according to the article identifier and the logistics data includes:
converting the article identifier into third information in a character format;
and calculating the first information according to the third information and the logistics data.
Preferably, the service request further includes an authentication parameter, and after receiving the service request sent by the service platform to the server, the method further includes:
acquiring an authentication parameter in the service request;
and sending a service use permission message to the service platform in response to that the authentication of the authentication parameters is passed according to the authentication information of the article stored in advance by the server and that the article identification and the logistics data are not tampered.
As a second aspect of the present disclosure, there is provided a block chain-based information verification method applied to an item node in a block chain, the method including:
acquiring logistics data of the article node and an article identifier of the article node;
calculating second information according to the article identification and the logistics data;
broadcasting the second information in a block chain and generating a new block including the second information;
acquiring the block number of the new block;
and sending the logistics data, the block number and the article identification to a server node in a block chain, so that the server node is stored locally.
Preferably, the calculating the second information according to the article identifier and the logistics data includes:
converting the article identifier into fourth information in a character format;
and calculating the second information according to the fourth information and the logistics data.
As a third aspect of the present disclosure, there is provided a server applied to a server in a blockchain, including:
the receiving module is used for receiving a service request sent to the server by the service platform;
the first acquisition module is used for acquiring the article identifier in the service request;
the second acquisition module is used for acquiring pre-stored logistics data corresponding to the article identifier;
the calculation module is used for calculating first information according to the article identification and the logistics data;
the third acquisition module is used for acquiring a pre-stored block number corresponding to the article identifier;
a fourth obtaining module, configured to obtain, in a block chain, second information corresponding to the block number;
and the determining module is used for determining whether the article identification and/or the logistics data are tampered or not according to the first information and the second information.
Preferably, the determining module is specifically configured to:
in response to determining that the first information is consistent with the second information, determining that neither the item identifier nor the logistics data has been tampered with;
in response to determining that the first information is inconsistent with the second information, determining that the item identification and/or the item data is tampered.
Preferably, the calculation module is specifically configured to:
converting the article identifier into third information in a character format;
and calculating the first information according to the third information and the logistics data.
Preferably, the service request further includes an authentication parameter, further including:
a fifth obtaining module, configured to obtain an authentication parameter in the service request;
and the sending module is used for responding to the authentication of the authentication parameters according to the authentication information of the article prestored by the server and determining that the article identification and the logistics data are not tampered, and sending a message of allowing the use of service to the service platform.
As a fourth aspect of the present disclosure, there is provided an article node applied to an article node in a block chain, the apparatus including:
the first acquisition module is used for acquiring the logistics data of the article node and the article identifier of the article node;
the calculation module is used for calculating second information according to the article identification and the logistics data;
a broadcasting module for broadcasting the second information in a block chain and generating a new block including the second information;
the second acquisition module is used for acquiring the block number of the new block;
and the sending module is used for sending the logistics data, the block number and the article identifier to a server node in a block chain so as to enable the server node to be stored locally.
Preferably, the calculation module is specifically configured to:
converting the article identifier into fourth information in a character format;
and calculating the second information according to the fourth information and the logistics data.
According to the information verification method based on the block chain, when a user uses an article, an article node sends a service request to a server in the block chain through a service platform, the server obtains an article identifier in the service request, obtains pre-stored logistics data corresponding to the article identifier, and recalculates first information of the article identifier and the logistics data. And the server locally stores the block number corresponding to the article identifier, searches the corresponding block in the block chain according to the block number and acquires second information in the block. The server determines whether the article identification and/or the logistics data are tampered or not according to the first information and the second information. The block chain is applied to the data acquisition process in the logistics link, so that the articles can be prevented from being interfered by improper people in the logistics link, and the logistics data and the article identification are prevented from being falsified by counterfeit pirates, factories and internal management supervisors. And the block chain is used for storing and recording data, the storage, processing and transmission capabilities are not limited, and the architecture is simple.
Drawings
Fig. 1 is a flowchart of an information verification method based on a blockchain on a server side according to an embodiment of the present disclosure;
fig. 2 is an application scenario diagram of an information verification method based on a block chain according to an embodiment of the present disclosure;
fig. 3 is another flowchart of a block chain-based information verification method on a server side according to an embodiment of the present disclosure;
