CN110490282A - Source tracing method, device of tracing to the source, traceability system and storage medium - Google Patents

Source tracing method, device of tracing to the source, traceability system and storage medium Download PDF

Info

Publication number
CN110490282A
CN110490282A CN201910773740.1A CN201910773740A CN110490282A CN 110490282 A CN110490282 A CN 110490282A CN 201910773740 A CN201910773740 A CN 201910773740A CN 110490282 A CN110490282 A CN 110490282A
Authority
CN
China
Prior art keywords
source
tracing
information
chain
identifying code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910773740.1A
Other languages
Chinese (zh)
Inventor
陈月华
袁小黎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yinfang Technology Co Ltd
Hunan Dao Industry Information Technology Co Ltd
Original Assignee
Shenzhen Yinfang Technology Co Ltd
Hunan Dao Industry Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yinfang Technology Co Ltd, Hunan Dao Industry Information Technology Co Ltd filed Critical Shenzhen Yinfang Technology Co Ltd
Priority to CN201910773740.1A priority Critical patent/CN110490282A/en
Publication of CN110490282A publication Critical patent/CN110490282A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Accounting & Taxation (AREA)
  • Human Resources & Organizations (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Data Mining & Analysis (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of source tracing method, device of tracing to the source, traceability system and storage mediums.Block chain includes side chain and main chain, and source tracing method includes: that acquisition is traced to the source information;The information that will trace to the source is stored to side chain;Processing traces to the source information to obtain identifying code of tracing to the source;The identifying code that will trace to the source is stored to main chain.So, the information that will trace to the source is stored to side chain, and the identifying code that will trace to the source is stored to main chain, using side chain technology to main chain dilatation, the storage to information of tracing to the source simply and easily is realized, the handling capacity of transaction is substantially increased, reduces order execution delay, reduce transaction cost, and ensure that the safety for information of tracing to the source.

Description

Source tracing method, device of tracing to the source, traceability system and storage medium
Technical field
This application involves block chain technical fields, and in particular to a kind of source tracing method, device of tracing to the source, traceability system and storage Medium.
Background technique
The relevant technologies produce links all in all supply chains usually by the core enterprise in supply chain as information centre The database of raw data input core enterprise foundation of tracing to the source, and use the modes such as scans the two-dimensional code and provides a user inquiry and take Business.In other words, the relevant technologies usually establish centralization traceability system by the core enterprise in supply chain.However, this trace to the source System has the defects of information occlusion, supervision retrospect is difficult, without direct benefit output, data abuse.
Summary of the invention
This application provides a kind of source tracing method, device of tracing to the source, traceability system and storage mediums.
The application embodiment provides a kind of source tracing method based on block chain.The block chain includes side chain and main chain, The source tracing method includes:
Acquisition is traced to the source information;
The information of tracing to the source is stored to the side chain;
Information of tracing to the source described in processing is to obtain identifying code of tracing to the source;
The identifying code of tracing to the source is stored to the main chain.
The application embodiment provides a kind of device of tracing to the source based on block chain.The block chain includes side chain and main chain, The device of tracing to the source includes obtaining module, the first memory module, processing module and the second memory module, the acquisition module to be used for Acquisition is traced to the source information;First memory module is used to store the information of tracing to the source to the side chain;The processing module is used Information is traced to the source to obtain identifying code of tracing to the source described in the processing;Second memory module is for arriving the identifying code storage of tracing to the source The main chain.
The application embodiment provides a kind of traceability system based on block chain.The block chain includes side chain and main chain, The traceability system includes processor and the memory that is connected to the processor, and the memory is stored with program of tracing to the source, institute It states when program of tracing to the source is executed by the processor and realizes above-mentioned source tracing method.
The application embodiment provides a kind of computer readable storage medium.It is stored on the computer readable storage medium It traces to the source program, the program of tracing to the source realizes above-mentioned source tracing method when being executed by processor.
The source tracing method of the application embodiment, device of tracing to the source, traceability system and storage medium, the information that will trace to the source storage are arrived Side chain, and the identifying code storage that will trace to the source, using side chain technology to main chain dilatation, is simply and easily realized to letter of tracing to the source to main chain The storage of breath substantially increases the handling capacity of transaction, reduces order execution delay, reduces transaction cost, and ensure that letter of tracing to the source The safety of breath.
The additional aspect and advantage of presently filed embodiment will be set forth in part in the description, partially will be from following Description in become obvious, or recognized by the practice of presently filed embodiment.
Detailed description of the invention
The above-mentioned and/or additional aspect and advantage of the application is from combining in description of the following accompanying drawings to embodiment by change It obtains obviously and is readily appreciated that, in which:
Fig. 1 is the flow diagram of the source tracing method of the application embodiment;
Fig. 2 is the module diagram of the traceability system of the application embodiment;
Fig. 3 is another module diagram of the traceability system of the application embodiment;
Fig. 4 is the deployment model of the traceability system of the relevant technologies;
Fig. 5 is the deployment model of another traceability system of the relevant technologies;
Fig. 6 is the usage scenario schematic diagram of the intelligent contract of the source tracing method of the application embodiment;
Fig. 7 is the flow diagram of the source tracing method of another embodiment of the application;
Fig. 8 is the flow diagram of the source tracing method of the another embodiment of the application;
Fig. 9 is the process schematic of the data processing of the source tracing method of the application embodiment;
Figure 10 is the flow diagram of the source tracing method of the application a further embodiment;
Figure 11 is the flow diagram of the source tracing method of another embodiment of the application;
Figure 12 is the flow diagram of the source tracing method of the another embodiment of the application;
Figure 13 is the flow diagram of the source tracing method of the application a further embodiment;
Figure 14 is the module diagram of the device of tracing to the source of the application embodiment.
Specific embodiment
Presently filed embodiment is described below in detail, the example of the embodiment is shown in the accompanying drawings, wherein from beginning Same or similar element or element with the same or similar functions are indicated to same or similar label eventually.Below by ginseng The embodiment for examining attached drawing description is exemplary, and is only used for explaining the application, and should not be understood as the limitation to the application.
In the description of the present application, term " first ", " second " are used for description purposes only, and should not be understood as instruction or dark Show relative importance or implicitly indicates the quantity of indicated technical characteristic.The feature of " first ", " second " is defined as a result, It can explicitly or implicitly include one or more feature.In the description of the present application, the meaning of " plurality " is Two or more, unless otherwise specifically defined.
In the description of the present application, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected or can be in communication with each other;It can be directly connected, it can also be by between intermediary It connects connected, can be the connection inside two elements or the interaction relationship of two elements.For the ordinary skill of this field For personnel, the concrete meaning of above-mentioned term in this application can be understood as the case may be.
Following disclosure provides many different embodiments or example is used to realize the different structure of the application.In order to Simplify disclosure herein, hereinafter the component of specific examples and setting are described.Certainly, they are merely examples, and And purpose does not lie in limitation the application.In addition, the application can in different examples repeat reference numerals and/or reference letter, This repetition is for purposes of simplicity and clarity, itself not indicate between discussed various embodiments and/or setting Relationship.In addition, this application provides various specific techniques and material example, but those of ordinary skill in the art can be with Recognize the application of other techniques and/or the use of other materials.
Fig. 1, Fig. 2 and Fig. 3 are please referred to, the application embodiment provides a kind of source tracing method based on block chain.Block chain Including side chain 110 and main chain 120.Source tracing method includes:
Step S14: information of tracing to the source is obtained;
Step S15: the information that will trace to the source storage to side chain 110;
Step S16: processing traces to the source information to obtain identifying code of tracing to the source;
Step S17: the identifying code that will trace to the source storage to main chain 120.
The application embodiment provides a kind of traceability system 100 based on block chain.Block chain includes side chain 110 and main chain 120, traceability system 100 includes processor 101 and the memory 102 connecting with processor 101, and memory 102, which is stored with, traces to the source Program, program of tracing to the source realize above-mentioned source tracing method when being executed by processor 101.
In other words, processor 101 is for obtaining information of tracing to the source;And it stores for the information that will trace to the source to side chain 110;And it uses Information is traced to the source in processing to obtain identifying code of tracing to the source;And it stores for the identifying code that will trace to the source to main chain 120.
The source tracing method and traceability system 100 of the application embodiment, the information that will trace to the source is stored to side chain 110, and will be traced back Identifying code storage in source is simply and easily realized using 110 technology of side chain to 120 dilatation of main chain to information of tracing to the source to main chain 120 Storage, substantially increase the handling capacity of transaction, reduce order execution delay, reduce transaction cost, and ensure that information of tracing to the source Safety.
In the application present embodiment, side chain 110 is alliance's chain, and main chain 120 is publicly-owned chain, such as ether mill.It can be with Understand, in other implementations, side chain 110 and main chain 120 can be publicly-owned chain, privately owned chain or other kinds of block Chain.The concrete form of side chain 110 and main chain 120 is not defined herein.
The source tracing method and traceability system 100 of the application present embodiment, can be applied to the information source tracing of supply chain.For side Just illustrate, be next explained and illustrated so that source tracing method and traceability system 100 are applied to the information source tracing of supply chain as an example. It is appreciated that this does not represent the limitation of the application scenarios to source tracing method and traceability system 100.
Supply chain traceability system is to carry out Life cycle in each stage to the product in supply chain from production to consumption The system of tracking.Establishing safe and efficient supply chain traceability system trusty is that supply chain production quality safety, guarantee is promoted to disappear The important means of the person's of expense equity.Since supply chain is related to that main body is numerous, data are asymmetric between main body, data sharing is without direct warp The reasons such as benefit output of helping, cause supply chain traceability system management difficulty big, low efficiency, especially in the side of data storage security Face faces numerous challenges.
The relevant technologies produce links all in all supply chains usually by the core enterprise in supply chain as information centre The database of raw data input core enterprise foundation of tracing to the source, and use the modes such as scans the two-dimensional code and provides a user inquiry and take Business.In other words, the relevant technologies usually establish centralization traceability system by the core enterprise in supply chain.However, this trace to the source System has the defects of information occlusion, supervision retrospect is difficult, without direct benefit output, data abuse.
Specifically, firstly, supply chain is made of numerous participation main bodys, trust due to lacking, many information are discretely protected There are in the respective system of main body, information centre is caused to be difficult to build.Meanwhile largely interaction and association are needed between the main body of supply chain Make, and the system of centralization makes information one-way flow, this is unfavorable for collaboration and cooperation between supply chain modes.Secondly, enterprise is difficult With equilibrium data, the relationship with secret protection is disclosed, it is open to supervision department's data not friendly enough, it is asked once quality occurs in product Topic, information tracing are easy to interrupt, and put to the proof difficulty of calling to account.Again, since supply chain traceability system is without direct benefit output, Supply chain traceability system needs to increase cost, but there is no the output of direct economic benefit, causes the enterprise in supply chain powerless Maintenance.Finally, centralization supply chain system is also easy to produce data of tracing to the source and makes since in data set, data circulation is unidirectional, lacks supervision The safety problems such as vacation, data tampering, leaking data seriously reduce the authenticity for data of tracing to the source.
And block chain is a kind of distributed storage technology of decentralization, it can establish letter in a network without center Appoint, guarantees can not the distorting of data, open and clear and trackability.The natural characteristic of block chain technology just traces back with supply chain The pain spot in source mutually agrees with, and traces to the source for supply chain and provides new solution.
Specifically, firstly, block chain guarantees that account book data can not distort using common recognition algorithm and cryptological technique, so that chain Upper information truth is reliable;Secondly, block chain is a distributed account book, it is able to solve enterprise in centralized system and is reluctant that intention is traced back Source platform Construction Party unidirectionally delivers the trust problem of data;Finally, block chain technology can be facilitated using intelligent contract it is more efficient Supply chain transaction and data sharing, form that supply chain is traceable, credible system standard.
The super account book that the existing supply chain traceability system realized using block chain technology is researched and developed usually using IBM Corporation Hyperledger is supported as Floor layer Technology.Hyperledger is a kind of alliance's chain technology, it only allows special group member With the block chain network of limited third party access.Since there are mechanism of permitting the entrance, number of nodes is less, uses high performance common recognition Reasons, alliance's chains such as algorithm (class BFT algorithm) usually possess higher transaction performance compared to publicly-owned chain.But in existing application In, alliance's chain is usually deployed into Fig. 4 and two kinds of models shown in fig. 5.
In alliance's chain model 2000 of Fig. 4, common recognition node 2001 is usually deployed in large enterprises and some third parties In mechanism.Such as certification authority, regulatory agency, core enterprise in Fig. 4.And the little Wei enterprise in supply chain, as raw material supply Quotient, dealer's (i.e. Partner Enterprises in Fig. 4) are answered, generally only terminal 2001 or Internet of Things acquires equipment 2003, will not configure Common recognition server.Which results in the unbalance of right of knowing together in alliance's chain, as common recognition node is very few to lead to common recognition strategy Failure.
In alliance's chain model 3000 of Fig. 5, common recognition node 3001 is deployed under the same common recognition domain by core enterprise, or Person utilizes Docker container technique to generate four common recognition nodes 3001 on same server and is used to know together, its in supply chain His enterprise utilizes the access alliance's chain of client node 3002.This way can facilitate small application and early period with save the cost Debugging, but the original intention and principle of alliance's chain have been violated, the effect of alliance's chain can not be played, it is without the slightest difference with the system of centralization.
2013, Vitalik Buterin proposed that a kind of next generation encrypts currency and decentralization application platform --- with Too mill (Ethereum).The appearance of ether mill intelligence contract accelerates the development and application of block chain technology, and various traditional answers It is sought for scene and the combination of block chain technology, as supply chain is traced to the source, charitable public good, contract are anti-fake, electronic invoice, copyright Protection etc., especially supply chain is traced to the source.
Ether mill is a kind of public chain technology, realizes that supply chain is traced to the source on ether mill, it is necessary to consider how that solving transaction opens Sell big problem.Supplier needs to carry out every a collection of raw material information cochain, and processing industry needs the processing to every a collection of product Information carries out cochain, and dealer needs sales information cochain.These data can exert heavy pressures on to ether mill major network, also can High transaction procedure expense is brought, can also have higher confirmation delay, this is unacceptable.
Therefore, public chain technology is applied to supply chain to trace to the source and must carry out dilatation to it.Existing capacity-enlargement technology has lightning Network, thunder and lightning network, stator channel, fragment, side chain etc..Wherein, side chain technology be one kind can allow main chain token safely Other block chains are transferred to, and a kind of agreement of main chain can be returned to safely from other block chains.The agreement will be some frequent , carry out in the trade give-ups to side chain of small amount, not only increase the operational efficiency of public chain major network, be greatly reduced transaction hand It continues to pay dues.
However, carrying out dilatation to block chain using side chain technology, have the disadvantage that side chain technology contains only token and turns It moving, token transactions can be transferred to side chain progress by it, to obtain higher handling capacity and lower service charge, but can not be to confession It answers the nontransaction type information generated in chain traceability system to carry out dilatation, the mass data that traceability system generates can not also be carried out low Cost storage.
Based on this, the source tracing method and traceability system 100 of the application present embodiment, based on the side chain in block chain technology Technology realizes material handling, information sharing and the product traceability in supply chain by ether mill intelligence contract, meanwhile, utilize side Chain technology carries out dilatation to ether mill, and traceability system 100 is made to meet the needs of practical application.
Referring to Fig. 3, traceability system 100 may include side chain 110, main chain 120 and client modules 130.
Side chain 110 provides dilatation service for information cochain of tracing to the source, and increases the handling capacity in ether mill, when reducing trade confirmation Between, reduce transaction cost.Side chain 110 contains intelligent contract unit 112 and data synchronisation unit 114.Wherein intelligent contract sheet First 112 responsible processing business logics, data synchronisation unit 114 are responsible for being synchronized to ether mill after being handled every batch of transaction data Main chain 120.
Main chain 120 is realized based on ether mill, in the data interlock that it sends data synchronisation unit 114 to ether mill, and Revene lookup function is provided when traceability system 100 needs to verify and traces to the source information.
Client modules 130 are responsible for human-computer interaction.Client modules 130, which divide, inquires end for data input end and information.Letter Breath typing end will trace to the source information cochain by the main bodys such as supplier, and information inquiry end is then inquired by the interface of open system.
Referring to Fig. 6, traceability system 100 can be by intelligent contract come specification user right and/or operating process.Intelligence is closed It about can be used for user's registration, raw material typing, production, product are sold, are supervised with inquiry etc..
In some embodiments, source tracing method is used for supply chain, and source tracing method includes:
Obtain the user data and user's group number of supply chain;
User's registration is carried out according to user's group number and user data.
In this way, the registration of user in traceability system 100 is realized, so that the user of each supply chain has identical user Group number.Specifically, since public chain itself is without ID authentication mechanism, user's access can be realized by intelligent contract.It can To understand, due to the user of same supply chain user's group number having the same, can be arranged and use according to user's group number The permission at family, so that user can only add information of tracing to the source to the corresponding block chain of user's group number in the group of user's group number, it cannot Information of tracing to the source is added to other block chains.Number can be can be improved into the operation isolation of the information of tracing to the source to different supply chains in this way According to safety.
User's group number can be decided through consultation by the user of same supply chain, can also be randomly assigned by system, herein not to user group Number source be defined.It, can be by executing userRegister after the user data and user's group number for obtaining supply chain () function carries out user's registration, the user of same supply chain can be incorporated into the same user group, user group according to user's group number Interior user, which just has permission, adds information of tracing to the source to the corresponding block chain of user's group number.
The pseudo-code of the algorithm of user's registration is as follows in traceability system 100.
UserRegister () function in algorithm 1supplyChain contract
It is known: supplyChain contract address base_addr, user group number user_group, Customs Assigned Number user_id, User role user_name, contract publisher are owner.
It asks: completing or fail
After completing user's registration, the user of supply chain can be traced to the source information by step S14-S17 typing.Specifically, it traces back Source information can be by least one typing in supplier, manufacturer and dealer.
In step S14, information of tracing to the source can be acquired by internet of things equipment, can also voluntarily be uploaded by supplier, In This is not defined the source for information of tracing to the source.
Supplier is the information source of supply chain.In the link of supply chain, information of tracing to the source can be established initial for raw material Archives simultaneously distribute batch number.
In one example, by internet of things equipment to the production environment of raw material, production cycle, operation responsible person, original The data such as material date of manufacture are acquired, and then call rawRegister () function by data cochain.Certain batch raw material Archives of tracing to the source are modeled as:
<rawID,rawName,rawFac,produceTime,rawInfo>
The raw material that manufacturer can provide supplier are processed, and the minimum of output commodity sells unit.In supply chain The link, the commodity archives based on information of tracing to the source formally are established, and consumer query can be supplied in the form of two dimensional code.It traces back Source information may include raw material information, and manufacturer can call newProduct () function to carry out integration cochain to raw material information, It can also be in the URL of the big files such as product_info field write-in production environment, production video.
From the information of tracing to the source of dealer, the current intelligence of product can record, consumer query commodity can be helped Source helps manufacturer to prevent falsifying.Information of tracing to the source includes selling information.Dealer or loglstics enterprise can make after handling cargo It is that information is sold in commodity addition with product_deal () function.The quantity of dealer can be one or more, therefore, trace to the source Dynamic array bytes32 [] retailerNames can be used to be stored in the structural body of information.Due to code logic and original Expect that typing is more similar, production that details are not described herein again and the pseudocode for selling function.
Referring to Fig. 7, in some embodiments, source tracing method includes:
Step S11: logon data is obtained, logon data includes identity information;
Step S12: the typing permission of identity information is determined;
Step S13: in the case where typing permission is to have the right, S14 is entered step.
Accordingly, for processor 101 for obtaining logon data, logon data includes identity information;Determine identity information Typing permission;In the case where typing permission is to have the right, information of tracing to the source is obtained.
In this way, make the user for having typing permission could typing trace to the source information, it is ensured that the safety of traceability system 100 Property.Specifically, the source tracing method of the application embodiment can be used for server, and user can pass through client and traceability system 100 Client modules 130 interact, to log on to traceability system 100 and typing is traced to the source information.Client be, for example, mobile phone, Plate, laptop, PC, car-mounted terminal, wearable device etc..
In step s 11, user can input logon data to traceability system 100 by client.In step s 12, it traces back Source system 100 can parse logon data, obtain identity information, and the typing permission of the identity information is determined according to intelligent contract.
In one example, according to intelligent contract, supply chain that it is 0001 to product batches which, which does not have, into Row is traced to the source the permission of data input, and user request will trace to the source the supply chain that data input product batches are 0001.At this point, can Return to prompt information: " you do not have typing permission."
In another example, according to intelligent contract, supply chain that it is 0001 to product batches which, which has, into Row is traced to the source the permission of data input, and user request will trace to the source the supply chain that data input product batches are 0001.At this point, can It returns to prompt information: " you please be input and need the information of tracing to the source of typing."
Referring to Fig. 8, in some embodiments, the quantity of information to be traced to the source be it is multiple, step S16 includes:
Step S162: the validation value of each information to be traced to the source is calculated;
Step S164: identifying code of tracing to the source is determined according to whole validation values.
Accordingly, processor 101 is used to calculate the validation value of each information to be traced to the source;It is traced to the source according to the determination of whole validation values Identifying code.
In this way, realization processing traces to the source information to obtain identifying code of tracing to the source.In the present embodiment, it is arrived in information storage of tracing to the source After on side chain 110, Hash (Merkle Tree) algorithm can be used to carry out Hash locking, and the root Hash (Merkle that will be obtained Root) ether mill main chain 120 is synchronized to as identifying code of tracing to the source.It note that once information change of tracing to the source, Merkle Root It can change correspondingly.
Specifically, step S164 includes: that whole validation values are grouped to obtain multiple validation groups;According to each validation group Validation value determines verifying class value;Identifying code of tracing to the source is determined according to multiple verifying class values.It is determined in this way, realizing according to whole validation values It traces to the source identifying code.
Referring to Fig. 9, in the present embodiment, it, can be by supplier, manufacturer, warp on side chain after a wheel transaction Leaf node of the information as Merkle Tree of tracing to the source that the nodes such as quotient upload is sold, its cryptographic Hash is calculated.There are multiple supplies It, can be the information of different nodes respectively as leaf node processing in the case where quotient or dealer.Obtain several cryptographic Hash (H1,H2,H3...) after, then operation two-by-two is carried out to (H1, H2, H3 ...), seek cryptographic Hash.So circulation, until obtaining root Hash Merkle Root.Merkle Tree pseudo-code of the algorithm is as follows.
Algorithm 3.2Merkle Tree algorithm
Known: supply chain traces to the source information list_info=[T1, T2, T3 ...]
It asks: root Hash merkle_root
Referring to Fig. 10, in some embodiments, information of tracing to the source includes batch number, source tracing method includes:
Step S18: association traces to the source identifying code and batch number to obtain corresponding relationship.
Accordingly, processor 101 is for being associated with trace to the source identifying code and batch number to obtain corresponding relationship.
In this way, realizing the binding of trace to the source identifying code and batch number.It is appreciated that tracing to the source the one of identifying code and batch number One is corresponding, may make in the case where batch number determines, identifying code of tracing to the source corresponding in main chain 120 is uniquely determined, thus only One determines the identifying code of tracing to the source in the corresponding information of tracing to the source of side chain 110.The subsequent inquiry to information of tracing to the source can be made clear in this way Chu and specification.
In addition, corresponding relationship can be stored in the form of a table in the memory of traceability system 100.It is of course also possible to other Form storage, may also be stored in the equipment communicated with traceability system 100.Herein not to the specific storage mode of corresponding relationship and Specific storage location is defined.
Figure 11 is please referred to, in some embodiments, source tracing method includes:
Step S21: logon data is obtained, logon data includes identity information;
Step S22: the search access right of identity information is determined;
Step S23: in the case where search access right is to have the right, the query information of input is obtained;
Step S26: information of tracing to the source corresponding with query information is returned.
Accordingly, for processor 101 for obtaining logon data, logon data includes identity information;Determine identity information Search access right;In the case where search access right is to have the right, the query information of input is obtained;Return to trace to the source corresponding with query information Information.
In this way, making the user for having search access right that could inquire information of tracing to the source, it is ensured that the safety of traceability system 100 Property.As previously mentioned, search access right can be determined by intelligent peace treaty.Specifically, the source tracing method of the application embodiment can be used for taking Business device, user (such as consumer, regulator) can be interacted by the client modules 130 of client and traceability system 100, To log on to traceability system 100 and inquire information of tracing to the source.Client is, for example, mobile phone, plate, laptop, personal electricity Brain, car-mounted terminal, wearable device etc..
In one example, according to intelligent contract, supply chain that it is 0001 to product batches which, which does not have, into Row trace to the source information inquiry permission, and the user request inquiry product batches be 0001 supply chain information of tracing to the source.At this point, can Return to prompt information: " you do not have typing permission."
In another example, which requests the information of tracing to the source for the supply chain that inquiry product batches are 0001.According to intelligence Can contract, which there is the supply chain for being 0001 to product batches trace to the source the permission of information inquiry.At this point, can return Return the information of tracing to the source for the supply chain that product batches are 0001.
Figure 12 is please referred to, in some embodiments, query information includes batch number, and source tracing method includes:
Step S24: the corresponding identifying code of tracing to the source of batch number is determined according to the corresponding relationship prestored in main chain 120;
Step S25: the corresponding information of tracing to the source of identifying code of tracing to the source is obtained in side chain 110.
Accordingly, processor 101 is traced to the source for determining that batch number is corresponding according to the corresponding relationship prestored in main chain 120 Identifying code;The corresponding information of tracing to the source of identifying code of tracing to the source is obtained in side chain 110.
Information of tracing to the source is found according to batch number in this way, realizing, the information that will trace to the source returns to user.It is appreciated that It is corresponded due to tracing to the source identifying code with batch number, user's input product lot number, processor 101 can find correspondence The identifying code of tracing to the source for being stored in main chain 120.And be stored in main chain 120 trace to the source identifying code be stored in tracing back for side chain 110 Source information corresponds, and therefore, can find the corresponding information of tracing to the source for being stored in side chain 110 according to corresponding identifying code of tracing to the source.
Figure 13 is please referred to, in some embodiments, source tracing method includes:
Step S27: according to tracing to the source, identifying code determines whether information of tracing to the source is tampered.
Accordingly, processor 101 is used to determine whether information of tracing to the source is tampered according to identifying code of tracing to the source.
In this way, may be implemented to be determined to whether information of tracing to the source is tampered, it is further ensured that the safety of data.Specifically Ground can determine again identifying code of tracing to the source according to the information of tracing to the source got, in such a way that identifying code is traced to the source in determination above-mentioned. If the identifying code of tracing to the source that trace to the source identifying code and the main chain 120 that obtain again store is inconsistent, it can determine that the information of tracing to the source is usurped Change.
In one example, referring to Fig. 9, reusing aforementioned same side after user query to commodity trace to the source information Method obtains Merkle Root, and compared with being reliably worth on ether mill, if two values are inconsistent, Merkle is can be used in monitoring party Tree algorithm more quickly positions is tampered data from for which branch, and the specific link corresponded in supply chain is chased after Duty.
Figure 14 is please referred to, the application embodiment provides a kind of device 10 of tracing to the source based on block chain.Block chain includes side Chain 110 and main chain 120, device 10 of tracing to the source include obtaining module 14, the first memory module 15, processing module 16 and the second storage mould Block 17 obtains module 14 for obtaining information of tracing to the source;First memory module 15 is stored for the information that will trace to the source to side chain 110;Place Reason module 16 traces to the source information for handling to obtain identifying code of tracing to the source;Second memory module 17 is arrived for the identifying code storage that will trace to the source Main chain 120.
Each embodiment of the specific embodiment and above-mentioned source tracing method of the device 10 of tracing to the source of the application embodiment is basic Identical, this will not be repeated here.
In some embodiments, module 14 is obtained for obtaining logon data, and logon data includes identity information;It determines The typing permission of identity information;In the case where typing permission is to have the right, information of tracing to the source is obtained.
In some embodiments, processing module 16 is used to calculate the validation value of each information to be traced to the source;It is tested according to whole Card value determines identifying code of tracing to the source.
In some embodiments, module 14 is obtained for obtaining logon data, and logon data includes identity information;It determines The search access right of identity information;In the case where search access right is to have the right, the query information of input is obtained;Return and query information Corresponding information of tracing to the source.
In some embodiments, device 10 of tracing to the source includes enquiry module, and enquiry module is used in main chain 120 according to prestoring Corresponding relationship determine the corresponding identifying code of tracing to the source of batch number;The corresponding information of tracing to the source of identifying code of tracing to the source is obtained in side chain 110.
In some embodiments, enquiry module is used to determine whether information of tracing to the source is tampered according to identifying code of tracing to the source.
The embodiment of the present application also proposes a kind of computer readable storage medium, is stored with and traces back on computer readable storage medium Source program realizes the source tracing method such as above-mentioned any embodiment when program of tracing to the source is executed by processor.
Such as execute: step S14: obtaining information of tracing to the source;Step S15: the information that will trace to the source storage to side chain 110;Step S16: processing traces to the source information to obtain identifying code of tracing to the source;Step S17: the identifying code that will trace to the source storage to main chain 120.
The traceability system and computer readable storage medium of the application embodiment, the information that will trace to the source storage to side chain 110, And the identifying code storage that will trace to the source, using 110 technology of side chain to 120 dilatation of main chain, is simply and easily realized to tracing back to main chain 120 The storage of source information substantially increases the handling capacity of transaction, reduces order execution delay, reduces transaction cost, and ensure that and trace back The safety of source information.
Each reality of the specific embodiment of the computer readable storage medium of the application embodiment and above-mentioned source tracing method It is essentially identical to apply example, this will not be repeated here.
In summary, the source tracing method of the application embodiment, device 10 of tracing to the source, traceability system 100 and storage medium, it is real The traceability system of a supply chain Life cycle is showed, while dilatation is carried out to block chain using ether mill side chain technology, has mentioned The high trading efficiency of traceability system, meets the demand of actual production.
Specifically, the source tracing method of the application embodiment, device 10 of tracing to the source, traceability system 100 and storage medium, are based on Public chain.The cost of enterprise's deployment system can be substantially reduced using public block chain technology, and ensure that in supply chain and own The common recognition of participant is weighed, and the reliability of system is increased, and safeguards the authenticity for data of tracing to the source.
In addition, traditional expansion method is generally just for the token transactions in bit coin or ether mill.And the application is implemented The source tracing method of mode, device 10 of tracing to the source, traceability system 100 and storage medium trace back side chain capacity-enlargement technology applied to supply chain In the dilatation of source data, the data that will trace to the source first are stored in side chain 110, then by the data simultaneous module on side chain 110, will count According to cryptographic Hash be stored in ether mill main chain 120.Preferable storage performance can be obtained in this way, and guarantees the safety of data.
In the description of this specification, reference term " certain embodiments ", " embodiment ", " some embodiment party The description of formula ", " exemplary embodiment ", " example ", " specific example " or " some examples " etc. mean to combine embodiment or Example particular features, structures, materials, or characteristics described are contained at least one embodiment or example of the application.In In this specification, schematic expression of the above terms are not necessarily referring to identical embodiment or example.Moreover, description Particular features, structures, materials, or characteristics can be in any one or more embodiments or example in an appropriate manner In conjunction with.
Although presently filed embodiment has been shown and described above, it is to be understood that above embodiment is Illustratively, it should not be understood as the limitation to the application, those skilled in the art within the scope of application can be right Above embodiment is changed, modifies, replacement and variant, and scope of the present application is defined by the claims and their equivalents.

Claims (10)

1. a kind of source tracing method based on block chain, which is characterized in that the block chain includes side chain and main chain, the side of tracing to the source Method includes:
Acquisition is traced to the source information;
The information of tracing to the source is stored to the side chain;
Information of tracing to the source described in processing is to obtain identifying code of tracing to the source;
The identifying code of tracing to the source is stored to the main chain.
2. source tracing method as described in claim 1, which is characterized in that the source tracing method includes:
Logon data is obtained, the logon data includes identity information;
Determine the typing permission of the identity information;
In the case where the typing permission is to have the right, the step of tracing to the source information is obtained into described.
3. source tracing method as described in claim 1, which is characterized in that the quantity of the information to be traced to the source is multiple, processing institute Information to be traced to the source is stated to obtain identifying code of tracing to the source, comprising:
Calculate the validation value of each information to be traced to the source;
According to all validation values determine described in trace to the source identifying code.
4. source tracing method as described in claim 1, which is characterized in that the information of tracing to the source includes batch number, described to trace to the source Method includes:
Identifying code and the batch number are traced to the source described in association to obtain corresponding relationship.
5. source tracing method as described in claim 1, which is characterized in that the source tracing method includes:
Logon data is obtained, the logon data includes identity information;
Determine the search access right of the identity information;
In the case where the search access right is to have the right, the query information of input is obtained;
Return to information of tracing to the source corresponding with the query information.
6. source tracing method as claimed in claim 5, which is characterized in that the query information includes batch number, described to trace to the source Method includes:
The corresponding identifying code of tracing to the source of the batch number is determined according to the corresponding relationship prestored in the main chain;
The corresponding information of tracing to the source of identifying code of tracing to the source described in being obtained in the side chain.
7. source tracing method as claimed in claim 6, which is characterized in that the source tracing method includes:
According to the identifying code of tracing to the source determine described in information of tracing to the source whether be tampered.
8. a kind of device of tracing to the source based on block chain, which is characterized in that the block chain includes side chain and main chain, the dress of tracing to the source It sets including obtaining module, the first memory module, processing module and the second memory module, the acquisition module is for obtaining letter of tracing to the source Breath;First memory module is used to store the information of tracing to the source to the side chain;The processing module is described for handling Information is traced to the source to obtain identifying code of tracing to the source;Second memory module is used to store the identifying code of tracing to the source to the main chain.
9. a kind of traceability system based on block chain, which is characterized in that the block chain includes side chain and main chain, and described trace to the source is System includes processor and the memory being connected to the processor, and the memory is stored with program of tracing to the source, the program of tracing to the source The source tracing method as described in any one of claims 1 to 7 is realized when being executed by the processor.
10. a kind of computer readable storage medium, which is characterized in that be stored with journey of tracing to the source on the computer readable storage medium Sequence realizes the source tracing method as described in any one of claims 1 to 7 when the program of tracing to the source is executed by processor.
CN201910773740.1A 2019-08-21 2019-08-21 Source tracing method, device of tracing to the source, traceability system and storage medium Pending CN110490282A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910773740.1A CN110490282A (en) 2019-08-21 2019-08-21 Source tracing method, device of tracing to the source, traceability system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910773740.1A CN110490282A (en) 2019-08-21 2019-08-21 Source tracing method, device of tracing to the source, traceability system and storage medium

Publications (1)

Publication Number Publication Date
CN110490282A true CN110490282A (en) 2019-11-22

Family

ID=68551626

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910773740.1A Pending CN110490282A (en) 2019-08-21 2019-08-21 Source tracing method, device of tracing to the source, traceability system and storage medium

Country Status (1)

Country Link
CN (1) CN110490282A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110690974A (en) * 2019-12-10 2020-01-14 腾讯科技(深圳)有限公司 Block chain based data verification method, device, equipment and readable storage medium
CN111078799A (en) * 2019-12-27 2020-04-28 中钞信用卡产业发展有限公司杭州区块链技术研究院 Tracing information storage method, device, equipment and readable storage medium
CN111698220A (en) * 2020-05-20 2020-09-22 厦门区块链云科技有限公司 Block chain anti-counterfeiting traceability verification system
CN111898165A (en) * 2020-07-09 2020-11-06 宁波浙大联科科技有限公司 Technical parameter change tracing method and system in PDM system
CN112348539A (en) * 2020-11-25 2021-02-09 贵州航天云网科技有限公司 Industrial product circulation life cycle tracing management system based on license chain and application thereof
CN112365277A (en) * 2020-12-07 2021-02-12 四川长虹电器股份有限公司 Decentralization charitable donation tracking system
CN112507392A (en) * 2020-12-10 2021-03-16 链博(成都)科技有限公司 Cross-chain data interaction data tracing method and system
CN113157809A (en) * 2021-04-28 2021-07-23 杭州丽冠科技有限公司 Traversal method and device based on block chain side chain and computer readable storage medium
CN113256307A (en) * 2021-05-25 2021-08-13 成都云租租科技有限公司 House leasing traceability system based on block chain and implementation method thereof
CN113506117A (en) * 2021-07-15 2021-10-15 上海海洋大学 Aquatic product block chain traceability optimization system and method
CN113706171A (en) * 2021-08-27 2021-11-26 广西卡西亚科技有限公司 Block chain agricultural product tracing method based on Beidou grid code
CN113704813A (en) * 2021-07-20 2021-11-26 武汉理工大学 Maritime work equipment secondary identification data storage method and system, and verification method and system
CN114915428A (en) * 2022-07-18 2022-08-16 江苏数一科技服务有限公司 Alliance chain suitable for circulation steel is traceed to source
CN114996664A (en) * 2022-06-13 2022-09-02 中国科学院沈阳自动化研究所 Block chain-based digital copyright protection method
WO2024007855A1 (en) * 2022-07-05 2024-01-11 腾讯科技(深圳)有限公司 Data processing method and device based on blockchain, and readable storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016109835A1 (en) * 2014-12-31 2016-07-07 Dauntless Software Inc. Supply chain management systems and methods
CN106779737A (en) * 2016-11-30 2017-05-31 电子科技大学 Product based on block chain technology is traced to the source verification method
CN107423980A (en) * 2017-07-11 2017-12-01 厦门易功成信息技术有限公司 Data trade reference platform and method in a kind of supply chain
WO2018163044A1 (en) * 2017-03-05 2018-09-13 Tatchell Shona System and method for provision of supply chain financing of ethically verified product where there has been verification of production processes and products inspection using blockchain smart contracts
CN108921329A (en) * 2018-06-08 2018-11-30 北京工商大学 A kind of food transaction Method of Optimal Matching based on block chain technology
US20180349893A1 (en) * 2017-06-03 2018-12-06 Tsai Cheng Yu System for outputting product traceability code
CN109034833A (en) * 2018-06-16 2018-12-18 复旦大学 A kind of product back-tracing information management system and method based on block chain
CN109064063A (en) * 2018-09-11 2018-12-21 北京工商大学 A kind of food safety risk Source Tracing system and method based on block chain
CN109191003A (en) * 2018-09-25 2019-01-11 仲恺农业工程学院 Fruit and vegetable agricultural product quality safety traceability system based on block chain
CN109711836A (en) * 2018-11-15 2019-05-03 远光软件股份有限公司 A kind of storage method of transaction, storage network and electronic equipment
CN109768988A (en) * 2019-02-26 2019-05-17 安捷光通科技成都有限公司 Decentralization Internet of Things security certification system, facility registration and identity identifying method
CN109919769A (en) * 2019-03-15 2019-06-21 北京世纪诚链科技有限公司 Model and its implementation across chain tra nsfer are worth between a kind of main chain side chain
CN110033243A (en) * 2019-03-06 2019-07-19 华南师范大学 Main chain based on block chain intelligence contract deposits card method, system and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016109835A1 (en) * 2014-12-31 2016-07-07 Dauntless Software Inc. Supply chain management systems and methods
CN106779737A (en) * 2016-11-30 2017-05-31 电子科技大学 Product based on block chain technology is traced to the source verification method
WO2018163044A1 (en) * 2017-03-05 2018-09-13 Tatchell Shona System and method for provision of supply chain financing of ethically verified product where there has been verification of production processes and products inspection using blockchain smart contracts
US20180349893A1 (en) * 2017-06-03 2018-12-06 Tsai Cheng Yu System for outputting product traceability code
CN107423980A (en) * 2017-07-11 2017-12-01 厦门易功成信息技术有限公司 Data trade reference platform and method in a kind of supply chain
CN108921329A (en) * 2018-06-08 2018-11-30 北京工商大学 A kind of food transaction Method of Optimal Matching based on block chain technology
CN109034833A (en) * 2018-06-16 2018-12-18 复旦大学 A kind of product back-tracing information management system and method based on block chain
CN109064063A (en) * 2018-09-11 2018-12-21 北京工商大学 A kind of food safety risk Source Tracing system and method based on block chain
CN109191003A (en) * 2018-09-25 2019-01-11 仲恺农业工程学院 Fruit and vegetable agricultural product quality safety traceability system based on block chain
CN109711836A (en) * 2018-11-15 2019-05-03 远光软件股份有限公司 A kind of storage method of transaction, storage network and electronic equipment
CN109768988A (en) * 2019-02-26 2019-05-17 安捷光通科技成都有限公司 Decentralization Internet of Things security certification system, facility registration and identity identifying method
CN110033243A (en) * 2019-03-06 2019-07-19 华南师范大学 Main chain based on block chain intelligence contract deposits card method, system and storage medium
CN109919769A (en) * 2019-03-15 2019-06-21 北京世纪诚链科技有限公司 Model and its implementation across chain tra nsfer are worth between a kind of main chain side chain

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110690974B (en) * 2019-12-10 2020-06-23 腾讯科技(深圳)有限公司 Block chain based data verification method, device, equipment and readable storage medium
CN110690974A (en) * 2019-12-10 2020-01-14 腾讯科技(深圳)有限公司 Block chain based data verification method, device, equipment and readable storage medium
CN111078799A (en) * 2019-12-27 2020-04-28 中钞信用卡产业发展有限公司杭州区块链技术研究院 Tracing information storage method, device, equipment and readable storage medium
CN111698220A (en) * 2020-05-20 2020-09-22 厦门区块链云科技有限公司 Block chain anti-counterfeiting traceability verification system
CN111898165A (en) * 2020-07-09 2020-11-06 宁波浙大联科科技有限公司 Technical parameter change tracing method and system in PDM system
CN112348539B (en) * 2020-11-25 2024-05-14 贵州航天云网科技有限公司 Industrial commodity circulation life cycle traceability management system based on license chain and application thereof
CN112348539A (en) * 2020-11-25 2021-02-09 贵州航天云网科技有限公司 Industrial product circulation life cycle tracing management system based on license chain and application thereof
CN112365277A (en) * 2020-12-07 2021-02-12 四川长虹电器股份有限公司 Decentralization charitable donation tracking system
CN112507392A (en) * 2020-12-10 2021-03-16 链博(成都)科技有限公司 Cross-chain data interaction data tracing method and system
CN113157809A (en) * 2021-04-28 2021-07-23 杭州丽冠科技有限公司 Traversal method and device based on block chain side chain and computer readable storage medium
CN113256307A (en) * 2021-05-25 2021-08-13 成都云租租科技有限公司 House leasing traceability system based on block chain and implementation method thereof
CN113506117A (en) * 2021-07-15 2021-10-15 上海海洋大学 Aquatic product block chain traceability optimization system and method
CN113704813A (en) * 2021-07-20 2021-11-26 武汉理工大学 Maritime work equipment secondary identification data storage method and system, and verification method and system
CN113706171A (en) * 2021-08-27 2021-11-26 广西卡西亚科技有限公司 Block chain agricultural product tracing method based on Beidou grid code
CN113706171B (en) * 2021-08-27 2024-01-05 广西卡西亚科技有限公司 Block chain agricultural product tracing method based on Beidou grid codes
CN114996664A (en) * 2022-06-13 2022-09-02 中国科学院沈阳自动化研究所 Block chain-based digital copyright protection method
CN114996664B (en) * 2022-06-13 2024-04-23 中国科学院沈阳自动化研究所 Digital copyright protection method based on block chain
WO2024007855A1 (en) * 2022-07-05 2024-01-11 腾讯科技(深圳)有限公司 Data processing method and device based on blockchain, and readable storage medium
CN114915428A (en) * 2022-07-18 2022-08-16 江苏数一科技服务有限公司 Alliance chain suitable for circulation steel is traceed to source

Similar Documents

Publication Publication Date Title
CN110490282A (en) Source tracing method, device of tracing to the source, traceability system and storage medium
Al-Breiki et al. Trustworthy blockchain oracles: review, comparison, and open research challenges
CN109218079B (en) Block chain network, deployment method and storage medium
CN109325854B (en) Block chain network, deployment method and storage medium
CN109191124B (en) Block chain network, deployment method and storage medium
CN110599181B (en) Data processing method, device and equipment based on block chain and storage medium
Vatankhah Barenji A blockchain technology based trust system for cloud manufacturing
US11151582B2 (en) Smart logistics management using blockchain
Dzobo et al. Proposed framework for blockchain technology in a decentralised energy network
Kodali et al. Blockchain based energy trading
JP2022527375A (en) Systems and methods for virtual distributed ledger networks
Harshavardhan et al. Blockchain technology in cloud computing to overcome security vulnerabilities
CN110471982A (en) Data processing method and device based on block chain
CN110942305A (en) Real estate information management method and device based on block chain
CN111383020A (en) Block chain-based article anti-counterfeiting management method, device, equipment and storage medium
Garriga et al. Blockchain and cryptocurrency: A comparative framework of the main architectural drivers
Romano et al. Beyond bitcoin: recent trends and perspectives in distributed ledger technology
CN115701078B (en) Cross-chain transaction processing method, device, electronic equipment and storage medium
CN111028078A (en) Method for applying block chain intelligent contract technology to bill pool service
Meydani et al. A Comprehensive Review of the Applications of Blockchain Technology
Vijayalakshmi et al. A Blockchain‐Based Secure Radio Frequency Identification Ownership Transfer Protocol
Wu et al. Evolution process and supply chain adaptation of smart contracts in blockchain
CN111222885A (en) Data processing request endorsement method and device, computer equipment and storage medium
CN110084568A (en) Demand management methods, devices and systems
CN115983853A (en) Client side green electricity application service method and system based on block chain and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191122

RJ01 Rejection of invention patent application after publication