CN108595980A - A kind of commodity trace to the source information guard method and device - Google Patents
A kind of commodity trace to the source information guard method and device Download PDFInfo
- Publication number
- CN108595980A CN108595980A CN201810411525.2A CN201810411525A CN108595980A CN 108595980 A CN108595980 A CN 108595980A CN 201810411525 A CN201810411525 A CN 201810411525A CN 108595980 A CN108595980 A CN 108595980A
- Authority
- CN
- China
- Prior art keywords
- commodity
- goods
- batch
- merkle
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Medical Informatics (AREA)
- Finance (AREA)
Abstract
The invention discloses a kind of commodity trace to the source information guard method and device, including:Obtain in same batch of goods the commodity sign of every commodity and the circulation information of the batch of goods;Merkle trees are generated according to the circulation information of the commodity sign of every commodity in same batch of goods and the batch of goods;The corresponding cryptographic Hash of the root node of merkle trees is deposited in publicly-owned chain, remaining node of merkle trees and path are deposited in alliance's chain.The present invention provides a kind of commodity trace to the source information guard method and device, just and not rewritable can be disclosed by realizing information of tracing to the source, while protect businessman's privacy.
Description
Technical field
The present invention relates to electronic transaction technical field more particularly to a kind of commodity trace to the source information guard method and device.
Background technology
With the raising of the level of consumption of people and the mature of e-commerce technology, people buy the channel of commodity
The pattern under line with dual development on line is converted to from entity patterns under original line, virtual shopping has progressed into people's
The computer network purchase system based on e-commerce such as daily life, such as internet shopping, electronic emporium.
Commodity are traced to the source exactly tracks and records the essential information and circulation process of each product since source.Consumer passes through
After items scanning anti-counterfeiting mark, the information of typing before the product can be inquired, to trust purchase.Block chain is born
Anti-tamper characteristic, is particularly suitable for the information of tracing to the source of storage commodity, and industry class product of much tracing to the source all simultaneously uses block
Chain technology.
Current a variety of class products of tracing to the source are all based on alliance's chain, although the private data of businessman can be protected preferably,
Consumer can not directly verify, and third-party monitoring mechanism is needed to supervise, and consumer wishes that the information of tracing to the source of commodity can disclose
Just and not rewritable, it is, therefore, desirable to provide a kind of commodity are traced to the source, the guard method of information and device are to realize letter of tracing to the source
Breath can disclose just and not rewritable, while protect businessman's privacy.
Invention content
The present invention provides a kind of commodity trace to the source information guard method and device, realize trace to the source information can disclose public affairs
Just and not rewritable, while protecting businessman's privacy.
A kind of guard method for information of tracing to the source the present invention provides commodity, including:
Obtain in same batch of goods the commodity sign of every commodity and the circulation information of the batch of goods;
It is generated according to the circulation information of the commodity sign of every commodity in same batch of goods and the batch of goods
Merkle trees;
The corresponding cryptographic Hash of the root node of merkle trees is deposited in publicly-owned chain, remaining node of merkle trees and path
It deposits in alliance's chain.
Optionally, it is given birth to according to the circulation information of the commodity sign of every commodity in same batch of goods and the batch of goods
It is specifically included at merkle trees:
The left subtree of merkle trees is generated according to the commodity sign of every commodity in same batch of goods;
The right subtree of merkle trees is generated according to the circulation information of the batch of goods.
Optionally, the left subtree for merkle trees being generated according to the commodity sign of every commodity in same batch of goods specifically wraps
It includes:
Using the commodity sign of sole product in same batch of goods as a leaf node of the left subtree of merkle trees,
Generate the commodity sign merkle subtrees for the leaf node for including preset quantity, wherein commodity sign merkle subtrees are
The left subtree of merkle trees, and if the actual quantity of sole product is less than preset quantity in the batch of goods, generate random
Data fill the leaf node for null value in commodity sign merkle subtrees.
Optionally, obtain in same batch of goods every commodity commodity sign and the batch of goods circulation information it
Before further include:
The commodity sign of every commodity is endorsed by the private key of manufacturer.
Optionally, obtain in same batch of goods every commodity commodity sign and the batch of goods circulation information it
Before further include:
The circulation information of the batch of goods is endorsed by the private key of logistics initiator.
A kind of protective device for information of tracing to the source the present invention provides commodity, including:
Acquiring unit, the circulation of commodity sign and the batch of goods for obtaining in same batch of goods every commodity
Information;
Merkle tree generation units, for according to every commodity in same batch of goods commodity sign and the batch quotient
The circulation information of product generates merkle trees;
Storage unit, for the corresponding cryptographic Hash of the root node of merkle trees to be deposited in publicly-owned chain, merkle trees
Remaining node and path are deposited in alliance's chain.
Optionally, Merkle trees generation unit specifically includes:
Left subtree generates subelement, for generating merkle trees according to the commodity sign of every commodity in same batch of goods
Left subtree;
Right subtree generates subelement, the right subtree for generating merkle trees according to the circulation information of the batch of goods.
Optionally, left subtree generate subelement, be additionally operable to using the commodity sign of sole product in same batch of goods as
One leaf node of the left subtree of merkle trees generates commodity sign merkle for the leaf node for including preset quantity
Tree, wherein commodity sign merkle subtrees are the left subtree of merkle trees, and if in the batch of goods sole product reality
Border quantity is less than preset quantity, then generates the leaf node for null value in random data filling commodity sign merkle subtrees.
A kind of protective device for information of tracing to the source the present invention provides commodity, including:
Memory, for storing instruction;
Processor, is coupled to the memory, and the processor is configured as holding based on the instruction that the memory stores
Row realizes any one of them method as above.
The present invention provides a kind of computer readable storage medium, the computer-readable recording medium storage has computer
Instruction, realizes any one of them method as above when described instruction is executed by processor.
As can be seen from the above technical solutions, the present invention has the following advantages:
A kind of guard method for information of tracing to the source the present invention provides commodity, including:Obtain every quotient in same batch of goods
The circulation information of the commodity sign of product and the batch of goods;According to the commodity sign of every commodity in same batch of goods and institute
The circulation information for stating batch of goods generates merkle trees;The corresponding cryptographic Hash of the root node of merkle trees is deposited in into publicly-owned chain
In, remaining node of merkle trees and path are deposited in alliance's chain.
In the present invention, by the circulation information of the commodity sign of every commodity in a batch of goods and the batch of goods with
The form of merkle trees is stored to alliance's chain and publicly-owned chain, and the corresponding cryptographic Hash of root node of wherein merkle trees is deposited in
Among publicly-owned chain, ensure that it can not be distorted and without alliance's credit endorsement, connection is deposited in remaining node of merkle trees and path
Among alliance's chain, the privacy of businessman is protected, and using the zero-knowledge proof characteristic of merkle trees, commodity can be got by program
The corresponding cryptographic Hash of node in necessary path carries out verification of tracing to the source, and is carried out with the root node for the merkle trees being stored in publicly-owned chain
Compare and complete commodity and trace to the source verification, just and not rewritable can be disclosed by realizing information of tracing to the source, while protect businessman hidden
It is private.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without having to pay creative labor, may be used also for those of ordinary skill in the art
To obtain other attached drawings according to these attached drawings.
Fig. 1 be a kind of commodity provided by the invention trace to the source information guard method a flow diagram;
Fig. 2 is merkle tree construction schematic diagrames;
Fig. 3 be a kind of commodity provided by the invention trace to the source information guard method another flow diagram;
Fig. 4 be a kind of commodity provided by the invention trace to the source information protective device first structural schematic diagram;
Fig. 5 be a kind of commodity provided by the invention trace to the source information protective device second structural schematic diagram;
Fig. 6 be a kind of commodity provided by the invention trace to the source information protective device third structural schematic diagram.
Specific implementation mode
An embodiment of the present invention provides a kind of commodity trace to the source information guard method and device, realizing information of tracing to the source can
Just and not rewritable is disclosed, while protecting businessman's privacy.
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention
Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below
Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field
All other embodiment that those of ordinary skill is obtained without making creative work, belongs to protection of the present invention
Range.
It please refers to Fig.1 and Fig. 2, a kind of one embodiment for the guard method of information of tracing to the source the present invention provides commodity is wrapped
It includes:
101, the commodity sign of every commodity and the circulation information of the batch of goods are obtained in same batch of goods;
It should be noted that in same batch of goods every commodity commodity sign be unique mark, commodity dispatch from the factory when with
Machine generates, and same batch of goods do not represent commodity and produced as same batch, but the circulation information of same batch of goods is identical and only
One, by logistics, initiator provides, such as batch A commodity are distributed to terminal C by manufacturer B, then is batch A quotient by manufacturer B
Product provide first-class transfering the letter breath, and batch A commodity distributions to warehouse D, are then provided the by terminal C by terminal C for batch A commodity
Second-rate transfering the letter breath.
102, it is generated according to the circulation information of the commodity sign of every commodity in same batch of goods and the batch of goods
Merkle trees;
It should be noted that as shown in Fig. 2, obtain in same batch of goods every commodity commodity sign and described batch
After the circulation information of secondary commodity, believed according to the circulation of the commodity sign of every commodity in same batch of goods and the batch of goods
Breath generates merkle trees, and merkle trees have zero-knowledge proof characteristic, can be in the value for all nodes for not returning to merkle trees
Under the premise of, the validity of verify data, in the present embodiment, if user needs to carry out commodity and traces to the source verification, it is only necessary to according to list
The commodity sign of part commodity using specific software operation and is searched the merkle trees where the commodity, and is obtained and the commodity
The cryptographic Hash of the cryptographic Hash of the node in commodity sign necessity path and the root node of the merkle trees where the commodity, according to must
The cryptographic Hash of the root node of merkle trees where wanting the cryptographic Hash in path to calculate the commodity, by the merkle trees being calculated
The cryptographic Hash of root node is compared with the cryptographic Hash of the root node of the merkle trees where the commodity got, judges the quotient
The positive moral character of product.
103, the corresponding cryptographic Hash of the root node of merkle trees is deposited in publicly-owned chain, remaining node of merkle trees and
Path is deposited in alliance's chain;
It should be noted that after generating merkle trees, the corresponding cryptographic Hash of the root node of merkle trees is deposited in into public affairs
Have in chain, remaining node of merkle trees and path are deposited in alliance's chain, since alliance's chain is built by different organisations and institutions
Vertical to form, different roles possesses different data permissions, guarantee pair while capable of protecting the privacy of the merchandise news of businessman
The supervision of data, consumer can not deduce complete data, and consumer can pass through the soft of offer while receiving commodity
Part is passed to printed in the commodity packaging and associated commodity sign of merchandise news, the service acquisition provided by alliance's chain to this
The information of commodity sign interdependent node is verified the cryptographic Hash of commodity after calculating, can not be usurped with being stored on publicly-owned chain
The corresponding cryptographic Hash of root node of the merkle trees changed is compared to judge whether commodity are certified products.
In the embodiment of the present invention, by the circulation information of the commodity sign of every commodity in a batch of goods and the batch of goods
It is stored in the form of merkle trees to alliance's chain and publicly-owned chain, the corresponding cryptographic Hash storage of root node of wherein merkle trees
Among publicly-owned chain, ensure that it can not be distorted and without alliance's credit endorsement, remaining node of merkle trees and path are deposited in
Among alliance's chain, the privacy of businessman is protected, and using the zero-knowledge proof characteristic of merkle trees, quotient can be got by program
The corresponding cryptographic Hash of node in product necessity path carries out verification of tracing to the source, with the root nodes of the merkle trees being stored in publicly-owned chain into
Row relatively completes commodity and traces to the source verification, and just and not rewritable can be disclosed by realizing information of tracing to the source, while protect businessman
Privacy.
Be above to a kind of commodity provided by the invention trace to the source information guard method the explanation that carries out of one embodiment,
A kind of trace to the source another embodiment of guard method of information of commodity provided by the invention will be illustrated below.
Referring to Fig. 3, a kind of another embodiment for the guard method of information of tracing to the source the present invention provides commodity, including:
201, the commodity sign of every commodity is endorsed by the private key of manufacturer;
It should be noted that in order to ensure that the data source header information of commodity sign can not distort, to the commodity of sole product
The private key that mark carries out manufacturer is endorsed processing.
202, the circulation information of the batch of goods is endorsed by the private key of logistics initiator;
It should be noted that further ensure that the circulation process of commodity can not distort, the circulation to same batch of goods
The private key that information carries out logistics initiator is endorsed processing.
203, the commodity sign of every commodity and the circulation information of the batch of goods are obtained in same batch of goods;
It should be noted that in same batch of goods every commodity commodity sign be unique mark, commodity dispatch from the factory when with
Machine generates, and same batch of goods do not represent commodity and produced as same batch, but the circulation information of same batch of goods is identical and only
One, by logistics, initiator provides, such as batch A commodity are distributed to terminal C by manufacturer B, then is batch A quotient by manufacturer B
Product provide first-class transfering the letter breath, and batch A commodity distributions to warehouse D, are then provided the by terminal C by terminal C for batch A commodity
Second-rate transfering the letter breath.
204, using the commodity sign of sole product in same batch of goods as a leaf of the left subtree of merkle trees
Node generates the commodity sign merkle subtrees for the leaf node for including preset quantity, wherein commodity sign merkle subtrees are
For the left subtree of merkle trees, and if the actual quantity of sole product is less than preset quantity in the batch of goods, generate with
Machine data fill the leaf node for null value in commodity sign merkle subtrees;
It should be noted that merkle trees are divided into left subtree and right subtree, it according to Fig.2, will be in same batch of goods
A leaf node of the commodity sign of sole product as the left subtree of merkle trees, to generate the leaf including preset quantity
The leaf node of the commodity sign merkle subtrees of node, the i.e. left subtree of merkle trees, preset quantity can ensure generation
The number of plies all same of the left subtree of merkle trees can prevent user from extrapolating a batch by returning to the depth of merkle trees
The substantially quantity of commodity, the sensitive informations such as inventory to know businessman.
If the actual quantity of sole product is less than preset quantity in a batch, random data filling commodity sign is generated
It is the leaf node of null value in merkle subtrees, generates and other batch of subuniform commodity sign merkle subtree;
It, will first as unit of preset quantity if the actual quantity of sole product is higher than preset quantity in a batch
The batch is divided into multiple batches to generate commodity sign merkle subtrees, equally, if single-piece when being divided to the last one batch
The actual quantity of commodity is less than preset quantity, is solved according to above-mentioned method.
205, the right subtree of merkle trees is generated according to the circulation information of the batch of goods;
It should be noted that generating the right subtree and commodity mark of merkle trees according to the circulation information of the batch of goods
Know merkle subtrees and collectively form merkle trees, the corresponding cryptographic Hash of root node of merkle trees is commodity sign merkle
The corresponding cryptographic Hash of root node of tree and the corresponding cryptographic Hash of root node of the right subtree of merkle trees are calculated by hash function
It obtains.
206, the corresponding cryptographic Hash of the root node of merkle trees is deposited in publicly-owned chain, remaining node of merkle trees and
Path is deposited in alliance's chain.
It should be noted that after generating merkle trees, the corresponding cryptographic Hash of the root node of merkle trees is deposited in into public affairs
Have in chain, remaining node of merkle trees and path are deposited in alliance's chain, since alliance's chain is built by different organisations and institutions
Vertical to form, different roles possesses different data permissions, guarantee pair while capable of protecting the privacy of the merchandise news of businessman
The supervision of data, consumer can not deduce complete data, and consumer can pass through the soft of offer while receiving commodity
Part is passed to printed in the commodity packaging and associated commodity sign of merchandise news, the service acquisition provided by alliance's chain to this
The information of commodity sign interdependent node is verified the cryptographic Hash of commodity after calculating, can not be usurped with being stored on publicly-owned chain
The corresponding cryptographic Hash of root node of the merkle trees changed is compared to judge whether commodity are certified products.
In the embodiment of the present invention, by the circulation information of the commodity sign of every commodity in a batch of goods and the batch of goods
It is stored in the form of merkle trees to alliance's chain and publicly-owned chain, the corresponding cryptographic Hash storage of root node of wherein merkle trees
Among publicly-owned chain, ensure that it can not be distorted and without alliance's credit endorsement, remaining node of merkle trees and path are deposited in
Among alliance's chain, the privacy of businessman is protected, and using the zero-knowledge proof characteristic of merkle trees, quotient can be got by program
The corresponding cryptographic Hash of node in product necessity path carries out verification of tracing to the source, with the root nodes of the merkle trees being stored in publicly-owned chain into
Row relatively completes commodity and traces to the source verification, and just and not rewritable can be disclosed by realizing information of tracing to the source, while protect businessman
Privacy is further endorsed the commodity sign of every commodity by the private key of manufacturer, the circulation information of the batch of goods
It is endorsed by the private key of logistics initiator, ensures that source data and circulation process can not distort, and identify by affixed merchandise
The depth of merkle subtrees prevents user from extrapolating the substantially quantity of a batch of goods by returning to the depth of merkle trees,
The sensitive informations such as the inventory to know businessman.
Be above to a kind of commodity provided by the invention trace to the source information guard method saying of carrying out of another embodiment
It is bright, a kind of trace to the source one embodiment of protective device of information of commodity provided by the invention will be illustrated below.
Referring to Fig. 4, a kind of one embodiment for the protective device of information of tracing to the source the present invention provides commodity, including:
Acquiring unit 401, commodity sign and the batch of goods for obtaining in same batch of goods every commodity
Circulate information;
Merkle trees generation unit 402, for according to the commodity sign of every commodity in same batch of goods and described batch
The circulation information of secondary commodity generates merkle trees;
Storage unit 403, for the corresponding cryptographic Hash of the root node of merkle trees to be deposited in publicly-owned chain, merkle trees
Remaining node and path deposit in alliance's chain.
Be above to a kind of commodity provided by the invention trace to the source information protective device saying of carrying out of one embodiment
It is bright, a kind of trace to the source second embodiment of protective device of information of commodity provided by the invention will be illustrated below.
Referring to Fig. 5, a kind of second embodiment of the protective device of information of tracing to the source the present invention provides commodity, including:
First encryption unit 501, for the commodity sign of every commodity to be endorsed by the private key of manufacturer;
Second encryption unit 502, for the circulation information of the batch of goods to be endorsed by the private key of logistics initiator;
Acquiring unit 503, commodity sign and the batch of goods for obtaining in same batch of goods every commodity
Circulate information;
Merkle trees generation unit 504, for according to the commodity sign of every commodity in same batch of goods and described batch
The circulation information of secondary commodity generates merkle trees;
Merkle trees generation unit 504 specifically includes:
Left subtree generates subelement 5041, for being generated according to the commodity sign of every commodity in same batch of goods
The left subtree of merkle trees;
Left subtree generate subelement 5041, be additionally operable to using the commodity sign of sole product in same batch of goods as
One leaf node of the left subtree of merkle trees generates commodity sign merkle for the leaf node for including preset quantity
Tree, wherein commodity sign merkle subtrees are the left subtree of merkle trees, and if in the batch of goods sole product reality
Border quantity is less than preset quantity, then generates the leaf node for null value in random data filling commodity sign merkle subtrees;
Right subtree generates subelement 5042, the right son for generating merkle trees according to the circulation information of the batch of goods
Tree;
Storage unit 505, for the corresponding cryptographic Hash of the root node of merkle trees to be deposited in publicly-owned chain, merkle trees
Remaining node and path deposit in alliance's chain.
Be above to a kind of commodity provided by the invention trace to the source information protective device saying of carrying out of second embodiment
It is bright, a kind of the trace to the source third embodiment of protective device of information of commodity provided by the invention will be illustrated below.
As shown in fig. 6, a kind of third embodiment for the protective device of information of tracing to the source the present invention provides commodity, including:
Memory 601, for storing instruction;
Processor 602 is coupled to memory 601, and it is real that processor 602 is configured as the instruction execution stored based on memory
The method that now any embodiment is related to such as in Fig. 1 or Fig. 3.
As shown in fig. 6, commodity are traced to the source, the protective device of information further includes communication interface 603, for being carried out with miscellaneous equipment
Information exchange.The device further includes bus 604 simultaneously, and processor 602, communication interface 603 and memory 601 pass through bus
604 complete mutual communication.
Memory 601 can include high-speed RAM memory, also can further include nonvolatile memory (non-volatile
Memory), a for example, at least magnetic disk storage.Memory 601 can also be memory array.Memory 601 be also possible to by
Piecemeal, and block can be combined into virtual volume by certain rule.
In addition, processor 602 section Yan Shi, mono- central processor CPU, or can be application-specific integrated circuit ASIC
(application specific integrated circuit), or be arranged to implement the one of the embodiment of the present invention
A or multiple integrated circuits.
Be above to a kind of commodity provided by the invention trace to the source information protective device saying of carrying out of third embodiment
It is bright, a kind of one embodiment of computer readable storage medium provided by the invention will be illustrated below.
A kind of one embodiment of computer readable storage medium provided by the invention, computer-readable recording medium storage
There is computer instruction, the method that any embodiment is related in such as Fig. 1 or Fig. 3 is realized when described instruction is executed by processor.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, device or unit
It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention
Portion or part steps.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before
Stating embodiment, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding
The technical solution recorded in each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
Modification or replacement, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution.
Claims (10)
- The guard method of information 1. a kind of commodity are traced to the source, which is characterized in that including:Obtain in same batch of goods the commodity sign of every commodity and the circulation information of the batch of goods;Merkle trees are generated according to the circulation information of the commodity sign of every commodity in same batch of goods and the batch of goods;The corresponding cryptographic Hash of the root node of merkle trees is deposited in publicly-owned chain, remaining node of merkle trees and path storage In alliance's chain.
- The guard method of information 2. commodity according to claim 1 are traced to the source, which is characterized in that according to every in same batch of goods The circulation information of the commodity sign of commodity and the batch of goods generates merkle trees and specifically includes:The left subtree of merkle trees is generated according to the commodity sign of every commodity in same batch of goods;The right subtree of merkle trees is generated according to the circulation information of the batch of goods.
- The guard method of information 3. commodity according to claim 2 are traced to the source, which is characterized in that according to every in same batch of goods The left subtree that the commodity sign of commodity generates merkle trees specifically includes:Using the commodity sign of sole product in same batch of goods as a leaf node of the left subtree of merkle trees, generate The commodity sign merkle subtrees of leaf node including preset quantity, wherein commodity sign merkle subtrees are merkle The left subtree of tree, and if in the batch of goods sole product actual quantity be less than preset quantity, generate random data and fill out Fill the leaf node for null value in commodity sign merkle subtrees.
- The guard method of information 4. commodity according to claim 3 are traced to the source, which is characterized in that obtain in same batch of goods Further include before the commodity sign of every commodity and the circulation information of the batch of goods:The commodity sign of every commodity is endorsed by the private key of manufacturer.
- The guard method of information 5. commodity according to claim 4 are traced to the source, which is characterized in that obtain in same batch of goods Further include before the commodity sign of every commodity and the circulation information of the batch of goods:The circulation information of the batch of goods is endorsed by the private key of logistics initiator.
- The protective device of information 6. a kind of commodity are traced to the source, which is characterized in that including:Acquiring unit, the circulation letter of commodity sign and the batch of goods for obtaining in same batch of goods every commodity Breath;Merkle tree generation units, for according to the commodity signs of every commodity in same batch of goods and the batch of goods The information that circulates generates merkle trees;Storage unit, for the corresponding cryptographic Hash of the root node of merkle trees to be deposited in publicly-owned chain, merkle trees remaining Node and path are deposited in alliance's chain.
- The protective device of information 7. commodity according to claim 6 are traced to the source, feature exist, and Merkle tree generation units are specific Including:Left subtree generates subelement, the left side for generating merkle trees according to the commodity sign of every commodity in same batch of goods Subtree;Right subtree generates subelement, the right subtree for generating merkle trees according to the circulation information of the batch of goods.
- The protective device of information 8. commodity according to claim 7 are traced to the source, which is characterized in that left subtree generates subelement, It is additionally operable to using the commodity sign of sole product in same batch of goods as a leaf node of the left subtree of merkle trees, it is raw At the commodity sign merkle subtrees of the leaf node including preset quantity, wherein commodity sign merkle subtrees are The left subtree of merkle trees, and if the actual quantity of sole product is less than preset quantity in the batch of goods, generate random Data fill the leaf node for null value in commodity sign merkle subtrees.
- The protective device of information 9. a kind of commodity are traced to the source, which is characterized in that including:Memory, for storing instruction;Processor is coupled to the memory, and it is real that the processor is configured as the instruction execution stored based on the memory The now method as described in any one of claim 1 to 5.