fig. 4 is a flowchart of an information verification method based on a block chain on an article node side according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a server according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of an article node according to an embodiment of the present disclosure.
Detailed Description
In order to make the technical solutions of the present invention better understood, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
The system aims to solve the problems that transportation and sales sensor nodes which provide energy by using a rechargeable battery are limited in storage, processing and transmission capacity, the structure is complex, and logistics data and article identification collected in the links of article production, transportation, sales and the like can be artificially tampered and damaged. The disclosure provides an information verification method based on a block chain, a server and an article node. The following detailed description is made with reference to the accompanying drawings which respectively illustrate embodiments provided by the present disclosure.
Fig. 1 shows a flowchart of a block chain-based information verification method on a server side according to an embodiment of the present disclosure.
Referring to fig. 1, the method for verifying information based on a blockchain provided in this embodiment includes the following steps.
Step S101, receiving a service request sent by a service platform to the server.
Step S102, the article identification in the service request is obtained.
Wherein the nodes in the blockchain include servers and item nodes. The server is a server corresponding to the intelligent factory node. Referring to fig. 2, when an article is produced by the intelligent factory node, a unique article identifier is marked on the article and is stored in the intelligent chip for internal calculation and storage of the article. The article identification is recorded in the server as a unique authentication code.
In step S101 and step S102, the server in the blockchain corresponds to the intelligent plant node and is also a background server of the service platform. When the user uses the article, the article node sends a service request to the service platform, and the service platform forwards the service request to the server. The server verifies the data and the user can use the article after the verification is passed.
The server in the blockchain of the embodiments of the present disclosure mainly takes on two recording roles: the article node is registered in a network; and recording the second information generated by the article identification and the logistics data. Referring to fig. 2, there are two different types of chunks in a server in a blockchain, namely authentication chunks and data check chunks. And the servers in all the block chains jointly form a block chain, and simultaneously form a peer-to-peer network of the block chain, and the records in the block chain blocks are checked.
The following briefly describes the network access registration process of the article node:
1, when an item is first connected to a network of blockchains at production, it is necessary to complete identity registration at the blockchain. The system generates a public and private key address for each article through an asymmetric encryption algorithm (RSA, elliptic curve and other algorithms), and the private key information comprises the article identification of the article. Each individual device retains its own private key and records the corresponding public key and other information onto a dedicated authentication block of the blockchain.
When logistics data of new storage nodes (the storage nodes can be intelligent factory nodes, logistics transportation nodes and distribution block servers) with changed commodity life cycles are accessed to the network later, the storage nodes are required to broadcast (public keys and other information) information of related commodities, the commodity nodes which are already on the network are audited, the new nodes which pass the audit (more than 51% of nodes agree) are allowed to be accessed to the network, and the related information is recorded in a newly generated authentication block. And all the article nodes recorded on the authentication block can be subjected to data verification.
And 3, when the article nodes (single article damage and repair or unqualified destruction) or the storage nodes (point of sale withdrawal, logistics cooperation withdrawal and factory reclosing) exit the network in batches, broadcasting needs to be sent, and the equipment is declared to exit the network. On the newly created authentication block, the relevant information of the device will not be recorded any more. The last authentication block on the block chain is required to retain all the relevant information of the effective equipment, the previous authentication block is only used for forming a chain structure and has no verification significance, the identification of the article in the sold article is not influenced, once the storage node exits the network, the information recorded by the storage node can not exist in the block chain network, and the generation of pirated articles caused by the accidental outflow of the equipment is prevented.
In a preferred embodiment, the articles are intelligent bricks.
And step S103, acquiring pre-stored logistics data corresponding to the article identification.
And step S104, calculating first information according to the article identification and the logistics data.
Step S105, a pre-stored block number corresponding to the article identifier is obtained, and second information corresponding to the block number is obtained in the block chain.
And S106, determining whether the article identification and/or the logistics data are tampered or not according to the first information and the second information.
Before the step S103 to the step S106, the article node hashes the logistics data (data collected during the logistics links such as production, sales, and transportation of the article) and the article identifier by using a Hash algorithm (for example, SHA-256 algorithm), so as to form second information of the data. I.e. a short characteristic string of fixed byte length in a specific time. Then, the article node encapsulates the signature information and the second information (Hash value), and then performs digital signature using its own private key address. The broadcast is sent into a block chain. After receiving the broadcast information, other network nodes in the block chain firstly determine the validity of the equipment according to the equipment registration information recorded on the building block authentication block. The signature of the data is checked by using the public key address of the equipment recorded in the building block authentication block, and only after the data passes the check and verification, the true and valid data uploaded by the equipment is confirmed. And storing the public key and the Hash identification of the corresponding article node to the block chain to form an effective data identification record and finish the block chain record. And after the steps are completed, the article node sends the logistics data, the article identification and the corresponding block number to the server to finish data storage.
In step S103 to step S106, when the user uses an article, the article node sends a service request to the server in the block chain through the service platform, and the server obtains an article identifier in the service request and performs verification in the data verification block in the server. The server acquires the pre-stored logistics data corresponding to the article identifier, and recalculates the Hash value of the article identifier and the logistics data, namely recalculates the first information. And the server locally stores the block number corresponding to the article identifier, searches the corresponding block in the block chain according to the block number and acquires second information in the block. The server determines whether the article identification and/or the logistics data are tampered or not according to the first information and the second information.
In the embodiment of the disclosure, the block chain is applied to the data acquisition process in logistics links such as production, transportation and article sale, so that the articles can be prevented from being interfered by improper persons in the production, transportation and sale processes, and the logistics data and the article identification are prevented from being falsified by counterfeit pirates, factories and internal management supervisors. And the block chain is used for storing and recording data, the storage, processing and transmission capabilities are not limited, and the architecture is simple.
In some embodiments, the determining whether the item identification and/or the logistics data is tampered according to the first information and the second information (i.e. step S106) includes: in response to determining that the first information is consistent with the second information, determining that neither the item identifier nor the logistics data has been tampered with; in response to determining that the first information is inconsistent with the second information, it is determined that the item identification and/or the item data is tampered with.
In the above step, the server compares the calculated first information with the second information found in the blockchain. And if the first information is consistent with the second information, determining that the article identification and the logistics data are not tampered, wherein the logistics data are acquired through links such as production, transportation and sale in a legal way, and the article identification is legal and effective. If the first information is inconsistent with the second information, it is determined that the item identification and/or the item data has been tampered with.
In some embodiments, the calculating the first information according to the article identification and the logistics data (i.e., step S104) includes: converting the article identifier into third information in a character format; and calculating the first information according to the third information and the logistics data.
In the above step, the first information is a short characteristic character string with a fixed byte length in a specific time. The item identifier is generally a numeric code, for example 001, the item identifier is converted into third information in a character format, and the first information is calculated based on the third information and the logistics data, such as a hash value calculated by the SHA-256 algorithm.
Fig. 3 shows another flowchart of a block chain-based information verification method on the server side according to an embodiment of the present disclosure.
In some embodiments, the service request further includes an authentication parameter, and after receiving the service request sent by the service platform to the server, referring to fig. 3, the method further includes:
step S201, obtain the authentication parameter in the service request.
Step S202, in response to the authentication of the authentication parameters according to the authentication information of the goods pre-stored by the server and the fact that the goods identification and the logistics data are not tampered, a message allowing the use of the service is sent to the service platform.
In step S201-step S202, the authentication block includes authentication information such as an authentication code of the article, a production place, a production time, copyright authorization information, a physical address of the physical node, and a network access time in addition to the article identifier. And after receiving the service request sent by the service platform, the server acquires the authentication parameters in the service request. If the authentication parameters are authenticated by the authentication block in the server according to the authentication codes of the locally stored articles, the authentication information such as the production place, the production time, the copyright authorization information, the physical address of the physical node, the network access time and the like, and the article identification and the logistics data are determined not to be tampered, the authentication block sends a message allowing the use of the service to the service platform.
In the embodiment of the disclosure, the service platform is automatically networked when copyright authentication traceability, counterfeit screening, networking fight and play guidance functions are performed on the articles, for example, the building blocks, authentication is performed through the authentication block in the server, and the service function in the articles can be used only when the authentication is passed.
Fig. 4 shows a flowchart of an information verification method based on a blockchain on an article node side according to an embodiment of the present disclosure.
Referring to fig. 4, an information verification method based on a blockchain, which is applied to an item node in the blockchain, includes the following steps.
Step S301, acquiring logistics data of the article node and an article identifier of the article node.
Step S302, second information is calculated according to the article identification and the logistics data.
Step S303 broadcasts the second information in the block chain, and generates a new block including the second information.
In step S304, the block number of the new block is obtained.
Step S305, the logistics data, the block number and the article identification are sent to the server node in the block chain, so that the server node can be stored locally.
In steps S301 to S305, the article is grounded, and the logistics data (data collected in logistics links such as production, sales, and transportation of articles) of the article node and the article identifier of the article node are obtained. The logistics data and the article identification are hashed by a Hash algorithm (such as SHA-256 algorithm) to form second information of the data. I.e. a short characteristic string of fixed byte length in a specific time. Then, the article node encapsulates the signature information and the second information (Hash value), and then performs digital signature using its own private key address. The broadcast is sent into a block chain. After receiving the broadcast information, other network nodes in the block chain firstly determine the validity of the equipment according to the equipment registration information recorded on the building block authentication block. The signature of the data is checked by using the public key address of the equipment recorded in the building block authentication block, and only after the data passes the check and verification, the true and valid data uploaded by the equipment is confirmed. And storing the public key and the Hash identification of the corresponding article node to the block chain to form an effective data identification record, generating a new block comprising the second information, and finishing the block chain record. And after the steps are completed, the article node sends the logistics data, the article identification and the corresponding block number to the server to finish data storage.
In the embodiment of the disclosure, the block chain is applied to the data acquisition process in logistics links such as production, transportation and article sale, so that the articles can be prevented from being interfered by improper persons in the production, transportation and sale processes, and the logistics data and the article identification are prevented from being falsified by counterfeit pirates, factories and internal management supervisors. And the block chain is used for storing and recording data, the storage, processing and transmission capabilities are not limited, and the architecture is simple.
In some embodiments, the calculating second information from the item identification and the logistics data (step S202) includes: converting the article identifier into fourth information in a character format; and calculating second information according to the fourth information and the logistics data.
In the above step, the second information is a short characteristic character string with a fixed byte length in a specific time. The item identifier is generally a numeric code, for example 001, the item identifier is converted into fourth information in a character format, and second information, such as a hash value calculated by the SHA-256 algorithm, is calculated based on the fourth information and the logistics data. Because the logistics data is collected in real time, the second information is updated as the logistics data is updated.
Fig. 5 shows a schematic structural diagram of a server provided in an embodiment of the present disclosure. Based on the same technical concept as the embodiment corresponding to fig. 1, as shown in fig. 5, the server provided by the embodiment of the present disclosure includes the following modules.
The receiving module 11 is configured to receive a service request sent by a service platform to the server;
a first obtaining module 12, configured to obtain an item identifier in the service request;
a second obtaining module 13, configured to obtain pre-stored logistics data corresponding to the article identifier;
a calculation module 14, configured to calculate first information according to the item identifier and the logistics data;
a third obtaining module 15, configured to obtain a pre-stored block number corresponding to the article identifier;
a fourth obtaining module 16, configured to obtain, in a block chain, second information corresponding to the block number;
a determining module 17, configured to determine whether the item identifier and/or the logistics data are tampered with according to the first information and the second information.
Preferably, the determining module 17 is specifically configured to:
in response to determining that the first information is consistent with the second information, determining that neither the item identifier nor the logistics data has been tampered with;
in response to determining that the first information is inconsistent with the second information, determining that the item identification and/or the item data is tampered.
Preferably, the calculation module 14 is specifically configured to:
converting the article identifier into third information in a character format;
and calculating the first information according to the third information and the logistics data.
Preferably, the service request further includes an authentication parameter, further including:
a fifth obtaining module, configured to obtain an authentication parameter in the service request;
and the sending module is used for responding to the authentication of the authentication parameters according to the authentication information of the article prestored by the server and determining that the article identification and the logistics data are not tampered, and sending a message of allowing the use of service to the service platform.
Fig. 6 shows a schematic structural diagram of an article node provided by an embodiment of the present disclosure. Based on the same technical concept as the embodiment corresponding to fig. 4, as shown in fig. 6, the article node provided by the embodiment of the present disclosure includes the following modules.
A first obtaining module 21, configured to obtain logistics data of a node of the article and an article identifier of the node of the article;
a calculation module 22, configured to calculate second information according to the item identifier and the logistics data;
a broadcasting module 23, configured to broadcast the second information in a block chain, and generate a new block including the second information;
a second obtaining module 24, configured to obtain a block number of the new block;
a sending module 25, configured to send the logistics data, the block number, and the item identifier to a server node in a block chain, so that the server node stores the logistics data, the block number, and the item identifier locally.
Preferably, the calculation module 22 is specifically configured to:
converting the article identifier into fourth information in a character format;
and calculating the second information according to the fourth information and the logistics data.
It is to be understood that the above embodiments are merely exemplary embodiments that are employed to illustrate the principles of the present disclosure, and that the present disclosure is not limited thereto. It will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the disclosure, and these are to be considered as the scope of the disclosure.

Claims (12)

1. An information verification method based on a block chain is characterized in that the method is applied to a server in the block chain and comprises the following steps:
receiving a service request sent by a service platform to the server, and acquiring an article identifier in the service request;
acquiring pre-stored logistics data corresponding to the article identification;
calculating first information according to the article identification and the logistics data;
acquiring a pre-stored block number corresponding to the article identifier, and acquiring second information corresponding to the block number in a block chain;
and determining whether the article identification and/or the logistics data are tampered or not according to the first information and the second information.
2. The blockchain-based information verification method according to claim 1, wherein the determining whether the item identifier and the logistics data are tampered according to the first information and the second information includes:
in response to determining that the first information is consistent with the second information, determining that neither the item identifier nor the logistics data has been tampered with;
in response to determining that the first information is inconsistent with the second information, determining that the item identification and/or the item data is tampered.
3. The blockchain-based information verification method according to claim 1, wherein the calculating the first information according to the item identifier and the logistics data includes:
converting the article identifier into third information in a character format;
and calculating the first information according to the third information and the logistics data.
4. The blockchain-based information verification method according to claim 1, wherein the service request further includes an authentication parameter, and after receiving the service request sent by the service platform to the server, the method further includes:
acquiring an authentication parameter in the service request;
and sending a service use permission message to the service platform in response to that the authentication of the authentication parameters is passed according to the authentication information of the article stored in advance by the server and that the article identification and the logistics data are not tampered.
5. An information verification method based on a block chain is applied to an article node in the block chain, and the method comprises the following steps:
acquiring logistics data of the article node and an article identifier of the article node;
calculating second information according to the article identification and the logistics data;
broadcasting the second information in a block chain and generating a new block including the second information;
acquiring the block number of the new block;
and sending the logistics data, the block number and the article identification to a server node in a block chain, so that the server node is stored locally.
6. The blockchain-based information verification method according to claim 5, wherein the calculating the second information according to the item identifier and the logistics data includes:
converting the article identifier into fourth information in a character format;
and calculating the second information according to the fourth information and the logistics data.
7. A server applied in a blockchain, comprising:
the receiving module is used for receiving a service request sent to the server by the service platform;
the first acquisition module is used for acquiring the article identifier in the service request;
the second acquisition module is used for acquiring pre-stored logistics data corresponding to the article identifier;
the calculation module is used for calculating first information according to the article identification and the logistics data;
the third acquisition module is used for acquiring a pre-stored block number corresponding to the article identifier;
a fourth obtaining module, configured to obtain, in a block chain, second information corresponding to the block number;
and the determining module is used for determining whether the article identification and/or the logistics data are tampered or not according to the first information and the second information.
8. The server according to claim 7, wherein the determining module is specifically configured to:
in response to determining that the first information is consistent with the second information, determining that neither the item identifier nor the logistics data has been tampered with;
in response to determining that the first information is inconsistent with the second information, determining that the item identification and/or the item data is tampered.
9. The server according to claim 7, wherein the computing module is specifically configured to:
converting the article identifier into third information in a character format;
and calculating the first information according to the third information and the logistics data.
10. The server of claim 7, wherein the service request further includes an authentication parameter, further comprising:
a fifth obtaining module, configured to obtain an authentication parameter in the service request;
and the sending module is used for responding to the authentication of the authentication parameters according to the authentication information of the article prestored by the server and determining that the article identification and the logistics data are not tampered, and sending a message of allowing the use of service to the service platform.
11. An article node for use in a blockchain, the apparatus comprising:
the first acquisition module is used for acquiring the logistics data of the article node and the article identifier of the article node;
the calculation module is used for calculating second information according to the article identification and the logistics data;
a broadcasting module for broadcasting the second information in a block chain and generating a new block including the second information;
the second acquisition module is used for acquiring the block number of the new block;
and the sending module is used for sending the logistics data, the block number and the article identifier to a server node in a block chain so as to enable the server node to be stored locally.
12. The item node according to claim 11, wherein the calculation module is specifically configured to:
converting the article identifier into fourth information in a character format;
and calculating the second information according to the fourth information and the logistics data.
CN202110577399.XA 2021-05-26 2021-05-26 Information verification method based on block chain, server and article node Pending CN113392942A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110577399.XA CN113392942A (en) 2021-05-26 2021-05-26 Information verification method based on block chain, server and article node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110577399.XA CN113392942A (en) 2021-05-26 2021-05-26 Information verification method based on block chain, server and article node

Publications (1)

Publication Number Publication Date
CN113392942A true CN113392942A (en) 2021-09-14

Family

ID=77619119

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110577399.XA Pending CN113392942A (en) 2021-05-26 2021-05-26 Information verification method based on block chain, server and article node

Country Status (1)

Country Link
CN (1) CN113392942A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172689A (en) * 2021-11-11 2022-03-11 卓尔智联(武汉)研究院有限公司 Information processing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583820A (en) * 2018-12-19 2019-04-05 东莞市盟大塑化科技有限公司 A kind of freight tracking method based on block chain technology
CN110796414A (en) * 2018-05-31 2020-02-14 腾讯科技(深圳)有限公司 Circulation information inquiry method, device, equipment, system and storage medium
US20200387859A1 (en) * 2018-02-24 2020-12-10 VeChain Global Technology, S.AR.L Methods, Application Server, Block Chain Node and Media For Logistics Tracking and Source Tracing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200387859A1 (en) * 2018-02-24 2020-12-10 VeChain Global Technology, S.AR.L Methods, Application Server, Block Chain Node and Media For Logistics Tracking and Source Tracing
CN110796414A (en) * 2018-05-31 2020-02-14 腾讯科技(深圳)有限公司 Circulation information inquiry method, device, equipment, system and storage medium
CN109583820A (en) * 2018-12-19 2019-04-05 东莞市盟大塑化科技有限公司 A kind of freight tracking method based on block chain technology

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172689A (en) * 2021-11-11 2022-03-11 卓尔智联(武汉)研究院有限公司 Information processing method and device
CN114172689B (en) * 2021-11-11 2023-11-28 卓尔智联(武汉)研究院有限公司 Information processing method and equipment

Similar Documents

Publication Publication Date Title
CN109409122B (en) File storage method, electronic device and storage medium
CN109766673B (en) Alliance type audio and video copyright block chain system and audio and video copyright chaining method
CN107508812B (en) Industrial control network data storage method, calling method and system
CN111737360B (en) Block chain-based equipment management method and device and computer equipment
US8209536B2 (en) Message authentication system, message transmission apparatus and message reception apparatus
CN108959416A (en) A kind of web data automatic evidence-collecting based on block chain and deposit card method
CN112041849A (en) Method and system for automatic object identification and authentication
CN108646983A (en) The treating method and apparatus of storage service data on block chain
CN106789090A (en) Public key infrastructure system and semi-random participating certificate endorsement method based on block chain
CN107483419A (en) Method, apparatus, system, server and the computer-readable recording medium of server authentication access terminal
EP1959372B1 (en) Distance-preserving anonymization of data
CN109522988B (en) Method and system for updating product anti-counterfeiting electronic label information
CN112395353A (en) Intelligent electric energy meter quality data sharing method and system based on alliance chain
CN109360008B (en) Product anti-counterfeiting authentication updating method and system
CN102088375A (en) Privacy preserving artificial immune system
CN113034128B (en) Block chain-based data transaction and right confirmation method
CN109815732B (en) Workshop data storage and access system, method and device based on alliance chain
CN110874747A (en) Product service data uploading method, product service data storing device, product service data storing equipment and product service data storing medium
CN110866265A (en) Data storage method, device and storage medium based on block chain
CN113469716A (en) Product tracing method and system based on block chain and identification analysis
CN104363593A (en) Two-tier sensor network oriented verifiable Top-k query processing method
CN106971311A (en) A kind of false proof traceability system of logistics Means of Agricultural Production and method
CN103812864A (en) Sybil attack detection method in online social network
CN112733211A (en) Intelligent power grid data storage scheme based on block chain
CN113392942A (en) Information verification method based on block chain, server and article node

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination