CN112732830A - Block chain-based wharf logistics supply chain data protection method - Google Patents
Block chain-based wharf logistics supply chain data protection method Download PDFInfo
- Publication number
- CN112732830A CN112732830A CN202011603230.9A CN202011603230A CN112732830A CN 112732830 A CN112732830 A CN 112732830A CN 202011603230 A CN202011603230 A CN 202011603230A CN 112732830 A CN112732830 A CN 112732830A
- Authority
- CN
- China
- Prior art keywords
- data
- logistics
- wharf
- supply chain
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Databases & Information Systems (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- General Engineering & Computer Science (AREA)
- Finance (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Development Economics (AREA)
- Computing Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention requests to protect a wharf logistics supply chain data protection method based on a block chain, in the wharf logistics supply chain data protection method based on the block chain, logistics traceability information is recorded based on the block chain, loss of the logistics traceability information is prevented, meanwhile, the logistics traceability information is convenient to inquire, a secret key, a certificate and an execution record are written into the block chain, dependence of an identity authentication system on an original authentication center is greatly reduced, and the whole identity authentication process is public, transparent and auditable. According to the wharf logistics supply chain data protection method based on the block chain, scanned logistics traceability information can be compared with information stored in a database, the feedback of the traceability logistics information is achieved, potential safety hazards caused by the fact that a key of an authentication center is leaked or expired are reduced, and the working efficiency of an authentication system is improved.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain-based data protection method for a wharf logistics supply chain.
Background
With the rapid development of internet technology and the increasing popularization of information technology, the technologies and applications of mobile internet, internet finance, internet of things and the like are rapidly developed like bamboo shoots in spring after rain, and unprecedented convenience is provided for the work and life of people.
Current supply chains are a linear economic model that directly or indirectly meets supply demand, but this model has some drawbacks, such as the relationship between supply chain members being based on some central dimension, and the difficulty for consumers to obtain information about the source of the product. Although the blockchain technology has many advantages, the technical maturity cannot meet various business requirements, an authoritative solution for the research of the supply chain does not appear as a reference, and the whole technology community has fewer open source codes and designs an application scene for digital currency transactions.
From the advent to the present decade, the block chain technology has grown rapidly into a mature and practical information technology. A blockchain can be considered as a distributed ledger that is supervised and maintained by all participants through the network to ensure authenticity and non-tamper of information. Meanwhile, the block chain is used as a decentralized trust network, manual intervention can be eliminated to the maximum extent, each node in the network does not need to know who the other node is, operation can be completed as long as a consensus encryption mechanism is met, and distributed storage is achieved. The characteristics of decentralized, non-tampering, openness and transparency and the like of the block chain provide a new path for the development of a traceability system of a commodity supply chain. For the logistics industry, due to the fact that the data volume in the logistics industry is huge, the logistics information program is complicated, the traceability information in the logistics industry is easy to lose, and the traceability information of logistics is difficult to trace. In view of this, we propose a block chain-based data protection method for the supply chain of wharf logistics.
Disclosure of Invention
The invention aims to provide a wharf logistics supply chain data protection method based on a block chain, and aims to solve the problems that the data volume in the logistics industry is huge, the logistics information procedure is complicated, the traceability information in the logistics industry is easily lost, and the traceability information of logistics is difficult to trace in the background technology.
The invention discloses a block chain-based data protection method for a wharf logistics supply chain, which is characterized by comprising the following steps of:
the method comprises the following steps that a wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self business and sold containers, identifies and determines logistics service supply chain data, identifies each node resource through logistics, and processes data in a centralized mode;
the auditing mechanism serves as a candidate node to establish a contract block chain, and the self-constructed logistics network is utilized to transfer the quick response capability of the logistics node;
splicing basic information and commodity information of the container at the wharf into data in a json format, and then sending the json format data to a specified port of a specified IP (Internet protocol) to realize data uploading;
the block chain is deployed on an enterprise server, so that the server becomes a node of a tracing block chain network, and the storage work of container data information of any wharf is completed;
members in each link of the supply chain access to the network for authorization, and a decision analysis result is provided for a manager by using a data analysis algorithm;
finding a logistics service object, and finding an object meeting the service by a logistics centralized management platform according to the request description and the requirement of a logistics initiator;
selecting candidate nodes by adopting an improved mixed consensus mechanism;
credit evaluation of a logistics service supply chain, namely evaluating the quality of a subject and an object of the supply chain, the quality of a container, the timeliness of credit information feedback and the payment timeliness;
and the logistics service supply chain payment service transfers the payment to both supply chain parties by applying a third party payment tool or a bank approved by both parties.
Compared with the prior art, the invention has the beneficial effects that: according to the wharf logistics supply chain data protection method based on the block chain, logistics traceability information is recorded based on the block chain, loss of the logistics traceability information is prevented, meanwhile, the logistics traceability information is convenient to inquire, a secret key, a certificate and an execution record are written into the block chain, dependence of an identity authentication system on an original authentication center is greatly reduced, and the whole identity authentication process is public, transparent and auditable. According to the wharf logistics supply chain data protection method based on the block chain, scanned logistics traceability information can be compared with information stored in a database, the feedback of the traceability logistics information is achieved, potential safety hazards caused by the fact that a key of an authentication center is leaked or expired are reduced, and the working efficiency of an authentication system is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart illustrating a block chain-based data protection method for a dock logistics supply chain according to the present invention;
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
A block chain-based wharf logistics supply chain data protection method is characterized by comprising the following steps:
the method comprises the following steps that a wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self business and sold containers, identifies and determines logistics service supply chain data, identifies each node resource through logistics, and processes data in a centralized mode;
the auditing mechanism serves as a candidate node to establish a contract block chain, and the self-constructed logistics network is utilized to transfer the quick response capability of the logistics node;
splicing basic information and commodity information of the container at the wharf into data in a json format, and then sending the json format data to a specified port of a specified IP (Internet protocol) to realize data uploading;
the block chain is deployed on an enterprise server, so that the server becomes a node of a tracing block chain network, and the storage work of container data information of any wharf is completed;
members in each link of the supply chain access to the network for authorization, and a decision analysis result is provided for a manager by using a data analysis algorithm;
finding a logistics service object, and finding an object meeting the service by a logistics centralized management platform according to the request description and the requirement of a logistics initiator;
selecting candidate nodes by adopting an improved mixed consensus mechanism;
credit evaluation of a logistics service supply chain, namely evaluating the quality of a subject and an object of the supply chain, the quality of a container, the timeliness of credit information feedback and the payment timeliness;
and the logistics service supply chain payment service transfers the payment to both supply chain parties by applying a third party payment tool or a bank approved by both parties.
Preferably, the wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self business and sold containers, identifies and determines logistics service supply chain data, identifies each node resource through logistics, and processes data in a centralized manner, and specifically includes:
the method comprises the steps that a wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self service and sold containers, wherein the wharf container basic information table comprises the types and names of wharf containers and is bound with enterprise information, and an App is obtained by scanning two-dimensional codes attached to the wharf containers;
when data information of each link of wharf logistics is written into a block chain database, a data uploading interface is called to upload the data information, a data transcoding interface is called to convert the data information into a character string required for storage, and then a data analysis interface and a database writing interface are called to write data and block chain hash codes into an RFID data table and a sensor data table of the wharf database;
the data in the RFID data table comprises RFID numbers, longitudes, latitudes and timestamps;
the data in the sensing data table includes sensor number, humidity, temperature, time stamp.
Preferably, the auditing mechanism is used as a candidate node to establish a contract block chain, and utilizes a self-constructed logistics network to transfer the quick response capability of the logistics node, and the method specifically includes:
after an auditing mechanism with a supply chain auditing responsibility completes identity authentication, a point-to-point contract block chain network model is established; all auditing agencies directly become candidate nodes in the model, and the model generates a private key and a public key;
the logistics center administrator generates or appoints a logistics center key in advance, wherein the center key is a first key of the logistics center and is written into the block chain together with the replacement condition;
the contract organizations respectively generate the secret keys and give the public keys to the logistics center administrator, and the secret key generation algorithm should be specified by the logistics center administrator.
Preferably, the splicing of the basic information of the container at the wharf and the commodity information into data in the json format, and then sending the data in the json format to a specified port of a specified IP to realize data uploading specifically includes:
fusing the source information of each container batch with satellite positioning data and standard time data, calculating a first hash value of the fused source information, generating a blockchain batch code of each batch of containers based on the first hash value, and storing the fused source information and the blockchain batch code in a blockchain in an associated manner, wherein the blockchain batch code is used for identifying each container batch;
and splicing the basic information of the container of the wharf and time information, longitude and latitude information, a unique two-dimensional code number and the like which can be acquired by a mobile phone into json format data, and then sending the json format data to a specified port of a specified IP (Internet protocol) by using a HTTP (hyper text transport protocol)/IP (Internet protocol) based http request to realize data uploading.
The block chain is deployed on an enterprise server, so that the server becomes a node of a tracing block chain network and is mainly used for storing data information of containers in a wharf;
the Oracle database is used as a storage database for providing source and enterprise information for the wharf container basic information;
the uploaded data can be mapped and stored in the database, and the inspection of whether the wharf container information is stored repeatedly can be carried out by setting the element for storing the two-dimensional code number of the wharf container as a unique attribute;
acquiring json data uploaded by a sensor or a data uploading APP in a mode of monitoring a designated port, then disassembling the acquired json data, selecting a storage function of a corresponding intelligent contract as an input parameter of the function according to a source of the json data, calling the storage function by a node.
Preferably, the member access authorization of each link of the supply chain provides a decision analysis result for a manager by using a data analysis algorithm, and further includes:
before each member of each link of the supply chain accesses the network, a digital certificate is acquired through CA authentication of an auditing mechanism, and the member enters a block chain network with a trusted identity; all supply chain members become common nodes after being networked, and the nodes in the whole network distribute keys, wherein the keys comprise private keys and public keys;
the key data and the supply chain identifier are associated through identifier configuration, and all the key data adopt the same key identifier; reading the key identifier from the identifier library according to the supply chain identifier sid configured by the identifier, and constructing a corresponding identifier cache;
taking the identifier sid of the supply chain as a key index, and taking an identifier cache SymbolCache as a key value to transmit the key value into an identifier cache list; thus, the coordinate position of the key data is obtained by circularly traversing the key data;
an authorization matrix is constructed according to parameters such as coordinate positions and the like, and corresponding identifier caches are obtained from the identifier cache list;
and realizing coordinate transformation of the identifier cache data through matrix multiplication, transforming the vertex data of the identifier cache to the coordinate position of the corresponding key data, submitting network access data and an authorization command to the GPU to perform identifier network access of the key data, processing all loaded data, and finishing authorization.
In addition, the key can be replaced when the logistics center key is exposed to leakage or loss. In this regard, the key of the logistics center, although important, is only an executor of the plurality of contracting agencies. The contract organization has the ability to reach consensus and supervise the logistics center administrator. If the logistics center administrator does not work, the position of the logistics center administrator can be revoked, and the logistics center key is replaced. So that the whole blockchain logistics center can be continuously used.
The logistics center administrator prepares a new key and a replacement request, and collects the signature of the contract organization offline. The request should include the following:
certificate of new logistics center: CertNewCA;
signature of contract agency a: SignAA;
signature of contract agency B: SignAB;
signature of contract agency C: SignAC
Signature of contract agency D: SignAD
And calling the intelligent contract to perform key exchange. The intelligent contract will check if there is a contract authority's signature before making the change and the correct number will reach the threshold. In addition, time limitation can be added, so that in order to avoid malicious attacks, the number of times of calling is limited, for example, the key replacement can be called only once at most every day;
after the verification is passed, the public key and algorithm of the logistics center in the block chain can be changed, and when the public key and algorithm are changed, the old public key and algorithm are also kept, so that the certificate capable of verifying the logistics of the old logistics center key is kept. Therefore, the data structure should be a linked list, and only the last logistics center has the functions of issuing and revoking the certificate. Thus, the whole system is protected to be still usable after the key is leaked;
writes to the blockchain and returns the results to the administrator. This is a great innovation compared to traditional authentication centers. After the key of the logistics center is lost or leaked, the whole public key infrastructure system can still continue to work and continue to be credible in a key replacement mode. And because of the multi-signature mode, the decentralization of the contract is realized.
Preferably, the object of the logistics service is found, and the object meeting the service is found by the logistics centralized management platform according to the request description and the requirement of the logistics initiator;
selecting candidate nodes by adopting an improved hybrid consensus mechanism, and further comprising:
after the whole network node completes the resource credibility judgment, the calculation of the designated random number is carried out, and the calculated node releases the logistics content in the whole network, including the credibility judgment of the resource and the calculated random number meeting the requirements, and the method specifically comprises the following steps:
the method comprises the steps that all nodes are defaulted to stop random number calculation once receiving logistics contents sent by other nodes, and check calculation is carried out on the received logistics contents;
the checking content comprises the verification of the credible judgment of the newly added resource, the received data result is compared with the self test result for judgment, if the value is within the error constant A, the judgment result is determined to be correct, otherwise, the judgment result is determined to be wrong;
verifying the correctness of the random number, and judging whether the random number meets the system requirements or not, wherein the set random number meets the requirements;
once the check calculation finds that any part has errors, the received logistics content is judged to be illegal;
and all the nodes which are legal after the node verification are used as candidate nodes.
The candidate nodes are accounting nodes of the whole network and are responsible for verifying the supply chain and maintaining the consistency of the account book of the whole network; the candidate node is composed of two parts: all audit organization nodes + part supply chain nodes, and the number of candidate nodes is fixed; the candidate node is selected from the member nodes of the supply chain and used as a candidate domain of the candidate node; after the supply chain member is authenticated and accessed to the network, whether the supply chain member becomes a candidate node or not can be selected, if the supply chain member becomes the candidate node, the supply chain member means that the supply chain member intentionally participates in the whole network consensus process, and the supply chain member intentionally saves all data of the block chain main chain ledger; if not, maintaining the identity of the common node; and the candidate node and the common node are allowed to be changed in a later period.
Preferably, the credit evaluation of the logistics service supply chain, the evaluation of the quality of the subject and object, the quality of the container, the timeliness of the credit information feedback and the payment timeliness of the supply chain, further include:
inputting information in the loading and unloading information reports into a control system through an operation station, and automatically generating all work flows according to the sequence of superiority and inferiority according to the information such as stockpiling information of the goods in the yard and the integrity of logistics conveyor equipment, so that an operator can select an evaluation flow according to production experience;
when no evaluation plan exists, an operator can select an evaluation flow by adopting a flow number mode or a main large-scale computer selection mode;
after the operator selects the process, the programmable controller of the central control system sends the relevant information of the container, the container stacking position, the production process, the ship information, the relevant equipment number and other signals to the large-scale equipment and displays the signals on the production display screens of all the large-scale cab;
starting and stopping the process, namely starting a conveyor belt system in the process after the process setting is finished and the preparation of each large machine and the positions of an apron board, a baffle plate and a rainwater drainage device of the logistics conveyor are confirmed to be correct, and starting a high-power audible and visual alarm along the front conveyor belt to give out an audible and visual alarm for 30 seconds;
the starting sequence of the logistics conveyor is that the lowest layer of large machine equipment is started first, and then the equipment on the upper layer is started in sequence;
when the operation is normally stopped, the process is to stop the equipment at the uppermost layer and then stop the equipment at the lower layer in sequence;
when the equipment in the evaluation process has faults, the equipment and the equipment on the upper layer stop running immediately, and the equipment on the lower layer stops running sequentially or selectively after the containers are cleared;
and evaluating the quality of the subject and the object of the supply chain and the quality of the container based on the operation performance of the equipment.
Preferably, according to the selection principle of the candidate nodes, selecting the candidate nodes to verify the supply chain, and waiting for the consensus block; each supply chain generated needs to be digitally signed by two parties or even multiple participating nodes, and the supply chain is broadcasted to nearby candidate nodes to verify supply chain information; after the candidate node passes the verification, adding the supply chain into a local supply chain pool, forwarding the supply chain to other adjacent candidate nodes, and after the candidate node passes the verification, adding the supply chain into the supply chain pool for waiting for chain winding;
the logistics traders provide information in the information flow, which relates to the state information before container transportation (departure point, processing batch information, physical photos, packaging mode), storage information (warehousing time, quantity, warehouse temperature and humidity, leader number and ex-warehouse time), cold chain transportation (refrigerating time, temperature and humidity in a carriage and operator number), state information after container transportation arrival (destination, transportation batch, physical photos and loss), logistics transportation time and logistics unit information.
According to the model, a DPoS + BFT consensus mechanism is adopted, candidate nodes pack supply chain blocks from a local supply chain pool according to a block outlet sequence randomly generated in the current round, and after the blocks are packed, the blocks are broadcasted to other candidate nodes for verification and waiting for other nodes to reply; each node generates a block and links the chain with a certain time limit, if the time limit reaches the time limit that other nodes do not reply, the node calculates the abandon right and deducts corresponding integral; if all the returned candidate nodes have more than 2/3 people to recognize the block, the block is linked, and the next candidate node is packaged into the block and broadcasted, and the steps are repeated; if the node less than 2/3 is approved, then it is considered as invalid, deduct the block candidate node integral, and pack the block by the next candidate node; after the last candidate node is blocked, the block output is finished, the candidate nodes are reselected according to the integral, a round of consensus is finished through the steps, and a main chain is generated;
in consideration of resource waste caused by repeated occupation of storage space, generating a summary chain by the candidate nodes on the basis of the main chain; the period of the block generated by the abstract chain is consistent with the main chain, the main chain generates a plurality of blocks according to the number of the candidate nodes after a round of consensus, and the abstract chain generates one block;
the common nodes can optionally select and store the main chains or the abstract chains, and if the common nodes are required to become candidate nodes, all main chain and abstract chain data need to be stored; if the candidate node application is changed into the common node, discarding the locally stored main chain data, and storing the abstract chain, namely storing and releasing;
if one wants to verify a supply chain: and finding the nearest candidate node, verifying whether the information of the candidate node is complete and has not been tampered according to the summary block, and finding the original supply chain data according to the merkle tree.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (6)
1. A block chain-based wharf logistics supply chain data protection method is characterized by comprising the following steps:
the method comprises the following steps that a wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self business and sold containers, identifies and determines logistics service supply chain data, identifies each node resource through logistics, and processes data in a centralized mode;
the auditing mechanism serves as a candidate node to establish a contract block chain, and the self-constructed logistics network is utilized to transfer the quick response capability of the logistics node;
splicing basic information and commodity information of the container at the wharf into data in a json format, and then sending the json format data to a specified port of a specified IP (Internet protocol) to realize data uploading;
the block chain is deployed on an enterprise server, so that the server becomes a node of a tracing block chain network, and the storage work of container data information of any wharf is completed;
members in each link of the supply chain access to the network for authorization, and a decision analysis result is provided for a manager by using a data analysis algorithm;
finding a logistics service object, and finding an object meeting the service by a logistics centralized management platform according to the request description and the requirement of a logistics initiator;
selecting candidate nodes by adopting an improved mixed consensus mechanism;
credit evaluation of a logistics service supply chain, namely evaluating the quality of a subject and an object of the supply chain, the quality of a container, the timeliness of credit information feedback and the payment timeliness;
and the logistics service supply chain payment service transfers the payment to both supply chain parties by applying a third party payment tool or a bank approved by both parties.
2. The block chain-based data protection method for the wharf logistics supply chain is characterized in that the contract requirement 1 comprises the following steps:
the wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self business and sold containers, identifies and determines logistics service supply chain data, identifies each node resource through logistics, and processes data in a centralized manner, and specifically comprises the following steps: the method comprises the steps that a wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self service and sold containers, wherein the wharf container basic information table comprises the types and names of wharf containers and is bound with enterprise information, and an App is obtained by scanning two-dimensional codes attached to the wharf containers;
when data information of each link of wharf logistics is written into a block chain database, a data uploading interface is called to upload the data information, a data transcoding interface is called to convert the data information into a character string required for storage, and then a data analysis interface and a database writing interface are called to write data and block chain hash codes into an RFID data table and a sensor data table of the wharf database;
the data in the RFID data table comprises RFID numbers, longitudes, latitudes and timestamps;
the data in the sensing data table includes sensor number, humidity, temperature, time stamp.
3. The block chain-based data protection method for the wharf logistics supply chain is characterized in that the contract requirement 1 comprises the following steps:
the auditing mechanism serves as a candidate node to establish a contract block chain, utilizes a self-constructed logistics network to transfer the quick response capability of the logistics node, and specifically comprises the following steps:
after an auditing mechanism with a supply chain auditing responsibility completes identity authentication, a point-to-point contract block chain network model is established; all auditing agencies directly become candidate nodes in the model, and the model generates a private key and a public key;
the logistics center administrator generates or appoints a logistics center key in advance, wherein the center key is a first key of the logistics center and is written into the block chain together with the replacement condition;
the contract organizations respectively generate the secret keys and give the public keys to the logistics center administrator, and the secret key generation algorithm should be specified by the logistics center administrator.
4. The block chain-based data protection method for the wharf logistics supply chain is characterized in that the contract requirement 1 comprises the following steps:
splicing the basic information and commodity information of the wharf container into data in a json format, and then sending the json format data to a specified port of a specified IP (Internet protocol), so as to realize data uploading, specifically comprising:
fusing the source information of each container batch with satellite positioning data and standard time data, calculating a first hash value of the fused source information, generating a blockchain batch code of each batch of containers based on the first hash value, and storing the fused source information and the blockchain batch code in a blockchain in an associated manner, wherein the blockchain batch code is used for identifying each container batch;
and splicing the basic information of the container of the wharf and time information, longitude and latitude information, a unique two-dimensional code number and the like which can be acquired by a mobile phone into json format data, and then sending the json format data to a specified port of a specified IP (Internet protocol) by using a HTTP (hyper text transport protocol)/IP (Internet protocol) based http request to realize data uploading.
The block chain is deployed on an enterprise server, so that the server becomes a node of a tracing block chain network and is mainly used for storing data information of containers in a wharf;
the Oracle database is used as a storage database for providing source and enterprise information for the wharf container basic information;
the uploaded data can be mapped and stored in the database, and the inspection of whether the wharf container information is stored repeatedly can be carried out by setting the element for storing the two-dimensional code number of the wharf container as a unique attribute;
acquiring json data uploaded by a sensor or a data uploading APP in a mode of monitoring a designated port, then disassembling the acquired json data, selecting a storage function of a corresponding intelligent contract as an input parameter of the function according to a source of the json data, calling the storage function by a node.
5. The block chain-based data protection method for the wharf logistics supply chain is characterized in that the contract requirement 1 comprises the following steps:
the member access authorization of each link of the supply chain provides decision analysis results for managers by using a data analysis algorithm, and the method further comprises the following steps:
before each member of each link of the supply chain accesses the network, a digital certificate is acquired through CA authentication of an auditing mechanism, and the member enters a block chain network with a trusted identity; all supply chain members become common nodes after being networked, and the nodes in the whole network distribute keys, wherein the keys comprise private keys and public keys;
the key data and the supply chain identifier are associated through identifier configuration, and all the key data adopt the same key identifier; reading the key identifier from the identifier library according to the supply chain identifier sid configured by the identifier, and constructing a corresponding identifier cache;
taking the identifier sid of the supply chain as a key index, and taking an identifier cache SymbolCache as a key value to transmit the key value into an identifier cache list; thus, the coordinate position of the key data is obtained by circularly traversing the key data;
an authorization matrix is constructed according to parameters such as coordinate positions and the like, and corresponding identifier caches are obtained from the identifier cache list;
and realizing coordinate transformation of the identifier cache data through matrix multiplication, transforming the vertex data of the identifier cache to the coordinate position of the corresponding key data, submitting network access data and an authorization command to the GPU to perform identifier network access of the key data, processing all loaded data, and finishing authorization.
6. The block chain-based data protection method for the wharf logistics supply chain is characterized in that the contract requirement 1 comprises the following steps:
the logistics centralized management platform finds the object meeting the service according to the request description and the requirement of the logistics initiator;
selecting candidate nodes by adopting an improved hybrid consensus mechanism, and further comprising:
after the whole network node completes the resource credibility judgment, the calculation of the designated random number is carried out, and the calculated node releases the logistics content in the whole network, including the credibility judgment of the resource and the calculated random number meeting the requirements, and the method specifically comprises the following steps:
the method comprises the steps that all nodes are defaulted to stop random number calculation once receiving logistics contents sent by other nodes, and check calculation is carried out on the received logistics contents;
the checking content comprises the verification of the credible judgment of the newly added resource, the received data result is compared with the self test result for judgment, if the value is within the error constant A, the judgment result is determined to be correct, otherwise, the judgment result is determined to be wrong;
verifying the correctness of the random number, and judging whether the random number meets the system requirements or not, wherein the set random number meets the requirements;
once the check calculation finds that any part has errors, the received logistics content is judged to be illegal;
and all the nodes which are legal after the node verification are used as candidate nodes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011603230.9A CN112732830B (en) | 2020-12-29 | 2020-12-29 | Block chain-based wharf logistics supply chain data protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011603230.9A CN112732830B (en) | 2020-12-29 | 2020-12-29 | Block chain-based wharf logistics supply chain data protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112732830A true CN112732830A (en) | 2021-04-30 |
CN112732830B CN112732830B (en) | 2022-03-01 |
Family
ID=75610566
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011603230.9A Active CN112732830B (en) | 2020-12-29 | 2020-12-29 | Block chain-based wharf logistics supply chain data protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112732830B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115460222A (en) * | 2022-09-05 | 2022-12-09 | 蚂蚁区块链科技(上海)有限公司 | Block chain data flow calculating device |
CN116128390A (en) * | 2023-04-17 | 2023-05-16 | 长沙智医云科技有限公司 | Medical consumable cold chain transportation monitoring method based on Internet of things |
CN117195298A (en) * | 2023-09-18 | 2023-12-08 | 淮阴工学院 | Cold chain product tracing method and device based on block chain mixed consensus |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107679809A (en) * | 2017-10-18 | 2018-02-09 | 上海唯链信息科技有限公司 | A kind of material flow tracking method based on block chain |
CN109949142A (en) * | 2019-02-01 | 2019-06-28 | 深圳尚融供应链科技有限公司 | A kind of dominant supply chain finance implementation method, system and terminal device |
CN110675099A (en) * | 2019-08-05 | 2020-01-10 | 南京中诚区块链研究院有限公司 | Port logistics traceability system and method based on block chain technology |
CN110706006A (en) * | 2019-10-09 | 2020-01-17 | 北京物资学院 | Supply chain logistics traceability system with block chain multi-chain cooperation |
US20200110740A1 (en) * | 2017-09-29 | 2020-04-09 | Oracle International Corporation | System and method for providing a representational state transfer proxy service for a blockchain cloud service |
US20200364817A1 (en) * | 2019-05-17 | 2020-11-19 | UCOT Holdings Pty Ltd | Machine type communication system or device for recording supply chain information on a distributed ledger in a peer to peer network |
-
2020
- 2020-12-29 CN CN202011603230.9A patent/CN112732830B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200110740A1 (en) * | 2017-09-29 | 2020-04-09 | Oracle International Corporation | System and method for providing a representational state transfer proxy service for a blockchain cloud service |
CN107679809A (en) * | 2017-10-18 | 2018-02-09 | 上海唯链信息科技有限公司 | A kind of material flow tracking method based on block chain |
CN109949142A (en) * | 2019-02-01 | 2019-06-28 | 深圳尚融供应链科技有限公司 | A kind of dominant supply chain finance implementation method, system and terminal device |
US20200364817A1 (en) * | 2019-05-17 | 2020-11-19 | UCOT Holdings Pty Ltd | Machine type communication system or device for recording supply chain information on a distributed ledger in a peer to peer network |
CN110675099A (en) * | 2019-08-05 | 2020-01-10 | 南京中诚区块链研究院有限公司 | Port logistics traceability system and method based on block chain technology |
CN110706006A (en) * | 2019-10-09 | 2020-01-17 | 北京物资学院 | Supply chain logistics traceability system with block chain multi-chain cooperation |
Non-Patent Citations (2)
Title |
---|
LAMMI M: "SmartLog Piloting BlockChain for Logistics", 《PORT TECHNOLOGY INTERNATIONAL》 * |
朱盛军: "区块链技术在集装箱运输行业中的应用", 《集装箱化》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115460222A (en) * | 2022-09-05 | 2022-12-09 | 蚂蚁区块链科技(上海)有限公司 | Block chain data flow calculating device |
CN116128390A (en) * | 2023-04-17 | 2023-05-16 | 长沙智医云科技有限公司 | Medical consumable cold chain transportation monitoring method based on Internet of things |
CN116128390B (en) * | 2023-04-17 | 2023-06-30 | 长沙智医云科技有限公司 | Medical consumable cold chain transportation monitoring method based on Internet of things |
CN117195298A (en) * | 2023-09-18 | 2023-12-08 | 淮阴工学院 | Cold chain product tracing method and device based on block chain mixed consensus |
CN117195298B (en) * | 2023-09-18 | 2024-05-17 | 淮阴工学院 | Cold chain product tracing method and device based on block chain mixed consensus |
Also Published As
Publication number | Publication date |
---|---|
CN112732830B (en) | 2022-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112732830B (en) | Block chain-based wharf logistics supply chain data protection method | |
KR102254920B1 (en) | Method for security serialization of supply chain product units | |
CN109829824B (en) | Commodity transaction information sharing method based on block chain technology | |
US9641342B2 (en) | Tracking unitization occurring in a supply chain | |
US11734756B1 (en) | Blockchain based loan securitization | |
CN111177275A (en) | Block chain-based management method, terminal, device and storage medium | |
CN106570710A (en) | Commodity anti-counterfeiting method and device | |
Wang et al. | Auditable protocols for fair payment and physical asset delivery based on smart contracts | |
CN111798209A (en) | Engineering project management method based on block chain, electronic equipment and storage medium | |
Koirala et al. | Supply chain using smart contract: A blockchain enabled model with traceability and ownership management | |
CN112001663B (en) | Material donation data processing method based on block chain and related equipment | |
CN112308484A (en) | Whole-course logistics information sharing method and system, equipment and medium | |
CN113469716A (en) | Product tracing method and system based on block chain and identification analysis | |
Wei | Blockchain-based data traceability platform architecture for supply chain management | |
CN111385751B (en) | Information sending method, device, terminal and readable storage medium | |
Hofman et al. | The applicability of blockchain technology in the mobility and logistics domain | |
CN112417031A (en) | Contextual internet of things using blockchains | |
CN111695856A (en) | Ship information registration method based on block chain intelligent contract | |
CN113793158A (en) | Textile inspection detection information query method and system | |
CN109242254A (en) | A kind of enterprise's account approaches to IM and device, readable storage medium storing program for executing | |
CN112700327A (en) | User confirmation method, device and system in financial scene | |
CN210955189U (en) | Sample entrusted detection logistics and information management system based on block chain | |
CN117788007A (en) | Blockchain-based quality traceability system and method for traditional Chinese medicine decoction pieces | |
CN112330252A (en) | Cold chain logistics monitoring system based on block chain technology | |
Imeri | Using the blockchain technology for trust improvement of processes in Logistics and Transportation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |