CN112597546A - Violation management method based on block chain, device monitoring terminal and storage medium - Google Patents

Violation management method based on block chain, device monitoring terminal and storage medium Download PDF

Info

Publication number
CN112597546A
CN112597546A CN202011584047.9A CN202011584047A CN112597546A CN 112597546 A CN112597546 A CN 112597546A CN 202011584047 A CN202011584047 A CN 202011584047A CN 112597546 A CN112597546 A CN 112597546A
Authority
CN
China
Prior art keywords
violation
vehicle
information
violation vehicle
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011584047.9A
Other languages
Chinese (zh)
Inventor
尹健
姜旭
邱明凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Guanhai Data Technology Co ltd
Original Assignee
Shandong Guanhai Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Guanhai Data Technology Co ltd filed Critical Shandong Guanhai Data Technology Co ltd
Priority to CN202011584047.9A priority Critical patent/CN112597546A/en
Publication of CN112597546A publication Critical patent/CN112597546A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Primary Health Care (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Educational Administration (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a block chain-based violation management method, a device monitoring terminal and a storage medium. The violation management method based on the block chain, the device monitoring terminal and the storage medium can carry out chain winding operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in the block chain network, further the violation information recorded by the violation vehicle can not be falsified, further a vehicle owner can draw the detained violation vehicle by virtue of the drawing certificate recorded with the violation information recorded by the violation vehicle, and further when the drawing state of the violation vehicle detained by the vehicle owner is different from the detaining state, right pursuing can be carried out according to the drawing certificate recorded with the violation information recorded by the violation vehicle.

Description

Violation management method based on block chain, device monitoring terminal and storage medium
Technical Field
The application relates to the field of violation supervision, in particular to a block chain-based violation management method, a device monitoring terminal and a storage medium.
Background
At present, in some scenes, after a vehicle breaks rules and regulations, the violation vehicle needs to be detained, wherein, in the detaining process, law enforcement personnel can manually input information of the violation vehicle, and the input information of the violation vehicle comprises the violation information and basic information of the violation vehicle, for example, information of a violation location and the vehicle of the violation vehicle. On the other hand, when the violation vehicle meets the retrieval condition, the vehicle owner can retrieve the violation vehicle.
However, after the owner returns the illegal vehicle, the basic condition of the vehicle is usually found to be different from that of the vehicle at the time of the detaining, and disputes are caused.
Disclosure of Invention
The application aims to provide a block chain-based violation management method, a device monitoring terminal and a storage medium. The violation management method based on the block chain, the device monitoring terminal and the storage medium can carry out chain winding operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in the block chain network, further the violation information recorded by the violation vehicle can not be falsified, further a vehicle owner can draw the detained violation vehicle by virtue of the drawing certificate recorded with the violation information recorded by the violation vehicle, and further when the drawing state of the violation vehicle detained by the vehicle owner is different from the detaining state, right pursuing can be carried out according to the drawing certificate recorded with the violation information recorded by the violation vehicle.
To this end, the first aspect of the present application discloses a violation management method based on a block chain, where the method uses a supervision terminal, and the method includes:
acquiring violation information input by a supervisor aiming at a violation vehicle, wherein the violation information comprises the violation information of the violation vehicle and the vehicle information of the violation vehicle;
the violation information of the violation vehicle and the vehicle information of the violation vehicle are sent to a client terminal, so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed, and sends a confirmation instruction after the confirmation;
after receiving a confirmation instruction sent by the client terminal, performing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in a block chain network;
acquiring violation processing information of the violation vehicle;
and judging whether the violation vehicle meets a receipt condition or not according to the violation processing information and the violation information of the violation vehicle, if so, generating a receipt certificate and sending the receipt certificate to the client terminal, wherein the receipt certificate comprises receipt confirmation information and vehicle information of the violation vehicle.
The violation management method based on the block chain can carry out chain winding operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in the block chain network, the violation information recorded by the violation vehicle can not be falsified, a vehicle owner can draw a detained violation vehicle by virtue of a drawing-back certificate recording the violation information recorded by the violation vehicle, and when the drawing-back state of the violation vehicle detained by the vehicle owner is different from the detaining state, right pursuit can be carried out according to the drawing-back certificate recording the violation information recorded by the violation vehicle.
In the first aspect of the present application, as an optional implementation manner, before obtaining violation information entered by a monitoring party for a violation vehicle, where the violation information includes violation information of the violation vehicle and vehicle information of the violation vehicle, the method further includes:
acquiring a digital identity certificate of a law enforcement officer, wherein the digital identity certificate of the executive officer has uniqueness;
verifying the digital identity certificate of the law enforcement officer;
and when the digital identity voucher of the executive personnel is successfully verified, triggering the executive personnel to acquire violation information input by the supervision party for the violation vehicle.
In this optional embodiment, the authenticity of data uploading can be ensured by checking the digital identity certificate of the law enforcement officer, and other officers are prevented from uploading false data.
In the first aspect of the present application, as an optional implementation manner, before the acquiring the digital identity certificate of the law enforcement officer, the method further includes:
acquiring a local machine MAC address, a local machine mainboard serial number and personnel information of law enforcement personnel;
and generating the digital identity certificate according to the local MAC address, the local mainboard serial number and the personnel information of the law enforcement personnel, and storing the digital identity certificate.
In this optional embodiment, since the local MAC address of the supervisory terminal, the local motherboard serial number, and the personnel information of the law enforcement officer are difficult to copy, generating the digital identity credential according to the local MAC address, the local motherboard serial number, and the personnel information of the law enforcement officer can further improve the authenticity and the reliability of the data uploader.
In the first aspect of the present application, as an optional implementation manner, after the sending the violation information of the violation vehicle and the vehicle information of the violation vehicle to the client terminal, before performing the uplink operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle, the method further includes:
acquiring a digital identity certificate of a violation person, wherein the digital identity certificate of the violation person has uniqueness;
verifying the digital identity certificate of the violation personnel;
and when the digital identity certificate of the violation personnel is successfully verified, triggering and executing the chain loading operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle.
In the optional implementation mode, the authenticity and the credibility of the data uploaded by the client terminal can be guaranteed by verifying the digital identity certificate of the violation personnel.
In the first aspect of the present application, as an optional implementation manner, before the verifying the digital identity certificate of the violator, the method further includes:
acquiring a decryption public key corresponding to the digital identity certificate of the violation personnel;
and, the verification of the digital identity certificate of the violator comprises the following steps:
and verifying the digital identity certificate of the violation personnel according to the decryption public key.
In this alternative embodiment, the digital identity credential of the violator may be verified by decrypting the public key.
In the first aspect of the application, as an optional implementation manner, the violation information of the violation vehicle includes violation date and violation cost, and the violation processing information of the violation vehicle includes violation processing date and violation payment amount;
and judging whether the violation vehicle meets a receipt condition according to the violation processing information and the violation information of the violation vehicle, if so, generating a receipt certificate and sending the receipt certificate to the client terminal, and the method comprises the following steps:
judging whether the violation vehicle meets the detaining time limit or not according to the violation date and the violation processing date;
when the violation vehicle meets the detaining time limit, judging whether the violation cost of the violation vehicle is paid clearly according to the violation cost and the violation payment amount, and if so, determining that the violation vehicle meets the pickup condition;
and generating the receipt voucher and sending the receipt voucher to the client terminal.
In the optional implementation mode, whether the illegal vehicle meets the return condition or not can be judged according to the violation date, the violation cost, the violation processing date and the violation payment amount. On the other hand, since the determination process is performed by the system monitoring terminal based on the blockchain network, the influence of human factors can be avoided.
In the first aspect of the present application, as an optional implementation, the method further includes:
when a modification instruction aiming at the violation information input by the violation vehicle is received, generating a modification notice and sending the modification notice to the client terminal;
and receiving a modification confirmation instruction sent by the client terminal aiming at the modification notice and modifying the violation information recorded by the violation vehicle.
In the optional implementation mode, the regulation terminal needs to obtain confirmation of the client terminal for the regulation violation information modification, otherwise, the regulation terminal cannot modify the regulation violation information, and therefore the regulation terminal can further prevent the regulation violation information from being tampered privately.
The second aspect of this application discloses a management device violating regulations based on block chain, supervision terminal is used to the device, the device includes:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring violation information which is input by a monitoring party aiming at a violation vehicle, and the violation information comprises the violation information of the violation vehicle and the vehicle information of the violation vehicle;
the sending module is used for sending the violation information of the violation vehicle and the vehicle information of the violation vehicle to the client terminal so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed and sends a confirmation instruction after the confirmation;
the chain winding module is used for executing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle after receiving the confirmation instruction sent by the client terminal, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in the block chain network;
the second acquisition module is used for acquiring violation processing information of the violation vehicle;
and the judging module is used for judging whether the violation vehicle meets a return receiving condition or not according to the violation processing information and the violation information of the violation vehicle, if so, generating a return receiving certificate and sending the return receiving certificate to the client terminal, wherein the return receiving certificate comprises return receiving confirmation information and vehicle information of the violation vehicle.
The violation management device based on the block chain can carry out chain winding operation on violation information recorded by a violation vehicle, the violation information recorded by the violation vehicle is stored in the block chain network, the violation information recorded by the violation vehicle can not be falsified, and then a vehicle owner can draw a detained violation vehicle by virtue of a drawing-back certificate recorded with the violation information recorded by the violation vehicle, and when the state of the vehicle owner when drawing back the violation vehicle is different from the state of the vehicle owner when detaining, the right drawing back can be carried out according to the drawing-back certificate recorded with the violation information recorded by the violation vehicle.
A third aspect of the present application discloses a supervisory terminal, including:
a processor; and
a memory configured to store machine readable instructions which, when executed by the processor, cause the processor to perform the blockchain based violation management method of the first aspect of the present application.
The supervision terminal can carry out chain loading operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in the block chain network, the violation information recorded by the violation vehicle can not be falsified, the vehicle owner can draw the detained violation vehicle by virtue of the drawing-back certificate recorded with the violation information recorded by the violation vehicle, and when the drawing-back state of the violation vehicle detained by the vehicle owner is different from the drawing-back state, the right pursuit can be carried out according to the drawing-back certificate recorded with the violation information recorded by the violation vehicle.
A fourth aspect of the present application discloses a storage medium storing a computer program executed by a processor to perform the method for regulation violation management based on a blockchain of the first aspect of the present application.
The storage medium can carry out chain operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in a block chain network, the violation information recorded by the violation vehicle can not be falsified, a vehicle owner can draw the detained violation vehicle by virtue of the drawing-back certificate recorded with the violation information recorded by the violation vehicle, and when the state of the vehicle owner when drawing back the violation vehicle is different from the state of the vehicle owner when drawing back the violation vehicle, the right drawing-back can be carried out according to the drawing-back certificate recorded with the violation information recorded by the violation vehicle.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
FIG. 1 is a schematic flow chart of a violation management method based on a block chain according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a violation management device based on a block chain according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a monitoring terminal device disclosed in the embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
Example one
Referring to fig. 1, fig. 1 is a schematic flowchart of a violation management method based on a blockchain according to an embodiment of the present application, where the method is applied to a supervision terminal. As shown in fig. 1, the method of the embodiment of the present application includes the steps of:
101. acquiring violation information input by a supervisor aiming at a violation vehicle, wherein the violation information comprises the violation information of the violation vehicle and the vehicle information of the violation vehicle;
102. the violation information of the violation vehicle and the vehicle information of the violation vehicle are sent to the client terminal, so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed, and sends a confirmation instruction after the confirmation;
103. after receiving a confirmation instruction sent by the client terminal, performing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in the block chain network;
104. acquiring violation processing information of a violation vehicle;
105. and judging whether the violation vehicle meets a retrieval condition or not according to the violation processing information and the violation information of the violation vehicle, if so, generating a retrieval certificate and sending the retrieval certificate to the client terminal, wherein the retrieval certificate comprises retrieval confirmation information and vehicle information of the violation vehicle.
According to the embodiment of the application, the illegal information recorded by the illegal vehicle can be linked, so that the illegal information recorded by the illegal vehicle is stored in the block chain network, the illegal information recorded by the illegal vehicle can not be falsified, and then the vehicle owner can draw the detained illegal vehicle by virtue of the drawing-back certificate recorded with the illegal information recorded by the illegal vehicle, and when the drawing-back state of the illegal vehicle detained by the vehicle owner is different from the drawing-back state, the illegal vehicle can be subjected to right pursuit according to the drawing-back certificate recorded with the illegal information recorded by the illegal vehicle.
In the embodiment of the present application, as an optional implementation manner, before obtaining violation information entered by a supervisor for a violation vehicle, where the violation information includes violation information of the violation vehicle and vehicle information of the violation vehicle, the method of the embodiment of the present application further includes:
acquiring a digital identity certificate of a law enforcement officer, wherein the digital identity certificate of an executive officer has uniqueness;
verifying the digital identity certificate of the law enforcement officer;
and when the digital identity certificate of the executive personnel is successfully verified, triggering and executing the violation information recorded by the supervision party aiming at the violation vehicle.
In this optional embodiment, the authenticity of data uploading can be ensured by checking the digital identity certificate of the law enforcement officer, and other officers are prevented from uploading false data.
In this embodiment, as an optional implementation manner, before acquiring the digital identity credential of the law enforcement officer, the method of this embodiment further includes:
acquiring a local machine MAC address, a local machine mainboard serial number and personnel information of law enforcement personnel;
and generating a digital identity certificate according to the MAC address of the local machine, the serial number of the local machine mainboard and personnel information of law enforcement personnel, and storing the digital identity certificate.
In the optional embodiment, because the local MAC address of the monitoring terminal, the local motherboard serial number, and the personnel information of the law enforcement officer are difficult to copy, the digital identity credential generated according to the local MAC address, the local motherboard serial number, and the personnel information of the law enforcement officer can further improve the authenticity and the reliability of the data uploader.
In the embodiment of the present application, as an optional implementation manner, after the violation information of the violation vehicle and the vehicle information of the violation vehicle are sent to the client terminal, before the uplink operation is performed according to the violation information of the violation vehicle and the vehicle information of the violation vehicle, the method of the embodiment of the present application further includes the steps of:
acquiring a digital identity certificate of a violation person, wherein the digital identity certificate of the violation person has uniqueness;
verifying the digital identity certificate of the violation personnel;
and when the digital identity certificate of the violation personnel is successfully verified, triggering and executing the chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle.
In the optional implementation mode, the authenticity and the credibility of the data uploaded by the client terminal can be guaranteed by verifying the digital identity certificate of the violation personnel.
In this embodiment of the present application, as an optional implementation manner, before verifying the digital identity certificate of the violator, the method of this embodiment of the present application further includes:
acquiring a decryption public key corresponding to the digital identity certificate of the violation personnel;
and, the digital identity voucher of the violator is verified, including:
and verifying the digital identity certificate of the violation personnel according to the decryption public key.
In this alternative embodiment, the digital identity credential of the violator may be verified by decrypting the public key.
In the embodiment of the application, as an optional implementation mode, the violation information of the violation vehicle comprises violation date and violation cost, and the violation processing information of the violation vehicle comprises the violation processing date and the violation payment amount;
and judging whether the violation vehicle meets a pickup condition according to the violation processing information and the violation information of the violation vehicle, if so, generating a pickup certificate and sending the pickup certificate to the client terminal, wherein the steps of:
judging whether the violation vehicle meets the detaining time limit or not according to the violation date and the violation processing date;
when the violation vehicle meets the detaining time limit, judging whether the violation vehicle is clearly paid according to the violation cost and the violation payment amount, and if so, determining that the violation vehicle meets the pickup condition;
generating a receipt voucher and sending the receipt voucher to the client terminal.
In the optional implementation mode, whether the violation vehicle meets the return condition or not can be judged according to the violation date, the violation cost, the violation processing date and the violation payment amount. On the other hand, since the determination process is performed by the system monitoring terminal based on the blockchain network, the influence of human factors can be avoided.
In this embodiment, as an optional implementation manner, the method in this embodiment further includes:
when a modification instruction aiming at the violation information recorded by the violation vehicle is received, generating a modification notice and sending the modification notice to the client terminal;
and receiving a modification confirmation instruction sent by the client terminal aiming at the modification notice and modifying the violation information recorded by the violation vehicle.
In the optional implementation mode, the regulation terminal needs to obtain confirmation of the client terminal for the regulation violation information modification, otherwise, the regulation terminal cannot modify the regulation violation information, and therefore the regulation terminal can further prevent the regulation violation information from being tampered privately.
Example two
Referring to fig. 2, fig. 2 is a schematic structural diagram of a violation management device based on a block chain according to an embodiment of the present application, where the device is applied to a supervision terminal. As shown in fig. 2, the apparatus of the embodiment of the present application includes:
the first acquisition module 201 is used for acquiring violation information which is input by a monitoring party aiming at a violation vehicle, wherein the violation information comprises violation information of the violation vehicle and vehicle information of the violation vehicle;
the sending module 202 is used for sending the violation information of the violation vehicle and the vehicle information of the violation vehicle to the client terminal so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed and sends a confirmation instruction after the confirmation;
the chain winding module 203 is used for executing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle after receiving the confirmation instruction sent by the client terminal, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in the block chain network;
the second obtaining module 204 is used for obtaining violation processing information of the violation vehicle;
and the judging module 205 is used for judging whether the violation vehicle meets the retrieval condition according to the violation processing information and the violation information of the violation vehicle, if so, generating a retrieval certificate and sending the retrieval certificate to the client terminal, wherein the retrieval certificate comprises retrieval confirmation information and vehicle information of the violation vehicle.
The violation management device based on the block chain can carry out chain winding operation on violation information recorded by the violation vehicle, the violation information recorded by the violation vehicle is stored in the block chain network, the violation information recorded by the violation vehicle can not be falsified, a vehicle owner can then draw a detained violation vehicle by virtue of a drawing-back certificate recording the violation information recorded by the violation vehicle, and when the drawing-back state of the violation vehicle detained by the vehicle owner is different from the buckling state, right drawing can be carried out according to the drawing-back certificate recording the violation information recorded by the violation vehicle.
EXAMPLE III
Referring to fig. 3, fig. 3 is a schematic structural diagram of a monitoring terminal disclosed in the embodiment of the present application. As shown in fig. 3, the supervision terminal includes:
a processor 301; and
the memory 302 is configured to store machine readable instructions, which when executed by the processor 301, cause the processor 301 to execute the method for violation management based on blockchain according to the first embodiment of the present application.
The supervision terminal of the embodiment of the application can carry out chain winding operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in a block chain network, the violation information recorded by the violation vehicle can not be falsified, a vehicle owner can then draw the detained violation vehicle by virtue of the draw-back certificate recorded with the violation information recorded by the violation vehicle, and when the state of the detained violation vehicle drawn by the vehicle owner is different from the state of the detained violation vehicle, right pursuit can be carried out according to the draw-back certificate recorded with the violation information recorded by the violation vehicle.
Example four
The embodiment of the application discloses a storage medium, wherein a computer program is stored in the storage medium, and the computer program is executed by a processor to implement the violation management method based on the block chain.
The storage medium of the embodiment of the application can carry out chain winding operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in a block chain network, the violation information recorded by the violation vehicle can not be falsified, a vehicle owner can receive the detained violation vehicle by virtue of the receipt recorded with the violation information recorded by the violation vehicle, and when the receipt state of the violation vehicle detained by the vehicle owner is different from the receipt state of the violation vehicle detained by the vehicle owner, the right investigation can be carried out according to the receipt recorded with the violation information recorded by the violation vehicle.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
In addition, units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Furthermore, the functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
It should be noted that the functions, if implemented in the form of software functional modules and sold or used as independent products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A block chain-based violation management method is characterized in that the method applies a supervision terminal, and the method comprises the following steps:
acquiring violation information input by a supervisor aiming at a violation vehicle, wherein the violation information comprises the violation information of the violation vehicle and the vehicle information of the violation vehicle;
the violation information of the violation vehicle and the vehicle information of the violation vehicle are sent to a client terminal, so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed, and sends a confirmation instruction after the confirmation;
after receiving a confirmation instruction sent by the client terminal, performing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in a block chain network;
acquiring violation processing information of the violation vehicle;
and judging whether the violation vehicle meets a receipt condition or not according to the violation processing information and the violation information of the violation vehicle, if so, generating a receipt certificate and sending the receipt certificate to the client terminal, wherein the receipt certificate comprises receipt confirmation information and vehicle information of the violation vehicle.
2. The method of claim 1 wherein prior to said obtaining violation information entered by a supervisor for a violation vehicle, said violation information including violation information for said violation vehicle and vehicle information for said violation vehicle, said method further comprises:
acquiring a digital identity certificate of a law enforcement officer, wherein the digital identity certificate of the executive officer has uniqueness;
verifying the digital identity certificate of the law enforcement officer;
and when the digital identity voucher of the executive personnel is successfully verified, triggering the executive personnel to acquire violation information input by the supervision party for the violation vehicle.
3. The method of claim 2, wherein prior to said obtaining the digital identity credential of a law enforcement officer, the method further comprises:
acquiring a local machine MAC address, a local machine mainboard serial number and personnel information of law enforcement personnel;
and generating the digital identity certificate according to the local MAC address, the local mainboard serial number and the personnel information of the law enforcement personnel, and storing the digital identity certificate.
4. The method of claim 1 wherein after said transmitting the violation information for the violation vehicle and the vehicle information for the violation vehicle to the customer terminal, and prior to performing the uplink operation based on the violation information for the violation vehicle and the vehicle information for the violation vehicle, the method further comprises:
acquiring a digital identity certificate of a violation person, wherein the digital identity certificate of the violation person has uniqueness;
verifying the digital identity certificate of the violation personnel;
and when the digital identity certificate of the violation personnel is successfully verified, triggering and executing the chain loading operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle.
5. The method of claim 4 wherein prior to said verifying the digital identity credential of the violator, the method further comprises:
acquiring a decryption public key corresponding to the digital identity certificate of the violation personnel;
and, the verification of the digital identity certificate of the violator comprises the following steps:
and verifying the digital identity certificate of the violation personnel according to the decryption public key.
6. The method of claim 1 wherein the violation information of the violation vehicle includes a violation date, a violation cost, and the violation processing information of the violation vehicle includes a violation processing date, a payment for violation, and the like;
and judging whether the violation vehicle meets a receipt condition according to the violation processing information and the violation information of the violation vehicle, if so, generating a receipt certificate and sending the receipt certificate to the client terminal, and the method comprises the following steps:
judging whether the violation vehicle meets the detaining time limit or not according to the violation date and the violation processing date;
when the violation vehicle meets the detaining time limit, judging whether the violation cost of the violation vehicle is paid clearly according to the violation cost and the violation payment amount, and if so, determining that the violation vehicle meets the pickup condition;
and generating the receipt voucher and sending the receipt voucher to the client terminal.
7. The method of claim 1, wherein the method further comprises:
when a modification instruction aiming at the violation information input by the violation vehicle is received, generating a modification notice and sending the modification notice to the client terminal;
and receiving a modification confirmation instruction sent by the client terminal aiming at the modification notice and modifying the violation information recorded by the violation vehicle.
8. A block chain based violation management device, characterized in that the device employs a supervision terminal, the device comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring violation information which is input by a monitoring party aiming at a violation vehicle, and the violation information comprises the violation information of the violation vehicle and the vehicle information of the violation vehicle;
the sending module is used for sending the violation information of the violation vehicle and the vehicle information of the violation vehicle to the client terminal so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed and sends a confirmation instruction after the confirmation;
the chain winding module is used for executing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle after receiving the confirmation instruction sent by the client terminal, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in the block chain network;
the second acquisition module is used for acquiring violation processing information of the violation vehicle;
and the judging module is used for judging whether the violation vehicle meets a return receiving condition or not according to the violation processing information and the violation information of the violation vehicle, if so, generating a return receiving certificate and sending the return receiving certificate to the client terminal, wherein the return receiving certificate comprises return receiving confirmation information and vehicle information of the violation vehicle.
9. A supervising terminal, characterized in that the supervising terminal comprises:
a processor; and
a memory configured to store machine readable instructions which, when executed by the processor, cause the processor to perform the blockchain based violation management method of any of claims 1-7.
10. A storage medium storing a computer program for execution by a processor of a blockchain based violation management method according to any one of claims 1-7.
CN202011584047.9A 2020-12-28 2020-12-28 Violation management method based on block chain, device monitoring terminal and storage medium Pending CN112597546A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011584047.9A CN112597546A (en) 2020-12-28 2020-12-28 Violation management method based on block chain, device monitoring terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011584047.9A CN112597546A (en) 2020-12-28 2020-12-28 Violation management method based on block chain, device monitoring terminal and storage medium

Publications (1)

Publication Number Publication Date
CN112597546A true CN112597546A (en) 2021-04-02

Family

ID=75203768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011584047.9A Pending CN112597546A (en) 2020-12-28 2020-12-28 Violation management method based on block chain, device monitoring terminal and storage medium

Country Status (1)

Country Link
CN (1) CN112597546A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745599A (en) * 2014-01-21 2014-04-23 兰州大学 Vehicle intelligent management system based on cloud computing platform
WO2016168555A1 (en) * 2015-04-17 2016-10-20 General Electric Company Monitoring parking rule violations
CN106875315A (en) * 2017-02-09 2017-06-20 江苏智通交通科技有限公司 Traffic offence article detains management system and method
CN109325751A (en) * 2018-09-30 2019-02-12 深圳市元征科技股份有限公司 A kind of vehicle violation method for monitoring and relevant device based on block chain technology
CN110222116A (en) * 2019-05-07 2019-09-10 北京奇艺世纪科技有限公司 A kind of control method, device and the storage medium of transaction data storage
CN110689460A (en) * 2019-10-09 2020-01-14 腾讯科技(深圳)有限公司 Traffic accident data processing method, device, equipment and medium based on block chain
CN111079196A (en) * 2019-11-29 2020-04-28 山东爱城市网信息技术有限公司 Block chain-based radio frequency vehicle illegal recording management method, device and medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745599A (en) * 2014-01-21 2014-04-23 兰州大学 Vehicle intelligent management system based on cloud computing platform
WO2016168555A1 (en) * 2015-04-17 2016-10-20 General Electric Company Monitoring parking rule violations
CN106875315A (en) * 2017-02-09 2017-06-20 江苏智通交通科技有限公司 Traffic offence article detains management system and method
CN109325751A (en) * 2018-09-30 2019-02-12 深圳市元征科技股份有限公司 A kind of vehicle violation method for monitoring and relevant device based on block chain technology
CN110222116A (en) * 2019-05-07 2019-09-10 北京奇艺世纪科技有限公司 A kind of control method, device and the storage medium of transaction data storage
CN110689460A (en) * 2019-10-09 2020-01-14 腾讯科技(深圳)有限公司 Traffic accident data processing method, device, equipment and medium based on block chain
CN111079196A (en) * 2019-11-29 2020-04-28 山东爱城市网信息技术有限公司 Block chain-based radio frequency vehicle illegal recording management method, device and medium

Similar Documents

Publication Publication Date Title
EP3786871B1 (en) Vehicle-related information processing based on blockchain
US7000115B2 (en) Method and apparatus for uniquely and authoritatively identifying tangible objects
CN109583230A (en) Data based on block chain deposit card method and device, electronic equipment
CN111027028A (en) Copyright data processing method and device based on intelligent contract
CN111797430B (en) Data verification method, device, server and storage medium
CN110246039B (en) Transaction monitoring method and device based on alliance chain and electronic equipment
CN108073821B (en) Data security processing method and device
CN112561633B (en) Virtual object order data verification method, device and equipment
CN103268558A (en) Processing method and device for electronic trading information
CN111179066A (en) Batch processing method and device of service data, server and storage medium
CN112819617A (en) Data uplink method and device, electronic equipment and storage medium
EP3547243A1 (en) Methods and apparatuses for fraud handling
CN112597546A (en) Violation management method based on block chain, device monitoring terminal and storage medium
CN110599211A (en) Ticket information processing method and device and computer equipment
KR101532765B1 (en) System and method for application counterfeit prevention
CN115423471A (en) Safety protection method and device for NFT digital assets
CN111209602B (en) Block chain based data development method, system, server and storage medium
CN105635048A (en) Service request processing method and service request processing device
CN107566410A (en) A kind of data save message request treating method and apparatus from damage
CN114925337A (en) Data labeling method and device and electronic equipment
CN107809424B (en) On-site certificate storing method and device and related certificate storing system
CN115174238B (en) Network attack source identification method and device
US20210125162A1 (en) Flexible parking space payment
CN117974251A (en) Bill sale control method, device, equipment and medium
CN114266654A (en) Credit investigation data management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210402