CN113055450A - Intelligent transportation and data sharing storage method based on block chain - Google Patents
Intelligent transportation and data sharing storage method based on block chain Download PDFInfo
- Publication number
- CN113055450A CN113055450A CN202110229376.XA CN202110229376A CN113055450A CN 113055450 A CN113055450 A CN 113055450A CN 202110229376 A CN202110229376 A CN 202110229376A CN 113055450 A CN113055450 A CN 113055450A
- Authority
- CN
- China
- Prior art keywords
- data
- node
- block chain
- shared
- layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 71
- 230000008569 process Effects 0.000 claims abstract description 47
- 230000032258 transport Effects 0.000 claims description 87
- 238000013500 data storage Methods 0.000 claims description 33
- 238000007726 management method Methods 0.000 claims description 25
- 238000011160 research Methods 0.000 claims description 23
- 238000004891 communication Methods 0.000 claims description 19
- 238000012795 verification Methods 0.000 claims description 17
- DMBHHRLKUKUOEG-UHFFFAOYSA-N diphenylamine Chemical compound C=1C=CC=CC=1NC1=CC=CC=C1 DMBHHRLKUKUOEG-UHFFFAOYSA-N 0.000 claims description 5
- 230000008447 perception Effects 0.000 claims description 5
- 238000004458 analytical method Methods 0.000 claims description 4
- 238000007405 data analysis Methods 0.000 claims description 4
- 230000008034 disappearance Effects 0.000 claims description 4
- 239000013307 optical fiber Substances 0.000 claims description 3
- 238000012827 research and development Methods 0.000 claims description 3
- 238000005065 mining Methods 0.000 description 35
- 230000007246 mechanism Effects 0.000 description 16
- 238000004519 manufacturing process Methods 0.000 description 15
- 230000008901 benefit Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 239000000853 adhesive Substances 0.000 description 9
- 238000004364 calculation method Methods 0.000 description 9
- 230000001070 adhesive effect Effects 0.000 description 8
- 230000001965 increasing effect Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 8
- 238000013461 design Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 230000008859 change Effects 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 230000007547 defect Effects 0.000 description 4
- 238000012423 maintenance Methods 0.000 description 3
- 238000004321 preservation Methods 0.000 description 3
- 238000011084 recovery Methods 0.000 description 3
- 238000009412 basement excavation Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000002860 competitive effect Effects 0.000 description 2
- 239000006185 dispersion Substances 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 2
- 239000010931 gold Substances 0.000 description 2
- 229910052737 gold Inorganic materials 0.000 description 2
- 230000001939 inductive effect Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 238000012858 packaging process Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012797 qualification Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000009956 central mechanism Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000000428 dust Substances 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a block chain-based intelligent transportation and data sharing storage method.A background system loads sharing block chain nodes, remotely interacts with intelligent transportation acquisition equipment for a missing list, and the current position and time information of a transport vehicle, and stores the missing list, the current position and the time information into the sharing block chain nodes for sharing; the RF tags are installed on the articles, and the chip ID numbers of the RF tags are different; the intelligent transportation acquisition equipment scans and identifies the RF tag, confirms whether the ID number of the chip loaded in the transportation vehicle is the same as a preset article list or not, and uploads a missing list, the current position of the transportation vehicle and time information to the shared block chain node. The data generated in the transportation process is encrypted by a public key and then is broadcasted to the network, and a new block is generated together with other shared block chain link points; all blocks are sequentially connected according to the generation time to form a block chain; when the user local data is lost, the data can be obtained from the adjacent node and decrypted by the private key.
Description
Technical Field
The invention relates to an intelligent transportation and data sharing and storing method based on a block chain, and belongs to the technical field of block chain application.
Background
The existing transportation data in the market at present are all process data from a point A to a point B, and the tracking and tracing of other data records in the transportation process and historical data of specific objects in the transportation process are not very important, and the data records comprise: location, time, and in-vehicle environment, etc. And ownership protection of applications and related information of the distributed data store during subsequent data stores is not a great concern.
The prior art has the following disadvantages:
1. the existing transportation monitoring mode mostly adopts an active chip or an active sensor, needs a peripheral circuit and power supply, and meanwhile, equipment needs to be maintained regularly.
2. The whole-course tracking of the transported articles and the one-to-one correspondence of the data records of the articles cannot be realized. Data interruption can occur after a transfer or a vehicle change.
3. Although some platforms can splice transportation data in different time periods, multi-stage data expansion of transported articles cannot be really realized, such as from a production source to processing and then to consumers.
4. All information storage data of the device can not be traced and cannot be tampered. The tracing of ownership or first-release copyright of own data is also poor.
5. If the data is stored in a multi-backup manner to perform data backup so as to ensure the reliability of the data, the data storage cost is high.
6. Ordinary users or small enterprises such as data storage are on commercial cloud, although the risk of data loss can be reduced, data security cannot be guaranteed completely.
7. The cloud is used for storing data, so that the congestion of a core part of a network is easily caused when a large number of users use the data in a centralized manner, and the congestion is hardly controllable. Meanwhile, if the distance between the terminal device and the cloud network is long, the data are continuously rolled in the transmission process, so that large delay and even packet loss are caused, and the application with high real-time requirement is not facilitated.
8. The data can not be shared with other data in different industries, and even if the data can be shared with each other, the compatibility is poor.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides an intelligent transportation and data sharing and storage method based on a block chain, which is characterized in that scanning is carried out based on an RF label, the position and the current time of a transportation vehicle, the current time corresponding to the position of the transportation vehicle, the temperature in the transportation vehicle and the humidity in the transportation vehicle are uploaded to a sharing block chain node for sharing, the local data storage of each company or enterprise and a P2P node in a sharing block chain network ensure that data written into the sharing block chain node can be traced and cannot be falsified by adopting a distributed data storage mode, and the safety is ensured by adopting a public key encryption and private key decryption mode when the uploaded data in the transportation process is uploaded.
In order to achieve the above object, the present invention provides a method for intelligent transportation and data sharing storage based on a blockchain, comprising:
the background system is used for loading the sharing block chain nodes, remotely interacting the missing list, the positions of the transport vehicles and the current time with the intelligent transport acquisition equipment, storing the missing list, the positions of the transport vehicles and the current time into the sharing block chain nodes and sharing;
a transport vehicle that loads and transports the article;
RF tags mounted on the article, each of the RF tags having a different chip ID number;
the intelligent transportation acquisition equipment is installed on the transportation vehicle, scans and identifies the RF tag, confirms whether the ID number of the chip loaded in the transportation vehicle is the same as a preset article list or not, and uploads a missing list, the position of the transportation vehicle and the current time to the shared block chain node.
Preferably, the wisdom transportation collection equipment includes:
the RF module is used for collecting the chip ID number of the RF tag;
the controller is used for correspondingly storing the chip ID number of the RF label corresponding to the article, the two-dimensional code on the RF label and the bar code on the RF label into an article list one by one;
storing chip ID numbers of the RF tags collected by the RF module as a list to be matched when the transport vehicle loads articles or when the transport vehicle finishes loading the articles, and comparing the list to be matched with a preset article list by the controller;
in the transportation process of a transport vehicle, the controller compares the chip ID numbers corresponding to the articles with the article list, the controller confirms whether all the chip ID numbers in the article list are compared, and if the articles are incomplete, the chip ID numbers corresponding to the articles are listed in a missing list;
the communication module is used for transmitting the missing list, the position of the transport vehicle and the current time to the background system;
the Beidou module is used for acquiring the position of the transport vehicle and the current time in real time in the transport process of the transport vehicle;
the temperature sensor is used for acquiring the temperature in the transport vehicle in the transport process of the transport vehicle and feeding the temperature back to the controller;
the humidity sensor is used for acquiring the humidity in the transport vehicle in the transport process of the transport vehicle and feeding the humidity back to the controller;
and the power supply battery supplies power to the RF module, the controller, the communication module, the Beidou module, the temperature sensor and the humidity sensor.
Preferentially, confirming the articles to be loaded on each transport vehicle, listing an article list, fixing an RF (radio frequency) tag on each article, acquiring a chip ID (identity) number of the RF tag by an RF (radio frequency) module when the transport vehicle loads the articles or when the transport vehicle finishes loading the articles, storing the chip ID number as a list to be matched by a controller, comparing the list to be matched with the article list by the controller, if the chip ID number in the list to be matched is not in the article list, indicating that the article is added by mistake, and taking the article corresponding to the chip ID number out of the transport vehicle; if the chip ID number in the article list is not in the list to be matched, verifying whether the article corresponding to the chip ID number is on other transport vehicles or whether the article corresponding to the chip ID number is not loaded;
in the transport vehicle transportation, the big dipper module acquires transport vehicle position and current time in real time, RF radio frequency module gathers the chip ID number of RF chip in real time, the article list is compared with this chip ID number to the controller, whether all chip ID numbers in the article list are compared to the controller, thereby confirm whether complete of article in the transport vehicle, if article are not complete, the chip ID number that corresponds with this article is listed into the disappearance list, the controller reports to the police for backstage system through communication module, and with the disappearance list, transport vehicle position and current time upload for sharing block chain node.
Preferentially, the background system finds out the pseudorandom password corresponding to the RF tag according to the chip ID number and sends the pseudorandom password to the intelligent transportation acquisition equipment; the intelligent transportation acquisition equipment broadcasts a pseudo-random password corresponding to the RF tag, if the pseudo-random password is wrong, the RF tag refuses to write in the position of the transportation vehicle and the current time, and if the pseudo-random password is correct, the position of the transportation vehicle and the current time are written in the RF tag corresponding to the pseudo-random password;
after being encrypted by a public key, the shared block chain node broadcasts to the whole shared block chain network, and generates a new block together with other shared block chain link nodes; all blocks are sequentially connected according to the generation time to form a block chain, and a public account book on the shared block chain network is formed; all data written into the shared blockchain node can be traced and cannot be tampered;
uploading data in the transportation process is stored as local data by a user, and when the local data is lost, the local data is downloaded from adjacent sharing block chain nodes through a private key and recovered to the local data;
the uploaded data in the transportation process comprises the chip ID number, the position of the transportation vehicle, the current time of the position of the transportation vehicle, the temperature inside the transportation vehicle and the humidity inside the transportation vehicle.
Preferentially, the shared block chain node comprises a first node, a shared storage node and an access node; only the difference of the operational capability exists between the shared storage node and the shared node, and the shared storage node and the shared node can be mutually and freely converted;
a first node: a first established node in each shared blockchain network; the first node uploads the data written into the shared block chain node to a shared block chain network, and the first node is responsible for generation of a new block, distributed data storage and daily management;
sharing the nodes: uploading data written into the shared block chain nodes by nodes with certain computing capacity in the shared block chain network to generate new blocks and distributed storage data;
sharing the storage node: the data storage nodes in the shared block chain network are responsible for data uploading and distributed data storage and do not participate in the generation of new blocks; the shared storage node and the shared node only have the difference of operational capability, and the two nodes can be freely converted with each other;
the access node: the access node uploads the data written into the shared block chain node to the shared block chain node through public key encryption, when the data written into the shared block chain node needs to be read and accessed, the data written into the shared block chain node is downloaded from the adjacent shared block chain node or the first node, and then the data written into the shared block chain node is decrypted through the private key of the access node.
Preferentially, the system comprises a data perception layer, a network layer, a data layer, an analysis application layer and a user layer;
the data sensing layer collects uploaded data in the transportation process, the data sensing layer is used for timing and positioning and recording the current time and the position of the transportation vehicle based on the Beidou module, the data sensing layer is used for recording the temperature in the transportation vehicle and the humidity in the transportation vehicle in real time based on the temperature sensor and the humidity sensor,
network layer: the uploaded data in the transportation process is transmitted to a data layer through a 5G network, an optical fiber network or Wi-Fi;
the data layer is a P2P node in a local data storage and sharing block chain network of each company or enterprise, a distributed data storage mode is adopted to ensure that data written into the sharing block chain node can be traced and cannot be tampered, and the security is ensured by a public key encryption and private key decryption mode when uploading uploaded data in the transportation process;
analyzing an application layer: a new block is generated by using a Hash algorithm, a workload certification algorithm generates a shared currency, each node in a shared block chain node is encouraged to actively participate in the generation of the new block, a timestamp and unerupted transaction output further improve the time sequence and a public accounting book of data written into the shared block chain node, and intelligent contracts enhance and improve the reliability of electronic signature verification and data tracing;
and (3) a user layer: the user layer further deeply digs the data value written into the shared block chain node, and intuitively summarizes and presents the data statistics written into the shared block chain node to the user: the user checks own data on a PC terminal or mobile equipment, wherein the own data comprises user own data real-time tracking, user own data historical data source tracing, user own data analysis, copyright and original information verification and data protection;
the data written to the shared blockchain node includes:
1. the position and the current time of the transport vehicle, the current time corresponding to the position of the transport vehicle, the temperature in the transport vehicle and the humidity in the transport vehicle;
2. the location when the article is carried on the transport vehicle, the location when the article is transferred to another transport vehicle, the time when the article is transferred to another transport vehicle, and the origin of the article;
the local data of each company or enterprise comprises data written into the shared block chain node, research data or paper results in a scientific research institute or a college, daily work documents of the enterprise or enterprise, and research and development progress of the enterprise or enterprise;
the user's own data includes data written into the shared blockchain node and research data or paper results in a scientific research institute or a college.
The utility model provides a wisdom transportation collection equipment, wisdom transportation collection equipment includes the controller, RF radio frequency module, a communication module for data communication, be used for the big dipper module of location and satellite time service, a temperature sensor, humidity transducer and power supply battery, RF radio frequency module, a communication module, big dipper module, a temperature sensor and a humidity transducer are connected to the controller electricity, power supply battery electricity connection director, RF radio frequency module, a communication module, big dipper module, a temperature sensor and a humidity transducer.
Preferably, the RF tag includes a second layer of sticker including an RF chip and an antenna, the RF chip storing a unique chip ID number.
Preferentially, the RF label comprises a first layer of paster and a third layer of paster, the first layer of paster, the second layer of paster and the third layer of paster are sequentially stacked and pasted from top to bottom, a two-dimensional code and a bar code are arranged on the first layer of paster, a non-setting adhesive sticker is arranged on the lower surface of the second layer of paster and the lower surface of the third layer of paster, and a two-dimensional code identical with the first layer of paster and a bar code identical with the first layer of paster are arranged on the upper surface of the third layer of paster.
Preferentially, the first layer sticker is provided with left side fast tearing mouth and right side fast tearing mouth, can tear first layer sticker, second floor sticker and third layer sticker from right side fast tearing mouth and paste on article, can tear first layer sticker and second floor sticker from left side fast tearing mouth, stays article surface with the third layer sticker.
The invention achieves the following beneficial effects:
1. the label type RF chip adopts a three-layer design, the surface of a first layer of paster is provided with a two-dimensional code and a bar code, the middle second layer is provided with the RF chip and an antenna, the third layer and the second layer can be torn off, and the surface of the torn third layer is provided with the two-dimensional code and the bar code which are the same as the surface of the first layer. The adhesive sticker on the back of the label type RF chip is convenient to be attached to the surface of an object. Meanwhile, the recyclable design is adopted, and the recyclable material can be recycled after being recycled and unbound, so that the use cost is saved and the environment is protected.
2. The tag type RF chip adopts a passive chip design, does not need battery driving or peripheral circuits, and does not need maintenance.
3. The scanner of the RF module emits the radio wave energy of a specific frequency, all the articles with the RF chips in the signal coverage range are searched, and the articles in the transportation are in one-to-one correspondence. The operation of sweeping the sign indicating number and raise the efficiency from the manual work is removed, transports or the car change also can not cause the interrupt of data midway in the transportation.
4. The method has the advantages that each article with the tag type RF chip is accurately transported, multi-stage data expansion can be carried out on the transported goods, and the whole process from production to processing of the article and then to a consignee or a consumer is completely recorded.
5. And all data uploaded to the block chain are guaranteed to be not tampered. And all uploaded data can be traced, and even if the node for storing the data is cancelled, the data is uploaded on a network, namely a block chain.
6. By means of the P2P, the node can obtain data from the adjacent nodes, and network congestion caused by centralized use of a large number of users is not easy to cause. Meanwhile, data obtained from a closer node is more beneficial to application with higher real-time requirement.
7. And a distributed storage mode and a decentralized management mode are adopted, so that the free addition and management of the nodes are facilitated. Different nodes can be mutually used as shared storage points, and storage cost is saved. When local data is lost, data of adjacent nodes (the description: adjacent refers to the relationship formed between the final node and the selected nearby router for exchanging routing information, and the adjacent nodes are nodes of a shared transmission medium and have lower mutual data transmission cost.) can be downloaded to recover records, so that the method is more cost-saving compared with a multi-backup storage mode.
8. The data uploaded locally is encrypted by adopting a public key, and the data is decrypted by using a private key when the data is read (the public key and the private key have explanation in the related noun explanation 4), so that the data security is guaranteed, and other nodes cannot decrypt the local data even if the other nodes own the data but do not have the private key, so that the security of the uploaded data is guaranteed.
9. Because the information on the chain can not be changed and the block data is arranged in the sharing block chain according to the time sequence, when the attribution of a certain section of information or the copyright of a certain section of content in the sharing block chain needs to be verified, the node in the sharing block chain can provide the data or the information by the node, namely, the node can be verified by downloading the corresponding information and decrypting by using a private key to recover an initial text, or the node can be verified by performing electronic signature authentication by a third party in the sharing block chain to determine whether the decrypted text verification information is valid, so that the attribution right is verified, and meanwhile, the private key of the owner of the information can not be leaked.
10. The nodes in the shared block are divided into four types, namely a first node, a shared storage node and an access node. The division of labor and the function of each node are different, the calculation capability of different nodes can be fully exerted by mutual cooperation, and the charging and management modes of different nodes are different.
11. Such a competitive reward mechanism is used to encourage nodes to actively participate in the generation of blockchain data by mining to generate shared coins (each time a new block is generated, the node will obtain a shared coin as a reward) during the generation of a new block, and to compensate for performance (computing power) differences between different machines.
12. Different from platforms such as bitcoin and the like, the shared coin generated by digging the mine does not have the attribute of common electronic money (only used for internal fee deduction), and can be only recycled through an operation or management platform or traded through a third-party platform, so that the trading loopholes can be blocked, and the risk of a shared block chain is greatly reduced.
13. Different from the defects of poor expansibility, poor manageability, concentrated internal calculation and the like of some alliance chains or private chains, the shared block chain has the advantages of decentralization, less calculation dispersion, less artificial intervention and the like, and also has a certain mining mechanism for encouraging each node in the shared block chain to compete for the calculation of a new block.
Drawings
FIG. 1 is an exploded view of an RF tag according to the present invention;
FIG. 2 is an exploded view of the RF tag of the present invention;
FIG. 3 is a functional block diagram of the present invention;
FIG. 4 is a flow chart in the present invention;
fig. 5 is a structural view of the present invention.
The reference in the figures, 1-bar code; 2-two-dimensional code; 3-first layer of paster; 4-second layer of paster; 5-third layer of paster; 6-left quick tearing opening; 7-right quick tearing opening; 8-RF chip; 9-adhesive sticker; 10-sequence number.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
The intelligent transportation and data sharing storage system based on the block chain uses the block chain technology, the RF chip, the communication module, the encryption data storage, the distributed data storage, the data tracking and other technologies, and is a set of comprehensive application system comprising hardware, software, background control and cloud data storage. The method can be widely applied to intelligent transportation or other applications or projects with storage and tracing requirements on data. For example, a unique tag is attached to food when the food leaves a factory, and the buyer and the seller can know the position, freshness and other conditions of the food at any time through data uploaded constantly during transportation, so that subsequent consumers can trace transportation data information in a shared block chain, even the production and processing processes of the food, and the communication module is a 5G module.
In conventional transportation applications, transportation vehicles are regarded as a moving point as a tracking target, and data is often recorded from a point a to a point B by the vehicles, so that the continuity and traceability are poor. Unlike previous shipping applications, the present invention has an RF tag attached to each shipping object. The transport is accurate to every RF tagged item, and records all the processes from the starting point to the end point, and the tracking can be continued even if the article is transferred or changed.
In the invention, the RF tag is used, the chip adopts a three-layer adhesive design, as shown in figure 1, a two-dimensional code and a bar code are arranged on the surface of the first layer, so that the serial number of the chip can be conveniently obtained; the second layer is that each RF tag [1] and each antenna has a corresponding and unique chip ID number; the back of the third layer has the non-setting adhesive and can paste on transporting the object, also has the non-setting adhesive to paste between third layer and the second floor, conveniently tears the back and retrieves the RF label, and the rear surface is the same two-dimensional code and the bar code with the first layer simultaneously under tearing to the third layer is in order to still usable two-dimensional code and the bar code is traced to the source after retrieving the RF label. The first layer surface is provided with two quick tearing openings, so that the article can be conveniently and quickly torn down and attached to the surface of the article. The design is different in that 1-3 layers of the tagged RF tag can be obtained from the top right corner of the quick-tear opening and attached to the surface of the article. And the corresponding 1-2 layers can be taken down by tearing from the quick tearing opening at the lower left corner, and the information at the bottommost layer is left. When the RF tag only has the lowest third layer (such as delivered to a consumer), the information of the whole process of the article from production to processing and then to transportation can still be known through the platform by scanning the two-dimensional code or bar code on the surface of the third layer. The two-dimensional code and the bar code on the label point to the same information, so that the label can be conveniently read by different equipment. Although the chip ID is different from the two-dimensional code and the bar code on the RF label, the chip ID can be in one-to-one correspondence with the two-dimensional code and the bar code on the RF label through binding of a background system. This has the advantage of allowing the RF tag to be reused after the background system is unbound.
Meanwhile, the RF tags correspond to the articles one to one, so that the articles can be tracked and traced, and the information such as the production base position of the articles, the whole production and packaging process and the like is bound with the RF tags on the platform before transportation through the expansion function of the corresponding service platform, so that the source of the articles, food inspection reports, the qualification of manufacturers, the safe production of crops and the like can be conveniently and further searched. The entire process can be viewed as a complete flow of the item from the place of origin to the consignee or consumer.
The humidity sensor collects humidity in the transport vehicle, the temperature sensor collects temperature in the transport vehicle, and the whole network refers to a network formed by the shared block chains.
The system of the invention is combined with the block chain, thereby further improving the practicability and the technological content. The block chain adopted by the system is a shared block chain, and the data of all uploading platforms (such as the uploading data of the transport vehicles) are finally stored in the shared block chain nodes which adopt a distributed design. Data among different nodes are mutually shared in a point-to-point mode, and shared nodes can be established in different transportation records, other information in a platform and even other industries. The local data is encrypted by the public key and then broadcasted to the whole network (the network formed by the shared block chain), and the local data and other nodes are jointly mined to generate a new block. All blocks are connected in sequence according to the generation time to form a block chain and form a public account book on the network. All written data can be traced and cannot be tampered, and the data recovery records of the adjacent nodes are conveniently downloaded when local data is lost. Other nodes have local node data, but the data cannot be decrypted because of no private key, and the actual content of the data information cannot be known.
The node in all networks is different from a private chain which is held in one hand and a alliance chain which only authorizes the node in the same industry to join and view different information according to different rights. The shared block chain has the advantages of decentralized node and node calculation, sharing distributed storage by different industries and applications, and the like.
In order to enable devices with different performances to better perform distributed data storage and maximally explore the computing power and storage potential of each node. The node types in the invention are divided into 4 types, which are respectively as follows: a first node, a shared storage node, and an access node. The user can flexibly configure and select the node type suitable for the user according to different requirements and hardware of the user, and the computing power and the storage space of the idle hardware equipment are fully exerted. The specific introduction is as follows (table 1):
a first node: the first established node in each shared blockchain network. The nodes controlled by the operator and the manager have functions of all nodes, including self data uploading, generation of new blocks (mining), distributed data storage, a small amount of daily management and the like.
Sharing the nodes: a node in the network that is large and has a certain amount of computing power. Including data upload, creation of new blocks (mining), distributed data storage, etc.
Sharing the storage node: the data storage nodes in the network have weak computing capability, only have functions of data uploading, distributed data storage and the like, and do not participate in generation (mining) of new blocks. The shared storage node and the shared node only have difference of operational capability, and the two nodes can be freely converted with each other.
The access node: no chunk data is stored locally and no participation in the generation (mining) of new chunks on the blockchain is involved. The self operation data is encrypted and uploaded on the block chain through a public key, and when the self data needs to be read, the data (required data segment) of the adjacent node or the first node is downloaded, and then the data is decrypted through the self private key. The investment cost of the access node is the lowest, but the corresponding ordinary operation and maintenance cost is the highest.
All user nodes in the shared block chain are formed in an ad hoc mode through setting rules, and the establishment of the rules and some daily management are mainly completed by operators and management parties. The operators and managers do not intervene too much in the management of the shared blockchain, but a small annual fee is incurred each year. While such a model may incur some overhead and operational costs, it may be more cost effective than using other backup or distributed storage. Meanwhile, compared with the renting business cloud storage, the data is not easy to acquire by a third party.
The intelligent transportation and data sharing storage system based on the blockchain can be roughly divided into 5 layers (fig. 5) according to different functions and specific applications, specifically, a data perception layer, a network layer, a data layer, an analysis application layer and a user layer.
A data perception layer: the data sensing layer senses real-time data by various sensors. The Beidou module is used for carrying out time service and positioning in the intelligent transportation business, and the temperature and humidity sensor is used for recording information in the vehicle in real time and recording the information in the tag type RF chip. And other applications such as intellectual property can guarantee own rights and interests by uploading texts with digital signatures.
Network layer: and then the data is transmitted to the next data layer by the network layer through a 5G network, a fiber network, Wi-Fi or other networks.
And (3) a data layer: mainly the P2P node in the local data storage and shared block chain network of each platform. And a distributed data storage mode is adopted to ensure that data in the block chain cannot be tampered, traced and the like. The uploaded data is encrypted by a public key and decrypted by a private key to ensure the safety of the data.
Analyzing an application layer: the normal operation and function of the whole system are ensured through various technologies. If a hash algorithm is used for generating a new block, a POW algorithm (workload proof) is used for generating a shared currency to encourage each node to actively generate the new block, the timestamp and unexposed transaction output (UXTO) further improve the time sequence and public accounting of data, and the intelligent contract can enhance and improve the reliability of electronic signature verification and data tracing.
And (3) a user layer: and finally, a user layer is used, data can be collected and analyzed and processed according to previous layers, data value is further dug deeply, and most visual data application and results are presented to the user. The user can check own data and application on the PC terminal or the mobile phone, such as real-time data tracking, historical data tracing, data analysis, copyright and original information verification and protection.
The characteristics of each node are shown in the table:
the following are some explanations of the shared blockchain technical details and specific operations:
data tracing and tracing
Data uploading in the shared block chain is encrypted by using a public key, but data reading needs to be decrypted by using a private key, so that the safety of the data is guaranteed. Meanwhile, the shared block chain has the advantages of data non-tampering, traceability and the like. For example, a unique tag is attached to food at the time of shipment, and the buyer and seller can know the location of shipment and the freshness of the product at any time by data uploaded continuously during shipment. When the food quality problem occurs, the method is convenient for tracking and investigating whether the food is a problem of origin, a problem in the middle of transportation or a problem of warehouse preservation. Meanwhile, as the label type RF chips and the articles are in one-to-one correspondence, information such as the position of a production base, the whole production and packaging process, the qualification of a manufacturer, a food inspection report and the like can be further searched through the corresponding service platform.
Copyright and originality information verification
And because the time of each node is uniformly corrected by Universal Time Coordinated (UTC) (based on international atomic time), the information on the chain cannot be changed, the block data is arranged in the shared block chain according to the sequence of the timestamp [7], and the like. The shared block chain can be used in other industries besides data tracing and tracing in the transportation industry. For example when it is necessary to verify that a certain piece of information in the shared blockchain is attributed, or that a certain piece of content is first copyrighted. The nodes in the shared blockchain can be certified by providing data or information by themselves, i.e. by downloading the corresponding information and recovering the original text by decryption using the private key. In addition to this, it is also proven by a third party in the shared blockchain. And the information or work submitting party uploads the original information with the timestamp [7] after electronic signature [8] is carried out by adopting a private key. When infringement needs to be cut, verifying that a participant uses the shared block chain query information or digital work information (identification thereof) submitted by a work submitting party to query works through UXTO [9] and intelligent contracts [10] in the shared block chain, and using a public key provided by the information or work submitting party to carry out electronic signature authentication to decrypt whether text verification information is valid. Therefore, the arbitration is realized, and the rights and interests of the originators are protected. This way, it is possible to prove the issue of ownership without revealing the owner's private key.
Block generation
After each time a node in the PBCH uploads data, the data is broadcast over the PBCH network by P2P transport [11 ]. The nodes with the shorter distance receive the information first. The nodes participating in mining are monitoring the uploaded data in the network at any time. Because the nodes in the network can independently check the validity of the data, if the data and the uploading process are legal, the nodes can collect the uploaded data into the memory of the nodes for temporary storage, and then the nodes can continuously spread the information to other nodes. According to a general common protocol, the size of a block is 1MB at most, and a group of uploaded data is about 500 bytes, so that a block can contain uploaded information of 2000 different nodes at most. Each node uploads information approximately one hour apart. The generation of new blocks is almost an hour apart. For a node, if the data uploaded by the node cannot be written with 500 bytes at a time, null bytes can be added to be fully completed, or the node can be uploaded after waiting for full information next time. If the written information exceeds 500 bytes, the uploaded information can be packaged for multiple times. For the nodes uploading data, all the information which is uploaded but not confirmed to be written into the block chain is written into the memory of the nodes for temporary storage until the information is confirmed to be recorded by the block chain, and the data is deleted to release the cache.
The nodes involved in mining [5] are responsible for packing the 2000 transactions together into a block, and then computing the Hash value (Hash) for this block [12 ]. The term "hash" means that a computer can calculate a feature value with the same length for any content. Each tile contains two parts, a header (Head) and a Body (Body). Wherein, the block header (Head) records the characteristic value of the current block, including the generation time, the hash of the actual data (i.e. block), the hash of the last block, etc. The block Body (Body) is then the actual data. The chunks are in a one-to-one correspondence with the hashes, and the hash of each chunk is calculated for the header (Head). The hash algorithm typically used for blockchains is SHA 256. The characteristic values of the block head are connected together in sequence to form a long character string, and then the hash is calculated for the character string. The generated new block is covered with a time stamp [7] and then broadcast and sent to all nodes of the whole network.
The hash length of the blockchain is 256 bits, and a 256-bit binary number is finally calculated regardless of the original content. Moreover, it can be ensured that corresponding hashes are necessarily different as long as the original content is different. Each chunk header (Head) contains much of the hash of the current chunk, as well as the hash of the previous chunk. This means that if the content of the current chunk becomes, or the hash of the last chunk becomes, the hash of the current chunk must be caused to change. This may ensure that if someone modifies a tile, the hash of the tile becomes changed. In order for the following block to be attached to it (since the next block contains the hash of the previous block), all following blocks must be modified in turn, otherwise the modified block is taken off the block chain. And changing all blocks in the block chain is not possible. It can be considered that the data cannot be tampered with once written.
Two conclusions can be drawn about the block: 1. the hash of each chunk is different and the chunks may be identified by the hash. 2. If the content of a block changes, its hash must change.
Algorithm control
The block competition algorithm adopted in the present invention is the POW algorithm (workload proof) [13 ]. The algorithm completes the established hash operation through the node consumption computing power, and finds out a reasonable random number. Thus, although the computing power of the nodes is consumed, each node in the shared block chain can be guaranteed to have the right of fairly participating in competition, and the computing of the new block is completed by the computing power of the device. When the random number calculated by a node participating in mining is smaller than the target value specified by the common block chain network, the node has the right to generate a new block, leaves a digital signature of the node on the new block, and broadcasts the new block to the whole network (in the common block chain). And after the other nodes receive the new block and pass the verification, abandoning the block which is being calculated, and adding the block into the own block chain.
The new block generation must ensure the synchronization between the nodes, and also consider certain economic benefits, so the adding speed of the new block cannot be too fast or too slow. The operator and the manager adjust the difficulty coefficient generated by the new block by sending information through the first node according to the conditions (including the number of nodes, the amount of uploaded data and other factors) in the actual network, wherein the difficulty coefficient is higher (the target value is smaller and smaller) and the ore excavation is more difficult, and the difficulty coefficient is easier otherwise. According to the general protocol, the size of a block is 1MB at most, and a group of data uploaded by one node is about 500 bytes, so that a block can contain 2000 uploaded messages of different nodes at most. The nodes upload information approximately one hour or so apart. The generation of new blocks is almost an hour apart. When the network data is more, the operator and the manager adjust the mining difficulty degree to be reduced, so that the adding speed of the new block is increased. When the data volume in the network is less, the difficulty coefficient is increased to increase the mining difficulty of the shared block chain, and the generation time interval of the new block is far more than one hour.
Bifurcation of block chains
When a node verifies a new block, the new block is added to the block chain, and each node has a complete block chain. After receiving the new block, the nodes participating in the mining process abandon the ongoing mining work, add the new block to the top of the block chain storage of the nodes, and start to participate in the mining competition of the next block. If two nodes in the network generate new blocks at approximately the same time, then two new blocks will propagate through the network. The node receives each block at a different time and the chain of blocks diverges. Nodes in the network will select the first-arriving fork as the "main chain" and the other fork as the "standby chain". The chains that different nodes may see are different, for example, a part of the nodes receive only one of the new blocks, and the part of the nodes consider the block chain to have no branches. The other part may be a "main chain" and a "spare chain". When the block bifurcation occurs, voting is carried out through nodes in the shared block chain to decide, each point of the first node and the shared node records two votes, each shared storage node records one vote, and the access node does not participate in the voting. The nodes participating in the voting select the node or "main chain" to which they are added, the votes win and the corresponding nodes receive the reward for digging a mine. Other nodes in the network select the block generated by the winning node, and subsequent blocks it generates. If the votes on the two sides are consistent, the branch where the first node is located wins. This rule still applies when multiple bifurcations occur. This rule is to ensure that the branch with most computing power and storage is the authentic blockchain, to maintain the benefit of most users in the shared blockchain.
Shared coin
In order to encourage each node in the shared block chain to calculate a new block, the mining system provided by the invention is also provided with a corresponding mining reward to ensure a competition mechanism of the block chain. Each time a new block is created, the node will receive a share as a reward. The shared currency can be accumulated and deducted at the end of the year by the carrier and manager annual fees for the shared blockchain. The annual deduction amount of the shared currency is calculated by the year according to the shared currency and the operation condition generated in one year. The shared currency can be traded to other users in need through a third party trading platform (non-operator and management) in addition to deducting official payment. The shared currency includes two sets of character strings, card number and password. The card number consists of the generation time and the network address [14] of the generating node, and the other set of character string is the password. The shared currency can be verified and sold only when the card number corresponds to the password. The card number of the shared coin can be checked in a block chain or a website of an operator and a manager, and whether the shared coin is verified or not is confirmed. When the shared currency is checked and sold, the information of the shared currency is updated to be checked and sold.
Two ore digging mechanisms are reserved in the invention. In addition to the above mine digging reward mechanism, when there are few nodes in the shared blockchain and no effective competition can be formed, mine digging is performed by the first node and a new block is broadcasted to the network, and the mine digging mechanism does not generate the shared currency.
Expansion of blocks
A new block is generated in the shared block chain on average around one hour. The block size is only 1MB, and can only contain 2000 sets of data at most. That is, the chain of common blocks can only process 2000 groups of data at most every hour, and the uploaded data in each group is about 500 bytes. When the number of nodes in the shared blockchain network increases and the data uploading requirement is more than 500 bytes per group, the method becomes a bottleneck restricting the development of the method. The processing speed can be increased by 8 times by increasing the size of each block from 1MB to 8MB, and the generation speed of new blocks can be improved by adjusting the excavation difficulty.
To further explain the system functions and some applications of the present invention, the intelligent transportation and data sharing and storage system based on block chain can be roughly divided into 5 layers according to different functions and specific applications, as shown in fig. 5, specifically a data perception layer, a network layer, a data layer, an analysis application layer and a user layer.
The data sensing layer collects uploaded data in the transportation process, the data sensing layer is used for timing and positioning and recording the current time and the position of the transportation vehicle based on the Beidou module, the data sensing layer is used for recording the temperature in the transportation vehicle and the humidity in the transportation vehicle in real time based on the temperature sensor and the humidity sensor,
network layer: the uploaded data in the transportation process is transmitted to a data layer through a 5G network, an optical fiber network or Wi-Fi;
the data layer is a P2P node in a local data storage and sharing block chain network of each company or enterprise, a distributed data storage mode is adopted to ensure that data written into the sharing block chain node can be traced and cannot be tampered, and the security is ensured by a public key encryption and private key decryption mode when uploading uploaded data in the transportation process;
analyzing an application layer: a new block is generated by using a Hash algorithm, the workload proving algorithm generates a shared coin to encourage each node in the shared block chain node to actively participate in the generation of the new block, the timestamp and the unetched transaction output further improve the time sequence and the public accounting book of the data written into the shared block chain node, and the intelligent contract enhances and improves the reliability of electronic signature verification and data tracing;
and (3) a user layer: further deep digging of the user layer is performed to obtain the data value written into the shared block chain nodes, and the data statistics and summarization written into the shared block chain nodes are visually presented to the user: the user checks own data on a PC terminal or a mobile phone, wherein the own data comprises user own data real-time tracking, historical data tracing, data analysis, copyright and original information verification and data protection;
the data written to the shared blockchain node includes:
1. time information of the transport vehicle, location information of the transport vehicle, temperature inside the vehicle, and humidity inside the vehicle;
2. the location when the article is carried on the transport vehicle, the location when the article is transferred to another transport vehicle, the time when the article is transferred to another transport vehicle, and the origin of the article;
the local data of each company or enterprise comprises data written into the shared block chain node, research data or paper results in a scientific research institute or a college, daily work documents of the enterprise or enterprise, and research and development progress of the enterprise or enterprise;
the user's own data includes data written into the shared blockchain node and research data or paper results in a scientific research institute or a college.
The data of the user comprises data written into the shared block chain node and research data or thesis results in a scientific research institute or a college; the data written into the shared block chain node is used for tracing the conditions of the product, such as the position, the freshness preservation and the like in the process of delivery and transportation. And uploading research data or thesis results and the like of the scientific research institute or colleges in sections according to the completion time. The data loss can be stored in real time, and the copyright or the first copyright of research results can be proved according to the uploading time.
The invention realizes the good operation of the whole set of system by unifying the standard software and hardware and adding perfect comprehensive management. Including both intelligent transportation systems and shared blockchains. The intelligent transportation system is enhanced and improved aiming at the problem of poor tracking and tracing capability in the current industry, and information such as the position of a production base of an article, the whole flow of production and packaging and the like is integrated completely before transportation through the expansion function of a corresponding service platform. The shared block chain provides a low-cost, safe and reliable distributed data storage scheme for general small and medium-sized enterprises or individual users. Different from the defects of poor expansibility, weak supervision, concentrated internal calculation force and the like of certain alliance chains or private chains, the shared block chain has the advantages of decentralization, calculation force dispersion, less manual intervention and the like. And customers with different requirements can be conveniently added in a flexible mode.
The number of the ID number of the RF tag chip has uniqueness, so that the multi-stage data tracking can be performed on the transported goods, and the data can be timely tracked even if the goods are transported for several times. All processes from the starting point to the terminal point are recorded, and after the terminal point is reached, a third party or a receiver (or a first party) can obtain the information of the goods or the goods in the transportation process by directly reading the information in the RF chip. Rather than by the platform of the transporter (or the second party).
When the RF tag only has the lowest third layer (such as delivered to a consumer), the information of the whole process of the article from production to processing and then to transportation can still be known through the platform by scanning the two-dimensional code or bar code on the surface of the third layer.
The effective distance of the RF module is about 10m, the existence of lost articles can be determined by checking an article list obtained after automatic scanning with the list, the articles in other transport vehicles are excluded from being added by mistake, and the actual effective articles in the vehicles can be determined. In order to reduce errors, a special cloak can be covered in a carriage, the cloak is smooth on the inner surface of the carriage, RF can be guaranteed to be only reflected in the carriage, the signal receiving effect in the carriage is improved, and meanwhile, external signals cannot come in. Thereby eliminating the need for scanning one by one, which can improve work efficiency. And then, after the RF chips pass through the pseudo-random passwords of the verification chips and are successfully matched, recording respective corresponding information in the chips, wherein the information comprises the positions and time information of the RF chips and the temperature and humidity acquired by the in-vehicle sensor. The advantage of using the pseudo-random password is that the passwords of different tags in each time period are not repeated one and cannot be cracked, and information is prevented from being written into other RF chips in adjacent areas due to misoperation.
In order to enable devices with different performances to better perform distributed data storage and maximally explore the potential of each node. The node types in the invention are divided into 4 types, which are respectively as follows: a first node, a shared storage node, and an access node. Different nodes have different purposes and authorities, and a user can flexibly configure and select a node type suitable for the user according to different requirements and own hardware, so that the computing power and the storage space of idle hardware equipment are fully exerted. The shared storage node and the shared node only have difference of operational capability, and the two nodes can be freely converted with each other.
Unlike electronic money transaction platforms such as Bizhou (Bizhou) money, the shared money generated by mining can only be used for deduction of the cost of an operation or management platform, and can be recycled through the operation or management platform or transacted on a third party platform. Therefore, transaction vulnerabilities can be blocked, and the risk of sharing the blockchain is greatly reduced. Meanwhile, the invention is different from a completely open public chain, the shared block chain has a small amount of management attributes, and a first node in the network has partial adjustment authority.
Unlike some alliance chains or private chains, the shared blockchain of the present invention also has a certain mining mechanism. In order to encourage each node in the shared block chain to calculate new blocks, the mining system also has a corresponding mining reward, and each time a new block is generated, the node can obtain a shared coin as the reward. Through the mode of mining to generate the shared currency, each node is stimulated to actively participate in a competitive reward mechanism of block chain data generation. Meanwhile, unfairness caused by performance difference among different machines with nodes working simultaneously is made up by adjusting the operation cost and the corresponding value of the shared currency.
In addition to the mine digging reward mechanism, other mechanisms are reserved to ensure that new blocks can be smoothly added in the network under different conditions. When the number of nodes in the shared block chain is less and effective competition cannot be formed, mining is conducted by the first node in a unified mode, and new blocks are broadcast to the network.
Because the invention has a certain adjustment mechanism, the invention can prevent and adjust specific situations or risks. For example, blocks may be expanded as the number of nodes in a shared blockchain network increases and the need for data upload increases. The operator and the manager can adjust the block generation time according to the actual network conditions (comprehensively considering the number of nodes, the amount of uploaded data and other factors). For example, when the network data is more, the mining difficulty is reduced, so that the adding speed of the new block is increased. When the data volume in the network is less, operators and management parties can improve the difficulty coefficient to enable the mining difficulty of the shared block chain to be increased, and the generation time interval of the new block is far more than one hour.
The hardware of the intelligent transportation acquisition equipment comprises a control circuit, an RF (radio frequency) module, a 5G module (data communication), a Beidou module (used for positioning and satellite time service), a temperature sensor, a humidity sensor (customized according to different requirements), a power supply battery and the like. And the method is realized by adopting a similar hardware system or similar functions.
The invention has the following advantages:
1. the serial number of the chip ID number of the RF tag has uniqueness, a 5G module for data communication and a Beidou module for positioning and satellite time service are additionally arranged in the system, the RF tag with the unique chip ID number is attached to an article when the article leaves a factory, and the buyer and the seller can know the transportation position, freshness (food) and other conditions at any time through data uploaded continuously in the transportation process.
2. Different from the defects of poor continuity, poor traceability and the like of the conventional transportation data record, the RF tag is stuck on each transportation object in the invention. The transport is accurate to every article with the RF label, records all processes from the starting point to the end point, even if the midway transfer or the vehicle change can still continue to track, the transport can be regarded as a complete flow of the article from the production place to the receiver (consumer).
3. The system is combined with the block chain, and the data of all the uploading platforms are finally stored in the block chain nodes which adopt a distributed design. Data among different nodes are mutually shared in a point-to-point mode, and different transportation records and even other industries can establish shared nodes. The data is encrypted by the public key and then broadcasted to the whole network, and the data and other nodes jointly mine to generate a new block. All blocks are connected in sequence according to the generation time to form a block chain and form a public account book on the network. All written data can be traced and cannot be tampered, and the data recovery records of the adjacent nodes are conveniently downloaded when local data is lost. Other nodes have local node data, but the data cannot be decrypted because of no private key, and the information content of the data cannot be known.
4. The RF tag is used, the chip is designed in a three-layer adhesive mode, and the two-dimensional code and the bar code are arranged on the surface of the first layer, so that the serial number can be conveniently obtained through the bar code scanner; the middle layer is that each RF label has a corresponding and unique chip ID number; the back of bottom has the non-setting adhesive can paste on transporting the object, also has the non-setting adhesive to paste between bottom and the intermediate level, conveniently retrieves the RF label after tearing, and the bottom is tearing the same two-dimensional code and the bar code that the rear surface is the same with the first layer so that still usable two-dimensional code and bar code are traced to the source after retrieving the RF label. When the RF tag is left at the bottom layer (such as delivered to a consumer), the whole process information of the article transportation can still be known through the platform by scanning the two-dimensional code or the bar code. The two-dimensional code and the bar code on the RF label point to the same information, although the chip ID number is different from the two-dimensional code and the bar code on the RF label, the chip ID number can be in one-to-one correspondence with the two-dimensional code and the bar code on the RF label through binding of the background system. When a complete process has been completed, these RF tags can be recycled later by eliminating previous usage records.
5. The effective distance of the RF radio frequency module is about 10m, the article list obtained after automatic scanning is checked with the list again, whether the articles are missed or not is determined, the articles in the adjacent transport vehicles are removed, and the actual effective articles in the vehicles are determined (the special mantles in the carriages can be used for reducing errors, the mantles are smooth in the inner surfaces of the vehicles, the RF radio frequency can be guaranteed to be only reflected in the vehicles, the signal receiving effect in the vehicles is improved, and meanwhile, the external signals cannot come in advance). Thereby eliminating the need for scanning one by one, which can improve work efficiency.
6. In order to enable devices with different performances to better perform distributed data storage and maximally explore the computational potential of each node. The node types in the invention are divided into 4 types, which are respectively as follows: a first node, a shared storage node, and an access node. Different nodes have different uses and rights.
7. Better data tracing and tracing. The shared block chain has the advantages of data non-tampering, traceability and the like. For example, a unique tag is attached to food at the time of shipment, and the buyer and seller can know the location of shipment and the freshness of the product at any time by data uploaded continuously during shipment. When the food quality problem occurs, the method is convenient for tracking and investigating whether the food is a problem of origin, a problem in the middle of transportation or a problem of warehouse preservation.
8. And (4) verifying copyright and original information. In addition to data tracing in the transportation industry, the shared blockchain can also be used in other industries because information on the chain cannot be changed and the blockdata are arranged in the shared blockchain according to the time stamp sequence. For example when it is desired to verify that a certain piece of information in the shared blockchain is attributed, or that the first copyright of a certain piece of content is. The nodes in the shared blockchain can be certified by providing data or information by themselves, i.e. by downloading the corresponding information and recovering the original text by decryption using the private key. In addition to this, it is also proven by a third party in the shared blockchain. And carrying out electronic signature on the original information with the timestamp by adopting a private key. When the infringement action needs to be cut out, verifying that a participant uses a shared block chain to inquire the information (hash value and identification) of the digital work submitted by the work submitting party, inquires the work through a UXTO intelligent contract in the shared block chain, and uses a public key provided by the work submitting party to carry out electronic signature authentication to decrypt whether the text verification information is effective or not. Therefore, the arbitration is realized, and the rights and interests of the originators are protected. This way, the problem of ownership can be proved, and the private key of the user is not leaked.
9. Compared with other similar distributed data storage modes, the distributed data storage method is more economical and safe. All user nodes and distributed accounting nodes in the shared block chain are formed in an ad hoc mode through setting rules, and the rules and some daily management are mainly completed by operators and management parties. The operators and managers do not intervene too much in the operation of the shared blockchain, but a small annual fee is generated each year. While such a model may incur some overhead and operational costs, it may be more cost effective than using other backup or distributed storage. Meanwhile, compared with rented cloud storage, data is not easy to obtain by a third party (private key encryption).
10. Unlike some alliance chains or private chains, the shared blockchain of the present invention also has a certain mining mechanism. In order to encourage each node in the shared block chain to calculate a new block, the mining system also has a corresponding mining reward to ensure a competition mechanism of the block chain. Each time a new block is created, the node will receive a share as a reward. The shared currency can be accumulated and deducted at the end of the year by the carrier and manager annual fees for the shared blockchain. The annual deduction amount of the shared currency is calculated by the year according to the shared currency and the operation condition generated in one year. The shared currency may be given to other desired users through third party transactions (non-operator and administrative) in addition to deducting official payments. The shared currency includes two sets of character strings, card number and password. The card number is composed of the generation time and the network address of the generation node, and the other group of character strings are passwords. The shared currency can be verified and sold only when the card number corresponds to the password.
11. In addition to the mine digging reward mechanism, other mechanisms are reserved to ensure that new blocks can be smoothly added in the network under different conditions. When the number of nodes in the shared block chain is less and effective competition cannot be formed, mining is conducted by the first node in a unified mode, and new blocks are broadcast to the network.
12. Unlike platforms such as Bizhou (Bizhou) currency, the shared currency generated by mining can only be used for deduction of the cost of an operation or management platform, and can be recycled through the operation or management platform or traded on a third party platform. Therefore, transaction vulnerabilities can be blocked, and the risk of sharing the blockchain is greatly reduced. Meanwhile, the invention is different from a completely open public chain, the shared block chain has a small amount of management attributes, and a first node in the network has partial adjustment authority.
13. The invention can prevent and adjust specific situations or risks due to the existence of a certain management mechanism. For example, blocks may be expanded as the number of nodes in a shared blockchain network increases and the need for data upload increases. The operator and the manager can adjust the block generation time according to the actual network conditions (comprehensively considering the number of nodes, the amount of uploaded data and other factors). For example, when the network data is more, the mining difficulty is reduced, so that the adding speed of the new block is increased. When the data volume in the network is less, operators and management parties can improve the difficulty coefficient to enable the mining difficulty of the shared block chain to be increased, and the generation time interval of the new block is far more than one hour.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.
The specific practice is as follows:
example one
The invention can be combined with intelligent agriculture to form a special intelligent transportation and shared block chain storage system for a certain region or specific types of crops by combining small and medium-sized agricultural companies. The background system is an upper computer in the prior art.
The principle of the transportation part is that the RF module emits radio wave energy of a specific frequency, and the RF tag feeds back the ID number of the chip after receiving the radio wave energy; and the background system confirms whether the ID number of the chip loaded in the transport vehicle is the same as a preset article list or not according to the fed back ID number of the chip, and if the ID number of the chip is not in the article list and indicates that the article which is wrongly added is present, the background system reminds field workers to take out the wrongly added article. After matching the article list with all the fed back chip ID numbers, the controller searches whether an unmatched chip ID number exists in the article list and verifies whether an article corresponding to the unmatched chip ID number is in an adjacent transport vehicle or is unloaded. In the transportation process of the transport vehicle, the scanner of the RF module periodically collects RF tags in the transport vehicle, the current position and the current time of the transport vehicle are obtained through the Beidou module, whether articles in the transport vehicle are complete or not is inquired, if the articles are not complete, the 5G module gives an alarm to the background system, the background system verifies whether the articles in the batch are in a transport article list, alarm information is sent if article loss occurs, and a reminder can also be sent if the article background system finds that the articles are out of the article list. And uploading the current position and the current time of the transport vehicle to corresponding sharing block chain nodes of each company. During specific work, the background system finds out the pseudo-random passwords corresponding to the RF tags according to the ID numbers of the chips, sends the pseudo-random passwords to hardware equipment in the automobile through a 5G wireless network, then the RF radio frequency module broadcasts the pseudo-random passwords, the RF tags determine to write data if the pseudo-random passwords are wrong, and the current position and time information is written into the RF tags if the pseudo-random passwords are correct.
The data storage part is that all data generated in the transportation process are encrypted through a public key and then broadcast to the whole network of the network except for local storage of users, and a new block is generated together with other shared block chain nodes; all blocks are sequentially connected according to the generation time to form a block chain and form a public account book on the network; all data written to the shared blockchain is traceable and not tamperable. When the local data of the user is lost, the local data can be downloaded from the adjacent shared block chain node through the private key and restored to the local.
The information of the transportation and origin of the products is accompanied by the corresponding place and time. Therefore, the information can also be used as a data source for tracing the two-dimension code of the agricultural product and provided to the consumer by an agricultural company or a merchant. Due to the characteristics of the block chain, data tracing can be achieved no matter how long the data is generated, and effective guarantee can be provided for the aspects of food safety tracking and the like.
Example two
In a scientific research institute or a college, respective shared block chain nodes can be respectively established for all departments. Different departments or institutions select the nodes as a first node, a shared storage node or an access node according to self conditions, and all the nodes are connected to form a shared block chain network. Departments or institutions with abundant funds can invest in better equipment to provide greater computing power. On the premise of meeting the use requirement, idle equipment is fully utilized.
All department or department data can be uploaded to the PBX network in time for storage. Because the public key encryption and the private key are used for decryption, and the private key is replaced regularly, mutual information can be kept secret. These data are uploaded in segments according to the completion time. The data loss can be stored in real time, and the copyright or the first copyright of research results can be proved according to the uploading time. Thus, each department or institution does not need to worry about the leakage or plagiarism of own scientific research data or other research results. And simultaneously, the data in the shared block chain is simultaneously stored by the chain links of all the shared blocks, and all the blocks are sequentially connected according to the generation time to form the block chain so as to form a complete public account book. Therefore, when a department or an institution causes data or is damaged due to self problems, the complete block chain (historical data) can be downloaded through other nodes in the shared block chain network in time to recover the data, and the useful data can be decrypted through the private key.
In addition, the method adopted by the invention can also be used for positioning and protecting fixed assets and important equipment and instruments in scientific research institutes or colleges. And attaching RF tags to all registered equipment, transmitting radio wave energy of a specific frequency by a scanner of an indoor RF module, and feeding back chip ID numbers of the RF tags after receiving the radio wave energy. When the background system finds that the corresponding equipment is lost or moved, an alarm is sent out and the site position is locked. The collected information of the RF tag is also transmitted to a shared block chain in real time as a historical record of fixed assets and important equipment and instruments inside a scientific research institute or a college.
EXAMPLE III
Independent operators build a shared blockchain and provide services to businesses and individuals in need. The operator may operate in a manner that charges are made for business users, free of charge for individual users, and advertising charges are made to cover operating expenses. The operator establishes different sharing block chains according to different requirements, different users are classified according to different levels, and classification and grouping bases can be adopted according to the use frequency, the data volume uploaded each time and the like. Data between different sharing block chains can be mixed with each other, but the data volume is prevented from being too large, and the excessive storage data space is occupied.
In actual operation, a node established by an operator is a master node, namely, a first node in the present invention. The system has the functions of all nodes, including self data uploading, new block generation (mining), distributed data storage, a small amount of daily management and the like. Enterprises or individuals using the sharing block chain can select the sharing node or the sharing storage node according to the weak computing capability of the hardware equipment of the enterprises or individuals. The difference is whether the node is involved in the generation (mining) of a new block. The customer is also free to translate between the two nodes. For businesses or individuals not intended to devote hardware resources, they may choose to act as access nodes in the shared blockchain. The operation data of the type node is encrypted and uploaded on the block chain through a public key, and when the data of the type node needs to be read, the data (required data segment) of the adjacent node or the first node is downloaded, and the corresponding data in the downloaded block is decrypted through the private key of the type node, so that the required information is obtained. The investment cost of the access node is the lowest, but the operation and maintenance cost needing to be paid is the highest. In addition to the carrier and customer, personal participation is encouraged to share the carrier's pressure by packaging data and generating new blocks. At the same time, a certain reward can be obtained from the operator according to the contribution of the individual to the shared block chain. For example, a new block is generated by competition to obtain the shared currency, and the corresponding reward is exchanged from the operator through the shared currency.
The blocks are connected in sequence according to the generation time to form a block chain and form a public accounting book on the network. Therefore, the written data can be traced and cannot be tampered, and the data recovery records of the adjacent nodes are conveniently downloaded when the local data is lost. Meanwhile, other nodes have local node data, but the data cannot be decrypted due to the absence of a private key, so that the actual content of the data information cannot be known. Due to the above characteristics, a shared block chain can be built by independent operators to meet the requirements of different enterprises and individuals.
Noun interpretation of related art terms:
[1] RF technology: radio Frequency technology (RF) is an abbreviation for Radio Frequency. The most common applications include Radio Frequency Identification (RF), which is often called inductive electronic chip or proximity card, inductive card, contactless card, electronic tag, electronic bar code, etc. The principle is that the scanner transmits radio wave energy of a specific frequency to the receiver to drive the receiver circuit to send out an internal code (some of which can simultaneously complete reading or writing data), and then the scanner receives the code. The receiver is characterized by battery-free, contact-free, card-swiping-free, dirt-proof, unique chip password in the world, no duplication, high safety and long service life. Short-distance radio frequency products are not afraid of harsh environments such as oil stain, dust pollution and the like, and can replace bar codes in the environments, such as the environments used for tracking objects on a production line of a factory. The long-distance radio frequency product is mostly used in traffic, and the identification distance can reach dozens of meters, such as automatic charging or vehicle identity identification. RF is widely used, and typical applications of RF include animal chip, car chip burglar alarm, door control, parking lot control, production line automation, and material management.
[2] Sweep a yard rifle: the bar code reader is used for reading information contained in bar codes and can be divided into one-dimensional and two-dimensional bar code scanners. The basic working principle of the scanning gun is as follows: light emitted from the light source is irradiated onto the bar code symbol through the optical system. The reflected light is imaged on a photoelectric converter through an optical system and is interpreted as a digital signal which can be directly received by a computer through a decoder. The bar code symbol is printed on the package of a single commodity, and the information of the variety (commodity number), the quantity, the unit price, the manufacturer, the delivery date and the like of the commodity can be mastered at high speed, accurately and timely by using a bar code reader. Therefore, the efficiency is improved, and the method is widely applied to bar codes for scanning commodities and documents in supermarkets, logistics expressage, libraries and the like.
[3] Pseudo-random password: the pseudo-random code sequence may be generated using a shift register network consisting of an R-stage cascaded two-state device shift pulse generator and a modulo two adder. The network may generate a pseudo random code having a code length of 15. Random numbers and random codes adopted in computers and communication systems are pseudo-random numbers and pseudo-random codes. The "random code" is a phenomenon that no cycle occurs regardless of the length of the code, and a "pseudo random code" cycles from its first bit when the code length reaches a certain level, and can be used as a random code because the cycle length is relatively large, for example, CDMA employs a 42 pseudo random code, and the repetition probability is 4.4 parts per trillion.
[4] Private and public keys: the public key and the private key are a key pair (i.e., a public key and a private key) obtained by an algorithm, and the public key is public and can be obtained by anyone. The private key is secret and can only be used by the owner. Others encrypt information using your public key and then send to you, you decrypt with the private key and take out the information. The key pair derived by such an algorithm can be guaranteed to be unique worldwide. When using this key pair, if one of the keys is used to encrypt a piece of data, the other key must be used to decrypt the piece of data. For example, encrypting data with a public key necessitates decryption with the private key, and if encrypting with the private key, also must decrypt with the public key, otherwise decryption will not succeed.
[5] Digging ore: mining is the process of confirming transactions occurring in a block chain system for a period of time and recording the formation of new blocks on the block chain, and the mining person is called a miner. The mine is the accounting process, the miners are the accounting staffs, and the block chain is the account book. When a node finds a solution that matches the requirements, it can broadcast its own results to the entire network. The other nodes can receive this newly solved data block and check if it matches the rule. If the other node finds that the request (the operand of the bitcoin request) is indeed satisfied by calculating the hash value, then the block is valid and the other node will accept the block.
This throughput speed is not achieved by command, but rather is deliberately set to a large number of calculations. That is, only through an extremely large number of computations can a valid hash of the current block be obtained, thereby adding a new block to the chain of blocks. Since the amount of calculation is too large, it is not fast. In the bitcoin, the Chinese smart generates the bitcoin by consuming the power and time of a CPU (central processing unit), and compares the bitcoin with the situation that gold is injected into economy by gold mine consumption resources. Each network node carries out broadcast transactions to the network, the miners can use the self-work demonstration results to express confirmation after the broadcast transactions are verified by the miners (computers on the network), the confirmed transactions are packaged into data blocks, and the data blocks are concatenated to form a continuous data block chain.
[6] Block: the blockchain is a special distributed database and mainly used for storing information. A block chain consists of individual blocks (blocks). The blocks are records in a database, and each time data is written, one block is created. Each block contains two parts: the Head (Head) records the characteristic value of the current block and the actual data of the block Body (Body). Any information that needs to be stored can be written to the block or read from it.
[7] Time stamping: the time stamp is used to prove that the contents of the electronic data file remain intact and unchanged after the electronic data file applies for the trusted time stamp. The timestamp in the block chain can ensure that each piece of data is real and credible, and can effectively avoid counterfeiting behaviors. Taking the Bingpene blockchain network as an example, a blockis established by the Bingpene blockchain for 10 minutes, is stamped with a time stamp, and is broadcast and sent to all nodes of the whole network. Each block is ensured to be sequentially connected in turn through a time stamp, and each transaction datum on the block chain is provided with a time mark through the time stamp. The time stamp in each subsequent block is enhanced over the previous time stamp to form a chain of time increments.
[8] Signature and signature verification: the digital signature is a signature obtained by encrypting a digest of a text to be transmitted by using a private key, and the obtained ciphertext is called the transmission process. When the data receiving end takes the transmission text, whether the text is the transmitted content or not and whether the text is tampered in the middle or not needs to be confirmed. The signature is decrypted with its own public key (data encrypted with one key of the key pair must be decrypted using the other key). After the text is obtained, the text is compared with the unencrypted text of the sender, and if the text is completely consistent with the unencrypted text of the sender, the text is not tampered. This process is signature verification.
[9] UXTO: UXTO (unspent transaction outputs) refers to transaction outputs that are not spent and are the basic unit in a transaction. In the bitcoin system, a trader account system is not designed to be used, but one transaction (data) is recorded, so that each transaction of the bitcoin can be traced back to the previous transaction (data) until a miner digs the block of the transaction, and the system data cannot be forged. The UTXO in the entire blockchain network will be stored in each node and only transactions that satisfy the conditions derived from the UTXO and the digital signature will be legitimate, which can trace back every transaction in the blockchain.
[10] Intelligent contract: the intelligent contract is an intelligent contract technology applied to a block chain technology, and solves the problems that the bit currency block chain is insufficient in expansibility, only transactions can be conducted, and other records cannot be recorded. The intelligent contract supports a programming system with changeable programming languages such as Java and the like, judges the contract execution condition of each node and the obligation to be fulfilled, and does not need a central mechanism to supervise and automatically execute the matters meeting the contract condition.
[11] P2P transmits: a Peer-to-Peer network, i.e., a Peer-to-Peer computer network, is a distributed application architecture that distributes tasks and workloads among peers (peers), and is a networking or networking form of a Peer-to-Peer computing model formed in an application layer. "Peer" has the meaning of "Peer, partner, Peer" in English. Thus, literally, P2P may be understood as a peer-to-peer computing or peer-to-peer network. It can be defined as: participants of the network share a portion of the hardware resources (processing power, storage power, network connectivity, printers, etc.) they own, which provide services and content over the network and which can be accessed directly by other Peer nodes (peers) without going through intermediate entities. The participants in this network are both providers (servers) and acquirers (clients) of resources, services and content. In a P2P network environment, multiple computers connected to each other are in a peer-to-peer relationship, each computer has the same functionality, without a master-slave relationship, and a computer can serve as both a server, setting shared resources for use by other computers in the network, and a workstation, and the overall network generally does not rely on a dedicated centralized server, nor does it have a dedicated workstation.
[12] And (3) hashing: the hash is that a computer can calculate a feature value with the same length for any content. The hash length of the blockchain is 256 bits, which means that a 256-bit binary number is finally calculated regardless of the original content. Moreover, it can be ensured that corresponding hashes are necessarily different as long as the original content is different. For example, the hash of the string 123 is a8fdc205a9f19cc1c7507a60c4f01b13d11d7fd0 (hexadecimal), the conversion to binary is 256 bits, and only 123 gets the hash. Theoretically, other strings could get this hash, but the probability is very low and it can be considered approximately impossible. It can be derived:
1. the hash of each chunk is different and the chunks may be identified by the hash.
2. If the content of a block changes, its hash must change.
[13] POW algorithm (workload proof): the algorithm carries out established hash operation through the consumption of computing power of the nodes, a reasonable random number is found, when the random number is smaller than a target value specified by the bitcoin network, the nodes have the right to generate a new block, a digital signature of the nodes is left on the new block, the computed hash value, the identification of the head of the new block (also a hash character string), the identification of the head of the previous block and other information are verified and packaged into the new block, and then the transactions existing in the nodes (which can be from other nodes or generated by the nodes of the. And after the other nodes receive the blocks and pass the verification, the other nodes are added into the block chain of the other nodes. The digital currency using such a consensus algorithm is represented by bitcoin, lyte coin, ethereal coin, and the like.
[14] And (3) node address: when each node uploads data, a label of the node is marked to indicate that the data belong to the node, and the node is convenient to search in the future. This special label is the node address. The node address is a long string of characters, the cryptology principle is hidden in the address, and the real source and identity of a user or an enterprise are not easy to know by the outside.
Claims (10)
1. A block chain-based intelligent transportation and data sharing storage method is characterized by comprising the following steps:
the background system is used for loading the sharing block chain nodes, remotely interacting the missing list, the positions of the transport vehicles and the current time with the intelligent transport acquisition equipment, storing the missing list, the positions of the transport vehicles and the current time into the sharing block chain nodes and sharing;
a transport vehicle that loads and transports the article;
RF tags mounted on the article, each of the RF tags having a different chip ID number;
the intelligent transportation acquisition equipment is installed on the transportation vehicle, scans and identifies the RF tag, confirms whether the ID number of the chip loaded in the transportation vehicle is the same as a preset article list or not, and uploads a missing list, the position of the transportation vehicle and the current time to the shared block chain node.
2. The method as claimed in claim 1, wherein the intelligent transportation and data sharing and storage device comprises:
the RF module is used for collecting the chip ID number of the RF tag;
the controller is used for correspondingly storing the chip ID number of the RF label corresponding to the article, the two-dimensional code on the RF label and the bar code on the RF label into an article list one by one;
storing chip ID numbers of the RF tags collected by the RF module as a list to be matched when the transport vehicle loads articles or when the transport vehicle finishes loading the articles, and comparing the list to be matched with a preset article list by the controller;
in the transportation process of a transport vehicle, the controller compares the chip ID numbers corresponding to the articles with the article list, the controller confirms whether all the chip ID numbers in the article list are compared, and if the articles are incomplete, the chip ID numbers corresponding to the articles are listed in a missing list;
the communication module is used for transmitting the missing list, the position of the transport vehicle and the current time to the background system;
the Beidou module is used for acquiring the position of the transport vehicle and the current time in real time in the transport process of the transport vehicle;
the temperature sensor is used for acquiring the temperature in the transport vehicle in the transport process of the transport vehicle and feeding the temperature back to the controller;
the humidity sensor is used for acquiring the humidity in the transport vehicle in the transport process of the transport vehicle and feeding the humidity back to the controller;
and the power supply battery supplies power to the RF module, the controller, the communication module, the Beidou module, the temperature sensor and the humidity sensor.
3. The intelligent transportation and data sharing storage method based on the block chain as claimed in claim 2, wherein the items to be loaded on each transportation vehicle are confirmed, an item list is listed, an RF tag is fixed on each item, when the transportation vehicle loads the items or when the transportation vehicle finishes loading the items, an RF module collects a chip ID number of the RF tag, a controller stores the chip ID number as a list to be matched, the controller compares the list to be matched with the item list, if the chip ID number in the list to be matched is not in the item list, it indicates that there is an erroneously added item, and the item corresponding to the chip ID number is taken out from the transportation vehicle; if the chip ID number in the article list is not in the list to be matched, verifying whether the article corresponding to the chip ID number is on other transport vehicles or whether the article corresponding to the chip ID number is not loaded;
in the transport vehicle transportation, the big dipper module acquires transport vehicle position and current time in real time, RF radio frequency module gathers the chip ID number of RF chip in real time, the article list is compared with this chip ID number to the controller, whether all chip ID numbers in the article list are compared to the controller, thereby confirm whether complete of article in the transport vehicle, if article are not complete, the chip ID number that corresponds with this article is listed into the disappearance list, the controller reports to the police for backstage system through communication module, and with the disappearance list, transport vehicle position and current time upload for sharing block chain node.
4. The method according to claim 1, wherein the background system finds the pseudo-random password corresponding to the RF tag according to the chip ID number and sends the pseudo-random password to the smart transportation acquisition device; the intelligent transportation acquisition equipment broadcasts a pseudo-random password corresponding to the RF tag, if the pseudo-random password is wrong, the RF tag refuses to write in the position of the transportation vehicle and the current time, and if the pseudo-random password is correct, the position of the transportation vehicle and the current time are written in the RF tag corresponding to the pseudo-random password;
after being encrypted by a public key, the shared block chain node broadcasts to the whole shared block chain network, and generates a new block together with other shared block chain link nodes; all blocks are sequentially connected according to the generation time to form a block chain, and a public account book on the shared block chain network is formed; all data written into the shared blockchain node can be traced and cannot be tampered;
uploading data in the transportation process is stored as local data by a user, and when the local data is lost, the local data is downloaded from adjacent sharing block chain nodes through a private key and recovered to the local data;
the uploaded data in the transportation process comprises the chip ID number, the position of the transportation vehicle, the current time of the position of the transportation vehicle, the temperature inside the transportation vehicle and the humidity inside the transportation vehicle.
5. The method according to claim 4, wherein the shared blockchain link point comprises a first node, a shared storage node and an access node; only the difference of the operational capability exists between the shared storage node and the shared node, and the shared storage node and the shared node can be mutually and freely converted;
a first node: a first established node in each shared blockchain network; the first node uploads the data written into the shared block chain node to a shared block chain network, and the first node is responsible for generation of a new block, distributed data storage and daily management;
sharing the nodes: uploading data written into the shared block chain nodes by nodes with certain computing capacity in the shared block chain network to generate new blocks and distributed storage data;
sharing the storage node: the data storage nodes in the shared block chain network are responsible for data uploading and distributed data storage and do not participate in the generation of new blocks; the shared storage node and the shared node only have the difference of operational capability, and the two nodes can be freely converted with each other;
the access node: the access node uploads the data written into the shared block chain node to the shared block chain node through public key encryption, when the data written into the shared block chain node needs to be read and accessed, the data written into the shared block chain node is downloaded from the adjacent shared block chain node or the first node, and then the data written into the shared block chain node is decrypted through the private key of the access node.
6. The intelligent transportation and data sharing and storing method based on the blockchain as claimed in claim 5, wherein the method comprises a data perception layer, a network layer, a data layer, an analysis application layer and a user layer;
the data sensing layer collects uploaded data in the transportation process, the data sensing layer is used for timing and positioning and recording the current time and the position of the transportation vehicle based on the Beidou module, the data sensing layer is used for recording the temperature in the transportation vehicle and the humidity in the transportation vehicle in real time based on the temperature sensor and the humidity sensor,
network layer: the uploaded data in the transportation process is transmitted to a data layer through a 5G network, an optical fiber network or Wi-Fi;
the data layer is a P2P node in a local data storage and sharing block chain network of each company or enterprise, a distributed data storage mode is adopted to ensure that data written into the sharing block chain node can be traced and cannot be tampered, and the security is ensured by a public key encryption and private key decryption mode when uploading uploaded data in the transportation process;
analyzing an application layer: a new block is generated by using a Hash algorithm, a workload certification algorithm generates a shared currency, each node in a shared block chain node is encouraged to actively participate in the generation of the new block, a timestamp and unerupted transaction output further improve the time sequence and a public accounting book of data written into the shared block chain node, and intelligent contracts enhance and improve the reliability of electronic signature verification and data tracing;
and (3) a user layer: the user layer further deeply digs the data value written into the shared block chain node, and intuitively summarizes and presents the data statistics written into the shared block chain node to the user: the user checks own data on a PC terminal or mobile equipment, wherein the own data comprises user own data real-time tracking, user own data historical data source tracing, user own data analysis, copyright and original information verification and data protection;
the data written to the shared blockchain node includes:
the position and the current time of the transport vehicle, the current time corresponding to the position of the transport vehicle, the temperature in the transport vehicle and the humidity in the transport vehicle;
the location when the article is carried on the transport vehicle, the location when the article is transferred to another transport vehicle, the time when the article is transferred to another transport vehicle, and the origin of the article;
the local data of each company or enterprise comprises data written into the shared block chain node, research data or paper results in a scientific research institute or a college, daily work documents of the enterprise or enterprise, and research and development progress of the enterprise or enterprise;
the user's own data includes data written into the shared blockchain node and research data or paper results in a scientific research institute or a college.
7. The intelligent transportation collecting device is based on claim 2 and is characterized in that the intelligent transportation collecting device comprises a controller, an RF radio frequency module, a communication module for data communication, a Beidou module for positioning and satellite time service, a temperature sensor, a humidity sensor and a power supply battery, wherein the controller is electrically connected with the RF radio frequency module, the communication module, the Beidou module, the temperature sensor and the humidity sensor, and the power supply battery is electrically connected with the controller, the RF radio frequency module, the communication module, the Beidou module, the temperature sensor and the humidity sensor.
8. The RF tag of claim 1, wherein the RF tag includes a second layer of sticker, the second layer of sticker including an RF chip and an antenna, the RF chip storing a unique chip ID number.
9. The RF tag of claim 8, wherein the RF tag includes a first layer sticker and a third layer sticker, the first layer sticker, the second layer sticker and the third layer sticker are sequentially stacked and pasted from top to bottom, the first layer sticker is provided with a two-dimensional code and a bar code, the second layer sticker is provided with a sticker on a lower surface and a third layer sticker is provided with a two-dimensional code identical to that of the first layer sticker and a bar code identical to that of the first layer sticker on an upper surface.
10. The RF tag of claim 9 wherein the first layer of sticker is provided with a left quick-tear opening and a right quick-tear opening, the first layer of sticker, the second layer of sticker, and the third layer of sticker being removable from the right quick-tear opening for application to the article, the first layer of sticker and the second layer of sticker being removable from the left quick-tear opening for leaving the third layer of sticker on the surface of the article.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110229376.XA CN113055450B (en) | 2021-03-02 | 2021-03-02 | Intelligent transportation and data sharing storage method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110229376.XA CN113055450B (en) | 2021-03-02 | 2021-03-02 | Intelligent transportation and data sharing storage method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113055450A true CN113055450A (en) | 2021-06-29 |
CN113055450B CN113055450B (en) | 2024-06-25 |
Family
ID=76509490
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110229376.XA Active CN113055450B (en) | 2021-03-02 | 2021-03-02 | Intelligent transportation and data sharing storage method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113055450B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113872768A (en) * | 2021-09-23 | 2021-12-31 | 国网陕西省电力公司汉中供电公司 | Power transmission and transformation equipment state quantity acquisition and storage method and system |
CN113888192A (en) * | 2021-10-11 | 2022-01-04 | 徐州医科大学 | RFID lightweight authentication protocol based on block chain in Chinese herbal medicine product traceability platform |
CN113886499A (en) * | 2021-10-19 | 2022-01-04 | 赛维森(广州)医疗科技服务有限公司 | Patch chain based pathological data sharing method, sharing system and computing device |
CN114567366A (en) * | 2022-02-17 | 2022-05-31 | 北京电信规划设计院有限公司 | System and method for sharing vehicle-mounted satellite communication resources based on block chain |
TWI847140B (en) * | 2022-05-24 | 2024-07-01 | 國立成功大學 | Mobile battery device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7707076B1 (en) * | 2002-10-22 | 2010-04-27 | PPI Technology Services, LP | System for continuous asset verification |
US20180096175A1 (en) * | 2016-10-01 | 2018-04-05 | James L. Schmeling | Blockchain Enabled Packaging |
CN109241778A (en) * | 2018-08-13 | 2019-01-18 | 阿里巴巴集团控股有限公司 | A kind of public transport data processing method and device based on block chain |
CN109359836A (en) * | 2018-09-29 | 2019-02-19 | 厦门艾欧特科技有限公司 | A kind of wisdom building system based on block chain and RFID technique |
CN110647503A (en) * | 2019-10-09 | 2020-01-03 | 重庆特斯联智慧科技股份有限公司 | Distributed storage method and device |
US10694372B1 (en) * | 2019-09-06 | 2020-06-23 | International Business Machines Corporation | Independent agent-based location verification |
CN112052930A (en) * | 2020-07-31 | 2020-12-08 | 优思物联科技(深圳)有限公司 | Block chain-based electronic tag production method and electronic tag card |
-
2021
- 2021-03-02 CN CN202110229376.XA patent/CN113055450B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7707076B1 (en) * | 2002-10-22 | 2010-04-27 | PPI Technology Services, LP | System for continuous asset verification |
US20180096175A1 (en) * | 2016-10-01 | 2018-04-05 | James L. Schmeling | Blockchain Enabled Packaging |
CN109241778A (en) * | 2018-08-13 | 2019-01-18 | 阿里巴巴集团控股有限公司 | A kind of public transport data processing method and device based on block chain |
CN109359836A (en) * | 2018-09-29 | 2019-02-19 | 厦门艾欧特科技有限公司 | A kind of wisdom building system based on block chain and RFID technique |
US10694372B1 (en) * | 2019-09-06 | 2020-06-23 | International Business Machines Corporation | Independent agent-based location verification |
CN110647503A (en) * | 2019-10-09 | 2020-01-03 | 重庆特斯联智慧科技股份有限公司 | Distributed storage method and device |
CN112052930A (en) * | 2020-07-31 | 2020-12-08 | 优思物联科技(深圳)有限公司 | Block chain-based electronic tag production method and electronic tag card |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113872768A (en) * | 2021-09-23 | 2021-12-31 | 国网陕西省电力公司汉中供电公司 | Power transmission and transformation equipment state quantity acquisition and storage method and system |
CN113872768B (en) * | 2021-09-23 | 2024-01-09 | 国网陕西省电力公司汉中供电公司 | Method and system for collecting and storing state quantity of power transmission and transformation equipment |
CN113888192A (en) * | 2021-10-11 | 2022-01-04 | 徐州医科大学 | RFID lightweight authentication protocol based on block chain in Chinese herbal medicine product traceability platform |
CN113886499A (en) * | 2021-10-19 | 2022-01-04 | 赛维森(广州)医疗科技服务有限公司 | Patch chain based pathological data sharing method, sharing system and computing device |
CN114567366A (en) * | 2022-02-17 | 2022-05-31 | 北京电信规划设计院有限公司 | System and method for sharing vehicle-mounted satellite communication resources based on block chain |
CN114567366B (en) * | 2022-02-17 | 2024-02-23 | 北京电信规划设计院有限公司 | Vehicle-mounted satellite communication resource sharing method based on block chain |
TWI847140B (en) * | 2022-05-24 | 2024-07-01 | 國立成功大學 | Mobile battery device |
Also Published As
Publication number | Publication date |
---|---|
CN113055450B (en) | 2024-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113055450B (en) | Intelligent transportation and data sharing storage method based on block chain | |
WO2020000707A1 (en) | Anti-fake method and system based on block chain, computer device, and storage medium | |
EP3971802A1 (en) | Supply chain management method, supply chain management program, supply chain management system, and transaction record display program | |
CN109544160B (en) | Transaction authenticity verification method and system based on block chain and intelligent contract | |
US11922363B2 (en) | Counterparty physical proximity verification for digital asset transfers | |
CN112036901A (en) | Method for protecting supply chain data in block chain and system for recording supply chain information | |
US11757989B2 (en) | System and method for incorporating sensor measurements into a blockchain | |
CN109711836A (en) | A kind of storage method of transaction, storage network and electronic equipment | |
CN111445272A (en) | Agricultural product traceability information processing system and method based on block chain | |
CN111309711A (en) | Cross-block-chain data migration method, device, equipment and storage medium | |
CN110807641A (en) | Pet food traceability system | |
CN113574913A (en) | Method and system for preparing and performing object authentication | |
Lin et al. | Blockchain and IoT-based architecture design for intellectual property protection | |
CN105096134A (en) | Security scheme for authenticating digital entities and aggregate object origins | |
CA3141307A1 (en) | Method and system for generalized provenance solution for blockchain supply chain applications | |
CN111414429A (en) | Commodity information management method based on block chain, electronic device and storage medium | |
Laouar et al. | Towards blockchain-based urban planning: Application for waste collection management | |
CN110599107A (en) | Logistics data processing method and device based on block chain | |
CN113947414A (en) | Commodity traceability anti-counterfeiting system based on NFC and block chain | |
CN112163811A (en) | Block chain-based port and navigation logistics remote monitoring system | |
Hou et al. | IoT and blockchain-based smart agri-food supply chains | |
CN106504007A (en) | A kind of commodity counterfeit prevention management system based on NFC electronic tags | |
CN109800597A (en) | The merchandise news encryption method anti-fake for luxury goods | |
Meydani et al. | A Comprehensive Review of the Applications of Blockchain Technology | |
CN112948488A (en) | Industrial chain alliance service integration platform system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |