CN112597546A - Violation management method based on block chain, device monitoring terminal and storage medium - Google Patents
Violation management method based on block chain, device monitoring terminal and storage medium Download PDFInfo
- Publication number
- CN112597546A CN112597546A CN202011584047.9A CN202011584047A CN112597546A CN 112597546 A CN112597546 A CN 112597546A CN 202011584047 A CN202011584047 A CN 202011584047A CN 112597546 A CN112597546 A CN 112597546A
- Authority
- CN
- China
- Prior art keywords
- violation
- vehicle
- information
- violation vehicle
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 24
- 238000012544 monitoring process Methods 0.000 title claims abstract description 16
- 238000004804 winding Methods 0.000 claims abstract description 17
- 238000000034 method Methods 0.000 claims description 36
- 238000012790 confirmation Methods 0.000 claims description 29
- 238000012545 processing Methods 0.000 claims description 26
- 238000012986 modification Methods 0.000 claims description 19
- 230000004048 modification Effects 0.000 claims description 19
- 238000004590 computer program Methods 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- General Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Primary Health Care (AREA)
- Data Mining & Analysis (AREA)
- Economics (AREA)
- Computing Systems (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Educational Administration (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Bioethics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application provides a block chain-based violation management method, a device monitoring terminal and a storage medium. The violation management method based on the block chain, the device monitoring terminal and the storage medium can carry out chain winding operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in the block chain network, further the violation information recorded by the violation vehicle can not be falsified, further a vehicle owner can draw the detained violation vehicle by virtue of the drawing certificate recorded with the violation information recorded by the violation vehicle, and further when the drawing state of the violation vehicle detained by the vehicle owner is different from the detaining state, right pursuing can be carried out according to the drawing certificate recorded with the violation information recorded by the violation vehicle.
Description
Technical Field
The application relates to the field of violation supervision, in particular to a block chain-based violation management method, a device monitoring terminal and a storage medium.
Background
At present, in some scenes, after a vehicle breaks rules and regulations, the violation vehicle needs to be detained, wherein, in the detaining process, law enforcement personnel can manually input information of the violation vehicle, and the input information of the violation vehicle comprises the violation information and basic information of the violation vehicle, for example, information of a violation location and the vehicle of the violation vehicle. On the other hand, when the violation vehicle meets the retrieval condition, the vehicle owner can retrieve the violation vehicle.
However, after the owner returns the illegal vehicle, the basic condition of the vehicle is usually found to be different from that of the vehicle at the time of the detaining, and disputes are caused.
Disclosure of Invention
The application aims to provide a block chain-based violation management method, a device monitoring terminal and a storage medium. The violation management method based on the block chain, the device monitoring terminal and the storage medium can carry out chain winding operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in the block chain network, further the violation information recorded by the violation vehicle can not be falsified, further a vehicle owner can draw the detained violation vehicle by virtue of the drawing certificate recorded with the violation information recorded by the violation vehicle, and further when the drawing state of the violation vehicle detained by the vehicle owner is different from the detaining state, right pursuing can be carried out according to the drawing certificate recorded with the violation information recorded by the violation vehicle.
To this end, the first aspect of the present application discloses a violation management method based on a block chain, where the method uses a supervision terminal, and the method includes:
acquiring violation information input by a supervisor aiming at a violation vehicle, wherein the violation information comprises the violation information of the violation vehicle and the vehicle information of the violation vehicle;
the violation information of the violation vehicle and the vehicle information of the violation vehicle are sent to a client terminal, so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed, and sends a confirmation instruction after the confirmation;
after receiving a confirmation instruction sent by the client terminal, performing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in a block chain network;
acquiring violation processing information of the violation vehicle;
and judging whether the violation vehicle meets a receipt condition or not according to the violation processing information and the violation information of the violation vehicle, if so, generating a receipt certificate and sending the receipt certificate to the client terminal, wherein the receipt certificate comprises receipt confirmation information and vehicle information of the violation vehicle.
The violation management method based on the block chain can carry out chain winding operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in the block chain network, the violation information recorded by the violation vehicle can not be falsified, a vehicle owner can draw a detained violation vehicle by virtue of a drawing-back certificate recording the violation information recorded by the violation vehicle, and when the drawing-back state of the violation vehicle detained by the vehicle owner is different from the detaining state, right pursuit can be carried out according to the drawing-back certificate recording the violation information recorded by the violation vehicle.
In the first aspect of the present application, as an optional implementation manner, before obtaining violation information entered by a monitoring party for a violation vehicle, where the violation information includes violation information of the violation vehicle and vehicle information of the violation vehicle, the method further includes:
acquiring a digital identity certificate of a law enforcement officer, wherein the digital identity certificate of the executive officer has uniqueness;
verifying the digital identity certificate of the law enforcement officer;
and when the digital identity voucher of the executive personnel is successfully verified, triggering the executive personnel to acquire violation information input by the supervision party for the violation vehicle.
In this optional embodiment, the authenticity of data uploading can be ensured by checking the digital identity certificate of the law enforcement officer, and other officers are prevented from uploading false data.
In the first aspect of the present application, as an optional implementation manner, before the acquiring the digital identity certificate of the law enforcement officer, the method further includes:
acquiring a local machine MAC address, a local machine mainboard serial number and personnel information of law enforcement personnel;
and generating the digital identity certificate according to the local MAC address, the local mainboard serial number and the personnel information of the law enforcement personnel, and storing the digital identity certificate.
In this optional embodiment, since the local MAC address of the supervisory terminal, the local motherboard serial number, and the personnel information of the law enforcement officer are difficult to copy, generating the digital identity credential according to the local MAC address, the local motherboard serial number, and the personnel information of the law enforcement officer can further improve the authenticity and the reliability of the data uploader.
In the first aspect of the present application, as an optional implementation manner, after the sending the violation information of the violation vehicle and the vehicle information of the violation vehicle to the client terminal, before performing the uplink operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle, the method further includes:
acquiring a digital identity certificate of a violation person, wherein the digital identity certificate of the violation person has uniqueness;
verifying the digital identity certificate of the violation personnel;
and when the digital identity certificate of the violation personnel is successfully verified, triggering and executing the chain loading operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle.
In the optional implementation mode, the authenticity and the credibility of the data uploaded by the client terminal can be guaranteed by verifying the digital identity certificate of the violation personnel.
In the first aspect of the present application, as an optional implementation manner, before the verifying the digital identity certificate of the violator, the method further includes:
acquiring a decryption public key corresponding to the digital identity certificate of the violation personnel;
and, the verification of the digital identity certificate of the violator comprises the following steps:
and verifying the digital identity certificate of the violation personnel according to the decryption public key.
In this alternative embodiment, the digital identity credential of the violator may be verified by decrypting the public key.
In the first aspect of the application, as an optional implementation manner, the violation information of the violation vehicle includes violation date and violation cost, and the violation processing information of the violation vehicle includes violation processing date and violation payment amount;
and judging whether the violation vehicle meets a receipt condition according to the violation processing information and the violation information of the violation vehicle, if so, generating a receipt certificate and sending the receipt certificate to the client terminal, and the method comprises the following steps:
judging whether the violation vehicle meets the detaining time limit or not according to the violation date and the violation processing date;
when the violation vehicle meets the detaining time limit, judging whether the violation cost of the violation vehicle is paid clearly according to the violation cost and the violation payment amount, and if so, determining that the violation vehicle meets the pickup condition;
and generating the receipt voucher and sending the receipt voucher to the client terminal.
In the optional implementation mode, whether the illegal vehicle meets the return condition or not can be judged according to the violation date, the violation cost, the violation processing date and the violation payment amount. On the other hand, since the determination process is performed by the system monitoring terminal based on the blockchain network, the influence of human factors can be avoided.
In the first aspect of the present application, as an optional implementation, the method further includes:
when a modification instruction aiming at the violation information input by the violation vehicle is received, generating a modification notice and sending the modification notice to the client terminal;
and receiving a modification confirmation instruction sent by the client terminal aiming at the modification notice and modifying the violation information recorded by the violation vehicle.
In the optional implementation mode, the regulation terminal needs to obtain confirmation of the client terminal for the regulation violation information modification, otherwise, the regulation terminal cannot modify the regulation violation information, and therefore the regulation terminal can further prevent the regulation violation information from being tampered privately.
The second aspect of this application discloses a management device violating regulations based on block chain, supervision terminal is used to the device, the device includes:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring violation information which is input by a monitoring party aiming at a violation vehicle, and the violation information comprises the violation information of the violation vehicle and the vehicle information of the violation vehicle;
the sending module is used for sending the violation information of the violation vehicle and the vehicle information of the violation vehicle to the client terminal so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed and sends a confirmation instruction after the confirmation;
the chain winding module is used for executing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle after receiving the confirmation instruction sent by the client terminal, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in the block chain network;
the second acquisition module is used for acquiring violation processing information of the violation vehicle;
and the judging module is used for judging whether the violation vehicle meets a return receiving condition or not according to the violation processing information and the violation information of the violation vehicle, if so, generating a return receiving certificate and sending the return receiving certificate to the client terminal, wherein the return receiving certificate comprises return receiving confirmation information and vehicle information of the violation vehicle.
The violation management device based on the block chain can carry out chain winding operation on violation information recorded by a violation vehicle, the violation information recorded by the violation vehicle is stored in the block chain network, the violation information recorded by the violation vehicle can not be falsified, and then a vehicle owner can draw a detained violation vehicle by virtue of a drawing-back certificate recorded with the violation information recorded by the violation vehicle, and when the state of the vehicle owner when drawing back the violation vehicle is different from the state of the vehicle owner when detaining, the right drawing back can be carried out according to the drawing-back certificate recorded with the violation information recorded by the violation vehicle.
A third aspect of the present application discloses a supervisory terminal, including:
a processor; and
a memory configured to store machine readable instructions which, when executed by the processor, cause the processor to perform the blockchain based violation management method of the first aspect of the present application.
The supervision terminal can carry out chain loading operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in the block chain network, the violation information recorded by the violation vehicle can not be falsified, the vehicle owner can draw the detained violation vehicle by virtue of the drawing-back certificate recorded with the violation information recorded by the violation vehicle, and when the drawing-back state of the violation vehicle detained by the vehicle owner is different from the drawing-back state, the right pursuit can be carried out according to the drawing-back certificate recorded with the violation information recorded by the violation vehicle.
A fourth aspect of the present application discloses a storage medium storing a computer program executed by a processor to perform the method for regulation violation management based on a blockchain of the first aspect of the present application.
The storage medium can carry out chain operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in a block chain network, the violation information recorded by the violation vehicle can not be falsified, a vehicle owner can draw the detained violation vehicle by virtue of the drawing-back certificate recorded with the violation information recorded by the violation vehicle, and when the state of the vehicle owner when drawing back the violation vehicle is different from the state of the vehicle owner when drawing back the violation vehicle, the right drawing-back can be carried out according to the drawing-back certificate recorded with the violation information recorded by the violation vehicle.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
FIG. 1 is a schematic flow chart of a violation management method based on a block chain according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a violation management device based on a block chain according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a monitoring terminal device disclosed in the embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
Example one
Referring to fig. 1, fig. 1 is a schematic flowchart of a violation management method based on a blockchain according to an embodiment of the present application, where the method is applied to a supervision terminal. As shown in fig. 1, the method of the embodiment of the present application includes the steps of:
101. acquiring violation information input by a supervisor aiming at a violation vehicle, wherein the violation information comprises the violation information of the violation vehicle and the vehicle information of the violation vehicle;
102. the violation information of the violation vehicle and the vehicle information of the violation vehicle are sent to the client terminal, so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed, and sends a confirmation instruction after the confirmation;
103. after receiving a confirmation instruction sent by the client terminal, performing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in the block chain network;
104. acquiring violation processing information of a violation vehicle;
105. and judging whether the violation vehicle meets a retrieval condition or not according to the violation processing information and the violation information of the violation vehicle, if so, generating a retrieval certificate and sending the retrieval certificate to the client terminal, wherein the retrieval certificate comprises retrieval confirmation information and vehicle information of the violation vehicle.
According to the embodiment of the application, the illegal information recorded by the illegal vehicle can be linked, so that the illegal information recorded by the illegal vehicle is stored in the block chain network, the illegal information recorded by the illegal vehicle can not be falsified, and then the vehicle owner can draw the detained illegal vehicle by virtue of the drawing-back certificate recorded with the illegal information recorded by the illegal vehicle, and when the drawing-back state of the illegal vehicle detained by the vehicle owner is different from the drawing-back state, the illegal vehicle can be subjected to right pursuit according to the drawing-back certificate recorded with the illegal information recorded by the illegal vehicle.
In the embodiment of the present application, as an optional implementation manner, before obtaining violation information entered by a supervisor for a violation vehicle, where the violation information includes violation information of the violation vehicle and vehicle information of the violation vehicle, the method of the embodiment of the present application further includes:
acquiring a digital identity certificate of a law enforcement officer, wherein the digital identity certificate of an executive officer has uniqueness;
verifying the digital identity certificate of the law enforcement officer;
and when the digital identity certificate of the executive personnel is successfully verified, triggering and executing the violation information recorded by the supervision party aiming at the violation vehicle.
In this optional embodiment, the authenticity of data uploading can be ensured by checking the digital identity certificate of the law enforcement officer, and other officers are prevented from uploading false data.
In this embodiment, as an optional implementation manner, before acquiring the digital identity credential of the law enforcement officer, the method of this embodiment further includes:
acquiring a local machine MAC address, a local machine mainboard serial number and personnel information of law enforcement personnel;
and generating a digital identity certificate according to the MAC address of the local machine, the serial number of the local machine mainboard and personnel information of law enforcement personnel, and storing the digital identity certificate.
In the optional embodiment, because the local MAC address of the monitoring terminal, the local motherboard serial number, and the personnel information of the law enforcement officer are difficult to copy, the digital identity credential generated according to the local MAC address, the local motherboard serial number, and the personnel information of the law enforcement officer can further improve the authenticity and the reliability of the data uploader.
In the embodiment of the present application, as an optional implementation manner, after the violation information of the violation vehicle and the vehicle information of the violation vehicle are sent to the client terminal, before the uplink operation is performed according to the violation information of the violation vehicle and the vehicle information of the violation vehicle, the method of the embodiment of the present application further includes the steps of:
acquiring a digital identity certificate of a violation person, wherein the digital identity certificate of the violation person has uniqueness;
verifying the digital identity certificate of the violation personnel;
and when the digital identity certificate of the violation personnel is successfully verified, triggering and executing the chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle.
In the optional implementation mode, the authenticity and the credibility of the data uploaded by the client terminal can be guaranteed by verifying the digital identity certificate of the violation personnel.
In this embodiment of the present application, as an optional implementation manner, before verifying the digital identity certificate of the violator, the method of this embodiment of the present application further includes:
acquiring a decryption public key corresponding to the digital identity certificate of the violation personnel;
and, the digital identity voucher of the violator is verified, including:
and verifying the digital identity certificate of the violation personnel according to the decryption public key.
In this alternative embodiment, the digital identity credential of the violator may be verified by decrypting the public key.
In the embodiment of the application, as an optional implementation mode, the violation information of the violation vehicle comprises violation date and violation cost, and the violation processing information of the violation vehicle comprises the violation processing date and the violation payment amount;
and judging whether the violation vehicle meets a pickup condition according to the violation processing information and the violation information of the violation vehicle, if so, generating a pickup certificate and sending the pickup certificate to the client terminal, wherein the steps of:
judging whether the violation vehicle meets the detaining time limit or not according to the violation date and the violation processing date;
when the violation vehicle meets the detaining time limit, judging whether the violation vehicle is clearly paid according to the violation cost and the violation payment amount, and if so, determining that the violation vehicle meets the pickup condition;
generating a receipt voucher and sending the receipt voucher to the client terminal.
In the optional implementation mode, whether the violation vehicle meets the return condition or not can be judged according to the violation date, the violation cost, the violation processing date and the violation payment amount. On the other hand, since the determination process is performed by the system monitoring terminal based on the blockchain network, the influence of human factors can be avoided.
In this embodiment, as an optional implementation manner, the method in this embodiment further includes:
when a modification instruction aiming at the violation information recorded by the violation vehicle is received, generating a modification notice and sending the modification notice to the client terminal;
and receiving a modification confirmation instruction sent by the client terminal aiming at the modification notice and modifying the violation information recorded by the violation vehicle.
In the optional implementation mode, the regulation terminal needs to obtain confirmation of the client terminal for the regulation violation information modification, otherwise, the regulation terminal cannot modify the regulation violation information, and therefore the regulation terminal can further prevent the regulation violation information from being tampered privately.
Example two
Referring to fig. 2, fig. 2 is a schematic structural diagram of a violation management device based on a block chain according to an embodiment of the present application, where the device is applied to a supervision terminal. As shown in fig. 2, the apparatus of the embodiment of the present application includes:
the first acquisition module 201 is used for acquiring violation information which is input by a monitoring party aiming at a violation vehicle, wherein the violation information comprises violation information of the violation vehicle and vehicle information of the violation vehicle;
the sending module 202 is used for sending the violation information of the violation vehicle and the vehicle information of the violation vehicle to the client terminal so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed and sends a confirmation instruction after the confirmation;
the chain winding module 203 is used for executing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle after receiving the confirmation instruction sent by the client terminal, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in the block chain network;
the second obtaining module 204 is used for obtaining violation processing information of the violation vehicle;
and the judging module 205 is used for judging whether the violation vehicle meets the retrieval condition according to the violation processing information and the violation information of the violation vehicle, if so, generating a retrieval certificate and sending the retrieval certificate to the client terminal, wherein the retrieval certificate comprises retrieval confirmation information and vehicle information of the violation vehicle.
The violation management device based on the block chain can carry out chain winding operation on violation information recorded by the violation vehicle, the violation information recorded by the violation vehicle is stored in the block chain network, the violation information recorded by the violation vehicle can not be falsified, a vehicle owner can then draw a detained violation vehicle by virtue of a drawing-back certificate recording the violation information recorded by the violation vehicle, and when the drawing-back state of the violation vehicle detained by the vehicle owner is different from the buckling state, right drawing can be carried out according to the drawing-back certificate recording the violation information recorded by the violation vehicle.
EXAMPLE III
Referring to fig. 3, fig. 3 is a schematic structural diagram of a monitoring terminal disclosed in the embodiment of the present application. As shown in fig. 3, the supervision terminal includes:
a processor 301; and
the memory 302 is configured to store machine readable instructions, which when executed by the processor 301, cause the processor 301 to execute the method for violation management based on blockchain according to the first embodiment of the present application.
The supervision terminal of the embodiment of the application can carry out chain winding operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in a block chain network, the violation information recorded by the violation vehicle can not be falsified, a vehicle owner can then draw the detained violation vehicle by virtue of the draw-back certificate recorded with the violation information recorded by the violation vehicle, and when the state of the detained violation vehicle drawn by the vehicle owner is different from the state of the detained violation vehicle, right pursuit can be carried out according to the draw-back certificate recorded with the violation information recorded by the violation vehicle.
Example four
The embodiment of the application discloses a storage medium, wherein a computer program is stored in the storage medium, and the computer program is executed by a processor to implement the violation management method based on the block chain.
The storage medium of the embodiment of the application can carry out chain winding operation on violation information recorded by the violation vehicle, so that the violation information recorded by the violation vehicle is stored in a block chain network, the violation information recorded by the violation vehicle can not be falsified, a vehicle owner can receive the detained violation vehicle by virtue of the receipt recorded with the violation information recorded by the violation vehicle, and when the receipt state of the violation vehicle detained by the vehicle owner is different from the receipt state of the violation vehicle detained by the vehicle owner, the right investigation can be carried out according to the receipt recorded with the violation information recorded by the violation vehicle.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
In addition, units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Furthermore, the functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
It should be noted that the functions, if implemented in the form of software functional modules and sold or used as independent products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (10)
1. A block chain-based violation management method is characterized in that the method applies a supervision terminal, and the method comprises the following steps:
acquiring violation information input by a supervisor aiming at a violation vehicle, wherein the violation information comprises the violation information of the violation vehicle and the vehicle information of the violation vehicle;
the violation information of the violation vehicle and the vehicle information of the violation vehicle are sent to a client terminal, so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed, and sends a confirmation instruction after the confirmation;
after receiving a confirmation instruction sent by the client terminal, performing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in a block chain network;
acquiring violation processing information of the violation vehicle;
and judging whether the violation vehicle meets a receipt condition or not according to the violation processing information and the violation information of the violation vehicle, if so, generating a receipt certificate and sending the receipt certificate to the client terminal, wherein the receipt certificate comprises receipt confirmation information and vehicle information of the violation vehicle.
2. The method of claim 1 wherein prior to said obtaining violation information entered by a supervisor for a violation vehicle, said violation information including violation information for said violation vehicle and vehicle information for said violation vehicle, said method further comprises:
acquiring a digital identity certificate of a law enforcement officer, wherein the digital identity certificate of the executive officer has uniqueness;
verifying the digital identity certificate of the law enforcement officer;
and when the digital identity voucher of the executive personnel is successfully verified, triggering the executive personnel to acquire violation information input by the supervision party for the violation vehicle.
3. The method of claim 2, wherein prior to said obtaining the digital identity credential of a law enforcement officer, the method further comprises:
acquiring a local machine MAC address, a local machine mainboard serial number and personnel information of law enforcement personnel;
and generating the digital identity certificate according to the local MAC address, the local mainboard serial number and the personnel information of the law enforcement personnel, and storing the digital identity certificate.
4. The method of claim 1 wherein after said transmitting the violation information for the violation vehicle and the vehicle information for the violation vehicle to the customer terminal, and prior to performing the uplink operation based on the violation information for the violation vehicle and the vehicle information for the violation vehicle, the method further comprises:
acquiring a digital identity certificate of a violation person, wherein the digital identity certificate of the violation person has uniqueness;
verifying the digital identity certificate of the violation personnel;
and when the digital identity certificate of the violation personnel is successfully verified, triggering and executing the chain loading operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle.
5. The method of claim 4 wherein prior to said verifying the digital identity credential of the violator, the method further comprises:
acquiring a decryption public key corresponding to the digital identity certificate of the violation personnel;
and, the verification of the digital identity certificate of the violator comprises the following steps:
and verifying the digital identity certificate of the violation personnel according to the decryption public key.
6. The method of claim 1 wherein the violation information of the violation vehicle includes a violation date, a violation cost, and the violation processing information of the violation vehicle includes a violation processing date, a payment for violation, and the like;
and judging whether the violation vehicle meets a receipt condition according to the violation processing information and the violation information of the violation vehicle, if so, generating a receipt certificate and sending the receipt certificate to the client terminal, and the method comprises the following steps:
judging whether the violation vehicle meets the detaining time limit or not according to the violation date and the violation processing date;
when the violation vehicle meets the detaining time limit, judging whether the violation cost of the violation vehicle is paid clearly according to the violation cost and the violation payment amount, and if so, determining that the violation vehicle meets the pickup condition;
and generating the receipt voucher and sending the receipt voucher to the client terminal.
7. The method of claim 1, wherein the method further comprises:
when a modification instruction aiming at the violation information input by the violation vehicle is received, generating a modification notice and sending the modification notice to the client terminal;
and receiving a modification confirmation instruction sent by the client terminal aiming at the modification notice and modifying the violation information recorded by the violation vehicle.
8. A block chain based violation management device, characterized in that the device employs a supervision terminal, the device comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring violation information which is input by a monitoring party aiming at a violation vehicle, and the violation information comprises the violation information of the violation vehicle and the vehicle information of the violation vehicle;
the sending module is used for sending the violation information of the violation vehicle and the vehicle information of the violation vehicle to the client terminal so that the client terminal sends the violation information of the violation vehicle and the vehicle information of the violation vehicle to be confirmed and sends a confirmation instruction after the confirmation;
the chain winding module is used for executing chain winding operation according to the violation information of the violation vehicle and the vehicle information of the violation vehicle after receiving the confirmation instruction sent by the client terminal, so that the violation information of the violation vehicle and the vehicle information of the violation vehicle are stored in the block chain network;
the second acquisition module is used for acquiring violation processing information of the violation vehicle;
and the judging module is used for judging whether the violation vehicle meets a return receiving condition or not according to the violation processing information and the violation information of the violation vehicle, if so, generating a return receiving certificate and sending the return receiving certificate to the client terminal, wherein the return receiving certificate comprises return receiving confirmation information and vehicle information of the violation vehicle.
9. A supervising terminal, characterized in that the supervising terminal comprises:
a processor; and
a memory configured to store machine readable instructions which, when executed by the processor, cause the processor to perform the blockchain based violation management method of any of claims 1-7.
10. A storage medium storing a computer program for execution by a processor of a blockchain based violation management method according to any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011584047.9A CN112597546A (en) | 2020-12-28 | 2020-12-28 | Violation management method based on block chain, device monitoring terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011584047.9A CN112597546A (en) | 2020-12-28 | 2020-12-28 | Violation management method based on block chain, device monitoring terminal and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112597546A true CN112597546A (en) | 2021-04-02 |
Family
ID=75203768
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011584047.9A Pending CN112597546A (en) | 2020-12-28 | 2020-12-28 | Violation management method based on block chain, device monitoring terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112597546A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103745599A (en) * | 2014-01-21 | 2014-04-23 | 兰州大学 | Vehicle intelligent management system based on cloud computing platform |
WO2016168555A1 (en) * | 2015-04-17 | 2016-10-20 | General Electric Company | Monitoring parking rule violations |
CN106875315A (en) * | 2017-02-09 | 2017-06-20 | 江苏智通交通科技有限公司 | Traffic offence article detains management system and method |
CN109325751A (en) * | 2018-09-30 | 2019-02-12 | 深圳市元征科技股份有限公司 | A kind of vehicle violation method for monitoring and relevant device based on block chain technology |
CN110222116A (en) * | 2019-05-07 | 2019-09-10 | 北京奇艺世纪科技有限公司 | A kind of control method, device and the storage medium of transaction data storage |
CN110689460A (en) * | 2019-10-09 | 2020-01-14 | 腾讯科技(深圳)有限公司 | Traffic accident data processing method, device, equipment and medium based on block chain |
CN111079196A (en) * | 2019-11-29 | 2020-04-28 | 山东爱城市网信息技术有限公司 | Block chain-based radio frequency vehicle illegal recording management method, device and medium |
-
2020
- 2020-12-28 CN CN202011584047.9A patent/CN112597546A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103745599A (en) * | 2014-01-21 | 2014-04-23 | 兰州大学 | Vehicle intelligent management system based on cloud computing platform |
WO2016168555A1 (en) * | 2015-04-17 | 2016-10-20 | General Electric Company | Monitoring parking rule violations |
CN106875315A (en) * | 2017-02-09 | 2017-06-20 | 江苏智通交通科技有限公司 | Traffic offence article detains management system and method |
CN109325751A (en) * | 2018-09-30 | 2019-02-12 | 深圳市元征科技股份有限公司 | A kind of vehicle violation method for monitoring and relevant device based on block chain technology |
CN110222116A (en) * | 2019-05-07 | 2019-09-10 | 北京奇艺世纪科技有限公司 | A kind of control method, device and the storage medium of transaction data storage |
CN110689460A (en) * | 2019-10-09 | 2020-01-14 | 腾讯科技(深圳)有限公司 | Traffic accident data processing method, device, equipment and medium based on block chain |
CN111079196A (en) * | 2019-11-29 | 2020-04-28 | 山东爱城市网信息技术有限公司 | Block chain-based radio frequency vehicle illegal recording management method, device and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3786871B1 (en) | Vehicle-related information processing based on blockchain | |
US7000115B2 (en) | Method and apparatus for uniquely and authoritatively identifying tangible objects | |
CN109583230A (en) | Data based on block chain deposit card method and device, electronic equipment | |
CN111027028A (en) | Copyright data processing method and device based on intelligent contract | |
CN111797430B (en) | Data verification method, device, server and storage medium | |
CN110246039B (en) | Transaction monitoring method and device based on alliance chain and electronic equipment | |
CN108073821B (en) | Data security processing method and device | |
CN112561633B (en) | Virtual object order data verification method, device and equipment | |
CN103268558A (en) | Processing method and device for electronic trading information | |
CN111179066A (en) | Batch processing method and device of service data, server and storage medium | |
CN112819617A (en) | Data uplink method and device, electronic equipment and storage medium | |
EP3547243A1 (en) | Methods and apparatuses for fraud handling | |
CN112597546A (en) | Violation management method based on block chain, device monitoring terminal and storage medium | |
CN110599211A (en) | Ticket information processing method and device and computer equipment | |
KR101532765B1 (en) | System and method for application counterfeit prevention | |
CN115423471A (en) | Safety protection method and device for NFT digital assets | |
CN111209602B (en) | Block chain based data development method, system, server and storage medium | |
CN105635048A (en) | Service request processing method and service request processing device | |
CN107566410A (en) | A kind of data save message request treating method and apparatus from damage | |
CN114925337A (en) | Data labeling method and device and electronic equipment | |
CN107809424B (en) | On-site certificate storing method and device and related certificate storing system | |
CN115174238B (en) | Network attack source identification method and device | |
US20210125162A1 (en) | Flexible parking space payment | |
CN117974251A (en) | Bill sale control method, device, equipment and medium | |
CN114266654A (en) | Credit investigation data management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210402 |