CN111782723A - Double-layer product information tracing system architecture based on permission chain - Google Patents

Double-layer product information tracing system architecture based on permission chain Download PDF

Info

Publication number
CN111782723A
CN111782723A CN202010504432.1A CN202010504432A CN111782723A CN 111782723 A CN111782723 A CN 111782723A CN 202010504432 A CN202010504432 A CN 202010504432A CN 111782723 A CN111782723 A CN 111782723A
Authority
CN
China
Prior art keywords
chain
layer
enterprise
block
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010504432.1A
Other languages
Chinese (zh)
Inventor
唐煜
尚超
王镱璇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Lianxiang Technology Co ltd
Original Assignee
Chengdu Lianxiang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Lianxiang Technology Co ltd filed Critical Chengdu Lianxiang Technology Co ltd
Priority to CN202010504432.1A priority Critical patent/CN111782723A/en
Publication of CN111782723A publication Critical patent/CN111782723A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products

Abstract

The invention discloses a double-layer product information tracing system architecture based on a permission chain, which adopts a permission chain module of the double-layer architecture; and the permission chain module of the double-layer architecture consists of a main layer and a sub-layer; the main layer is composed of enterprise alliance block chains, the sub-layer is composed of enterprise private block chains, the main layer and the sub-layer are independent of each other and are interacted through respective selected key nodes, the key nodes of the alliance chains participate in maintaining the two block chains, interaction between the main layer and the sub-layer is achieved through a Hash pointer and an interface, and is maintained through key nodes in the enterprise private chains, and the like. The invention improves the supervision and data security, and reduces the requirements on hardware equipment.

Description

Double-layer product information tracing system architecture based on permission chain
Technical Field
The invention relates to the technical field of block chains, in particular to a double-layer product information tracing system architecture based on a permission chain.
Background
The blockchain technology, namely the distributed ledger technology, is a decentralized distributed internet database, and is widely applied to the fields of renewable energy management, logistics management, internet of things, finance and the like at present, and the traceability of product information is also one of important application scenarios of the blockchain technology.
The existing technical scheme for tracing the product information based on the block chain technology fully utilizes the characteristics of traceability and non-modifiability of the block chain technology, and realizes the disclosure and transparency of the product tracing information of the whole supply chain. The existing research mainly aims at a block chain-based product information traceability framework and case research, and realizes the traceability of products by using a block chain technology, and is applied to the industries of textile production, food production and processing and the like.
However, existing tracing schemes are proposed based on a single-layer block chain, research and development are mainly performed on application of researchers and enterprises, participation of government regulatory agencies is not considered, if enterprise collusion exists in a production chain, effective supervision cannot be achieved, and reliability and credibility of product information tracing information are reduced.
In addition, in the conventional single-layer, single-blockchain product information tracing system, an enterprise is required to be disclosed in the system to include all relevant information of production, transportation, sale and the like to a federation chain, which may reveal private data of the enterprise to competing enterprises and other enterprises participating in the product information tracing federation, and the single-layer architecture cannot ensure that the private sensitive data of the enterprise is protected.
In terms of performance, the single-layer architecture is also limited by hardware conditions, network speed, data block size and transaction processing, especially in the admission chain, when a transaction peak occurs, the packed transaction block size may exceed 10 mbytes, and at this time, the admission chain Transaction Performance (TPS) of the cross-regional and long-distance deployment will be greatly reduced, far below the theoretical throughput.
The single-layer architecture also has higher requirements on the storage capacity of hardware facilities, and due to the characteristic that a block chain is decentralized, the system does not require a central server to store transactions any more, but all nodes have to hold a distributed account book, and the distributed account book is rapidly increased along with the passage of time and exceeds the storage capacity range which can be borne by most intelligent equipment rapidly.
Therefore, the existing product information tracing system based on the single-layer architecture block chain needs to find a scheme to improve, so as to overcome the problems that the existing scheme is low in supervision and insufficient in data security, has high requirement on hardware equipment, is high in consumption, is easy to cause performance bottleneck and the like.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, provides a double-layer product information tracing system architecture based on a license chain, improves the supervision and data security, reduces the requirements on hardware equipment and the like.
The purpose of the invention is realized by the following technical scheme:
a double-layer product information tracing system architecture based on a permission chain adopts a permission chain module with a double-layer architecture; and the permission chain module of the double-layer architecture consists of a main layer and a sub-layer; the main layer is composed of enterprise alliance block chains, the sub-layer is composed of enterprise private block chains, the main layer and the sub-layer are independent of each other and are interacted through respective selected key nodes, the key nodes of the alliance chains participate in maintaining the two block chains, and interaction between the main layer and the sub-layer is achieved through a Hash pointer and an interface and is maintained through the key nodes in the enterprise private chains.
Further, in the double-layer architecture, detailed product data of an enterprise is stored in a private chain of the enterprise, a hash value and a hash pointer of the private chain are shared in a federation chain through a private chain key node, and data reading of the main layer is separated from data entry and storage of the sub-layer.
Furthermore, an enterprise can formulate an information sharing scheme according to the actual situation of the enterprise, when other nodes of the alliance chain need to acquire the tracing information of the product, a data acquisition request needs to be sent to the key node of the enterprise private chain, after the permission of the key node of the target private chain is obtained, the other nodes of the alliance chain can acquire the product information tracing information through the interface provided by the private chain, and the query for acquiring the product information tracing information can be directly carried out through the interface provided by the main layer node.
Further, the method comprises the following steps:
s1, an enterprise selects a department as a key node of a private chain according to actual application conditions, the key node is responsible for planning, constructing and maintaining the private chain, collecting transaction data, constructing a data block, examining product information in the private chain, connecting the private chain of the enterprise to a alliance chain, other departments related in a product information tracing system are used as non-key nodes and are also verification nodes, and the nodes are responsible for inputting product information to a traceable system and verifying the product information collected by the key node;
s2, introducing an intelligent contract into the enterprise key node, and auditing the integrity and accuracy of the information submitted by the non-private chain through the intelligent contract;
s3, the key node returns the auditing result to the non-key node of the private chain, and the non-key node verifies the auditing result returned by the key node;
s4, the key node obtains the private chain auditing result sent by the non-key node through the intelligent contract, so as to construct the private chain block, and the data block constructed by the key node in the enterprise private chain mainly comprises a block head part and a block body part: the block head mainly packages the hash value of the current block, the hash value before the block, the hash value of the enterprise department, the version number, the Mercker root and the timestamp, and the block packages the traceable production information;
and S5, the key node uploads the new block to the private chain, simultaneously sends the hash pointer, the license file and the data to the node of the government regulatory department, and sends the hash pointer and the hash value of the key node to the key node on the alliance chain and other non-key nodes on the alliance chain.
Further, the method comprises the following steps:
SS1, after the product information is audited by the government regulatory department, the data block is constructed by the key node of the alliance chain; the government supervision department node audits the product information submitted by the alliance chain non-key node through an intelligent contract and generates an audit result data set;
SS2, verifying the hash pointer of the enterprise private chain and the audit result data set generated by the government supervision department node by the non-key node of the alliance chain through an intelligent contract, wherein the data set can be from the audit and verification results of different supervision departments;
SS3, collecting the verification result of the non-key node on the alliance chain by the key node of the alliance chain, generating the block of the alliance chain, and packaging the hash value of the current block, the hash value before the block, the enterprise hash value and the version number, the Mercker root and the time stamp;
SS4, federation chain key nodes broadcasting the newly generated block to non-key nodes on the federation chain;
SS5, other key nodes that fail to be selected as key nodes of the enterprise blockchain, will verify the data block; when the verification is in agreement, updating the whole enterprise block chain by the enterprise block chain key node; meanwhile, key nodes of the alliance chain collect the interfaces provided by all private chains, and an integrated interface is created for the consumer and other members participating in product information tracing.
The invention has the beneficial effects that:
(1) the invention improves the supervision and data security, and reduces the requirements on hardware equipment. Particularly, product information tracing information inquiry cost among enterprises, between enterprises and governments and between enterprises and consumers is reduced, the enterprises can be guaranteed to be capable of controlling access requests for private chain data, privacy data of the enterprises are protected, government supervision department nodes can be well combined into the product information tracing system, the government supervision department nodes can be directly accessed into the enterprises, offline inspection is conducted on production business activities, a large amount of access information is processed by a alliance chain of a main layer, inquiry which does not pass identity verification is rejected, distributed denial of service attacks from other nodes in the system can be reduced, and work burden of sub-layer equipment is relieved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic diagram of key nodes of a federation chain participating in maintaining two blockchains according to the present invention;
FIG. 2 is a logic diagram illustrating the operation of the enterprise private chain in the two-tier architecture of the present invention;
FIG. 3 is a diagram illustrating the working logic of a federation chain in a two-tier architecture of the present invention;
FIG. 4 is a schematic diagram of a storage scheme of the present invention;
FIG. 5 is a diagram illustrating a first test result of the present invention;
FIG. 6 is a diagram illustrating a second test result according to the present invention;
FIG. 7 is a third test result of the present invention.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following. All of the features disclosed in this specification, or all of the steps of a method or process so disclosed, may be combined in any combination, except combinations where mutually exclusive features and/or steps are used.
Any feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.
Specific embodiments of the present invention will be described in detail below, and it should be noted that the embodiments described herein are only for illustration and are not intended to limit the present invention. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the present invention. In other instances, well-known circuits, software, or methods have not been described in detail so as not to obscure the present invention.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Before describing the embodiments, some necessary terms need to be explained. For example:
if the terms "first," "second," etc. are used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. Thus, a "first" element discussed below could also be termed a "second" element without departing from the teachings of the present invention. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. In contrast, when an element is referred to as being "directly connected" or "directly coupled" to another element, there are no intervening elements present.
The various terms appearing in this application are used for the purpose of describing particular embodiments only and are not intended as limitations of the invention, with the singular being intended to include the plural unless the context clearly dictates otherwise.
When the terms "comprises" and/or "comprising" are used in this specification, these terms are intended to specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence and/or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
As shown in fig. 1 to 7, a two-layer product information tracing system architecture based on a license chain adopts a license chain module with a two-layer architecture; and the permission chain module of the double-layer architecture consists of a main layer and a sub-layer; the main layer is composed of enterprise alliance block chains, the sub-layer is composed of enterprise private block chains, the main layer and the sub-layer are independent of each other and are interacted through respective selected key nodes, the key nodes of the alliance chains participate in maintaining the two block chains, and interaction between the main layer and the sub-layer is achieved through a Hash pointer and an interface and is maintained through the key nodes in the enterprise private chains.
Further, in the double-layer architecture, detailed product data of an enterprise is stored in a private chain of the enterprise, a hash value and a hash pointer of the private chain are shared in a federation chain through a private chain key node, and data reading of the main layer is separated from data entry and storage of the sub-layer.
Furthermore, an enterprise can formulate an information sharing scheme according to the actual situation of the enterprise, when other nodes of the alliance chain need to acquire the tracing information of the product, a data acquisition request needs to be sent to the key node of the enterprise private chain, after the permission of the key node of the target private chain is obtained, the other nodes of the alliance chain can acquire the product information tracing information through the interface provided by the private chain, and the query for acquiring the product information tracing information can be directly carried out through the interface provided by the main layer node.
Further, the method comprises the following steps:
s1, an enterprise selects a department as a key node of a private chain according to actual application conditions, the key node is responsible for planning, constructing and maintaining the private chain, collecting transaction data, constructing a data block, examining product information in the private chain, connecting the private chain of the enterprise to a alliance chain, other departments related in a product information tracing system are used as non-key nodes and are also verification nodes, and the nodes are responsible for inputting product information to a traceable system and verifying the product information collected by the key node;
s2, introducing an intelligent contract into the enterprise key node, and auditing the integrity and accuracy of the information submitted by the non-private chain through the intelligent contract;
s3, the key node returns the auditing result to the non-key node of the private chain, and the non-key node verifies the auditing result returned by the key node;
s4, the key node obtains the private chain auditing result sent by the non-key node through the intelligent contract, so as to construct the private chain block, and the data block constructed by the key node in the enterprise private chain mainly comprises a block head part and a block body part: the block head mainly packages the hash value of the current block, the hash value before the block, the hash value of the enterprise department, the version number, the Mercker root and the timestamp, and the block packages the traceable production information;
and S5, the key node uploads the new block to the private chain, simultaneously sends the hash pointer, the license file and the data to the node of the government regulatory department, and sends the hash pointer and the hash value of the key node to the key node on the alliance chain and other non-key nodes on the alliance chain.
Further, the method comprises the following steps:
SS1, after the product information is audited by the government regulatory department, the data block is constructed by the key node of the alliance chain; the government supervision department node audits the product information submitted by the alliance chain non-key node through an intelligent contract and generates an audit result data set;
SS2, verifying the hash pointer of the enterprise private chain and the audit result data set generated by the government supervision department node by the non-key node of the alliance chain through an intelligent contract, wherein the data set can be from the audit and verification results of different supervision departments;
SS3, collecting the verification result of the non-key node on the alliance chain by the key node of the alliance chain, generating the block of the alliance chain, and packaging the hash value of the current block, the hash value before the block, the enterprise hash value and the version number, the Mercker root and the time stamp;
SS4, federation chain key nodes broadcasting the newly generated block to non-key nodes on the federation chain;
SS5, other key nodes that fail to be selected as key nodes of the enterprise blockchain, will verify the data block; when the verification is in agreement, updating the whole enterprise block chain by the enterprise block chain key node; meanwhile, key nodes of the alliance chain collect the interfaces provided by all private chains, and an integrated interface is created for the consumer and other members participating in product information tracing.
The invention adopts a double-layer structure permission chain, wherein the double-layer structure permission chain consists of a main layer and sub-layers, the main layer consists of enterprise alliance block chains, the sub-layers consist of enterprise private block chains, which are not independent of each other, and are interacted by respectively selected key nodes, as shown in figure 1, the key nodes of the alliance chain participate in maintaining the two block chains, and the interaction between the main layer and the sub-layers is realized through a hash pointer and an interface and is maintained by the key nodes in the enterprise private chain.
In the double-layer architecture, detailed product data of an enterprise is stored in a private chain of the enterprise, a hash value and a hash pointer of the private chain are shared in a alliance chain through a private chain key node, data reading of a main layer is separated from data entry and storage of a sub-layer, the enterprise can make an information sharing scheme according to actual conditions of the enterprise, and therefore other enterprises cannot obtain privacy information of the product in a violation mode. When other nodes of the alliance chain need to acquire the tracing information of the product, a data acquisition request needs to be sent to the key node of the enterprise private chain, and after the permission of the key node of the target private chain is obtained, the other nodes of the alliance chain can acquire the tracing information of the product information through the interface provided by the private chain. The query for obtaining the product information tracing information can be directly carried out through the interface provided by the main layer node, so that the product information tracing information query cost among enterprises, between the enterprises and governments and between the enterprises and consumers is reduced.
In the double-layer framework, the characteristic of sub-layer enterprise private information sharing customization can ensure that an enterprise can control access requests to private chain data, private data of the enterprise is protected, and government supervision department nodes can be well combined into the product information tracing system, can be directly accessed into the enterprise, and can carry out offline inspection on production and management activities. The alliance chain of the main layer processes a large amount of access information, rejects queries which fail to pass identity authentication, can reduce distributed denial of service attacks (DDoS) from other nodes in the system, and reduces the workload of sub-layer equipment.
The application process mainly comprises the following steps: the method comprises the steps that key nodes are established by enterprise private chains, an enterprise private chain data block is established by the key nodes of the private chains, mutual verification data between the key nodes of the private chains and non-key nodes of the private chains are obtained, Hash pointers and interfaces are issued by the key nodes of the private chains to a main layer, key nodes of alliance chains are established by the key nodes of the alliances, check data between the key nodes of the alliance chains and non-key nodes of the alliance chains are obtained, the key nodes of the alliance chains are established by the key nodes of the alliance chains, the Hash pointers and the interfaces are issued by the key nodes of the alliance chains to the main layer, and users can inquire product tracing information by accessing.
Enterprise private chain key nodes, the enterprise private chain working logic in a two-tier architecture is shown in fig. 2, where,
1. the enterprise selects a department as a key node of the private chain according to the actual application condition, the key node is responsible for planning, constructing and maintaining the private chain, collecting transaction data, constructing a data block, examining product information in the private chain, and connecting the private chain of the enterprise to the alliance chain; other departments involved in the product information tracing system are used as non-key nodes and verification nodes; the nodes are responsible for inputting product information into the traceable system and verifying the product information collected by the key nodes;
2. introducing an intelligent contract into the enterprise key node, and auditing the integrity and accuracy of information submitted by the non-private chain through the intelligent contract;
3. the key node returns the auditing result to the non-key node of the private chain; the non-key node verifies the auditing result returned by the key node;
4. the key node obtains the private chain auditing result sent by the non-key node through the intelligent contract, so as to construct a private chain block, and the data block constructed by the key node in the enterprise private chain mainly comprises a block head and a block body 2 parts: the block head mainly packages the hash value of the current block, the hash value before the block, the hash value, the version number, the Mercker root and the timestamp of the affiliated enterprise department, and the block packages traceable production information similar to transaction and digital signature in a bit currency data block;
5. the key node uploads the new block to a private chain, simultaneously sends a hash pointer, a permission file and data to a node of a government regulatory department, and sends the hash pointer and the hash value of the key node to the key node on the alliance chain and other non-key nodes on the alliance chain;
federation chain key nodes, federation chain working logic in a two-tier architecture is shown in figure 3,
1. after the government regulatory department reviews the product information, the data block is constructed by key nodes of the alliance chain. And auditing the product information submitted by the non-key nodes of the alliance chain by the government supervisory department node through an intelligent contract, and generating an auditing result data set.
2. The non-key nodes of the alliance chain check the Hash pointers of the enterprise private chain and audit result data sets generated by the nodes of the government regulatory departments through intelligent contracts, and the data sets can be from audit and check results of different regulatory departments.
3. And collecting the verification result of the non-key nodes on the alliance chain by the key nodes of the alliance chain, and generating a block of the alliance chain, wherein the block encapsulates the hash value, the hash value before the block, the enterprise hash value, the version number, the Mercker root and the timestamp of the current block.
4. The federation chain key node broadcasts the newly generated block to non-key nodes on the federation chain.
5. Other key nodes that fail to be selected as key nodes of the enterprise blockchain will verify the data block. When the verification is in agreement, the enterprise blockchain key node updates the entire enterprise blockchain. Meanwhile, key nodes of the federation chain will collect the provided interfaces of all private chains, and create an integrated interface for consumers and other members (including enterprises and government regulatory bodies participating in the federation chain) participating in product information tracing.
The actual performance of the present invention will be described in further detail with reference to the accompanying drawings.
According to the scheme, through the super account book simulation platform, intelligent contracts of a private chain and an alliance chain are deployed to achieve data verification and audit, and the performance of the double-layer framework provided by the invention is tested. The performance evaluation index selects Transaction Performance (TPS), transaction delay and resource utilization rate, and the inter-group test index is maximum delay, minimum delay and throughput. The nodes of the sub-layer and the main layer are used for realizing data entry and data reading, the node configuration is shown in table 1, the performance of the nodes of the main layer and the sub-layer can be considered in the data writing and reading processes, the storage scheme is shown in fig. 4, and the hash value is calculated after signature, so that the storage pressure of the system can be reduced.
Figure BDA0002525995170000071
TABLE 1
The unit test case is sent to the intelligent contract through the rate controller, and the performance of the main layer node and the sub-layer node is reflected in the reading and writing process of the case.
The test results are shown in fig. 5, 6 and 7 by calculating the average value of the unit tests of each group, it can be seen that the maximum delay of the main layer node is much smaller than the maximum delay of the sub-layer node (close to 1000 times of the main layer node), fig. 6 compares the minimum delays between the main layer node and the sub-layer node, and as shown in the figure, the difference is small. As can be seen from fig. 5 and 6, the main layer operates faster than the sub-layers, and fig. 7 shows that the throughput of the nodes of the main layer is much greater than the sub-layers, which is approximately 50 times that of the sub-layers. The result shows that in the product information tracing information acquisition process, most of the time is consumed in the inquiry calculation of the enterprise private chain, and efficient product information tracing information sharing can be realized among enterprises, between the enterprises and government departments and between the enterprises and consumers through the main layer nodes.
In other technical features of the embodiment, those skilled in the art can flexibly select and use the features according to actual situations to meet different specific actual requirements. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the present invention. In other instances, well-known algorithms, methods or systems have not been described in detail so as not to obscure the present invention, and are within the scope of the present invention as defined by the claims.
For simplicity of explanation, the foregoing method embodiments are described as a series of acts or combinations, but those skilled in the art will appreciate that the present application is not limited by the order of acts, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and elements referred to are not necessarily required in this application.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The disclosed systems, modules, and methods may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be referred to as an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may also be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It will be understood by those skilled in the art that all or part of the processes in the methods for implementing the embodiments described above can be implemented by instructing the relevant hardware through a computer program, and the program can be stored in a computer-readable storage medium, and when executed, the program can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a ROM, a RAM, etc.
The foregoing is illustrative of the preferred embodiments of this invention, and it is to be understood that the invention is not limited to the precise form disclosed herein and that various other combinations, modifications, and environments may be resorted to, falling within the scope of the concept as disclosed herein, either as described above or as apparent to those skilled in the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (5)

1. A double-layer product information tracing system architecture based on a license chain is characterized in that a license chain module of the double-layer architecture is adopted; and the permission chain module of the double-layer architecture consists of a main layer and a sub-layer; the main layer is composed of enterprise alliance block chains, the sub-layer is composed of enterprise private block chains, the main layer and the sub-layer are independent of each other and are interacted through respective selected key nodes, the key nodes of the alliance chains participate in maintaining the two block chains, and interaction between the main layer and the sub-layer is achieved through a Hash pointer and an interface and is maintained through the key nodes in the enterprise private chains.
2. The license chain-based two-layer product information tracing system architecture of claim 1, wherein in the two-layer architecture, detailed product data of an enterprise is stored in a private chain of the enterprise, a hash value and a hash pointer of the private chain are shared into a federation chain through a private chain key node, and data reading of the main layer is separated from data entry and storage of the sub-layer.
3. The double-layer product information tracing system architecture based on the license chain as claimed in claim 2, wherein an enterprise can formulate an information sharing scheme according to its own actual situation, when other nodes of the federation chain need to obtain the tracing information of the product, a data acquisition request needs to be sent to the key node of the enterprise private chain, after the permission of the key node of the target private chain is obtained, the other nodes of the federation chain can acquire the product information tracing information through the interface provided by the private chain, and the query for acquiring the product information tracing information can be directly performed through the interface provided by the main layer node.
4. The license chain-based two-layer product information tracing system architecture according to any one of claims 1 to 3, comprising the steps of:
s1, an enterprise selects a department as a key node of a private chain according to actual application conditions, the key node is responsible for planning, constructing and maintaining the private chain, collecting transaction data, constructing a data block, examining product information in the private chain, connecting the private chain of the enterprise to a alliance chain, other departments related in a product information tracing system are used as non-key nodes and are also verification nodes, and the nodes are responsible for inputting product information to a traceable system and verifying the product information collected by the key node;
s2, introducing an intelligent contract into the enterprise key node, and auditing the integrity and accuracy of the information submitted by the non-private chain through the intelligent contract;
s3, the key node returns the auditing result to the non-key node of the private chain, and the non-key node verifies the auditing result returned by the key node;
s4, the key node obtains the private chain auditing result sent by the non-key node through the intelligent contract, so as to construct the private chain block, and the data block constructed by the key node in the enterprise private chain mainly comprises a block head part and a block body part: the block head mainly packages the hash value of the current block, the hash value before the block, the hash value of the enterprise department, the version number, the Mercker root and the timestamp, and the block packages the traceable production information;
and S5, the key node uploads the new block to the private chain, simultaneously sends the hash pointer, the license file and the data to the node of the government regulatory department, and sends the hash pointer and the hash value of the key node to the key node on the alliance chain and other non-key nodes on the alliance chain.
5. The license chain-based two-layer product information tracing system architecture of claim 4, comprising the steps of:
SS1, after the product information is audited by the government regulatory department, the data block is constructed by the key node of the alliance chain; the government supervision department node audits the product information submitted by the alliance chain non-key node through an intelligent contract and generates an audit result data set;
SS2, verifying the hash pointer of the enterprise private chain and the audit result data set generated by the government supervision department node by the non-key node of the alliance chain through an intelligent contract, wherein the data set can be from the audit and verification results of different supervision departments;
SS3, collecting the verification result of the non-key node on the alliance chain by the key node of the alliance chain, generating the block of the alliance chain, and packaging the hash value of the current block, the hash value before the block, the enterprise hash value and the version number, the Mercker root and the time stamp;
SS4, federation chain key nodes broadcasting the newly generated block to non-key nodes on the federation chain;
SS5, other key nodes that fail to be selected as key nodes of the enterprise blockchain, will verify the data block; when the verification is in agreement, updating the whole enterprise block chain by the enterprise block chain key node; meanwhile, key nodes of the alliance chain collect the interfaces provided by all private chains, and an integrated interface is created for the consumer and other members participating in product information tracing.
CN202010504432.1A 2020-06-05 2020-06-05 Double-layer product information tracing system architecture based on permission chain Pending CN111782723A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010504432.1A CN111782723A (en) 2020-06-05 2020-06-05 Double-layer product information tracing system architecture based on permission chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010504432.1A CN111782723A (en) 2020-06-05 2020-06-05 Double-layer product information tracing system architecture based on permission chain

Publications (1)

Publication Number Publication Date
CN111782723A true CN111782723A (en) 2020-10-16

Family

ID=72754613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010504432.1A Pending CN111782723A (en) 2020-06-05 2020-06-05 Double-layer product information tracing system architecture based on permission chain

Country Status (1)

Country Link
CN (1) CN111782723A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112015808A (en) * 2020-07-10 2020-12-01 浙江大搜车软件技术有限公司 Vehicle data processing method and device based on alliance chain
CN112286963A (en) * 2020-11-17 2021-01-29 北京物资学院 Trusted inquiry system for block chain terminal data and implementation method thereof
CN113037492A (en) * 2021-02-04 2021-06-25 精英数智科技股份有限公司 Sensor data processing method and device
CN113949538A (en) * 2021-09-27 2022-01-18 武汉理工大学 Traffic node information management system and management method based on double block chains
CN114205088A (en) * 2021-11-01 2022-03-18 黄传明 Intelligent traffic facility management method and system based on double block chains
WO2024066043A1 (en) * 2022-09-27 2024-04-04 深圳先进技术研究院 Electronic letter-of-guarantee management method and apparatus based on double-layer blockchain

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112015808A (en) * 2020-07-10 2020-12-01 浙江大搜车软件技术有限公司 Vehicle data processing method and device based on alliance chain
CN112015808B (en) * 2020-07-10 2021-07-06 浙江大搜车软件技术有限公司 Vehicle data processing method and device based on alliance chain
CN112286963A (en) * 2020-11-17 2021-01-29 北京物资学院 Trusted inquiry system for block chain terminal data and implementation method thereof
CN112286963B (en) * 2020-11-17 2023-05-26 北京物资学院 Block chain terminal data credible query system and implementation method thereof
CN113037492A (en) * 2021-02-04 2021-06-25 精英数智科技股份有限公司 Sensor data processing method and device
CN113949538A (en) * 2021-09-27 2022-01-18 武汉理工大学 Traffic node information management system and management method based on double block chains
CN113949538B (en) * 2021-09-27 2022-07-19 武汉理工大学 Traffic node information management system and management method based on double block chains
CN114205088A (en) * 2021-11-01 2022-03-18 黄传明 Intelligent traffic facility management method and system based on double block chains
WO2024066043A1 (en) * 2022-09-27 2024-04-04 深圳先进技术研究院 Electronic letter-of-guarantee management method and apparatus based on double-layer blockchain

Similar Documents

Publication Publication Date Title
CN111782723A (en) Double-layer product information tracing system architecture based on permission chain
Dhieb et al. A secure ai-driven architecture for automated insurance systems: Fraud detection and risk measurement
Xu et al. CUB, a consensus unit-based storage scheme for blockchain system
Hamida et al. Blockchain for enterprise: overview, opportunities and challenges
CN109189962B (en) License service implementation system based on block chain
Weber et al. A platform architecture for multi-tenant blockchain-based systems
WO2022179008A1 (en) Supply chain finance ai daas algorithm warehouse platform based on blockchain
CN111612393B (en) Medicine supply chain management system and method based on block chain and edge calculation
CN114065283A (en) Lightweight block chain storage method and device capable of cyclic regeneration
CN102243748A (en) Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt
Poblet et al. From Athens to the Blockchain: oracles for digital democracy
Li et al. Blockchain dividing based on node community clustering in intelligent manufacturing cps
Willrich et al. Towards More Sustainability: A Literature Review Where Bioeconomy Meets Blockchain.
Jiang et al. A cross-chain solution to integration of iot tangle for data access management
Cui et al. Protecting vaccine safety: An improved, blockchain-based, storage-efficient scheme
Kaur et al. Blockchain consensus protocols: State-of-the-art and future directions
Miccichè et al. A primer on statistically validated networks
CN105991609B (en) A kind of risk case determines method and device
CN116467026A (en) Cloud desktop data secure sharing and tracing method and system based on blockchain
CN113643032B (en) Information processing method, device and data management system based on block chain
CN109949881A (en) A kind of big data processing method and equipment based on block chain
Zhu et al. Authentication of Multi-Dimensional Top-$ K $ Query on Untrusted Server
CN112910974A (en) System and method based on block chain system architecture
Chen et al. Block-chain based federated learning for knowledge capital
Feng Enterprise’s credit information sharing model based on consortium blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20201016