CN112732830B - Block chain-based wharf logistics supply chain data protection method - Google Patents

Block chain-based wharf logistics supply chain data protection method Download PDF

Info

Publication number
CN112732830B
CN112732830B CN202011603230.9A CN202011603230A CN112732830B CN 112732830 B CN112732830 B CN 112732830B CN 202011603230 A CN202011603230 A CN 202011603230A CN 112732830 B CN112732830 B CN 112732830B
Authority
CN
China
Prior art keywords
data
logistics
supply chain
information
wharf
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011603230.9A
Other languages
Chinese (zh)
Other versions
CN112732830A (en
Inventor
刘建明
俞文军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangyin Huaxi Chemical Wharf Co ltd
Original Assignee
Jiangyin Huaxi Chemical Wharf Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangyin Huaxi Chemical Wharf Co ltd filed Critical Jiangyin Huaxi Chemical Wharf Co ltd
Priority to CN202011603230.9A priority Critical patent/CN112732830B/en
Publication of CN112732830A publication Critical patent/CN112732830A/en
Application granted granted Critical
Publication of CN112732830B publication Critical patent/CN112732830B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Finance (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Development Economics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Data Mining & Analysis (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Computing Systems (AREA)

Abstract

The invention requests to protect a wharf logistics supply chain data protection method based on a block chain, in the wharf logistics supply chain data protection method based on the block chain, logistics traceability information is recorded based on the block chain, loss of the logistics traceability information is prevented, meanwhile, the logistics traceability information is convenient to inquire, a secret key, a certificate and an execution record are written into the block chain, dependence of an identity authentication system on an original authentication center is greatly reduced, and the whole identity authentication process is public, transparent and auditable. According to the wharf logistics supply chain data protection method based on the block chain, scanned logistics traceability information can be compared with information stored in a database, the feedback of the traceability logistics information is achieved, potential safety hazards caused by the fact that a key of an authentication center is leaked or expired are reduced, and the working efficiency of an authentication system is improved.

Description

Block chain-based wharf logistics supply chain data protection method
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain-based data protection method for a wharf logistics supply chain.
Background
With the rapid development of internet technology and the increasing popularization of information technology, the technologies and applications of mobile internet, internet finance, internet of things and the like are rapidly developed like bamboo shoots in spring after rain, and unprecedented convenience is provided for the work and life of people.
Current supply chains are a linear economic model that directly or indirectly meets supply demand, but this model has some drawbacks, such as the relationship between supply chain members being based on some central dimension, and the difficulty for consumers to obtain information about the source of the product. Although the blockchain technology has many advantages, the technical maturity cannot meet various business requirements, an authoritative solution for the research of the supply chain does not appear as a reference, and the whole technology community has fewer open source codes and designs an application scene for digital currency transactions.
From the advent to the present decade, the block chain technology has grown rapidly into a mature and practical information technology. A blockchain can be considered as a distributed ledger that is supervised and maintained by all participants through the network to ensure authenticity and non-tamper of information. Meanwhile, the block chain is used as a decentralized trust network, manual intervention can be eliminated to the maximum extent, each node in the network does not need to know who the other node is, operation can be completed as long as a consensus encryption mechanism is met, and distributed storage is achieved. The characteristics of decentralized, non-tampering, openness and transparency and the like of the block chain provide a new path for the development of a traceability system of a commodity supply chain. For the logistics industry, due to the fact that the data volume in the logistics industry is huge, the logistics information program is complicated, the traceability information in the logistics industry is easy to lose, and the traceability information of logistics is difficult to trace. In view of this, we propose a block chain-based data protection method for the supply chain of wharf logistics.
Disclosure of Invention
The invention aims to provide a wharf logistics supply chain data protection method based on a block chain, and aims to solve the problems that the data volume in the logistics industry is huge, the logistics information procedure is complicated, the traceability information in the logistics industry is easily lost, and the traceability information of logistics is difficult to trace in the background technology.
The invention discloses a block chain-based data protection method for a wharf logistics supply chain, which is characterized by comprising the following steps of:
the method comprises the following steps that a wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self business and sold containers, identifies and determines logistics service supply chain data, identifies each node resource through logistics, and processes data in a centralized mode;
the auditing mechanism serves as a candidate node to establish a contract block chain, and the self-constructed logistics network is utilized to transfer the quick response capability of the logistics node;
splicing basic information and commodity information of the container at the wharf into data in a json format, and then sending the json format data to a specified port of a specified IP (Internet protocol) to realize data uploading;
the block chain is deployed on an enterprise server, so that the server becomes a node of a tracing block chain network, and the storage work of container data information of any wharf is completed;
members in each link of the supply chain access to the network for authorization, and a decision analysis result is provided for a manager by using a data analysis algorithm;
finding a logistics service object, and finding an object meeting the service by a logistics centralized management platform according to the request description and the requirement of a logistics initiator;
selecting candidate nodes by adopting an improved mixed consensus mechanism;
credit evaluation of a logistics service supply chain, namely evaluating the quality of a subject and an object of the supply chain, the quality of a container, the timeliness of credit information feedback and the payment timeliness;
and the logistics service supply chain payment service transfers the payment to both supply chain parties by applying a third party payment tool or a bank approved by both parties.
Compared with the prior art, the invention has the beneficial effects that: according to the wharf logistics supply chain data protection method based on the block chain, logistics traceability information is recorded based on the block chain, loss of the logistics traceability information is prevented, meanwhile, the logistics traceability information is convenient to inquire, a secret key, a certificate and an execution record are written into the block chain, dependence of an identity authentication system on an original authentication center is greatly reduced, and the whole identity authentication process is public, transparent and auditable. According to the wharf logistics supply chain data protection method based on the block chain, scanned logistics traceability information can be compared with information stored in a database, the feedback of the traceability logistics information is achieved, potential safety hazards caused by the fact that a key of an authentication center is leaked or expired are reduced, and the working efficiency of an authentication system is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart illustrating a block chain-based data protection method for a dock logistics supply chain according to the present invention;
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
A block chain-based wharf logistics supply chain data protection method is characterized by comprising the following steps:
the method comprises the following steps that a wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self business and sold containers, identifies and determines logistics service supply chain data, identifies each node resource through logistics, and processes data in a centralized mode;
the auditing mechanism serves as a candidate node to establish a contract block chain, and the self-constructed logistics network is utilized to transfer the quick response capability of the logistics node;
splicing basic information and commodity information of the container at the wharf into data in a json format, and then sending the json format data to a specified port of a specified IP (Internet protocol) to realize data uploading;
the block chain is deployed on an enterprise server, so that the server becomes a node of a tracing block chain network, and the storage work of container data information of any wharf is completed;
members in each link of the supply chain access to the network for authorization, and a decision analysis result is provided for a manager by using a data analysis algorithm;
finding a logistics service object, and finding an object meeting the service by a logistics centralized management platform according to the request description and the requirement of a logistics initiator;
selecting candidate nodes by adopting an improved mixed consensus mechanism;
credit evaluation of a logistics service supply chain, namely evaluating the quality of a subject and an object of the supply chain, the quality of a container, the timeliness of credit information feedback and the payment timeliness;
and the logistics service supply chain payment service transfers the payment to both supply chain parties by applying a third party payment tool or a bank approved by both parties.
Preferably, the wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self business and sold containers, identifies and determines logistics service supply chain data, identifies each node resource through logistics, and processes data in a centralized manner, and specifically includes:
the method comprises the steps that a wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self service and sold containers, wherein the wharf container basic information table comprises the types and names of wharf containers and is bound with enterprise information, and an App is obtained by scanning two-dimensional codes attached to the wharf containers;
when data information of each link of wharf logistics is written into a block chain database, a data uploading interface is called to upload the data information, a data transcoding interface is called to convert the data information into a character string required for storage, and then a data analysis interface and a database writing interface are called to write data and block chain hash codes into an RFID data table and a sensor data table of the wharf database;
the data in the RFID data table comprises RFID numbers, longitudes, latitudes and timestamps;
the data in the sensing data table includes sensor number, humidity, temperature, time stamp.
Preferably, the auditing mechanism is used as a candidate node to establish a contract block chain, and utilizes a self-constructed logistics network to transfer the quick response capability of the logistics node, and the method specifically includes:
after an auditing mechanism with a supply chain auditing responsibility completes identity authentication, a point-to-point contract block chain network model is established; all auditing agencies directly become candidate nodes in the model, and the model generates a private key and a public key;
the logistics center administrator generates or appoints a logistics center key in advance, wherein the center key is a first key of the logistics center and is written into the block chain together with the replacement condition;
the contract organizations respectively generate the secret keys and give the public keys to the logistics center administrator, and the secret key generation algorithm should be specified by the logistics center administrator.
Preferably, the splicing of the basic information of the container at the wharf and the commodity information into data in the json format, and then sending the data in the json format to a specified port of a specified IP to realize data uploading specifically includes:
fusing the source information of each container batch with satellite positioning data and standard time data, calculating a first hash value of the fused source information, generating a blockchain batch code of each batch of containers based on the first hash value, and storing the fused source information and the blockchain batch code in a blockchain in an associated manner, wherein the blockchain batch code is used for identifying each container batch;
and splicing the basic information of the container of the wharf and time information, longitude and latitude information, a unique two-dimensional code number and the like which can be acquired by a mobile phone into json format data, and then sending the json format data to a specified port of a specified IP (Internet protocol) by using a HTTP (hyper text transport protocol)/IP (Internet protocol) based http request to realize data uploading.
The block chain is deployed on an enterprise server, so that the server becomes a node of a tracing block chain network and is mainly used for storing data information of containers in a wharf;
the Oracle database is used as a storage database for providing source and enterprise information for the wharf container basic information;
the uploaded data can be mapped and stored in the database, and the inspection of whether the wharf container information is stored repeatedly can be carried out by setting the element for storing the two-dimensional code number of the wharf container as a unique attribute;
acquiring json data uploaded by a sensor or a data uploading APP in a mode of monitoring a designated port, then disassembling the acquired json data, selecting a storage function of a corresponding intelligent contract as an input parameter of the function according to a source of the json data, calling the storage function by a node.
Preferably, the member access authorization of each link of the supply chain provides a decision analysis result for a manager by using a data analysis algorithm, and further includes:
before each member of each link of the supply chain accesses the network, a digital certificate is acquired through CA authentication of an auditing mechanism, and the member enters a block chain network with a trusted identity; all supply chain members become common nodes after being networked, and the nodes in the whole network distribute keys, wherein the keys comprise private keys and public keys;
the key data and the supply chain identifier are associated through identifier configuration, and all the key data adopt the same key identifier; reading the key identifier from the identifier library according to the supply chain identifier sid configured by the identifier, and constructing a corresponding identifier cache;
taking the identifier sid of the supply chain as a key index, and taking an identifier cache SymbolCache as a key value to transmit the key value into an identifier cache list; thus, the coordinate position of the key data is obtained by circularly traversing the key data;
an authorization matrix is constructed according to parameters such as coordinate positions and the like, and corresponding identifier caches are obtained from the identifier cache list;
and realizing coordinate transformation of the identifier cache data through matrix multiplication, transforming the vertex data of the identifier cache to the coordinate position of the corresponding key data, submitting network access data and an authorization command to the GPU to perform identifier network access of the key data, processing all loaded data, and finishing authorization.
In addition, the key can be replaced when the logistics center key is exposed to leakage or loss. In this regard, the key of the logistics center, although important, is only an executor of the plurality of contracting agencies. The contract organization has the ability to reach consensus and supervise the logistics center administrator. If the logistics center administrator does not work, the position of the logistics center administrator can be revoked, and the logistics center key is replaced. So that the whole blockchain logistics center can be continuously used.
The logistics center administrator prepares a new key and a replacement request, and collects the signature of the contract organization offline. The request should include the following:
certificate of new logistics center: CertNewCA;
signature of contract agency a: SignAA;
signature of contract agency B: SignAB;
signature of contract agency C: SignAC
Signature of contract agency D: SignAD
And calling the intelligent contract to perform key exchange. The intelligent contract will check if there is a contract authority's signature before making the change and the correct number will reach the threshold. In addition, time limitation can be added, so that in order to avoid malicious attacks, the number of times of calling is limited, for example, the key replacement can be called only once at most every day;
after the verification is passed, the public key and algorithm of the logistics center in the block chain can be changed, and when the public key and algorithm are changed, the old public key and algorithm are also kept, so that the certificate capable of verifying the logistics of the old logistics center key is kept. Therefore, the data structure should be a linked list, and only the last logistics center has the functions of issuing and revoking the certificate. Thus, the whole system is protected to be still usable after the key is leaked;
writes to the blockchain and returns the results to the administrator. This is a great innovation compared to traditional authentication centers. After the key of the logistics center is lost or leaked, the whole public key infrastructure system can still continue to work and continue to be credible in a key replacement mode. And because of the multi-signature mode, the decentralization of the contract is realized.
Preferably, the object of the logistics service is found, and the object meeting the service is found by the logistics centralized management platform according to the request description and the requirement of the logistics initiator;
selecting candidate nodes by adopting an improved hybrid consensus mechanism, and further comprising:
after the whole network node completes the resource credibility judgment, the calculation of the designated random number is carried out, and the calculated node releases the logistics content in the whole network, including the credibility judgment of the resource and the calculated random number meeting the requirements, and the method specifically comprises the following steps:
the method comprises the steps that all nodes are defaulted to stop random number calculation once receiving logistics contents sent by other nodes, and check calculation is carried out on the received logistics contents;
the checking content comprises the verification of the credible judgment of the newly added resource, the received data result is compared with the self test result for judgment, if the value is within the error constant A, the judgment result is determined to be correct, otherwise, the judgment result is determined to be wrong;
verifying the correctness of the random number, and judging whether the random number meets the system requirements or not, wherein the set random number meets the requirements;
once the check calculation finds that any part has errors, the received logistics content is judged to be illegal;
and all the nodes which are legal after the node verification are used as candidate nodes.
The candidate nodes are accounting nodes of the whole network and are responsible for verifying the supply chain and maintaining the consistency of the account book of the whole network; the candidate node is composed of two parts: all audit organization nodes + part supply chain nodes, and the number of candidate nodes is fixed; the candidate node is selected from the member nodes of the supply chain and used as a candidate domain of the candidate node; after the supply chain member is authenticated and accessed to the network, whether the supply chain member becomes a candidate node or not can be selected, if the supply chain member becomes the candidate node, the supply chain member means that the supply chain member intentionally participates in the whole network consensus process, and the supply chain member intentionally saves all data of the block chain main chain ledger; if not, maintaining the identity of the common node; and the candidate node and the common node are allowed to be changed in a later period.
Preferably, the credit evaluation of the logistics service supply chain, the evaluation of the quality of the subject and object, the quality of the container, the timeliness of the credit information feedback and the payment timeliness of the supply chain, further include:
inputting information in the loading and unloading information reports into a control system through an operation station, and automatically generating all work flows according to the sequence of superiority and inferiority according to the information such as stockpiling information of the goods in the yard and the integrity of logistics conveyor equipment, so that an operator can select an evaluation flow according to production experience;
when no evaluation plan exists, an operator can select an evaluation flow by adopting a flow number mode or a main large-scale computer selection mode;
after the operator selects the process, the programmable controller of the central control system sends the relevant information of the container, the container stacking position, the production process, the ship information, the relevant equipment number and other signals to the large-scale equipment and displays the signals on the production display screens of all the large-scale cab;
starting and stopping the process, namely starting a conveyor belt system in the process after the process setting is finished and the preparation of each large machine and the positions of an apron board, a baffle plate and a rainwater drainage device of the logistics conveyor are confirmed to be correct, and starting a high-power audible and visual alarm along the front conveyor belt to give out an audible and visual alarm for 30 seconds;
the starting sequence of the logistics conveyor is that the lowest layer of large machine equipment is started first, and then the equipment on the upper layer is started in sequence;
when the operation is normally stopped, the process is to stop the equipment at the uppermost layer and then stop the equipment at the lower layer in sequence;
when the equipment in the evaluation process has faults, the equipment and the equipment on the upper layer stop running immediately, and the equipment on the lower layer stops running sequentially or selectively after the containers are cleared;
and evaluating the quality of the subject and the object of the supply chain and the quality of the container based on the operation performance of the equipment.
Preferably, according to the selection principle of the candidate nodes, selecting the candidate nodes to verify the supply chain, and waiting for the consensus block; each supply chain generated needs to be digitally signed by two parties or even multiple participating nodes, and the supply chain is broadcasted to nearby candidate nodes to verify supply chain information; after the candidate node passes the verification, adding the supply chain into a local supply chain pool, forwarding the supply chain to other adjacent candidate nodes, and after the candidate node passes the verification, adding the supply chain into the supply chain pool for waiting for chain winding;
the logistics traders provide information in the information flow, which relates to the state information before container transportation (departure point, processing batch information, physical photos, packaging mode), storage information (warehousing time, quantity, warehouse temperature and humidity, leader number and ex-warehouse time), cold chain transportation (refrigerating time, temperature and humidity in a carriage and operator number), state information after container transportation arrival (destination, transportation batch, physical photos and loss), logistics transportation time and logistics unit information.
According to the model, a DPoS + BFT consensus mechanism is adopted, candidate nodes pack supply chain blocks from a local supply chain pool according to a block outlet sequence randomly generated in the current round, and after the blocks are packed, the blocks are broadcasted to other candidate nodes for verification and waiting for other nodes to reply; each node generates a block and links the chain with a certain time limit, if the time limit reaches the time limit that other nodes do not reply, the node calculates the abandon right and deducts corresponding integral; if all the returned candidate nodes have more than 2/3 people to recognize the block, the block is linked, and the next candidate node is packaged into the block and broadcasted, and the steps are repeated; if the node less than 2/3 is approved, then it is considered as invalid, deduct the block candidate node integral, and pack the block by the next candidate node; after the last candidate node is blocked, the block output is finished, the candidate nodes are reselected according to the integral, a round of consensus is finished through the steps, and a main chain is generated;
in consideration of resource waste caused by repeated occupation of storage space, generating a summary chain by the candidate nodes on the basis of the main chain; the period of the block generated by the abstract chain is consistent with the main chain, the main chain generates a plurality of blocks according to the number of the candidate nodes after a round of consensus, and the abstract chain generates one block;
the common nodes can optionally select and store the main chains or the abstract chains, and if the common nodes are required to become candidate nodes, all main chain and abstract chain data need to be stored; if the candidate node application is changed into the common node, discarding the locally stored main chain data, and storing the abstract chain, namely storing and releasing;
if one wants to verify a supply chain: and finding the nearest candidate node, verifying whether the information of the candidate node is complete and has not been tampered according to the summary block, and finding the original supply chain data according to the merkle tree.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (1)

1. A block chain-based wharf logistics supply chain data protection method is characterized by comprising the following steps:
the method comprises the following steps that a wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self business and sold containers, identifies and determines logistics service supply chain data, identifies each node resource through logistics, and processes data in a centralized mode;
the auditing mechanism serves as a candidate node to establish a contract block chain, and the self-constructed logistics network is utilized to transfer the quick response capability of the logistics node;
splicing basic information and commodity information of the container at the wharf into data in a json format, and then sending the json format data to a specified port of a specified IP (Internet protocol) to realize data uploading;
the block chain is deployed on an enterprise server, so that the server becomes a node of a tracing block chain network, and the storage work of the data information of the container of the wharf is finished;
members in each link of the supply chain access to the network for authorization, and a decision analysis result is provided for a manager by using a data analysis algorithm;
finding a logistics service object, and finding an object meeting the service by a logistics centralized management platform according to the request description and the requirement of a logistics initiator;
selecting candidate nodes by adopting an improved mixed consensus mechanism;
credit evaluation of a logistics service supply chain, namely evaluating the quality of a subject and an object of the supply chain, the quality of a container, the timeliness of credit information feedback and the payment timeliness;
the logistics service supply chain payment service transfers money to both supply chain parties by applying a third party payment tool or a bank approved by both parties;
the wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self business and sold containers, identifies and determines logistics service supply chain data, identifies each node resource through logistics, and processes data in a centralized manner, and specifically comprises the following steps: the method comprises the steps that a wharf container supply chain enterprise establishes a wharf container basic information table in a database according to self service and sold containers, wherein the wharf container basic information table comprises the types and names of wharf containers and is bound with enterprise information, and an App is obtained by scanning two-dimensional codes attached to the wharf containers;
when data information of each link of wharf logistics is written into a block chain database, a data uploading interface is called to upload the data information, a data transcoding interface is called to convert the data information into a character string required for storage, and then a data analysis interface and a database writing interface are called to write data and block chain hash codes into an RFID data table and a sensor data table of the wharf database;
the data in the RFID data table comprises RFID numbers, longitudes, latitudes and timestamps;
the data in the sensing data table comprises a sensor number, humidity, temperature and a timestamp;
the auditing mechanism serves as a candidate node to establish a contract block chain, utilizes a self-constructed logistics network to transfer the quick response capability of the logistics node, and specifically comprises the following steps:
after an auditing mechanism with a supply chain auditing responsibility completes identity authentication, a point-to-point contract block chain network model is established; all auditing agencies directly become candidate nodes in the model, and the model generates a private key and a public key;
the logistics center administrator generates or appoints a logistics center key in advance, wherein the center key is a first key of the logistics center and is written into the block chain together with the replacement condition;
the auditing agencies respectively generate keys and send the keys to a logistics center administrator, and a key generation algorithm is specified by the logistics center administrator;
splicing the basic information and commodity information of the wharf container into data in a json format, and then sending the json format data to a specified port of a specified IP (Internet protocol), so as to realize data uploading, specifically comprising:
fusing the source information of each container batch with satellite positioning data and standard time data, calculating a first hash value of the fused source information, generating a blockchain batch code of each batch of containers based on the first hash value, and storing the fused source information and the blockchain batch code in a blockchain in an associated manner, wherein the blockchain batch code is used for identifying each container batch;
and splicing the basic information of the container of the wharf and time information, longitude and latitude information, a unique two-dimensional code number and the like which can be acquired by a mobile phone into json format data, and then sending the json format data to a specified port of a specified IP (Internet protocol) by using a HTTP (hyper text transport protocol)/IP (Internet protocol) based http request to realize data uploading.
The block chain is deployed on an enterprise server, so that the server becomes a node of a tracing block chain network and is mainly used for storing data information of containers in a wharf;
the Oracle database is used as a storage database for providing source and enterprise information for the wharf container basic information;
the uploaded data can be mapped and stored in the database, and the inspection of whether the wharf container information is stored repeatedly can be carried out by setting the element for storing the two-dimensional code number of the wharf container as a unique attribute;
acquiring json data uploaded by a sensor or a data uploading APP (application) in a mode of monitoring a designated port, then disassembling the acquired json data, selecting a storage function of a corresponding intelligent contract as an input parameter of the function according to a source of the json data, calling the storage function by a node.js interface, issuing the data on a block chain in a supply chain form through the intelligent contract, realizing the entering of the information data of the wharf container, and simultaneously enabling a node.js interface program to also serve as a task of receiving a query request of a WeChat tracing applet and returning tracing information;
the member access authorization of each link of the supply chain provides decision analysis results for managers by using a data analysis algorithm, and the method further comprises the following steps:
before each member of each link of the supply chain accesses the network, a digital certificate is acquired through CA authentication of an auditing mechanism, and the member enters a block chain network with a trusted identity; all supply chain members become common nodes after being networked, and the nodes in the whole network distribute keys, wherein the keys comprise private keys and public keys;
the key data and the supply chain identifier are associated through identifier configuration, and all the key data adopt the same key identifier; reading the key identifier from the identifier library according to the supply chain identifier sid configured by the identifier, and constructing a corresponding identifier cache;
taking the identifier sid of the supply chain as a key index, and taking an identifier cache SymbolCache as a key value to transmit the key value into an identifier cache list; thus, the coordinate position of the key data is obtained by circularly traversing the key data;
an authorization matrix is constructed according to parameters such as coordinate positions and the like, and corresponding identifier caches are obtained from the identifier cache list;
coordinate transformation of identifier cache data is realized through matrix multiplication, vertex data of the identifier cache is transformed to the coordinate position of corresponding key data, networking of the key data can be realized by submitting networking data and an authorization command to a GPU, all loaded data are processed, and authorization is finished;
the logistics centralized management platform finds the object meeting the service according to the request description and the requirement of the logistics initiator;
selecting candidate nodes by adopting an improved hybrid consensus mechanism, and further comprising:
after the whole network node completes the resource credibility judgment, the calculation of the designated random number is carried out, and the calculated node releases the logistics content in the whole network, including the credibility judgment of the resource and the calculated random number meeting the requirements, and the method specifically comprises the following steps:
the method comprises the steps that all nodes are defaulted to stop random number calculation once receiving logistics contents sent by other nodes, and check calculation is carried out on the received logistics contents;
the checking content comprises the verification of the credible judgment of the newly added resource, the received data result is compared with the self test result for judgment, if the value is within the error constant A, the judgment result is determined to be correct, otherwise, the judgment result is determined to be wrong;
verifying the correctness of the random number, and judging whether the random number meets the system requirements or not, wherein the set random number meets the requirements;
once the check calculation finds that any part has errors, the received logistics content is judged to be illegal;
all the legal nodes after the node verification are used as candidate nodes;
a DPoS + BFT consensus mechanism is adopted, and according to a randomly generated block output sequence, candidate nodes pack supply chain blocks from a local supply chain pool, and after the blocks are packed, the blocks are broadcasted to other candidate nodes for verification, and other nodes are waited to reply; each node generates a block and links the chain with a certain time limit, if the time limit reaches the time limit that other nodes do not reply, the node calculates the abandon right and deducts corresponding integral;
if all the returned candidate nodes have more than 2/3 people to recognize the block, the block is linked, and the next candidate node is packaged into the block and broadcasted, and the steps are repeated; if the node less than 2/3 is approved, then it is considered as invalid, deduct the block candidate node integral, and pack the block by the next candidate node; and after the last candidate node is blocked, finishing the block output in the current round, reselecting the candidate node according to the integral, finishing a round of consensus through the steps, and generating the main chain.
CN202011603230.9A 2020-12-29 2020-12-29 Block chain-based wharf logistics supply chain data protection method Active CN112732830B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011603230.9A CN112732830B (en) 2020-12-29 2020-12-29 Block chain-based wharf logistics supply chain data protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011603230.9A CN112732830B (en) 2020-12-29 2020-12-29 Block chain-based wharf logistics supply chain data protection method

Publications (2)

Publication Number Publication Date
CN112732830A CN112732830A (en) 2021-04-30
CN112732830B true CN112732830B (en) 2022-03-01

Family

ID=75610566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011603230.9A Active CN112732830B (en) 2020-12-29 2020-12-29 Block chain-based wharf logistics supply chain data protection method

Country Status (1)

Country Link
CN (1) CN112732830B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115460222A (en) * 2022-09-05 2022-12-09 蚂蚁区块链科技(上海)有限公司 Block chain data flow calculating device
CN116128390B (en) * 2023-04-17 2023-06-30 长沙智医云科技有限公司 Medical consumable cold chain transportation monitoring method based on Internet of things
CN117195298B (en) * 2023-09-18 2024-05-17 淮阴工学院 Cold chain product tracing method and device based on block chain mixed consensus

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110675099A (en) * 2019-08-05 2020-01-10 南京中诚区块链研究院有限公司 Port logistics traceability system and method based on block chain technology

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11556521B2 (en) * 2017-09-29 2023-01-17 Oracle International Corporation System and method for providing an interface for a blockchain cloud service
CN107679809A (en) * 2017-10-18 2018-02-09 上海唯链信息科技有限公司 A kind of material flow tracking method based on block chain
CN109949142A (en) * 2019-02-01 2019-06-28 深圳尚融供应链科技有限公司 A kind of dominant supply chain finance implementation method, system and terminal device
US20200364817A1 (en) * 2019-05-17 2020-11-19 UCOT Holdings Pty Ltd Machine type communication system or device for recording supply chain information on a distributed ledger in a peer to peer network
CN110706006B (en) * 2019-10-09 2020-06-23 北京物资学院 Supply chain logistics traceability system with block chain multi-chain cooperation

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110675099A (en) * 2019-08-05 2020-01-10 南京中诚区块链研究院有限公司 Port logistics traceability system and method based on block chain technology

Also Published As

Publication number Publication date
CN112732830A (en) 2021-04-30

Similar Documents

Publication Publication Date Title
CN112732830B (en) Block chain-based wharf logistics supply chain data protection method
CN109829824B (en) Commodity transaction information sharing method based on block chain technology
US11734756B1 (en) Blockchain based loan securitization
AU2017222708A1 (en) Electronic document platform
CN110073353A (en) Operating system and method based on container
CN111177275A (en) Block chain-based management method, terminal, device and storage medium
CN105868369B (en) A kind of data model verifying System and method for based on Merkle tree construction
EP3262785A1 (en) Tracking unitization occurring in a supply chain
Wang et al. Auditable protocols for fair payment and physical asset delivery based on smart contracts
Koirala et al. Supply chain using smart contract: A blockchain enabled model with traceability and ownership management
CN112001663B (en) Material donation data processing method based on block chain and related equipment
CN113469716A (en) Product tracing method and system based on block chain and identification analysis
CN111385751B (en) Information sending method, device, terminal and readable storage medium
Wei Blockchain-based data traceability platform architecture for supply chain management
Hofman et al. The applicability of blockchain technology in the mobility and logistics domain
CN112700251A (en) Identity confirmation method, device and system in financial scene
CN116258309A (en) Business object life cycle management and tracing method and device based on block chain
CN113793158A (en) Textile inspection detection information query method and system
CN112308484A (en) Whole-course logistics information sharing method and system, equipment and medium
CN113269565A (en) Anti-counterfeiting identification method and device for anti-reuse identification code and electronic equipment
CN116777340A (en) Method and system for storing right of goods
CN109242254A (en) A kind of enterprise's account approaches to IM and device, readable storage medium storing program for executing
CN114445218A (en) Logistics financing method, device, equipment and medium based on block chain
CN112700327A (en) User confirmation method, device and system in financial scene
CN112541194A (en) Actual measurement data chaining method for engineering construction and engineering detection management method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant