CN110490282A - Source tracing method, device of tracing to the source, traceability system and storage medium - Google Patents
Source tracing method, device of tracing to the source, traceability system and storage medium Download PDFInfo
- Publication number
- CN110490282A CN110490282A CN201910773740.1A CN201910773740A CN110490282A CN 110490282 A CN110490282 A CN 110490282A CN 201910773740 A CN201910773740 A CN 201910773740A CN 110490282 A CN110490282 A CN 110490282A
- Authority
- CN
- China
- Prior art keywords
- source
- tracing
- information
- chain
- identifying code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 68
- 238000012545 processing Methods 0.000 claims abstract description 20
- 238000010200 validation analysis Methods 0.000 claims description 12
- 238000005516 engineering process Methods 0.000 abstract description 30
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 description 32
- 238000010586 diagram Methods 0.000 description 11
- 238000004519 manufacturing process Methods 0.000 description 10
- 239000002994 raw material Substances 0.000 description 9
- 230000006870 function Effects 0.000 description 8
- 230000008901 benefit Effects 0.000 description 7
- 239000000463 material Substances 0.000 description 6
- 230000008859 change Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Accounting & Taxation (AREA)
- Human Resources & Organizations (AREA)
- Computing Systems (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Entrepreneurship & Innovation (AREA)
- Data Mining & Analysis (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses a kind of source tracing method, device of tracing to the source, traceability system and storage mediums.Block chain includes side chain and main chain, and source tracing method includes: that acquisition is traced to the source information;The information that will trace to the source is stored to side chain;Processing traces to the source information to obtain identifying code of tracing to the source;The identifying code that will trace to the source is stored to main chain.So, the information that will trace to the source is stored to side chain, and the identifying code that will trace to the source is stored to main chain, using side chain technology to main chain dilatation, the storage to information of tracing to the source simply and easily is realized, the handling capacity of transaction is substantially increased, reduces order execution delay, reduce transaction cost, and ensure that the safety for information of tracing to the source.
Description
Technical field
This application involves block chain technical fields, and in particular to a kind of source tracing method, device of tracing to the source, traceability system and storage
Medium.
Background technique
The relevant technologies produce links all in all supply chains usually by the core enterprise in supply chain as information centre
The database of raw data input core enterprise foundation of tracing to the source, and use the modes such as scans the two-dimensional code and provides a user inquiry and take
Business.In other words, the relevant technologies usually establish centralization traceability system by the core enterprise in supply chain.However, this trace to the source
System has the defects of information occlusion, supervision retrospect is difficult, without direct benefit output, data abuse.
Summary of the invention
This application provides a kind of source tracing method, device of tracing to the source, traceability system and storage mediums.
The application embodiment provides a kind of source tracing method based on block chain.The block chain includes side chain and main chain,
The source tracing method includes:
Acquisition is traced to the source information;
The information of tracing to the source is stored to the side chain;
Information of tracing to the source described in processing is to obtain identifying code of tracing to the source;
The identifying code of tracing to the source is stored to the main chain.
The application embodiment provides a kind of device of tracing to the source based on block chain.The block chain includes side chain and main chain,
The device of tracing to the source includes obtaining module, the first memory module, processing module and the second memory module, the acquisition module to be used for
Acquisition is traced to the source information;First memory module is used to store the information of tracing to the source to the side chain;The processing module is used
Information is traced to the source to obtain identifying code of tracing to the source described in the processing;Second memory module is for arriving the identifying code storage of tracing to the source
The main chain.
The application embodiment provides a kind of traceability system based on block chain.The block chain includes side chain and main chain,
The traceability system includes processor and the memory that is connected to the processor, and the memory is stored with program of tracing to the source, institute
It states when program of tracing to the source is executed by the processor and realizes above-mentioned source tracing method.
The application embodiment provides a kind of computer readable storage medium.It is stored on the computer readable storage medium
It traces to the source program, the program of tracing to the source realizes above-mentioned source tracing method when being executed by processor.
The source tracing method of the application embodiment, device of tracing to the source, traceability system and storage medium, the information that will trace to the source storage are arrived
Side chain, and the identifying code storage that will trace to the source, using side chain technology to main chain dilatation, is simply and easily realized to letter of tracing to the source to main chain
The storage of breath substantially increases the handling capacity of transaction, reduces order execution delay, reduces transaction cost, and ensure that letter of tracing to the source
The safety of breath.
The additional aspect and advantage of presently filed embodiment will be set forth in part in the description, partially will be from following
Description in become obvious, or recognized by the practice of presently filed embodiment.
Detailed description of the invention
The above-mentioned and/or additional aspect and advantage of the application is from combining in description of the following accompanying drawings to embodiment by change
It obtains obviously and is readily appreciated that, in which:
Fig. 1 is the flow diagram of the source tracing method of the application embodiment;
Fig. 2 is the module diagram of the traceability system of the application embodiment;
Fig. 3 is another module diagram of the traceability system of the application embodiment;
Fig. 4 is the deployment model of the traceability system of the relevant technologies;
Fig. 5 is the deployment model of another traceability system of the relevant technologies;
Fig. 6 is the usage scenario schematic diagram of the intelligent contract of the source tracing method of the application embodiment;
Fig. 7 is the flow diagram of the source tracing method of another embodiment of the application;
Fig. 8 is the flow diagram of the source tracing method of the another embodiment of the application;
Fig. 9 is the process schematic of the data processing of the source tracing method of the application embodiment;
Figure 10 is the flow diagram of the source tracing method of the application a further embodiment;
Figure 11 is the flow diagram of the source tracing method of another embodiment of the application;
Figure 12 is the flow diagram of the source tracing method of the another embodiment of the application;
Figure 13 is the flow diagram of the source tracing method of the application a further embodiment;
Figure 14 is the module diagram of the device of tracing to the source of the application embodiment.
Specific embodiment
Presently filed embodiment is described below in detail, the example of the embodiment is shown in the accompanying drawings, wherein from beginning
Same or similar element or element with the same or similar functions are indicated to same or similar label eventually.Below by ginseng
The embodiment for examining attached drawing description is exemplary, and is only used for explaining the application, and should not be understood as the limitation to the application.
In the description of the present application, term " first ", " second " are used for description purposes only, and should not be understood as instruction or dark
Show relative importance or implicitly indicates the quantity of indicated technical characteristic.The feature of " first ", " second " is defined as a result,
It can explicitly or implicitly include one or more feature.In the description of the present application, the meaning of " plurality " is
Two or more, unless otherwise specifically defined.
In the description of the present application, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase
Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can
To be mechanical connection, it is also possible to be electrically connected or can be in communication with each other;It can be directly connected, it can also be by between intermediary
It connects connected, can be the connection inside two elements or the interaction relationship of two elements.For the ordinary skill of this field
For personnel, the concrete meaning of above-mentioned term in this application can be understood as the case may be.
Following disclosure provides many different embodiments or example is used to realize the different structure of the application.In order to
Simplify disclosure herein, hereinafter the component of specific examples and setting are described.Certainly, they are merely examples, and
And purpose does not lie in limitation the application.In addition, the application can in different examples repeat reference numerals and/or reference letter,
This repetition is for purposes of simplicity and clarity, itself not indicate between discussed various embodiments and/or setting
Relationship.In addition, this application provides various specific techniques and material example, but those of ordinary skill in the art can be with
Recognize the application of other techniques and/or the use of other materials.
Fig. 1, Fig. 2 and Fig. 3 are please referred to, the application embodiment provides a kind of source tracing method based on block chain.Block chain
Including side chain 110 and main chain 120.Source tracing method includes:
Step S14: information of tracing to the source is obtained;
Step S15: the information that will trace to the source storage to side chain 110;
Step S16: processing traces to the source information to obtain identifying code of tracing to the source;
Step S17: the identifying code that will trace to the source storage to main chain 120.
The application embodiment provides a kind of traceability system 100 based on block chain.Block chain includes side chain 110 and main chain
120, traceability system 100 includes processor 101 and the memory 102 connecting with processor 101, and memory 102, which is stored with, traces to the source
Program, program of tracing to the source realize above-mentioned source tracing method when being executed by processor 101.
In other words, processor 101 is for obtaining information of tracing to the source;And it stores for the information that will trace to the source to side chain 110;And it uses
Information is traced to the source in processing to obtain identifying code of tracing to the source;And it stores for the identifying code that will trace to the source to main chain 120.
The source tracing method and traceability system 100 of the application embodiment, the information that will trace to the source is stored to side chain 110, and will be traced back
Identifying code storage in source is simply and easily realized using 110 technology of side chain to 120 dilatation of main chain to information of tracing to the source to main chain 120
Storage, substantially increase the handling capacity of transaction, reduce order execution delay, reduce transaction cost, and ensure that information of tracing to the source
Safety.
In the application present embodiment, side chain 110 is alliance's chain, and main chain 120 is publicly-owned chain, such as ether mill.It can be with
Understand, in other implementations, side chain 110 and main chain 120 can be publicly-owned chain, privately owned chain or other kinds of block
Chain.The concrete form of side chain 110 and main chain 120 is not defined herein.
The source tracing method and traceability system 100 of the application present embodiment, can be applied to the information source tracing of supply chain.For side
Just illustrate, be next explained and illustrated so that source tracing method and traceability system 100 are applied to the information source tracing of supply chain as an example.
It is appreciated that this does not represent the limitation of the application scenarios to source tracing method and traceability system 100.
Supply chain traceability system is to carry out Life cycle in each stage to the product in supply chain from production to consumption
The system of tracking.Establishing safe and efficient supply chain traceability system trusty is that supply chain production quality safety, guarantee is promoted to disappear
The important means of the person's of expense equity.Since supply chain is related to that main body is numerous, data are asymmetric between main body, data sharing is without direct warp
The reasons such as benefit output of helping, cause supply chain traceability system management difficulty big, low efficiency, especially in the side of data storage security
Face faces numerous challenges.
The relevant technologies produce links all in all supply chains usually by the core enterprise in supply chain as information centre
The database of raw data input core enterprise foundation of tracing to the source, and use the modes such as scans the two-dimensional code and provides a user inquiry and take
Business.In other words, the relevant technologies usually establish centralization traceability system by the core enterprise in supply chain.However, this trace to the source
System has the defects of information occlusion, supervision retrospect is difficult, without direct benefit output, data abuse.
Specifically, firstly, supply chain is made of numerous participation main bodys, trust due to lacking, many information are discretely protected
There are in the respective system of main body, information centre is caused to be difficult to build.Meanwhile largely interaction and association are needed between the main body of supply chain
Make, and the system of centralization makes information one-way flow, this is unfavorable for collaboration and cooperation between supply chain modes.Secondly, enterprise is difficult
With equilibrium data, the relationship with secret protection is disclosed, it is open to supervision department's data not friendly enough, it is asked once quality occurs in product
Topic, information tracing are easy to interrupt, and put to the proof difficulty of calling to account.Again, since supply chain traceability system is without direct benefit output,
Supply chain traceability system needs to increase cost, but there is no the output of direct economic benefit, causes the enterprise in supply chain powerless
Maintenance.Finally, centralization supply chain system is also easy to produce data of tracing to the source and makes since in data set, data circulation is unidirectional, lacks supervision
The safety problems such as vacation, data tampering, leaking data seriously reduce the authenticity for data of tracing to the source.
And block chain is a kind of distributed storage technology of decentralization, it can establish letter in a network without center
Appoint, guarantees can not the distorting of data, open and clear and trackability.The natural characteristic of block chain technology just traces back with supply chain
The pain spot in source mutually agrees with, and traces to the source for supply chain and provides new solution.
Specifically, firstly, block chain guarantees that account book data can not distort using common recognition algorithm and cryptological technique, so that chain
Upper information truth is reliable;Secondly, block chain is a distributed account book, it is able to solve enterprise in centralized system and is reluctant that intention is traced back
Source platform Construction Party unidirectionally delivers the trust problem of data;Finally, block chain technology can be facilitated using intelligent contract it is more efficient
Supply chain transaction and data sharing, form that supply chain is traceable, credible system standard.
The super account book that the existing supply chain traceability system realized using block chain technology is researched and developed usually using IBM Corporation
Hyperledger is supported as Floor layer Technology.Hyperledger is a kind of alliance's chain technology, it only allows special group member
With the block chain network of limited third party access.Since there are mechanism of permitting the entrance, number of nodes is less, uses high performance common recognition
Reasons, alliance's chains such as algorithm (class BFT algorithm) usually possess higher transaction performance compared to publicly-owned chain.But in existing application
In, alliance's chain is usually deployed into Fig. 4 and two kinds of models shown in fig. 5.
In alliance's chain model 2000 of Fig. 4, common recognition node 2001 is usually deployed in large enterprises and some third parties
In mechanism.Such as certification authority, regulatory agency, core enterprise in Fig. 4.And the little Wei enterprise in supply chain, as raw material supply
Quotient, dealer's (i.e. Partner Enterprises in Fig. 4) are answered, generally only terminal 2001 or Internet of Things acquires equipment 2003, will not configure
Common recognition server.Which results in the unbalance of right of knowing together in alliance's chain, as common recognition node is very few to lead to common recognition strategy
Failure.
In alliance's chain model 3000 of Fig. 5, common recognition node 3001 is deployed under the same common recognition domain by core enterprise, or
Person utilizes Docker container technique to generate four common recognition nodes 3001 on same server and is used to know together, its in supply chain
His enterprise utilizes the access alliance's chain of client node 3002.This way can facilitate small application and early period with save the cost
Debugging, but the original intention and principle of alliance's chain have been violated, the effect of alliance's chain can not be played, it is without the slightest difference with the system of centralization.
2013, Vitalik Buterin proposed that a kind of next generation encrypts currency and decentralization application platform --- with
Too mill (Ethereum).The appearance of ether mill intelligence contract accelerates the development and application of block chain technology, and various traditional answers
It is sought for scene and the combination of block chain technology, as supply chain is traced to the source, charitable public good, contract are anti-fake, electronic invoice, copyright
Protection etc., especially supply chain is traced to the source.
Ether mill is a kind of public chain technology, realizes that supply chain is traced to the source on ether mill, it is necessary to consider how that solving transaction opens
Sell big problem.Supplier needs to carry out every a collection of raw material information cochain, and processing industry needs the processing to every a collection of product
Information carries out cochain, and dealer needs sales information cochain.These data can exert heavy pressures on to ether mill major network, also can
High transaction procedure expense is brought, can also have higher confirmation delay, this is unacceptable.
Therefore, public chain technology is applied to supply chain to trace to the source and must carry out dilatation to it.Existing capacity-enlargement technology has lightning
Network, thunder and lightning network, stator channel, fragment, side chain etc..Wherein, side chain technology be one kind can allow main chain token safely
Other block chains are transferred to, and a kind of agreement of main chain can be returned to safely from other block chains.The agreement will be some frequent
, carry out in the trade give-ups to side chain of small amount, not only increase the operational efficiency of public chain major network, be greatly reduced transaction hand
It continues to pay dues.
However, carrying out dilatation to block chain using side chain technology, have the disadvantage that side chain technology contains only token and turns
It moving, token transactions can be transferred to side chain progress by it, to obtain higher handling capacity and lower service charge, but can not be to confession
It answers the nontransaction type information generated in chain traceability system to carry out dilatation, the mass data that traceability system generates can not also be carried out low
Cost storage.
Based on this, the source tracing method and traceability system 100 of the application present embodiment, based on the side chain in block chain technology
Technology realizes material handling, information sharing and the product traceability in supply chain by ether mill intelligence contract, meanwhile, utilize side
Chain technology carries out dilatation to ether mill, and traceability system 100 is made to meet the needs of practical application.
Referring to Fig. 3, traceability system 100 may include side chain 110, main chain 120 and client modules 130.
Side chain 110 provides dilatation service for information cochain of tracing to the source, and increases the handling capacity in ether mill, when reducing trade confirmation
Between, reduce transaction cost.Side chain 110 contains intelligent contract unit 112 and data synchronisation unit 114.Wherein intelligent contract sheet
First 112 responsible processing business logics, data synchronisation unit 114 are responsible for being synchronized to ether mill after being handled every batch of transaction data
Main chain 120.
Main chain 120 is realized based on ether mill, in the data interlock that it sends data synchronisation unit 114 to ether mill, and
Revene lookup function is provided when traceability system 100 needs to verify and traces to the source information.
Client modules 130 are responsible for human-computer interaction.Client modules 130, which divide, inquires end for data input end and information.Letter
Breath typing end will trace to the source information cochain by the main bodys such as supplier, and information inquiry end is then inquired by the interface of open system.
Referring to Fig. 6, traceability system 100 can be by intelligent contract come specification user right and/or operating process.Intelligence is closed
It about can be used for user's registration, raw material typing, production, product are sold, are supervised with inquiry etc..
In some embodiments, source tracing method is used for supply chain, and source tracing method includes:
Obtain the user data and user's group number of supply chain;
User's registration is carried out according to user's group number and user data.
In this way, the registration of user in traceability system 100 is realized, so that the user of each supply chain has identical user
Group number.Specifically, since public chain itself is without ID authentication mechanism, user's access can be realized by intelligent contract.It can
To understand, due to the user of same supply chain user's group number having the same, can be arranged and use according to user's group number
The permission at family, so that user can only add information of tracing to the source to the corresponding block chain of user's group number in the group of user's group number, it cannot
Information of tracing to the source is added to other block chains.Number can be can be improved into the operation isolation of the information of tracing to the source to different supply chains in this way
According to safety.
User's group number can be decided through consultation by the user of same supply chain, can also be randomly assigned by system, herein not to user group
Number source be defined.It, can be by executing userRegister after the user data and user's group number for obtaining supply chain
() function carries out user's registration, the user of same supply chain can be incorporated into the same user group, user group according to user's group number
Interior user, which just has permission, adds information of tracing to the source to the corresponding block chain of user's group number.
The pseudo-code of the algorithm of user's registration is as follows in traceability system 100.
UserRegister () function in algorithm 1supplyChain contract
It is known: supplyChain contract address base_addr, user group number user_group, Customs Assigned Number user_id,
User role user_name, contract publisher are owner.
It asks: completing or fail
After completing user's registration, the user of supply chain can be traced to the source information by step S14-S17 typing.Specifically, it traces back
Source information can be by least one typing in supplier, manufacturer and dealer.
In step S14, information of tracing to the source can be acquired by internet of things equipment, can also voluntarily be uploaded by supplier, In
This is not defined the source for information of tracing to the source.
Supplier is the information source of supply chain.In the link of supply chain, information of tracing to the source can be established initial for raw material
Archives simultaneously distribute batch number.
In one example, by internet of things equipment to the production environment of raw material, production cycle, operation responsible person, original
The data such as material date of manufacture are acquired, and then call rawRegister () function by data cochain.Certain batch raw material
Archives of tracing to the source are modeled as:
<rawID,rawName,rawFac,produceTime,rawInfo>
The raw material that manufacturer can provide supplier are processed, and the minimum of output commodity sells unit.In supply chain
The link, the commodity archives based on information of tracing to the source formally are established, and consumer query can be supplied in the form of two dimensional code.It traces back
Source information may include raw material information, and manufacturer can call newProduct () function to carry out integration cochain to raw material information,
It can also be in the URL of the big files such as product_info field write-in production environment, production video.
From the information of tracing to the source of dealer, the current intelligence of product can record, consumer query commodity can be helped
Source helps manufacturer to prevent falsifying.Information of tracing to the source includes selling information.Dealer or loglstics enterprise can make after handling cargo
It is that information is sold in commodity addition with product_deal () function.The quantity of dealer can be one or more, therefore, trace to the source
Dynamic array bytes32 [] retailerNames can be used to be stored in the structural body of information.Due to code logic and original
Expect that typing is more similar, production that details are not described herein again and the pseudocode for selling function.
Referring to Fig. 7, in some embodiments, source tracing method includes:
Step S11: logon data is obtained, logon data includes identity information;
Step S12: the typing permission of identity information is determined;
Step S13: in the case where typing permission is to have the right, S14 is entered step.
Accordingly, for processor 101 for obtaining logon data, logon data includes identity information;Determine identity information
Typing permission;In the case where typing permission is to have the right, information of tracing to the source is obtained.
In this way, make the user for having typing permission could typing trace to the source information, it is ensured that the safety of traceability system 100
Property.Specifically, the source tracing method of the application embodiment can be used for server, and user can pass through client and traceability system 100
Client modules 130 interact, to log on to traceability system 100 and typing is traced to the source information.Client be, for example, mobile phone,
Plate, laptop, PC, car-mounted terminal, wearable device etc..
In step s 11, user can input logon data to traceability system 100 by client.In step s 12, it traces back
Source system 100 can parse logon data, obtain identity information, and the typing permission of the identity information is determined according to intelligent contract.
In one example, according to intelligent contract, supply chain that it is 0001 to product batches which, which does not have, into
Row is traced to the source the permission of data input, and user request will trace to the source the supply chain that data input product batches are 0001.At this point, can
Return to prompt information: " you do not have typing permission."
In another example, according to intelligent contract, supply chain that it is 0001 to product batches which, which has, into
Row is traced to the source the permission of data input, and user request will trace to the source the supply chain that data input product batches are 0001.At this point, can
It returns to prompt information: " you please be input and need the information of tracing to the source of typing."
Referring to Fig. 8, in some embodiments, the quantity of information to be traced to the source be it is multiple, step S16 includes:
Step S162: the validation value of each information to be traced to the source is calculated;
Step S164: identifying code of tracing to the source is determined according to whole validation values.
Accordingly, processor 101 is used to calculate the validation value of each information to be traced to the source;It is traced to the source according to the determination of whole validation values
Identifying code.
In this way, realization processing traces to the source information to obtain identifying code of tracing to the source.In the present embodiment, it is arrived in information storage of tracing to the source
After on side chain 110, Hash (Merkle Tree) algorithm can be used to carry out Hash locking, and the root Hash (Merkle that will be obtained
Root) ether mill main chain 120 is synchronized to as identifying code of tracing to the source.It note that once information change of tracing to the source, Merkle Root
It can change correspondingly.
Specifically, step S164 includes: that whole validation values are grouped to obtain multiple validation groups;According to each validation group
Validation value determines verifying class value;Identifying code of tracing to the source is determined according to multiple verifying class values.It is determined in this way, realizing according to whole validation values
It traces to the source identifying code.
Referring to Fig. 9, in the present embodiment, it, can be by supplier, manufacturer, warp on side chain after a wheel transaction
Leaf node of the information as Merkle Tree of tracing to the source that the nodes such as quotient upload is sold, its cryptographic Hash is calculated.There are multiple supplies
It, can be the information of different nodes respectively as leaf node processing in the case where quotient or dealer.Obtain several cryptographic Hash
(H1,H2,H3...) after, then operation two-by-two is carried out to (H1, H2, H3 ...), seek cryptographic Hash.So circulation, until obtaining root Hash
Merkle Root.Merkle Tree pseudo-code of the algorithm is as follows.
Algorithm 3.2Merkle Tree algorithm
Known: supply chain traces to the source information list_info=[T1, T2, T3 ...]
It asks: root Hash merkle_root
Referring to Fig. 10, in some embodiments, information of tracing to the source includes batch number, source tracing method includes:
Step S18: association traces to the source identifying code and batch number to obtain corresponding relationship.
Accordingly, processor 101 is for being associated with trace to the source identifying code and batch number to obtain corresponding relationship.
In this way, realizing the binding of trace to the source identifying code and batch number.It is appreciated that tracing to the source the one of identifying code and batch number
One is corresponding, may make in the case where batch number determines, identifying code of tracing to the source corresponding in main chain 120 is uniquely determined, thus only
One determines the identifying code of tracing to the source in the corresponding information of tracing to the source of side chain 110.The subsequent inquiry to information of tracing to the source can be made clear in this way
Chu and specification.
In addition, corresponding relationship can be stored in the form of a table in the memory of traceability system 100.It is of course also possible to other
Form storage, may also be stored in the equipment communicated with traceability system 100.Herein not to the specific storage mode of corresponding relationship and
Specific storage location is defined.
Figure 11 is please referred to, in some embodiments, source tracing method includes:
Step S21: logon data is obtained, logon data includes identity information;
Step S22: the search access right of identity information is determined;
Step S23: in the case where search access right is to have the right, the query information of input is obtained;
Step S26: information of tracing to the source corresponding with query information is returned.
Accordingly, for processor 101 for obtaining logon data, logon data includes identity information;Determine identity information
Search access right;In the case where search access right is to have the right, the query information of input is obtained;Return to trace to the source corresponding with query information
Information.
In this way, making the user for having search access right that could inquire information of tracing to the source, it is ensured that the safety of traceability system 100
Property.As previously mentioned, search access right can be determined by intelligent peace treaty.Specifically, the source tracing method of the application embodiment can be used for taking
Business device, user (such as consumer, regulator) can be interacted by the client modules 130 of client and traceability system 100,
To log on to traceability system 100 and inquire information of tracing to the source.Client is, for example, mobile phone, plate, laptop, personal electricity
Brain, car-mounted terminal, wearable device etc..
In one example, according to intelligent contract, supply chain that it is 0001 to product batches which, which does not have, into
Row trace to the source information inquiry permission, and the user request inquiry product batches be 0001 supply chain information of tracing to the source.At this point, can
Return to prompt information: " you do not have typing permission."
In another example, which requests the information of tracing to the source for the supply chain that inquiry product batches are 0001.According to intelligence
Can contract, which there is the supply chain for being 0001 to product batches trace to the source the permission of information inquiry.At this point, can return
Return the information of tracing to the source for the supply chain that product batches are 0001.
Figure 12 is please referred to, in some embodiments, query information includes batch number, and source tracing method includes:
Step S24: the corresponding identifying code of tracing to the source of batch number is determined according to the corresponding relationship prestored in main chain 120;
Step S25: the corresponding information of tracing to the source of identifying code of tracing to the source is obtained in side chain 110.
Accordingly, processor 101 is traced to the source for determining that batch number is corresponding according to the corresponding relationship prestored in main chain 120
Identifying code;The corresponding information of tracing to the source of identifying code of tracing to the source is obtained in side chain 110.
Information of tracing to the source is found according to batch number in this way, realizing, the information that will trace to the source returns to user.It is appreciated that
It is corresponded due to tracing to the source identifying code with batch number, user's input product lot number, processor 101 can find correspondence
The identifying code of tracing to the source for being stored in main chain 120.And be stored in main chain 120 trace to the source identifying code be stored in tracing back for side chain 110
Source information corresponds, and therefore, can find the corresponding information of tracing to the source for being stored in side chain 110 according to corresponding identifying code of tracing to the source.
Figure 13 is please referred to, in some embodiments, source tracing method includes:
Step S27: according to tracing to the source, identifying code determines whether information of tracing to the source is tampered.
Accordingly, processor 101 is used to determine whether information of tracing to the source is tampered according to identifying code of tracing to the source.
In this way, may be implemented to be determined to whether information of tracing to the source is tampered, it is further ensured that the safety of data.Specifically
Ground can determine again identifying code of tracing to the source according to the information of tracing to the source got, in such a way that identifying code is traced to the source in determination above-mentioned.
If the identifying code of tracing to the source that trace to the source identifying code and the main chain 120 that obtain again store is inconsistent, it can determine that the information of tracing to the source is usurped
Change.
In one example, referring to Fig. 9, reusing aforementioned same side after user query to commodity trace to the source information
Method obtains Merkle Root, and compared with being reliably worth on ether mill, if two values are inconsistent, Merkle is can be used in monitoring party
Tree algorithm more quickly positions is tampered data from for which branch, and the specific link corresponded in supply chain is chased after
Duty.
Figure 14 is please referred to, the application embodiment provides a kind of device 10 of tracing to the source based on block chain.Block chain includes side
Chain 110 and main chain 120, device 10 of tracing to the source include obtaining module 14, the first memory module 15, processing module 16 and the second storage mould
Block 17 obtains module 14 for obtaining information of tracing to the source;First memory module 15 is stored for the information that will trace to the source to side chain 110;Place
Reason module 16 traces to the source information for handling to obtain identifying code of tracing to the source;Second memory module 17 is arrived for the identifying code storage that will trace to the source
Main chain 120.
Each embodiment of the specific embodiment and above-mentioned source tracing method of the device 10 of tracing to the source of the application embodiment is basic
Identical, this will not be repeated here.
In some embodiments, module 14 is obtained for obtaining logon data, and logon data includes identity information;It determines
The typing permission of identity information;In the case where typing permission is to have the right, information of tracing to the source is obtained.
In some embodiments, processing module 16 is used to calculate the validation value of each information to be traced to the source;It is tested according to whole
Card value determines identifying code of tracing to the source.
In some embodiments, module 14 is obtained for obtaining logon data, and logon data includes identity information;It determines
The search access right of identity information;In the case where search access right is to have the right, the query information of input is obtained;Return and query information
Corresponding information of tracing to the source.
In some embodiments, device 10 of tracing to the source includes enquiry module, and enquiry module is used in main chain 120 according to prestoring
Corresponding relationship determine the corresponding identifying code of tracing to the source of batch number;The corresponding information of tracing to the source of identifying code of tracing to the source is obtained in side chain 110.
In some embodiments, enquiry module is used to determine whether information of tracing to the source is tampered according to identifying code of tracing to the source.
The embodiment of the present application also proposes a kind of computer readable storage medium, is stored with and traces back on computer readable storage medium
Source program realizes the source tracing method such as above-mentioned any embodiment when program of tracing to the source is executed by processor.
Such as execute: step S14: obtaining information of tracing to the source;Step S15: the information that will trace to the source storage to side chain 110;Step
S16: processing traces to the source information to obtain identifying code of tracing to the source;Step S17: the identifying code that will trace to the source storage to main chain 120.
The traceability system and computer readable storage medium of the application embodiment, the information that will trace to the source storage to side chain 110,
And the identifying code storage that will trace to the source, using 110 technology of side chain to 120 dilatation of main chain, is simply and easily realized to tracing back to main chain 120
The storage of source information substantially increases the handling capacity of transaction, reduces order execution delay, reduces transaction cost, and ensure that and trace back
The safety of source information.
Each reality of the specific embodiment of the computer readable storage medium of the application embodiment and above-mentioned source tracing method
It is essentially identical to apply example, this will not be repeated here.
In summary, the source tracing method of the application embodiment, device 10 of tracing to the source, traceability system 100 and storage medium, it is real
The traceability system of a supply chain Life cycle is showed, while dilatation is carried out to block chain using ether mill side chain technology, has mentioned
The high trading efficiency of traceability system, meets the demand of actual production.
Specifically, the source tracing method of the application embodiment, device 10 of tracing to the source, traceability system 100 and storage medium, are based on
Public chain.The cost of enterprise's deployment system can be substantially reduced using public block chain technology, and ensure that in supply chain and own
The common recognition of participant is weighed, and the reliability of system is increased, and safeguards the authenticity for data of tracing to the source.
In addition, traditional expansion method is generally just for the token transactions in bit coin or ether mill.And the application is implemented
The source tracing method of mode, device 10 of tracing to the source, traceability system 100 and storage medium trace back side chain capacity-enlargement technology applied to supply chain
In the dilatation of source data, the data that will trace to the source first are stored in side chain 110, then by the data simultaneous module on side chain 110, will count
According to cryptographic Hash be stored in ether mill main chain 120.Preferable storage performance can be obtained in this way, and guarantees the safety of data.
In the description of this specification, reference term " certain embodiments ", " embodiment ", " some embodiment party
The description of formula ", " exemplary embodiment ", " example ", " specific example " or " some examples " etc. mean to combine embodiment or
Example particular features, structures, materials, or characteristics described are contained at least one embodiment or example of the application.In
In this specification, schematic expression of the above terms are not necessarily referring to identical embodiment or example.Moreover, description
Particular features, structures, materials, or characteristics can be in any one or more embodiments or example in an appropriate manner
In conjunction with.
Although presently filed embodiment has been shown and described above, it is to be understood that above embodiment is
Illustratively, it should not be understood as the limitation to the application, those skilled in the art within the scope of application can be right
Above embodiment is changed, modifies, replacement and variant, and scope of the present application is defined by the claims and their equivalents.
Claims (10)
1. a kind of source tracing method based on block chain, which is characterized in that the block chain includes side chain and main chain, the side of tracing to the source
Method includes:
Acquisition is traced to the source information;
The information of tracing to the source is stored to the side chain;
Information of tracing to the source described in processing is to obtain identifying code of tracing to the source;
The identifying code of tracing to the source is stored to the main chain.
2. source tracing method as described in claim 1, which is characterized in that the source tracing method includes:
Logon data is obtained, the logon data includes identity information;
Determine the typing permission of the identity information;
In the case where the typing permission is to have the right, the step of tracing to the source information is obtained into described.
3. source tracing method as described in claim 1, which is characterized in that the quantity of the information to be traced to the source is multiple, processing institute
Information to be traced to the source is stated to obtain identifying code of tracing to the source, comprising:
Calculate the validation value of each information to be traced to the source;
According to all validation values determine described in trace to the source identifying code.
4. source tracing method as described in claim 1, which is characterized in that the information of tracing to the source includes batch number, described to trace to the source
Method includes:
Identifying code and the batch number are traced to the source described in association to obtain corresponding relationship.
5. source tracing method as described in claim 1, which is characterized in that the source tracing method includes:
Logon data is obtained, the logon data includes identity information;
Determine the search access right of the identity information;
In the case where the search access right is to have the right, the query information of input is obtained;
Return to information of tracing to the source corresponding with the query information.
6. source tracing method as claimed in claim 5, which is characterized in that the query information includes batch number, described to trace to the source
Method includes:
The corresponding identifying code of tracing to the source of the batch number is determined according to the corresponding relationship prestored in the main chain;
The corresponding information of tracing to the source of identifying code of tracing to the source described in being obtained in the side chain.
7. source tracing method as claimed in claim 6, which is characterized in that the source tracing method includes:
According to the identifying code of tracing to the source determine described in information of tracing to the source whether be tampered.
8. a kind of device of tracing to the source based on block chain, which is characterized in that the block chain includes side chain and main chain, the dress of tracing to the source
It sets including obtaining module, the first memory module, processing module and the second memory module, the acquisition module is for obtaining letter of tracing to the source
Breath;First memory module is used to store the information of tracing to the source to the side chain;The processing module is described for handling
Information is traced to the source to obtain identifying code of tracing to the source;Second memory module is used to store the identifying code of tracing to the source to the main chain.
9. a kind of traceability system based on block chain, which is characterized in that the block chain includes side chain and main chain, and described trace to the source is
System includes processor and the memory being connected to the processor, and the memory is stored with program of tracing to the source, the program of tracing to the source
The source tracing method as described in any one of claims 1 to 7 is realized when being executed by the processor.
10. a kind of computer readable storage medium, which is characterized in that be stored with journey of tracing to the source on the computer readable storage medium
Sequence realizes the source tracing method as described in any one of claims 1 to 7 when the program of tracing to the source is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910773740.1A CN110490282A (en) | 2019-08-21 | 2019-08-21 | Source tracing method, device of tracing to the source, traceability system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910773740.1A CN110490282A (en) | 2019-08-21 | 2019-08-21 | Source tracing method, device of tracing to the source, traceability system and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110490282A true CN110490282A (en) | 2019-11-22 |
Family
ID=68551626
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910773740.1A Pending CN110490282A (en) | 2019-08-21 | 2019-08-21 | Source tracing method, device of tracing to the source, traceability system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110490282A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110690974A (en) * | 2019-12-10 | 2020-01-14 | 腾讯科技(深圳)有限公司 | Block chain based data verification method, device, equipment and readable storage medium |
CN111078799A (en) * | 2019-12-27 | 2020-04-28 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Tracing information storage method, device, equipment and readable storage medium |
CN111698220A (en) * | 2020-05-20 | 2020-09-22 | 厦门区块链云科技有限公司 | Block chain anti-counterfeiting traceability verification system |
CN111898165A (en) * | 2020-07-09 | 2020-11-06 | 宁波浙大联科科技有限公司 | Technical parameter change tracing method and system in PDM system |
CN112348539A (en) * | 2020-11-25 | 2021-02-09 | 贵州航天云网科技有限公司 | Industrial product circulation life cycle tracing management system based on license chain and application thereof |
CN112365277A (en) * | 2020-12-07 | 2021-02-12 | 四川长虹电器股份有限公司 | Decentralization charitable donation tracking system |
CN112507392A (en) * | 2020-12-10 | 2021-03-16 | 链博(成都)科技有限公司 | Cross-chain data interaction data tracing method and system |
CN113157809A (en) * | 2021-04-28 | 2021-07-23 | 杭州丽冠科技有限公司 | Traversal method and device based on block chain side chain and computer readable storage medium |
CN113256307A (en) * | 2021-05-25 | 2021-08-13 | 成都云租租科技有限公司 | House leasing traceability system based on block chain and implementation method thereof |
CN113506117A (en) * | 2021-07-15 | 2021-10-15 | 上海海洋大学 | Aquatic product block chain traceability optimization system and method |
CN113706171A (en) * | 2021-08-27 | 2021-11-26 | 广西卡西亚科技有限公司 | Block chain agricultural product tracing method based on Beidou grid code |
CN113704813A (en) * | 2021-07-20 | 2021-11-26 | 武汉理工大学 | Maritime work equipment secondary identification data storage method and system, and verification method and system |
CN114915428A (en) * | 2022-07-18 | 2022-08-16 | 江苏数一科技服务有限公司 | Alliance chain suitable for circulation steel is traceed to source |
CN114996664A (en) * | 2022-06-13 | 2022-09-02 | 中国科学院沈阳自动化研究所 | Block chain-based digital copyright protection method |
WO2024007855A1 (en) * | 2022-07-05 | 2024-01-11 | 腾讯科技(深圳)有限公司 | Data processing method and device based on blockchain, and readable storage medium |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016109835A1 (en) * | 2014-12-31 | 2016-07-07 | Dauntless Software Inc. | Supply chain management systems and methods |
CN106779737A (en) * | 2016-11-30 | 2017-05-31 | 电子科技大学 | Product based on block chain technology is traced to the source verification method |
CN107423980A (en) * | 2017-07-11 | 2017-12-01 | 厦门易功成信息技术有限公司 | Data trade reference platform and method in a kind of supply chain |
WO2018163044A1 (en) * | 2017-03-05 | 2018-09-13 | Tatchell Shona | System and method for provision of supply chain financing of ethically verified product where there has been verification of production processes and products inspection using blockchain smart contracts |
CN108921329A (en) * | 2018-06-08 | 2018-11-30 | 北京工商大学 | A kind of food transaction Method of Optimal Matching based on block chain technology |
US20180349893A1 (en) * | 2017-06-03 | 2018-12-06 | Tsai Cheng Yu | System for outputting product traceability code |
CN109034833A (en) * | 2018-06-16 | 2018-12-18 | 复旦大学 | A kind of product back-tracing information management system and method based on block chain |
CN109064063A (en) * | 2018-09-11 | 2018-12-21 | 北京工商大学 | A kind of food safety risk Source Tracing system and method based on block chain |
CN109191003A (en) * | 2018-09-25 | 2019-01-11 | 仲恺农业工程学院 | Fruit and vegetable agricultural product quality safety traceability system based on block chain |
CN109711836A (en) * | 2018-11-15 | 2019-05-03 | 远光软件股份有限公司 | A kind of storage method of transaction, storage network and electronic equipment |
CN109768988A (en) * | 2019-02-26 | 2019-05-17 | 安捷光通科技成都有限公司 | Decentralization Internet of Things security certification system, facility registration and identity identifying method |
CN109919769A (en) * | 2019-03-15 | 2019-06-21 | 北京世纪诚链科技有限公司 | Model and its implementation across chain tra nsfer are worth between a kind of main chain side chain |
CN110033243A (en) * | 2019-03-06 | 2019-07-19 | 华南师范大学 | Main chain based on block chain intelligence contract deposits card method, system and storage medium |
-
2019
- 2019-08-21 CN CN201910773740.1A patent/CN110490282A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016109835A1 (en) * | 2014-12-31 | 2016-07-07 | Dauntless Software Inc. | Supply chain management systems and methods |
CN106779737A (en) * | 2016-11-30 | 2017-05-31 | 电子科技大学 | Product based on block chain technology is traced to the source verification method |
WO2018163044A1 (en) * | 2017-03-05 | 2018-09-13 | Tatchell Shona | System and method for provision of supply chain financing of ethically verified product where there has been verification of production processes and products inspection using blockchain smart contracts |
US20180349893A1 (en) * | 2017-06-03 | 2018-12-06 | Tsai Cheng Yu | System for outputting product traceability code |
CN107423980A (en) * | 2017-07-11 | 2017-12-01 | 厦门易功成信息技术有限公司 | Data trade reference platform and method in a kind of supply chain |
CN108921329A (en) * | 2018-06-08 | 2018-11-30 | 北京工商大学 | A kind of food transaction Method of Optimal Matching based on block chain technology |
CN109034833A (en) * | 2018-06-16 | 2018-12-18 | 复旦大学 | A kind of product back-tracing information management system and method based on block chain |
CN109064063A (en) * | 2018-09-11 | 2018-12-21 | 北京工商大学 | A kind of food safety risk Source Tracing system and method based on block chain |
CN109191003A (en) * | 2018-09-25 | 2019-01-11 | 仲恺农业工程学院 | Fruit and vegetable agricultural product quality safety traceability system based on block chain |
CN109711836A (en) * | 2018-11-15 | 2019-05-03 | 远光软件股份有限公司 | A kind of storage method of transaction, storage network and electronic equipment |
CN109768988A (en) * | 2019-02-26 | 2019-05-17 | 安捷光通科技成都有限公司 | Decentralization Internet of Things security certification system, facility registration and identity identifying method |
CN110033243A (en) * | 2019-03-06 | 2019-07-19 | 华南师范大学 | Main chain based on block chain intelligence contract deposits card method, system and storage medium |
CN109919769A (en) * | 2019-03-15 | 2019-06-21 | 北京世纪诚链科技有限公司 | Model and its implementation across chain tra nsfer are worth between a kind of main chain side chain |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110690974B (en) * | 2019-12-10 | 2020-06-23 | 腾讯科技(深圳)有限公司 | Block chain based data verification method, device, equipment and readable storage medium |
CN110690974A (en) * | 2019-12-10 | 2020-01-14 | 腾讯科技(深圳)有限公司 | Block chain based data verification method, device, equipment and readable storage medium |
CN111078799A (en) * | 2019-12-27 | 2020-04-28 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Tracing information storage method, device, equipment and readable storage medium |
CN111698220A (en) * | 2020-05-20 | 2020-09-22 | 厦门区块链云科技有限公司 | Block chain anti-counterfeiting traceability verification system |
CN111898165A (en) * | 2020-07-09 | 2020-11-06 | 宁波浙大联科科技有限公司 | Technical parameter change tracing method and system in PDM system |
CN112348539B (en) * | 2020-11-25 | 2024-05-14 | 贵州航天云网科技有限公司 | Industrial commodity circulation life cycle traceability management system based on license chain and application thereof |
CN112348539A (en) * | 2020-11-25 | 2021-02-09 | 贵州航天云网科技有限公司 | Industrial product circulation life cycle tracing management system based on license chain and application thereof |
CN112365277A (en) * | 2020-12-07 | 2021-02-12 | 四川长虹电器股份有限公司 | Decentralization charitable donation tracking system |
CN112507392A (en) * | 2020-12-10 | 2021-03-16 | 链博(成都)科技有限公司 | Cross-chain data interaction data tracing method and system |
CN113157809A (en) * | 2021-04-28 | 2021-07-23 | 杭州丽冠科技有限公司 | Traversal method and device based on block chain side chain and computer readable storage medium |
CN113256307A (en) * | 2021-05-25 | 2021-08-13 | 成都云租租科技有限公司 | House leasing traceability system based on block chain and implementation method thereof |
CN113506117A (en) * | 2021-07-15 | 2021-10-15 | 上海海洋大学 | Aquatic product block chain traceability optimization system and method |
CN113704813A (en) * | 2021-07-20 | 2021-11-26 | 武汉理工大学 | Maritime work equipment secondary identification data storage method and system, and verification method and system |
CN113706171A (en) * | 2021-08-27 | 2021-11-26 | 广西卡西亚科技有限公司 | Block chain agricultural product tracing method based on Beidou grid code |
CN113706171B (en) * | 2021-08-27 | 2024-01-05 | 广西卡西亚科技有限公司 | Block chain agricultural product tracing method based on Beidou grid codes |
CN114996664A (en) * | 2022-06-13 | 2022-09-02 | 中国科学院沈阳自动化研究所 | Block chain-based digital copyright protection method |
CN114996664B (en) * | 2022-06-13 | 2024-04-23 | 中国科学院沈阳自动化研究所 | Digital copyright protection method based on block chain |
WO2024007855A1 (en) * | 2022-07-05 | 2024-01-11 | 腾讯科技(深圳)有限公司 | Data processing method and device based on blockchain, and readable storage medium |
CN114915428A (en) * | 2022-07-18 | 2022-08-16 | 江苏数一科技服务有限公司 | Alliance chain suitable for circulation steel is traceed to source |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110490282A (en) | Source tracing method, device of tracing to the source, traceability system and storage medium | |
Al-Breiki et al. | Trustworthy blockchain oracles: review, comparison, and open research challenges | |
CN109218079B (en) | Block chain network, deployment method and storage medium | |
CN109325854B (en) | Block chain network, deployment method and storage medium | |
CN109191124B (en) | Block chain network, deployment method and storage medium | |
CN110599181B (en) | Data processing method, device and equipment based on block chain and storage medium | |
Vatankhah Barenji | A blockchain technology based trust system for cloud manufacturing | |
US11151582B2 (en) | Smart logistics management using blockchain | |
Dzobo et al. | Proposed framework for blockchain technology in a decentralised energy network | |
Kodali et al. | Blockchain based energy trading | |
JP2022527375A (en) | Systems and methods for virtual distributed ledger networks | |
Harshavardhan et al. | Blockchain technology in cloud computing to overcome security vulnerabilities | |
CN110471982A (en) | Data processing method and device based on block chain | |
CN110942305A (en) | Real estate information management method and device based on block chain | |
CN111383020A (en) | Block chain-based article anti-counterfeiting management method, device, equipment and storage medium | |
Garriga et al. | Blockchain and cryptocurrency: A comparative framework of the main architectural drivers | |
Romano et al. | Beyond bitcoin: recent trends and perspectives in distributed ledger technology | |
CN115701078B (en) | Cross-chain transaction processing method, device, electronic equipment and storage medium | |
CN111028078A (en) | Method for applying block chain intelligent contract technology to bill pool service | |
Meydani et al. | A Comprehensive Review of the Applications of Blockchain Technology | |
Vijayalakshmi et al. | A Blockchain‐Based Secure Radio Frequency Identification Ownership Transfer Protocol | |
Wu et al. | Evolution process and supply chain adaptation of smart contracts in blockchain | |
CN111222885A (en) | Data processing request endorsement method and device, computer equipment and storage medium | |
CN110084568A (en) | Demand management methods, devices and systems | |
CN115983853A (en) | Client side green electricity application service method and system based on block chain and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191122 |
|
RJ01 | Rejection of invention patent application after publication |