- 10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to It enables, the method as described in any one of claim 1 to 5 is realized when described instruction is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810411525.2A CN108595980B (en) | 2018-05-02 | 2018-05-02 | Method and device for protecting commodity traceability information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810411525.2A CN108595980B (en) | 2018-05-02 | 2018-05-02 | Method and device for protecting commodity traceability information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108595980A true CN108595980A (en) | 2018-09-28 |
CN108595980B CN108595980B (en) | 2023-01-24 |
Family
ID=63620592
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810411525.2A Active CN108595980B (en) | 2018-05-02 | 2018-05-02 | Method and device for protecting commodity traceability information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108595980B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109377244A (en) * | 2018-10-24 | 2019-02-22 | 武汉珞樱联创信息科技有限公司 | A kind of quick traceability system of food and method based on multichain interconnection block chain network |
CN109508905A (en) * | 2018-12-18 | 2019-03-22 | 深圳壹账通智能科技有限公司 | Drug monitoring and managing method and device, storage medium and server based on block chain |
CN109741078A (en) * | 2018-12-28 | 2019-05-10 | 广东长盈科技股份有限公司 | One kind is towards retrospective Internet of Things storage system and method |
CN110119763A (en) * | 2019-04-16 | 2019-08-13 | 福建天晴数码有限公司 | Logistic regression data optimization methods, storage medium based on Merkel's tree thought |
CN110688377A (en) * | 2019-08-30 | 2020-01-14 | 阿里巴巴集团控股有限公司 | Method and device for updating state Merck tree |
CN111080311A (en) * | 2019-10-24 | 2020-04-28 | 广州运通链达金服科技有限公司 | Commodity tracing method and device based on block chain |
CN111967028A (en) * | 2020-08-04 | 2020-11-20 | 中国科学院上海微系统与信息技术研究所 | Data interaction system |
CN112632060A (en) * | 2020-08-31 | 2021-04-09 | 上海墨珩网络科技有限公司 | Block chain based hierarchical traceability batch information recording method and device |
US10992459B2 (en) | 2019-08-30 | 2021-04-27 | Advanced New Technologies Co., Ltd. | Updating a state Merkle tree |
CN113382005A (en) * | 2021-06-10 | 2021-09-10 | 南京财经大学 | Traceable logistics method with privacy protection and traceable logistics system |
CN117875990A (en) * | 2024-03-13 | 2024-04-12 | 贵州省畜牧兽医研究所 | Honey tracing method and system based on blockchain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105138478A (en) * | 2015-07-28 | 2015-12-09 | 哈尔滨工程大学 | Memory integrity protection method employing unbalanced hash tree mode |
CN106372533A (en) * | 2016-09-14 | 2017-02-01 | 中国银联股份有限公司 | Block chain technology-based content storage method |
CN107122985A (en) * | 2017-05-09 | 2017-09-01 | 广东工业大学 | A kind of agricultural-product supply-chain traceability system based on Internet of Things and block chain |
US20170262862A1 (en) * | 2015-12-21 | 2017-09-14 | Mohamed Alaa Aljawhari | Method and apparatus for managing and providing provenance of product using blockchain |
CN107657460A (en) * | 2017-09-08 | 2018-02-02 | 众安信息技术服务有限公司 | A kind of tobacco based on block chain is false proof and source tracing method and system |
-
2018
- 2018-05-02 CN CN201810411525.2A patent/CN108595980B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105138478A (en) * | 2015-07-28 | 2015-12-09 | 哈尔滨工程大学 | Memory integrity protection method employing unbalanced hash tree mode |
US20170262862A1 (en) * | 2015-12-21 | 2017-09-14 | Mohamed Alaa Aljawhari | Method and apparatus for managing and providing provenance of product using blockchain |
CN106372533A (en) * | 2016-09-14 | 2017-02-01 | 中国银联股份有限公司 | Block chain technology-based content storage method |
CN107122985A (en) * | 2017-05-09 | 2017-09-01 | 广东工业大学 | A kind of agricultural-product supply-chain traceability system based on Internet of Things and block chain |
CN107657460A (en) * | 2017-09-08 | 2018-02-02 | 众安信息技术服务有限公司 | A kind of tobacco based on block chain is false proof and source tracing method and system |
Non-Patent Citations (1)
Title |
---|
肖丽 等: "基于区块链技术的中药溯源体系研究", 《时珍国医国药》 * |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109377244B (en) * | 2018-10-24 | 2022-04-15 | 武汉珞樱联创信息科技有限公司 | Food fast traceability system and method based on multi-chain interconnection block chain network |
CN109377244A (en) * | 2018-10-24 | 2019-02-22 | 武汉珞樱联创信息科技有限公司 | A kind of quick traceability system of food and method based on multichain interconnection block chain network |
CN109508905A (en) * | 2018-12-18 | 2019-03-22 | 深圳壹账通智能科技有限公司 | Drug monitoring and managing method and device, storage medium and server based on block chain |
CN109741078A (en) * | 2018-12-28 | 2019-05-10 | 广东长盈科技股份有限公司 | One kind is towards retrospective Internet of Things storage system and method |
CN110119763A (en) * | 2019-04-16 | 2019-08-13 | 福建天晴数码有限公司 | Logistic regression data optimization methods, storage medium based on Merkel's tree thought |
CN110688377A (en) * | 2019-08-30 | 2020-01-14 | 阿里巴巴集团控股有限公司 | Method and device for updating state Merck tree |
CN110688377B (en) * | 2019-08-30 | 2020-07-17 | 阿里巴巴集团控股有限公司 | Method and device for updating state Merck tree |
US10992459B2 (en) | 2019-08-30 | 2021-04-27 | Advanced New Technologies Co., Ltd. | Updating a state Merkle tree |
CN111080311A (en) * | 2019-10-24 | 2020-04-28 | 广州运通链达金服科技有限公司 | Commodity tracing method and device based on block chain |
CN111080311B (en) * | 2019-10-24 | 2024-04-26 | 广州运通链达金服科技有限公司 | Commodity tracing method and device based on blockchain |
CN111967028A (en) * | 2020-08-04 | 2020-11-20 | 中国科学院上海微系统与信息技术研究所 | Data interaction system |
CN111967028B (en) * | 2020-08-04 | 2021-05-25 | 中国科学院上海微系统与信息技术研究所 | Data interaction system |
CN112632060A (en) * | 2020-08-31 | 2021-04-09 | 上海墨珩网络科技有限公司 | Block chain based hierarchical traceability batch information recording method and device |
CN112632060B (en) * | 2020-08-31 | 2022-10-11 | 上海墨珩网络科技有限公司 | Block chain based hierarchical traceability batch information recording method and device |
CN113382005A (en) * | 2021-06-10 | 2021-09-10 | 南京财经大学 | Traceable logistics method with privacy protection and traceable logistics system |
CN113382005B (en) * | 2021-06-10 | 2023-09-29 | 南京财经大学 | Traceable logistics method with privacy protection function and traceable logistics system with same |
CN117875990A (en) * | 2024-03-13 | 2024-04-12 | 贵州省畜牧兽医研究所 | Honey tracing method and system based on blockchain |
CN117875990B (en) * | 2024-03-13 | 2024-05-28 | 贵州省畜牧兽医研究所 | Honey tracing method and system based on blockchain |
Also Published As
Publication number | Publication date |
---|---|
CN108595980B (en) | 2023-01-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108595980A (en) | A kind of commodity trace to the source information guard method and device | |
EP3720045B1 (en) | Blockchain-based data verification method and apparatus | |
US11562451B1 (en) | Apparatus for proportional calculation regarding non-fungible tokens | |
JP6674961B2 (en) | Computer-implemented method for adapting a deterministically reproducible, cryptographic representation to a group of all associated items in a lot of similar items across a distribution chain | |
CN111105236A (en) | Realization algorithm of non-homogeneity evidence | |
CN108009810A (en) | A kind of Trusted Digital transaction in assets method | |
CN109255056B (en) | Data reference processing method, device, equipment and storage medium of block chain | |
CN109597822A (en) | A kind of storage of user data and querying method and user data processing unit | |
CN106447362A (en) | Method of preventing fake and shoddy commodities from entering into circulation field and device thereof | |
CN106203919A (en) | Run through the book keeping operation formula commodity counterfeit prevention source tracing method of supply chain | |
WO2019246399A1 (en) | Digital ledger for unique item ids with ownership | |
CN110766421A (en) | Commodity anti-counterfeiting method and device based on block chain | |
CN112862502A (en) | Authentication and transaction tracing method, system and storage medium based on block chain | |
US11037147B2 (en) | Money transfer fraud prevention methods and systems | |
CN107704546A (en) | Page configuration method and server | |
JP2020197937A (en) | Authenticity determining apparatus, authenticity determining system, and authenticity determining method | |
CN112070567B (en) | Quality control system based on block chain and control method thereof | |
CN105593876B (en) | Validation in serialized streams | |
CN111881482A (en) | User identity privacy encryption method based on block chain technology | |
CN107770165A (en) | The method and apparatus that a kind of analog machine sends request | |
CN111311284A (en) | Cosmetics traceability platform system based on block chain | |
CN114140133B (en) | Method for processing tracing data | |
CN111882335B (en) | Block chain-based target anti-counterfeiting tracing method and device | |
CN109150994A (en) | Hot spot data processing method, device and electronic equipment | |
RU2322692C1 (en) | Method for identification and accounting of movement of marked objects and informational system for realization of the method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |