CN117236820A - Logistics tracing method based on industrial identification and related equipment - Google Patents

Logistics tracing method based on industrial identification and related equipment Download PDF

Info

Publication number
CN117236820A
CN117236820A CN202311461563.6A CN202311461563A CN117236820A CN 117236820 A CN117236820 A CN 117236820A CN 202311461563 A CN202311461563 A CN 202311461563A CN 117236820 A CN117236820 A CN 117236820A
Authority
CN
China
Prior art keywords
data
logistics
nodes
verification
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311461563.6A
Other languages
Chinese (zh)
Inventor
时宗胜
蒋剑
渠立孝
王飞
胡世磊
季浩
孙旭
郁雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Zhongtian Internet Technology Co ltd
Original Assignee
Jiangsu Zhongtian Internet Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Zhongtian Internet Technology Co ltd filed Critical Jiangsu Zhongtian Internet Technology Co ltd
Priority to CN202311461563.6A priority Critical patent/CN117236820A/en
Publication of CN117236820A publication Critical patent/CN117236820A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The application provides a logistics tracing method, a device, a server and a storage medium based on industrial identification, wherein the server comprises a plurality of nodes, the server is in communication connection with a database, and the logistics tracing method based on the industrial identification comprises the following steps: responding to preset operation of a user on the industrial identifier to obtain a logistics data tracing request; determining target logistics data associated with the industrial identification from the database according to the logistics data tracing request, wherein the target logistics data comprises a plurality of blocks; acquiring an identity of a user, and verifying the validity of the identity by utilizing a plurality of nodes in the server; when the validity verification of the identity mark passes, verifying the data integrity of the blocks by utilizing the nodes; and outputting the target logistics data when the data integrity verification of the blocks passes. The application relates to the technical field of data analysis, and can improve the logistics traceability safety based on industrial identification.

Description

Logistics tracing method based on industrial identification and related equipment
Technical Field
The application relates to the technical field of data analysis, in particular to the technical field of logistics tracing based on industrial identification, and especially relates to a logistics tracing method based on industrial identification and related equipment, wherein the related equipment comprises a logistics tracing device based on industrial identification, a server and a storage medium.
Background
With the development of industrial internet technology, enterprises or organizations often upload data to servers for efficient data management. Currently, when an enterprise or organization needs to view historical data to analyze or evaluate a business, a preset operation is generally directly performed on an industrial identifier related to the historical data to obtain the historical data from a server. For example, when tracing logistics data, the industrial identifier related to the logistics data is generally directly scanned, so as to obtain the logistics data. However, the data transmission process is not safely controlled in the data tracing process in this way, which results in a data security accident in the tracing process.
Disclosure of Invention
In view of the above, it is necessary to provide a logistics tracing method and related devices based on industrial identification, so as to solve the technical problem of low data transmission security. The related equipment comprises a logistics traceability device based on industrial identification, a server and a storage medium.
The application provides a logistics tracing method based on industrial identification, which is applied to a server, wherein the server comprises a plurality of nodes, and the server is in communication connection with a database, and the method comprises the following steps: responding to preset operation of a user on the industrial identifier to obtain a logistics data tracing request; determining target logistics data associated with the industrial identification from the database according to the logistics data tracing request, wherein the target logistics data comprises a plurality of blocks; acquiring an identity of a user, and verifying the validity of the identity by utilizing a plurality of nodes in the server; when the validity verification of the identity mark passes, verifying the data integrity of the blocks by utilizing the nodes; and outputting the target logistics data when the data integrity verification of the blocks passes.
In some embodiments, the database is configured to store a plurality of candidate logistics data associated with the industrial identification, and determining the target logistics data associated with the industrial identification from the database according to the logistics data traceability request includes: analyzing the logistics data traceability request to obtain a request message; encoding the request message to obtain first encoded data corresponding to the request message; determining data description information corresponding to each candidate logistics data; coding the data description information to obtain a second code corresponding to each candidate stream data; and determining the similarity between the first coded data and each second coded data, and determining candidate logistics data corresponding to the second coded data with the highest similarity as target logistics data.
In some embodiments, the encoding the request message to obtain the first encoded data corresponding to the request message includes: word segmentation is carried out on the request message to obtain a message Wen Cihui; sparse coding is carried out on the message vocabulary, and coding vectors corresponding to the message vocabulary are obtained; and inputting the coding vector to a self-encoder trained in advance to a convergence state to obtain a first code corresponding to the request message.
In some embodiments, the obtaining the identity of the user, and verifying the validity of the identity by using a plurality of nodes in the server includes: encrypting the identity mark by using a pre-stored first key to obtain an encrypted mark; the server distributes the encrypted identification to the plurality of nodes to obtain verification results returned by the plurality of nodes; and when the returned verification result is that the number of nodes passing verification is greater than half of the number of the plurality of nodes, determining that the validity verification of the identity mark passes.
In some embodiments, the method for verifying the encrypted identifier by the plurality of nodes to obtain a verification result comprises the following steps: decrypting the identity mark by using a pre-stored second key to obtain a decrypted mark; and when the decryption identifications corresponding to the plurality of nodes are identical, determining that the verification result is verification passing.
In some embodiments, the verifying the data integrity of the plurality of blocks with the plurality of nodes comprises: distributing the target logistics data to the plurality of nodes; determining check information stored in each block in the corresponding target logistics data by using each node; carrying out hash operation on the data in each block to obtain a hash value corresponding to each block; when the hash value corresponding to each block is the same as the verification information of the next block, determining that the data integrity verification of the blocks passes; and when the data integrity check of the blocks corresponding to each node passes, determining that the data integrity check of the blocks in the target logistics data passes.
In some embodiments, the method further comprises: when the hash value of the block is determined to be different from the verification information corresponding to the next block, determining that the logistics data stored in the block is tampered; and outputting logistics data to tamper with early warning.
The embodiment of the application also provides a logistics traceability device based on the industrial identification, which comprises: the acquisition module is used for responding to the preset operation of the user on the industrial identifier to obtain a logistics data tracing request; the determining module is used for determining target logistics data associated with the industrial identifier from the database according to the logistics data tracing request, wherein the target logistics data comprises a plurality of blocks; the verification module is used for acquiring the identity of the user and verifying the validity of the identity by utilizing a plurality of nodes in the server; the verification module is further configured to verify data integrity of the plurality of blocks by using the plurality of nodes when the validity verification of the identity is passed; and the tracing module is used for outputting the target logistics data when the data integrity verification of the blocks passes.
The embodiment of the application also provides a server, which comprises: a memory storing at least one instruction; and the processor executes the instructions stored in the memory to realize the logistics tracing method based on the industrial identification.
The embodiment of the application also provides a computer readable storage medium, wherein at least one instruction is stored in the computer readable storage medium, and the at least one instruction is executed by a processor in a server to realize the logistics tracing method based on the industrial identification.
According to the technical scheme, the embodiment of the application determines the target logistics data associated with the industrial identification from the database according to the logistics data tracing request. By utilizing the plurality of nodes in the server to verify the validity of the identity of the user, whether the user has the authority of inquiring the logistics data or not can be determined before the logistics data tracing is executed, and the security of the logistics data tracing can be improved. When the validity verification of the identity mark passes, the nodes are utilized to verify the data integrity of the blocks, and the nodes cooperate to verify whether the data in the blocks are tampered or not, so that the data security in the logistics data tracing process can be improved.
Drawings
Fig. 1 is an application scenario diagram of a logistics tracing method based on industrial identification according to an embodiment of the present application.
Fig. 2 is a flowchart of a logistics tracing method based on industrial identification according to an embodiment of the present application.
Fig. 3 is a functional block diagram of a logistics traceability device based on industrial identification according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
The application will be described in detail below with reference to the drawings and the specific embodiments thereof in order to more clearly understand the objects, features and advantages of the application. It should be noted that, without conflict, embodiments of the present application and features in the embodiments may be combined with each other. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application, the described embodiments are merely some, rather than all, embodiments of the present application.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more of the described features. In the description of the present application, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
The embodiment of the application provides a logistics tracing method based on industrial identification, which can be applied to one or more servers, wherein the server is equipment capable of automatically carrying out numerical calculation and/or information processing according to preset or stored instructions, and the hardware of the equipment comprises, but is not limited to, a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, an ASIC), a programmable gate array (Field-Programmable Gate Array, FPGA), a digital processor (Digital Signal Processor, DSP), embedded equipment and the like.
The server may be any electronic product that can interact with a customer, such as a personal computer, tablet, smart phone, personal digital assistant (Personal Digital Assistant, PDA), gaming machine, interactive web television (Internet Protocol Television, IPTV), smart wearable device, etc.
The server may also include network devices and/or client devices. Wherein the network device includes, but is not limited to, a single network server, a server group composed of a plurality of network servers, or a Cloud based Cloud Computing (Cloud Computing) composed of a large number of hosts or network servers.
The network on which the server is located includes, but is not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a virtual private network (Virtual Private Network, VPN), and the like.
As shown in fig. 1, the logistics tracing method based on industrial identification provided by the application can be applied to a server 100, and the server 100 is in communication connection with a database 200. Wherein the server 100 includes a plurality of nodes (e.g., the first node 110, the second node 120, the third node 130 shown in fig. 1), each of which is operable to perform logistic data analysis and verification. Wherein database 200 is used to store a plurality of candidate stream data.
In an embodiment of the present application, the server 100 responds to a preset operation performed on an industrial identifier by a user to obtain a request for tracing logistics data; determining target logistics data associated with the industrial identification from the database 200 according to the logistics data tracing request, wherein the target logistics data comprises a plurality of blocks; acquiring the identity of the user, and verifying the validity of the identity by using a plurality of nodes (such as the first node 110, the second node 120 and the third node 130 shown in fig. 1) in the server; when the validity verification of the identity mark passes, verifying the data integrity of the blocks by utilizing the nodes; and outputting the target logistics data when the data integrity verification of the blocks passes, so as to finish logistics data tracing.
Fig. 2 is a flowchart of a logistics tracing method based on industrial identification according to an embodiment of the present application. The order of the steps in the flowchart may be changed and some steps may be omitted according to various needs. The logistics tracing method based on the industrial identification provided by the embodiment of the application comprises the following steps.
S20, responding to preset operation of the user on the industrial identifier, and obtaining a logistics data traceability request.
In an embodiment of the present application, in order to trace the logistics data, the server responds to a preset operation performed by a user on the industrial identifier to obtain a logistics data tracing request. The industrial identifier may be a two-dimensional code, a graphic code, a hyperlink, etc., which is not limited in the present application. For example, when the industrial identifier is a two-dimensional code or a graphic code, the preset operation performed on the industrial identifier by the user may be to scan the industrial identifier; when the industry identifier is a hyperlink, the user may perform a preset operation on the industry identifier by clicking on the hyperlink.
In an embodiment of the present application, the request for tracing the logistics data is used for characterizing a requirement of a user for tracing the logistics data associated with the industrial identifier. The request for tracing the logistics data can be a program or a program set written by any programming language, which is not limited in the application.
S21, determining target logistics data associated with the industrial identification from the database according to the logistics data tracing request, wherein the target logistics data comprises a plurality of blocks.
In one embodiment of the application, the server is communicatively coupled to a database for storing a plurality of candidate logistics data associated with the industrial identification. In order to achieve accurate tracing of logistics data, the server can determine target logistics data from a plurality of candidate logistics data stored in a database according to logistics data tracing information. The target logistics data comprises a plurality of blocks, and each block is used for storing part of the logistics data. For example, the logistics data may include information such as a time of arrival of the commodity at each of the transit nodes, a geographic location of each of the transit nodes, etc., and each of the blocks may be used to store the time of arrival of the commodity at each of the transit nodes, the geographic location of each of the transit nodes, etc.
In an embodiment of the present application, the determining, from the database, the target logistics data associated with the industrial identifier according to the logistics data tracing request includes: analyzing the logistics data traceability request to obtain a request message; encoding the request message to obtain first encoded data corresponding to the request message; determining data description information corresponding to each candidate logistics data; coding the data description information to obtain a second code corresponding to each candidate stream data; and determining the similarity between the first coded data and each second coded data, and determining candidate logistics data corresponding to the second coded data with the highest similarity as target logistics data.
In an embodiment of the present application, the encoding the request packet to obtain first encoded data corresponding to the request packet includes: word segmentation is carried out on the request message to obtain a message Wen Cihui; sparse coding is carried out on the message vocabulary, and coding vectors corresponding to the message vocabulary are obtained; and inputting the coding vector to a self-encoder trained in advance to a convergence state to obtain a first code corresponding to the request message.
S22, acquiring the identity of the user, and verifying the validity of the identity by utilizing a plurality of nodes in the server.
In an embodiment of the present application, in order to ensure security of candidate logistics data stored in a database, it is necessary to verify whether an identity of a user is legal by using a plurality of nodes in a server, and when the identity is legal, it is indicated that the user has authority to access the candidate logistics data stored in the database.
In an embodiment of the present application, the obtaining the identity of the user, and verifying the validity of the identity by using a plurality of nodes in the server includes: encrypting the identity mark by using a pre-stored first key to obtain an encrypted mark; the server distributes the encrypted identification to the plurality of nodes to obtain verification results returned by the plurality of nodes; and when the returned verification result is that the number of nodes passing verification is greater than half of the number of the plurality of nodes, determining that the validity verification of the identity mark passes.
In an embodiment of the present application, the method for verifying the encrypted identifier by the plurality of nodes to obtain a verification result includes: decrypting the identity mark by using a pre-stored second key to obtain a decrypted mark; and when the decryption identifications corresponding to the plurality of nodes are identical, determining that the verification result is verification passing.
And S23, when the validity verification of the identity mark passes, verifying the data integrity of the blocks by utilizing the plurality of nodes.
In an embodiment of the present application, when the user's id passes the authentication, it indicates that the user has the right to access the candidate logistics data stored in the database, so that the data integrity of a plurality of blocks can be further verified by using a plurality of nodes in the server.
In an embodiment of the present application, the verifying the data integrity of the plurality of blocks using the plurality of nodes includes: distributing the target logistics data to the plurality of nodes; determining check information stored in each block in the corresponding target logistics data by using each node; carrying out hash operation on the data in each block to obtain a hash value corresponding to each block; when the hash value corresponding to each block is the same as the verification information of the next block, determining that the data integrity verification of the blocks passes; and when the data integrity check of the blocks corresponding to each node passes, determining that the data integrity check of the blocks in the target logistics data passes. When the hash value corresponding to a certain block is the same as the verification information of the next block, the data stored in the block is not tampered, and the data integrity verification in the block is passed. The data in each block may be hashed by any hashing algorithm, for example, the hashing algorithm may be SHA256 algorithm, SHA1 algorithm, or the like, which is not limited in the present application.
Therefore, each node in the server is utilized to verify the data in each block, and the problem of lower accuracy caused by the fact that a single node verifies the data integrity can be avoided.
And S24, outputting the target logistics data when the data integrity verification of the blocks passes.
In an embodiment of the present application, when the data integrity verification of the plurality of blocks passes, it indicates that the target logistics data is not tampered, the target logistics data can be output, so as to complete the logistics data tracing.
In an embodiment of the present application, the method further includes: when the hash value of the block is determined to be different from the verification information corresponding to the next block, determining that the logistics data stored in the block is tampered; and outputting logistics data to tamper with early warning. When the hash value corresponding to a certain block is different from the verification information of the next block, the data stored in the block is tampered, and the data integrity verification in the block is not passed.
According to the technical scheme, the embodiment of the application determines the target logistics data associated with the industrial identification from the database according to the logistics data tracing request. By utilizing the plurality of nodes in the server to verify the validity of the identity of the user, whether the user has the authority of inquiring the logistics data or not can be determined before the logistics data tracing is executed, and the security of the logistics data tracing can be improved. When the validity verification of the identity mark passes, the nodes are utilized to verify the data integrity of the blocks, and the nodes cooperate to verify whether the data in the blocks are tampered or not, so that the data security in the logistics data tracing process can be improved.
Referring to fig. 3, fig. 3 is a functional block diagram of a logistics traceability device based on industrial identification according to an embodiment of the present application. The logistics traceability device 11 based on the industrial identification comprises an acquisition module 110, a determination module 111, a verification module 112 and a traceability module 113. The module/unit referred to herein is a series of computer readable instructions capable of being executed by the processor 13 and of performing a fixed function, stored in the memory 12. In the present embodiment, the functions of the respective modules/units will be described in detail in the following embodiments.
The obtaining module 110 is configured to obtain a request for tracing the logistics data in response to a preset operation performed on the industrial identifier by the user.
The determining module 111 is configured to determine, from the database, target logistics data associated with the industrial identifier according to the logistics data tracing request, where the target logistics data includes a plurality of blocks.
The verification module 112 is configured to obtain an identity of a user, and verify validity of the identity by using a plurality of nodes in the server.
The verification module 112 is further configured to verify the data integrity of the plurality of blocks using the plurality of nodes when the validity verification of the identity is passed.
The tracing module 113 is configured to output the target stream data when the data integrity of the plurality of blocks passes verification.
In some embodiments, the database is configured to store a plurality of candidate logistics data associated with an industrial identifier, and the determining module 111 determines, from the database, the target logistics data associated with the industrial identifier according to the logistics data tracing request includes: analyzing the logistics data traceability request to obtain a request message; encoding the request message to obtain first encoded data corresponding to the request message; determining data description information corresponding to each candidate logistics data; coding the data description information to obtain a second code corresponding to each candidate stream data; and determining the similarity between the first coded data and each second coded data, and determining candidate logistics data corresponding to the second coded data with the highest similarity as target logistics data.
In some embodiments, the determining module 111 encodes the request message, and obtaining the first encoded data corresponding to the request message includes: word segmentation is carried out on the request message to obtain a message Wen Cihui; sparse coding is carried out on the message vocabulary, and coding vectors corresponding to the message vocabulary are obtained; and inputting the coding vector to a self-encoder trained in advance to a convergence state to obtain a first code corresponding to the request message.
In some embodiments, the verifying module 112 obtains the identity of the user, and verifying the validity of the identity using the plurality of nodes in the server includes: encrypting the identity mark by using a pre-stored first key to obtain an encrypted mark; the server distributes the encrypted identification to the plurality of nodes to obtain verification results returned by the plurality of nodes; and when the returned verification result is that the number of nodes passing verification is greater than half of the number of the plurality of nodes, determining that the validity verification of the identity mark passes.
In some embodiments, the method for verifying the encrypted identifier by the verification module 112 through a plurality of nodes includes: decrypting the identity mark by using a pre-stored second key to obtain a decrypted mark; and when the decryption identifications corresponding to the plurality of nodes are identical, determining that the verification result is verification passing.
In some embodiments, the verifying module 112 verifies the data integrity of the plurality of blocks with a plurality of nodes comprises: distributing the target logistics data to the plurality of nodes; determining check information stored in each block in the corresponding target logistics data by using each node; carrying out hash operation on the data in each block to obtain a hash value corresponding to each block; when the hash value corresponding to each block is the same as the verification information of the next block, determining that the data integrity verification of the blocks passes; and when the data integrity check of the blocks corresponding to each node passes, determining that the data integrity check of the blocks in the target logistics data passes.
In some embodiments, the verification module 112 is further configured to: when the hash value of the block is determined to be different from the verification information corresponding to the next block, determining that the logistics data stored in the block is tampered; and outputting logistics data to tamper with early warning.
Fig. 4 is a schematic structural diagram of a server according to an embodiment of the present application. The server 1 comprises a memory 12 and a processor 13. The memory 12 is configured to store computer readable instructions, and the processor 13 executes the computer readable instructions stored in the memory to implement the industrial identifier-based logistics tracing method according to any one of the embodiments.
In an embodiment of the application, the server 1 further comprises a bus, a computer program stored in said memory 12 and executable on said processor 13, such as a logistics traceability program based on an industrial identification.
Fig. 4 shows only the server 1 with the memory 12 and the processor 13, it will be understood by those skilled in the art that the structure shown in fig. 4 does not constitute a limitation of the server 1, and may include fewer or more components than shown, or may combine certain components, or may be arranged in different components.
In connection with fig. 2, the memory 12 in the server 1 stores a plurality of computer readable instructions for implementing a method for tracing logistics based on industrial identification, and the processor 13 is capable of executing the plurality of instructions for implementing: responding to preset operation of a user on the industrial identifier to obtain a logistics data tracing request; determining target logistics data associated with the industrial identification from the database according to the logistics data tracing request, wherein the target logistics data comprises a plurality of blocks; acquiring an identity of a user, and verifying the validity of the identity by utilizing a plurality of nodes in the server; when the validity verification of the identity mark passes, verifying the data integrity of the blocks by utilizing the nodes; and outputting the target logistics data when the data integrity verification of the blocks passes.
Specifically, the specific implementation method of the above instructions by the processor 13 may refer to the description of the relevant steps in the corresponding embodiment of fig. 2, which is not repeated herein.
It will be appreciated by those skilled in the art that the schematic diagram is merely an example of the server 1, and does not constitute a limitation of the server 1, and the server 1 may be a bus type structure, a star type structure, the server 1 may further include more or less other hardware or software than illustrated, or different arrangements of components, for example, the server 1 may further include an input/output device, a network access device, and the like.
It should be noted that the server 1 is only used as an example, and other electronic products that may be present in the present application or may be present in the future are also included in the scope of the present application by way of reference.
The memory 12 includes at least one type of readable storage medium, which may be non-volatile or volatile. The readable storage medium includes flash memory, a removable hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 12 may in some embodiments be an internal storage unit of the server 1, such as a removable hard disk of the server 1. The memory 12 may also be an external storage device of the server 1 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the server 1. The memory 12 may be used not only for storing application software installed in the server 1 and various types of data, such as codes of a logistics traceability program based on an industrial identification, etc., but also for temporarily storing data that has been output or is to be output.
The processor 13 may be comprised of integrated circuits in some embodiments, for example, a single packaged integrated circuit, or may be comprised of multiple integrated circuits packaged with the same or different functions, including one or more central processing units (Central Processing unit, CPU), microprocessors, digital processing chips, graphics processors, a combination of various control chips, and the like. The processor 13 is a Control Unit (Control Unit) of the server 1, connects the respective components of the entire server 1 using various interfaces and lines, and executes various functions of the server 1 and processes data by running or executing programs or modules stored in the memory 12 (for example, executing a logistics traceability program based on an industrial identification, etc.), and calling data stored in the memory 12.
The processor 13 executes the operating system of the server 1 and various types of applications installed. The processor 13 executes the application program to implement the steps of the embodiments of the industrial identifier-based logistics traceability method described above, such as the steps shown in fig. 2.
Illustratively, the computer program may be partitioned into one or more modules/units that are stored in the memory 12 and executed by the processor 13 to complete the present application. The one or more modules/units may be a series of computer readable instruction segments capable of performing the specified functions, which instruction segments describe the execution of the computer program in the server 1. For example, the computer program may be divided into an acquisition module 110, a determination module 111, a verification module 112 and a tracing module 113.
The integrated units implemented in the form of software functional modules described above may be stored in a computer readable storage medium. The software functional module is stored in a storage medium, and includes several instructions for causing a computer device (which may be a personal computer, a computer device, or a network device, etc.) or a Processor (Processor) to execute portions of the industrial identifier-based logistics tracing method according to the embodiments of the present application.
The modules/units integrated by the server 1 may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as separate products. Based on this understanding, the present application may also be implemented by a computer program for instructing a relevant hardware device to implement all or part of the procedures of the above-mentioned embodiment method, where the computer program may be stored in a computer readable storage medium and the computer program may be executed by a processor to implement the steps of each of the above-mentioned method embodiments.
Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory, other memories, and the like.
Further, the computer-readable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created from the use of blockchain nodes, and the like.
The bus may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one arrow is shown in FIG. 4, but only one bus or one type of bus is not shown. The bus is arranged to enable a connection communication between the memory 12 and at least one processor 13 or the like.
The embodiment of the application also provides a computer readable storage medium (not shown), wherein computer readable instructions are stored in the computer readable storage medium, and the computer readable instructions are executed by a processor in a server to realize the logistics tracing method based on the industrial identification according to any embodiment.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be other manners of division when actually implemented.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. Several of the elements or devices described in the specification may be embodied by one and the same item of software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present application and not for limiting the same, and although the present application has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present application without departing from the spirit and scope of the technical solution of the present application.

Claims (10)

1. A logistics traceability method based on industrial identification, which is applied to a server, wherein the server comprises a plurality of nodes, and the server is in communication connection with a database, and the method is characterized by comprising the following steps:
responding to preset operation of a user on the industrial identifier to obtain a logistics data tracing request;
determining target logistics data associated with the industrial identification from the database according to the logistics data tracing request, wherein the target logistics data comprises a plurality of blocks;
acquiring an identity of a user, and verifying the validity of the identity by utilizing a plurality of nodes in the server;
when the validity verification of the identity mark passes, verifying the data integrity of the blocks by utilizing the nodes;
and outputting the target logistics data when the data integrity verification of the blocks passes.
2. The method of claim 1, wherein the database is configured to store a plurality of candidate logistics data associated with the industrial identification, and wherein determining the target logistics data associated with the industrial identification from the database based on the logistics data trace-back request comprises:
analyzing the logistics data traceability request to obtain a request message;
encoding the request message to obtain first encoded data corresponding to the request message;
determining data description information corresponding to each candidate logistics data;
coding the data description information to obtain a second code corresponding to each candidate stream data;
and determining the similarity between the first coded data and each second coded data, and determining candidate logistics data corresponding to the second coded data with the highest similarity as target logistics data.
3. The method of claim 2, wherein the encoding the request message to obtain the first encoded data corresponding to the request message comprises:
word segmentation is carried out on the request message to obtain a message Wen Cihui;
sparse coding is carried out on the message vocabulary, and coding vectors corresponding to the message vocabulary are obtained;
and inputting the coding vector to a self-encoder trained in advance to a convergence state to obtain a first code corresponding to the request message.
4. The method of claim 1, wherein the obtaining the identity of the user and verifying the validity of the identity using the plurality of nodes in the server comprises:
encrypting the identity mark by using a pre-stored first key to obtain an encrypted mark;
the server distributes the encrypted identification to the plurality of nodes to obtain verification results returned by the plurality of nodes;
and when the returned verification result is that the number of nodes passing verification is greater than half of the number of the plurality of nodes, determining that the validity verification of the identity mark passes.
5. The method of claim 4, wherein the plurality of nodes verify the encrypted identification to obtain a verification result comprises:
decrypting the identity mark by using a pre-stored second key to obtain a decrypted mark;
and when the decryption identifications corresponding to the plurality of nodes are identical, determining that the verification result is verification passing.
6. The method of claim 1, wherein verifying the data integrity of the plurality of blocks with the plurality of nodes comprises:
distributing the target logistics data to the plurality of nodes;
determining check information stored in each block in the corresponding target logistics data by using each node;
carrying out hash operation on the data in each block to obtain a hash value corresponding to each block;
when the hash value corresponding to each block is the same as the verification information of the next block, determining that the data integrity verification of the blocks passes;
and when the data integrity check of the blocks corresponding to each node passes, determining that the data integrity check of the blocks in the target logistics data passes.
7. The method of claim 6, wherein the method further comprises:
when the hash value of the block is determined to be different from the verification information corresponding to the next block, determining that the logistics data stored in the block is tampered;
and outputting logistics data to tamper with early warning.
8. An industrial identifier-based logistics traceability device, characterized in that the device comprises a module for implementing the industrial identifier-based logistics traceability method as claimed in any one of claims 1 to 7, the device comprising:
the acquisition module is used for responding to the preset operation of the user on the industrial identifier to obtain a logistics data tracing request;
the determining module is used for determining target logistics data associated with the industrial identifier from the database according to the logistics data tracing request, wherein the target logistics data comprises a plurality of blocks;
the verification module is used for acquiring the identity of the user and verifying the validity of the identity by utilizing a plurality of nodes in the server;
the verification module is further configured to verify data integrity of the plurality of blocks by using the plurality of nodes when the validity verification of the identity is passed;
and the tracing module is used for outputting the target logistics data when the data integrity verification of the blocks passes.
9. A server, the server comprising:
a memory storing computer readable instructions; a kind of electronic device with high-pressure air-conditioning system
A processor executing computer readable instructions stored in the memory to implement the industrial identification-based logistics traceability method of any one of claims 1 to 7.
10. A computer readable storage medium having computer readable instructions stored thereon, which when executed by a processor, implement the industrial identification based logistics traceability method of any of claims 1 to 7.
CN202311461563.6A 2023-11-06 2023-11-06 Logistics tracing method based on industrial identification and related equipment Pending CN117236820A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311461563.6A CN117236820A (en) 2023-11-06 2023-11-06 Logistics tracing method based on industrial identification and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311461563.6A CN117236820A (en) 2023-11-06 2023-11-06 Logistics tracing method based on industrial identification and related equipment

Publications (1)

Publication Number Publication Date
CN117236820A true CN117236820A (en) 2023-12-15

Family

ID=89088290

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311461563.6A Pending CN117236820A (en) 2023-11-06 2023-11-06 Logistics tracing method based on industrial identification and related equipment

Country Status (1)

Country Link
CN (1) CN117236820A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108364181A (en) * 2018-01-08 2018-08-03 广州中国科学院计算机网络信息中心 Source tracing method and system based on block chain and Internet of Things mark
CN108564379A (en) * 2018-02-26 2018-09-21 中国医学科学院药用植物研究所 A kind of source tracing method of object identity, terminal device and server
CN110706006A (en) * 2019-10-09 2020-01-17 北京物资学院 Supply chain logistics traceability system with block chain multi-chain cooperation
CN112966028A (en) * 2021-03-26 2021-06-15 全球能源互联网研究院有限公司 Data traceability system, method and device based on industrial internet identification
CN114386992A (en) * 2022-01-12 2022-04-22 北京工商大学 Grain and oil quality safety credible traceability method based on block chain and identification analysis
CN115114371A (en) * 2022-04-26 2022-09-27 安徽科大国创慧联运科技有限公司 Logistics transportation traceability method and system based on block chain
CN116777316A (en) * 2023-03-07 2023-09-19 北京航空航天大学 High-performance alliance block chain steel logistics traceability method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108364181A (en) * 2018-01-08 2018-08-03 广州中国科学院计算机网络信息中心 Source tracing method and system based on block chain and Internet of Things mark
CN108564379A (en) * 2018-02-26 2018-09-21 中国医学科学院药用植物研究所 A kind of source tracing method of object identity, terminal device and server
CN110706006A (en) * 2019-10-09 2020-01-17 北京物资学院 Supply chain logistics traceability system with block chain multi-chain cooperation
CN112966028A (en) * 2021-03-26 2021-06-15 全球能源互联网研究院有限公司 Data traceability system, method and device based on industrial internet identification
CN114386992A (en) * 2022-01-12 2022-04-22 北京工商大学 Grain and oil quality safety credible traceability method based on block chain and identification analysis
CN115114371A (en) * 2022-04-26 2022-09-27 安徽科大国创慧联运科技有限公司 Logistics transportation traceability method and system based on block chain
CN116777316A (en) * 2023-03-07 2023-09-19 北京航空航天大学 High-performance alliance block chain steel logistics traceability method

Similar Documents

Publication Publication Date Title
CN108111314B (en) Method and equipment for generating and verifying digital certificate
CN110046996B (en) Data processing method and device
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
JP2020074513A (en) Cryptographic verification of source in supply chain
EP2924916A1 (en) Security scheme for authenticating digital entities and aggregate object origins
CN109977684B (en) Data transmission method and device and terminal equipment
CN113472720B (en) Digital certificate key processing method, device, terminal equipment and storage medium
CN113055380B (en) Message processing method and device, electronic equipment and medium
CN111130800A (en) Trusted prediction machine implementation method and device based on TEE
EP3746968A1 (en) A method for controlling distribution of a product in a computer network and system
CN112287329A (en) Service instance checking method and device, electronic equipment and storage medium
CN112487253B (en) User invitation code generation method, verification method, device, equipment and storage medium
CN109684878A (en) One kind being based on block chain technology privacy information tamper resistant method and system
CN114172663A (en) Service right confirming method and device based on block chain, storage medium and electronic equipment
CN112862589A (en) Identity verification method, device and system in financial scene
CN110532290B (en) Information verification device, method and storage medium based on block chain
CN109446054B (en) Processing method and terminal equipment for override operation request based on big data
CN117236820A (en) Logistics tracing method based on industrial identification and related equipment
CN114925033A (en) Information uplink method, device, system and storage medium
CN112738175B (en) Request processing method and related equipment
CN117171235B (en) Data analysis method based on industrial identification and related equipment
CN117171185B (en) Logistics data changing method and related equipment based on industrial identification
CN112667659B (en) Feature processing method and related equipment
CN111698227A (en) Information synchronization management method, device, computer system and readable storage medium
CN114726541B (en) Electronic license reading method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination