CN112351045A - Supply chain management method, system, server and computer readable medium - Google Patents

Supply chain management method, system, server and computer readable medium Download PDF

Info

Publication number
CN112351045A
CN112351045A CN202011569790.7A CN202011569790A CN112351045A CN 112351045 A CN112351045 A CN 112351045A CN 202011569790 A CN202011569790 A CN 202011569790A CN 112351045 A CN112351045 A CN 112351045A
Authority
CN
China
Prior art keywords
product
source data
information
verification
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011569790.7A
Other languages
Chinese (zh)
Inventor
谭岳文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qimei Supply Chain Shenzhen Co ltd
Original Assignee
Qimei Supply Chain Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qimei Supply Chain Shenzhen Co ltd filed Critical Qimei Supply Chain Shenzhen Co ltd
Priority to CN202011569790.7A priority Critical patent/CN112351045A/en
Publication of CN112351045A publication Critical patent/CN112351045A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses a supply chain management method, a server and a computer readable medium, wherein the method comprises the following steps: receiving product management request information from an enterprise terminal, wherein the product management request information comprises product source data; and performing public key signature verification and hash verification on the product management request information, if the verification is passed, associating the product source data with traceable source data related to the product source data based on first associated information in the product source data, generating second associated information, writing the product source data and the second associated information into a block chain, and feeding back the second associated information to the enterprise terminal according to an intelligent contract, wherein the second associated information comprises storage address information of the product source data and storage address information of the traceable source data. The principle of asymmetric encryption is utilized in the application, so that the data of the uplink cannot be forged, and the data tracing is more reliable.

Description

Supply chain management method, system, server and computer readable medium
Technical Field
The present application relates to the field of block chain technologies, and in particular, to a supply chain management method, a server, and a computer readable medium.
Background
After the bit currency concept is proposed, the block chain is widely concerned as the underlying technology of the bit currency. In a narrow sense, a block chain is a string of data blocks containing transaction information which are generated by using a cryptographic method in a correlation mode, and the data blocks are connected in sequence according to time stamps to form a chain data structure; broadly, the blockchain technique is a completely new distributed infrastructure and computing approach that utilizes blockchain data structures to verify and store data, utilizes distributed node consensus algorithms to generate and update data, utilizes cryptography to secure data transmission and access, and utilizes intelligent contracts composed of automated script code to program and manipulate data. The block chain has the characteristics of decentralization, openness, autonomy, data tamper resistance, high transparency and the like, so that the block chain can be widely applied to the fields of securities trading, electronic commerce, social communication, file storage, existence certification, identity verification and the like.
The supply chain is a network chain structure formed by the supply and demand relationship among enterprises, and is a network structure formed by connecting members such as raw material suppliers, manufacturers, distributors, retailers and final consumers involved in the production and circulation processes of products with upstream and downstream members.
Disclosure of Invention
The embodiment of the application provides a supply chain management method, and a transparent and reliable supply chain management method and system can be provided through a block chain.
In a first aspect, an embodiment of the present application provides a supply chain management method, where the method includes:
receiving product management request information from an enterprise terminal, wherein the product management request information comprises product source data;
and performing public key signature verification and hash verification on the product management request information, if the verification is passed, associating the product source data with traceable source data related to the product source data based on first associated information in the product source data, generating second associated information, writing the product source data and the second associated information into a block chain, and feeding back the second associated information to the enterprise terminal according to an intelligent contract, wherein the second associated information comprises storage address information of the product source data and storage address information of the traceable source data.
Optionally, the product management request information further includes a first hash value, an enterprise public key, and a digital signature;
the public key signature verification and hash verification of the product management request information includes:
decoding the product management request information to obtain the product source data, the first hash value, the enterprise public key and the digital signature;
verifying the digital signature through the enterprise public key;
if the verification is passed, carrying out hash encryption on the product source data to obtain a second hash value;
comparing and matching the first hash value and the second hash value;
if the matching is successful, the hash verification is passed.
Optionally, the method further includes:
receiving a product information query request, wherein the product information query request comprises the second associated information;
acquiring the product source data and the traceable source data according to the intelligent contract and the second associated information;
and sending the product source data and the traceable source data to an initiating terminal corresponding to the query request.
Optionally, after the decoding the product management request information, the method further includes:
judging whether the product is a source product or not according to the product source data;
if the source product is the source product, the digital signature is verified through the enterprise public key, if the source product passes the verification, the product source data is written into a block chain, the third association information is generated, and the second association information is fed back to the enterprise terminal;
if the product is not the source product, verifying whether the source data in the product data is changed, if the source data in the product data is changed, feeding back data error to the enterprise terminal to reject uplink, and if the source data in the product data is not changed, performing steps of public key signature verification and hash verification on the product management request information.
Optionally, the product source data includes, but is not limited to, unit, quantity, production time, expiration date, and product production raw material information.
Optionally, the determining whether the product is a source product according to the product source data includes:
if the product production raw material information does not contain the first associated information, the product is a source product;
and if the product production raw material information contains the first associated information, the product is not a source product.
In a second aspect, an embodiment of the present application provides a supply chain management system, including:
the system comprises an enterprise terminal, a node server and a block chain, wherein the enterprise terminal and the block chain are respectively communicated with the node server;
the enterprise terminal carries out Hash encryption and private key signature on the product source data to obtain product management request information;
sending the product management request information to a node server;
and the node server performs public key signature verification and hash verification on the product management request information, if the verification is passed, the product source data and traceable source data related to the product source data are correlated based on first correlation information in the product source data, second correlation information is generated, the product source data and the second correlation information are written into a block chain, and the second correlation information is fed back to the enterprise terminal according to an intelligent contract, wherein the second correlation information comprises storage address information of the product source data and storage address information of the traceable source data.
In a third aspect, an embodiment of the present application provides a server, where the server includes:
the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving product management request information from an enterprise terminal, and the product management request information comprises product source data;
the verification unit is used for performing public key signature verification and Hash verification on the product management request information;
the association unit is used for associating the product source data with traceable source data related to the product source data based on first association information in the product source data and generating second association information under the condition that the verification unit passes the verification;
the writing unit writes the product source data and the second associated information into a block chain;
and the feedback unit is used for feeding back the second associated information to the enterprise terminal according to the intelligent contract, wherein the second associated information comprises the storage address information of the product source data and the storage address information of the traceable source data.
In a fourth aspect, an embodiment of the present application provides another server, including a processor, a memory and a communication module, where the memory is configured to store program codes, and the processor is configured to call the program codes to perform the method of the first aspect and any optional manner thereof.
In a fifth aspect, the present application provides a computer-readable storage medium, wherein the computer storage medium stores a computer program, and the computer program includes program instructions, which, when executed by a processor, cause the processor to execute the method of the first aspect and any one of the alternatives thereof.
It can be seen that, in the embodiment of the present application, product management request information is received from an enterprise terminal, where the product management request information includes product data; and performing public key signature verification and hash verification on the product management request information, writing the product data information into a block chain if the verification is passed, and feeding back product management information to the enterprise terminal according to an intelligent contract, wherein the product management information comprises storage address information of the product information. The data tracing method has the advantages that the principle of asymmetric encryption is utilized, the data of the chain link cannot be forged, the block chain technology is utilized, the data after the chain link cannot be falsified and forged in the whole circulation process, the authenticity of the data is guaranteed from the source, and the data tracing is more reliable.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments will be briefly introduced below.
Fig. 1 is a schematic flow chart of a supply chain management method provided in an embodiment of the present application;
FIG. 2 is a schematic diagram of a supply chain management system according to an embodiment of the present disclosure;
fig. 3 is a schematic block diagram of a server provided in an embodiment of the present application;
FIG. 4 is an apparatus provided by an embodiment of the present application;
fig. 5 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
The block chain is a chain data structure which connects the data blocks according to the time sequence and is a distributed account book which is ensured in a cryptographic mode and cannot be tampered and forged.
The block chain has the characteristics of openness, consensus, decentralization, distrust, transparency, anonymity of both sides, no tampering, traceability and the like. Open and transparent means that anyone can participate in the blockchain network, and each device can be used as a node, and each node allows a complete database copy to be obtained. The nodes maintain the whole block chain together through competition calculation based on a set of consensus mechanism. When any node fails, the rest nodes can still work normally. The decentralization and the distrust mean that a block chain is formed into an end-to-end network by a plurality of nodes together, and no centralized equipment or management mechanism exists. The data exchange between the nodes is verified by a digital signature technology, mutual trust is not needed, and other nodes cannot be deceived as long as the data exchange is carried out according to the rules set by the system. Transparent and anonymous meaning that the operation rule of the block chain is public, and all data information is also public, so that each transaction is visible to all nodes. Because the nodes are distrusted, the nodes do not need to disclose identities, and each participated node is anonymous. Among other things, non-tamperable and traceable means that modifications to the database by each and even multiple nodes cannot affect the databases of other nodes unless more than 51% of the nodes in the entire network can be controlled to modify at the same time, which is almost impossible. In the block chain, each transaction is connected with two adjacent blocks in series through a cryptographic method, so that any transaction record can be traced.
In particular, the blockchain may utilize blockchain data structures to verify and store data, utilize distributed node consensus algorithms to generate and update data, cryptographically secure data transmission and access, and utilize intelligent contracts comprised of automated script code to program and manipulate data in a completely new distributed infrastructure and computing manner. Therefore, the characteristic that the block chain technology is not tampered fundamentally changes a centralized credit creation mode, and the irrevocability and the safety of data are effectively improved. The intelligent contract enables all the terms to be written into programs, the terms can be automatically executed on the block chain, and therefore when conditions for triggering the intelligent contract exist, the block chain can be forcibly executed according to the content in the intelligent contract and is not blocked by any external force, effectiveness and execution force of the contract are guaranteed, cost can be greatly reduced, and efficiency can be improved. Each node on the block chain has the same account book, and the recording process of the account book can be ensured to be public and transparent. The block chain technology can realize point-to-point, open and transparent direct interaction, so that an information interaction mode with high efficiency, large scale and no centralized agent becomes a reality.
The embodiments of the present application are mainly applied to a blockchain node server, and the types of the blockchain node server are many, and the server may be a conventional server, a large storage system, a desktop computer, a notebook computer, a tablet computer, a palmtop computer, a smart phone, a portable digital player, a smart watch, a smart bracelet, and the like.
The block chain node server is one of the block chain servers in the block chain network determined according to the consensus mechanism. It should be appreciated that since the blockchain is a decentralized, distributed database, each time data is processed, one of the servers in the blockchain network needs to be selected as an executor to process the data. The rule for selecting the server each time is a Consensus mechanism, which in the embodiment of the present application may be a workload certification mechanism (Proof of Work, POW), an equity certification mechanism (Proof of stamp, POS), a Ripple Consensus mechanism (Ripple Consensus), an authorized equity certification mechanism (DPOS), and the like, and is not limited herein. In the embodiment of the present application, the terminal includes, but is not limited to, a device with a communication function, a smart phone, a tablet computer, a notebook computer, a desktop computer, a portable digital player, a smart band, a smart watch, and the like.
The existing supply chain has the problems of unclear source, unpublished information, difficult channel tracing and the like. In order to better understand the embodiments of the present application, methods of applying the embodiments of the present application will be described below.
Referring to fig. 1, fig. 1 is a schematic flow chart of a supply chain management method provided in an embodiment of the present application, and as shown in fig. 1, the method may include:
101: product management request information from an enterprise terminal is received.
The product management request information comprises product source data, a first hash value, an enterprise public key and a digital signature.
Specifically, the enterprise collects the required product source data related to the product, and the product source data may include, but is not limited to, units, quantities, production time, validity period, and enterprise public key, and associated information of traceable source data related to the product source data. Wherein, the traceable source data comprises data related to the production raw materials of the product, such as information of manufacturer units, suppliers and/or distributors of the production raw materials, quantity, production time, validity period, enterprise public key and the like. Then, carrying out hash encryption on the source data to obtain a first hash value, and carrying out private key signature on the product source data to obtain a digital signature; and the enterprise terminal obtains the product management request information according to the product source data, the first hash value, the enterprise public key and the digital signature. And then sending the product management request information to a node server, so that the node server receives the product management request information.
102: and performing public key signature verification and hash verification on the product management request information, associating the product source data with traceable source data related to the product source data based on first associated information in the product source data, generating second associated information, writing the product source data and the second associated information into a block chain, and feeding back the second associated information to the enterprise terminal according to an intelligent contract, wherein the second associated information comprises storage address information of the product source data and storage address information of the traceable source data.
Specifically, the node server decodes the product management request information to obtain the product source data, the first hash value, the enterprise public key, and the digital signature; then, the digital signature is verified through the enterprise public key; and if the verification is passed, associating the product source data with traceable source data related to the product source data based on first associated information in the product source data, generating second associated information, writing the product source data and the second associated information into a block chain, and feeding back the second associated information to the enterprise terminal according to an intelligent contract, wherein the second associated information comprises storage address information of the product source data and storage address information of the traceable source data.
In this embodiment, after the product management request information is decoded, the node server further determines whether a product is a source product according to the product source data;
if the source product is the source product, the digital signature is verified through the enterprise public key, if the source product passes the verification, the product source data is written into a block chain, the third association information is generated, and the second association information is fed back to the enterprise terminal; if the product is not the source product, verifying whether the source data in the product data is changed, if so, feeding back data error to the enterprise terminal to reject uplink, and if not, executing steps of performing public key signature verification and hash verification on the product management request information.
The product source data of the embodiment can be the product data of the source product, and can also be the product source data of a processed product processed by utilizing the source product. For example, a fruit growing enterprise, since bananas are the source material, the uploaded data related to bananas is the product data of the source product; food production enterprises obtain food by processing banana serving as a source material instead of the source material, so that uploaded data related to the banana cakes are not product data of source products. If the product is a source product, the product data can be directly verified. If the product is not the source product, but the product is processed on the basis of the source product, the data of the source product is contained in the product data at the moment, and the data of the source product cannot be changed. For example, the product data includes units, quantity, production time, validity period, enterprise public key, hash value I and digital signature I, wherein the source data: the unit, the quantity, the production time, the valid period and the enterprise public key cannot be changed, a certain food enterprise purchases bananas of a certain planting enterprise and manufactures the bananas into a banana cake, and the food enterprise downloads the related source data of the bananas of the planting enterprise from a block and edits the source data to obtain the product data of the banana cake: units, quantities, production time, expiration dates, enterprise public keys, new units, new quantities, new production time, new expiration dates, creator public keys, and the like. The food enterprise can add new data on the basis of the source data, but cannot modify the source data of bananas. If the modification is carried out, the node server feeds back data error uplink rejection to the enterprise terminal. And if the product data is not modified, verifying the product data.
Specifically, the determining whether the product is a source product according to the product source data includes: if the product production raw material information does not contain the first associated information, the product is a source product; and if the product production raw material information contains the first associated information, the product is not a source product. I.e., whether it is the source product by determining whether there is data associated with the product source data.
In this embodiment, after receiving the product management request information, the node server verifies the digital signature by using the enterprise public key in the product management request information, verifies the digital signature, further verifies the hash value, and verifies the hash value again, so that the node server indicates that the data is true, and issues the product data to a certain block of the block chain. Other businesses and platforms on the blockchain may each query for the product data. After the product data is stored in the block chain, a hash address for storing the product data is obtained, the hash address is fed back to the enterprise terminal, and the hash address and the product data are synchronized to the data verification platform.
In this embodiment, after an enterprise creates a public and private key pair, the enterprise private key is stored by itself, the enterprise public key can be published to other open platforms, and the enterprise prepares enterprise data required by the platforms according to the difference of the platforms, encrypts the enterprise data by using the platform public key and then sends the encrypted enterprise data to the platforms, the platforms decrypt the received data according to the private key to obtain the enterprise data, which includes but is not limited to enterprise name, establishment time, random number, enterprise public key and digital signature, and verifies whether the digital signature is correct by using the enterprise public key, and if so, stores and publishes the enterprise data so that users can freely invoke the verification.
103: and receiving a product information query request, wherein the product information query request comprises the second associated information.
In this embodiment, the node server may further receive a query request from a user terminal for product information, so that the user can obtain the authenticity information of the product at each production node.
Specifically, when a user wants to know the related data of a certain product, the two-dimensional code of the product on the packaging bag can be scanned by using a mobile phone (i.e., a user terminal) to obtain second related information of the stored product, i.e., the storage address information of the related information of the stored product on the block chain, and access request information is sent to the data verification platform according to the storage address information.
104: and acquiring the product source data according to the intelligent contract and the second associated information.
Specifically, the node server may automatically perform query according to the stored address information in the second association information according to the stored intelligent contract, so as to obtain the product source data and the traceable source data stored at the address.
105: and sending the product source data and the traceable source data to an initiating terminal corresponding to the query request.
And finally, after the node server acquires the product source data, the node server sends the product source data and the traceable source data to an initiating terminal corresponding to the query request.
It can be seen that, in the embodiment of the present application, product management request information is received from an enterprise terminal, where the product management request information includes product data; and performing public key signature verification and hash verification on the product management request information, writing the product data information into a block chain if the verification is passed, and feeding back product management information to the enterprise terminal according to an intelligent contract, wherein the product management information comprises storage address information of the product information. The data tracing method has the advantages that the principle of asymmetric encryption is utilized, the data of the chain link cannot be forged, the block chain technology is utilized, the data after the chain link cannot be falsified and forged in the whole circulation process, the authenticity of the data is guaranteed from the source, and the data tracing is more reliable.
The embodiment provides a system for supply chain management, which is suitable for the supply chain management method according to the first embodiment, as shown in fig. 2, including an enterprise terminal 210, a node server 230, a blockchain 240 and a user terminal 220, where the enterprise terminal and the blockchain are respectively in communication with the node server; the enterprise terminal carries out Hash encryption and private key signature on the product source data to obtain product management request information; sending the product management request information to a node server; and the node server performs public key signature verification and hash verification on the product management request information, if the verification is passed, the product source data and traceable source data related to the product source data are correlated based on first correlation information in the product source data, second correlation information is generated, the product source data and the second correlation information are written into a block chain, and the second correlation information is fed back to the enterprise terminal according to an intelligent contract, wherein the second correlation information comprises storage address information of the product source data and storage address information of the traceable source data.
Specifically, the step of the enterprise terminal performing hash encryption and private key signature on the product source data to obtain the product management request information includes: the enterprise terminal carries out Hash encryption on the collected product source data to obtain a first Hash value, and carries out private key signature on the product source data to obtain a digital signature; and the enterprise terminal obtains the product management request information according to the product source data, the first hash value, the enterprise public key and the digital signature.
The embodiment of the present application further provides a server, where the server is configured to execute the unit of any one of the foregoing methods. Specifically, referring to fig. 3, fig. 3 is a schematic block diagram of a server provided in an embodiment of the present application. The server of the embodiment includes: a receiving unit 310, a verifying unit 320, a writing unit 330, an associating unit 350 and a feedback unit 340.
The verification unit is used for performing public key signature verification and Hash verification on the product management request information;
the association unit is used for associating the product source data with traceable source data related to the product source data based on first association information in the product source data and generating second association information under the condition that the verification unit passes the verification;
the writing unit writes the product source data and the second associated information into a block chain;
and the feedback unit is used for feeding back the second associated information to the enterprise terminal according to the intelligent contract, wherein the second associated information comprises the storage address information of the product source data and the storage address information of the traceable source data.
Referring to fig. 4, fig. 4 is a device provided in an embodiment of the present application, where the device may be a server, and the device shown in fig. 5 includes: one or more processors 501; one or more input devices 502, one or more output devices 503, and memory 504. The processor 501, the input device 502, the output device 503, and the memory 504 are connected by a bus 505. The memory 502 is used to store instructions and the processor 501 is used to execute instructions stored by the memory 502.
Wherein, in case the device is used as a server, the processor 501 is configured to:
receiving product management request information from an enterprise terminal, wherein the product management request information comprises product source data;
and performing public key signature verification and hash verification on the product management request information, if the verification is passed, associating the product source data with traceable source data related to the product source data based on first associated information in the product source data, generating second associated information, writing the product source data and the second associated information into a block chain, and feeding back the second associated information to the enterprise terminal according to an intelligent contract, wherein the second associated information comprises storage address information of the product source data and storage address information of the traceable source data.
It should be understood that in the embodiments of the present Application, the Processor 501 may be a Central Processing Unit (CPU), and may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field-Programmable Gate arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and so on. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 502 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of the fingerprint), a microphone, etc., and the output device 503 may include a display (LCD, etc.), a speaker, etc.
The memory 504 may include a read-only memory and a random access memory, and provides instructions and data to the processor 501. A portion of the memory 504 may also include non-volatile random access memory. For example, the memory 504 may also store device type information.
In a specific implementation, the processor 501, the input device 502, and the output device 503 described in this embodiment of the present application may execute the implementation described in the first embodiment and the implementation described in the second embodiment of the supply chain management method provided in this embodiment of the present application, and may also execute the implementation of the server described in this embodiment of the present application, which is not described herein again.
In another embodiment of the present application, a computer-readable storage medium is provided, which stores a computer program that when executed by a processor implements: receiving product management request information from an enterprise terminal, wherein the product management request information comprises product source data; and performing public key signature verification and hash verification on the product management request information, writing the product source data into a block chain if the verification is passed, and feeding back product management information to the enterprise terminal according to an intelligent contract, wherein the product management information comprises storage address information of the product source data.
The computer readable storage medium may be an internal storage unit of the terminal according to any of the foregoing embodiments, for example, a hard disk or a memory of the terminal. The computer readable storage medium may be an external storage device of the terminal, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the terminal. Further, the computer-readable storage medium may include both an internal storage unit and an external storage device of the terminal. The computer-readable storage medium stores the computer program and other programs and data required by the terminal. The above-described computer-readable storage medium may also be used to temporarily store data that has been output or is to be output.
Fig. 5 is a schematic diagram of a server structure provided in an embodiment of the present application, where the server 600 may have a relatively large difference due to different configurations or performances, and may include one or more Central Processing Units (CPUs) 622 (e.g., one or more processors) and a memory 632, and one or more storage media 630 (e.g., one or more mass storage devices) for storing applications 642 or data 644. Memory 632 and storage medium 630 may be, among other things, transient or persistent storage. The program stored in the storage medium 630 may include one or more modules (not shown), each of which may include a series of instruction operations for the server. Still further, the central processor 622 may be configured to communicate with the storage medium 630 and execute a series of instruction operations in the storage medium 630 on the server 600.
The server 600 may also include one or more power supplies 626, one or more wired or wireless network interfaces 650, one or more input-output interfaces 658, and/or one or more operating systems 641, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and so forth.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the server, the terminal device and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, server and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the above-described division of units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiments of the present application.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, the technical solution of the present application may be substantially or partially contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A supply chain management method is applied to a block chain node server, and is characterized by comprising the following steps:
receiving product management request information from an enterprise terminal, wherein the product management request information comprises product source data, the product source data can include but is not limited to units, quantities, production time, validity period and enterprise public keys, and first associated information of traceable source data related to the product source data, the first associated information comprises a storage address of the traceable source data, and the traceable source data comprises data related to production raw materials of a product corresponding to the product management request information;
and performing public key signature verification and hash verification on the product management request information, if the verification is passed, associating the product source data with traceable source data related to the product source data based on first associated information in the product source data, generating second associated information, writing the product source data and the second associated information into a block chain, and feeding back the second associated information to the enterprise terminal according to an intelligent contract, wherein the second associated information comprises storage address information of the product source data and storage address information of the traceable source data.
2. The method of claim 1, wherein the product management request information further comprises a first hash value, an enterprise public key, and a digital signature;
the public key signature verification and hash verification of the product management request information includes:
decoding the product management request information to obtain the product source data, the first hash value, the enterprise public key and the digital signature;
verifying the digital signature through the enterprise public key;
if the verification is passed, carrying out hash encryption on the product source data to obtain a second hash value;
comparing and matching the first hash value and the second hash value;
if the matching is successful, the hash verification is passed.
3. The method of claim 1, further comprising:
receiving a product information query request, wherein the product information query request comprises the second associated information;
acquiring the product source data and the traceable source data according to the intelligent contract and the second associated information;
and sending the product source data and the traceable source data to an initiating terminal corresponding to the query request.
4. The method of claim 3, wherein after said decoding the product management request information, the method further comprises:
judging whether the product is a source product or not according to the product source data;
if the source product is the source product, the digital signature is verified through the enterprise public key, if the source product passes the verification, the product source data is written into a block chain, the third association information is generated, and the second association information is fed back to the enterprise terminal;
if the product is not the source product, verifying whether the source data in the product data is changed, if so, feeding back data error to the enterprise terminal to reject uplink, and if not, executing steps of performing public key signature verification and hash verification on the product management request information.
5. The method of claim 4, wherein the product source data includes, but is not limited to, unit, quantity, production time, expiration date, product manufacturing raw material information.
6. The method of claim 5, wherein said determining whether a product is a source product based on said product source data comprises:
if the product production raw material information does not contain the first associated information, the product is a source product;
and if the product production raw material information contains the first associated information, the product is not a source product.
7. A supply chain management system adapted for use in the supply chain management method of any one of claims 1-4, comprising an enterprise terminal, a node server, and a blockchain, the enterprise terminal and the blockchain being in communication with the node server, respectively;
the enterprise terminal carries out Hash encryption and private key signature on the product source data to obtain product management request information;
sending the product management request information to a node server;
and the node server performs public key signature verification and hash verification on the product management request information, if the verification is passed, the product source data and traceable source data related to the product source data are correlated based on first correlation information in the product source data, second correlation information is generated, the product source data and the second correlation information are written into a block chain, and the second correlation information is fed back to the enterprise terminal according to an intelligent contract, wherein the second correlation information comprises storage address information of the product source data and storage address information of the traceable source data.
8. A server, characterized in that the server comprises:
the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving product management request information from an enterprise terminal, and the product management request information comprises product source data;
the verification unit is used for performing public key signature verification and Hash verification on the product management request information;
the association unit is used for associating the product source data with traceable source data related to the product source data based on first association information in the product source data and generating second association information under the condition that the verification unit passes the verification;
the writing unit writes the product source data and the second associated information into a block chain;
and the feedback unit is used for feeding back the second associated information to the enterprise terminal according to the intelligent contract, wherein the second associated information comprises the storage address information of the product source data and the storage address information of the traceable source data.
9. A server, comprising a processor, a memory, and a communication module, wherein the memory is configured to store program code and the processor is configured to invoke the program code to perform the method of any of claims 1-6.
10. A computer-readable storage medium, characterized in that the computer storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to perform the method according to any of claims 1-6.
CN202011569790.7A 2020-12-26 2020-12-26 Supply chain management method, system, server and computer readable medium Pending CN112351045A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011569790.7A CN112351045A (en) 2020-12-26 2020-12-26 Supply chain management method, system, server and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011569790.7A CN112351045A (en) 2020-12-26 2020-12-26 Supply chain management method, system, server and computer readable medium

Publications (1)

Publication Number Publication Date
CN112351045A true CN112351045A (en) 2021-02-09

Family

ID=74427520

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011569790.7A Pending CN112351045A (en) 2020-12-26 2020-12-26 Supply chain management method, system, server and computer readable medium

Country Status (1)

Country Link
CN (1) CN112351045A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113505398A (en) * 2021-09-09 2021-10-15 杭州费尔斯通科技有限公司 Method, system, electronic device and storage medium for safely sharing industrial big data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018119892A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Method and device for publishing and validating software application program
CN109377244A (en) * 2018-10-24 2019-02-22 武汉珞樱联创信息科技有限公司 A kind of quick traceability system of food and method based on multichain interconnection block chain network
CN109727043A (en) * 2018-12-29 2019-05-07 厦门物之联智能科技有限公司 A kind of product traceability method, system and storage medium based on block chain
CN111325564A (en) * 2020-03-17 2020-06-23 河南佼荣网络科技有限公司 Method and system for tracing supply chain by using block chain
WO2020143196A1 (en) * 2019-01-11 2020-07-16 平安科技(深圳)有限公司 Communication method and device between blockchain nodes, storage medium and electronic apparatus
CN111464537A (en) * 2020-03-31 2020-07-28 湖南工程学院 Commodity tracing method based on block chain, commodity tracing system and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018119892A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Method and device for publishing and validating software application program
CN109377244A (en) * 2018-10-24 2019-02-22 武汉珞樱联创信息科技有限公司 A kind of quick traceability system of food and method based on multichain interconnection block chain network
CN109727043A (en) * 2018-12-29 2019-05-07 厦门物之联智能科技有限公司 A kind of product traceability method, system and storage medium based on block chain
WO2020143196A1 (en) * 2019-01-11 2020-07-16 平安科技(深圳)有限公司 Communication method and device between blockchain nodes, storage medium and electronic apparatus
CN111325564A (en) * 2020-03-17 2020-06-23 河南佼荣网络科技有限公司 Method and system for tracing supply chain by using block chain
CN111464537A (en) * 2020-03-31 2020-07-28 湖南工程学院 Commodity tracing method based on block chain, commodity tracing system and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113505398A (en) * 2021-09-09 2021-10-15 杭州费尔斯通科技有限公司 Method, system, electronic device and storage medium for safely sharing industrial big data

Similar Documents

Publication Publication Date Title
Syed et al. A comparative analysis of blockchain architecture and its applications: Problems and recommendations
CN111080295B (en) Electronic contract processing method and device based on blockchain
Wang et al. Smart contract-based product traceability system in the supply chain scenario
US10491390B2 (en) Proof chaining and decomposition
CN109690589B (en) Safely traceable manufactured part
US20180232731A1 (en) Supply chain recording method with traceable function by implementing blockchain technique
US20160098723A1 (en) System and method for block-chain verification of goods
CN111989707B (en) Managing user rights for blockchain-based customs clearance services
CA2992458A1 (en) Computationally efficient transfer processing, auditing, and search apparatuses, methods and systems
CN111464499A (en) Electronic warehouse receipt tracing method and device, computer equipment and storage medium
CN111936995A (en) Distributed storage of customs clearance data
CN111666460A (en) User portrait generation method and device based on privacy protection and storage medium
CN111989663A (en) Intelligent contract pool based on block chain
CN107172003B (en) Processing method and device for issued information and information issuing system
CN114930330A (en) User management of customs clearance service platform based on block chain
CN111868725A (en) Processing import customs clearance data based on block chain
EP3435310A1 (en) System and method of a decentralized payment network
Li et al. A decentralized and secure blockchain platform for open fair data trading
Saranya et al. Proof of transaction (PoTx) based traceability system for an agriculture supply chain
US20230327872A1 (en) Methods and systems for generating, subscribing to and processing action plans using a blockchain
CN111936994A (en) Block chain based document registration for customs clearance
CN110910150A (en) Correlation method and device for tracing source based on Internet of things technology and combined block chain
CN109818965B (en) Personal identity verification device and method
Madavi A comprehensive study on blockchain technology
Chen et al. A blockchain-based anti-counterfeit and traceable NBA digital trading card management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210209

RJ01 Rejection of invention patent application after publication