CN113657914A - Commodity tracing method based on block chain, computer device and storage medium - Google Patents

Commodity tracing method based on block chain, computer device and storage medium Download PDF

Info

Publication number
CN113657914A
CN113657914A CN202110988090.XA CN202110988090A CN113657914A CN 113657914 A CN113657914 A CN 113657914A CN 202110988090 A CN202110988090 A CN 202110988090A CN 113657914 A CN113657914 A CN 113657914A
Authority
CN
China
Prior art keywords
node
commodity
signature
character string
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110988090.XA
Other languages
Chinese (zh)
Inventor
向舜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Original Assignee
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuo Erzhi Lian Wuhan Research Institute Co Ltd filed Critical Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority to CN202110988090.XA priority Critical patent/CN113657914A/en
Publication of CN113657914A publication Critical patent/CN113657914A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Computational Linguistics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

According to the commodity tracing method based on the block chain, provided by the invention, the related commodity information is subjected to signature verification for multiple times in the commodity circulation process through the monitoring node and the other nodes which are in communication connection with each other, and the problems of serious information barrier phenomenon, easy information tampering, high tracing difficulty and the like in the conventional tracing anti-counterfeiting system can be solved. The invention also provides a computer device and a storage medium for realizing the block chain-based commodity tracing method.

Description

Commodity tracing method based on block chain, computer device and storage medium
Technical Field
The invention relates to the technical field of block chains, in particular to a commodity tracing method based on a block chain, a computer device and a storage medium.
Background
In the application scene of supply chain finance, the scene of commodity information authentication and anti-counterfeiting is involved, and in the circulation process of commodities and funds, the problems that partial information is difficult to check and data is difficult to manage can occur, and the problem that traceability cannot be realized due to information loss can also occur.
In the prior art, the traceability anti-counterfeiting technology mainly realizes the judgment of the authenticity of a product and the networking inquiry of circulation link information of the product by means of technical means such as two-dimensional codes, radio frequency tags, near field communication, computers, the internet and the like. However, the traditional method adopts centralized system management data, so that certain limitations exist, the supply chain roles respectively maintain own commodity transaction information, so that a plurality of centralized systems exist in the whole transaction chain, the commodity transaction information is difficult to update synchronously, the information checking process is complicated, the traceability difficulty is extremely high, and too much cost is needed for data docking on line. Under the drive of interests, malicious operators or attackers can modify commodity transaction information privately, and particularly, enterprises build classes and third-party platforms, the fairness is difficult to guarantee.
Disclosure of Invention
In view of the above, it is necessary to provide a commodity tracing method based on a block chain, a computer device and a storage medium, which can solve the problems of serious information barrier phenomenon, easy information tampering, great tracing difficulty and the like in the current tracing anti-counterfeiting system.
The invention provides a commodity tracing method based on a block chain, which is applied to a supervision node and a plurality of other nodes which are in communication connection with each other, wherein the other nodes comprise a first node, a second node, a third node and a fourth node, and the method comprises the following steps: the first node uploads the related information of the commodity to a block chain, and performs signature by combining the commodity ID distributed by the supervision node for the commodity and the key distributed by the first node to obtain a first signature character string; in response to a first request signal, the first node transmitting the first signature string to the second node; in response to a second request signal, the second node performs signing on the key distributed by the second node in combination with the first signature string and the supervisory node to obtain a second signature string, and sends the second signature string to the third node; in response to a third request signal, the third node performs signing on the key distributed by the third node in combination with the second signature string and the supervisory node to obtain a third signature string, and sends the third signature string to the fourth node; and responding to a fourth request signal, the fourth node verifies the third signature character string by combining the third signature character string and the commodity ID, and keys respectively distributed by the supervision node for the first node, the second node and the third node verify the third signature character string, and acquires a circulation path of the commodity.
Optionally, the supervision node is the first node, the second node, and the third node, and the keys respectively allocated by the supervision node, the second node, and the third node are different from each other; the secret key comprises a public key and a private key; and the monitoring node uploads the public keys respectively distributed by the first node, the second node and the third node to the block chain.
Optionally, the method further comprises: the first node, the second node, and the third node upload the first signature string, the second signature string, and the third signature string to the blockchain, respectively.
Optionally, the verifying the third signature character string by combining the third signature character string, the commodity ID, and keys respectively allocated by the supervisory node to the first node, the second node, and the third node, and acquiring the circulation path of the commodity specifically include: acquiring public keys respectively distributed by the supervision node as the first node, the second node and the third node from the block chain, and acquiring the first signature character string and the second signature character string from the block chain; decrypting the third signature character string by using the public key distributed to the third node by the supervisory node to obtain a first decrypted character string, and determining that the commodity normally flows in the third node when the first decrypted character string is consistent with the second signature character string; when the first decryption character string is inconsistent with the second signature character string, determining that information deviation occurs when the commodity flows through the third node; decrypting the first decryption character string by using the public key distributed to the second node by the supervision node to obtain a second decryption character string, and determining that the commodity normally flows in the second node when the second decryption character string is consistent with the first signature character string; when the second decryption character string is inconsistent with the first signature character string, determining that information deviation occurs when the commodity flows through the second node; decrypting the second decryption character string by using the public key distributed to the first node by the supervision node to obtain a third decryption character string, and determining that the commodity is a genuine commodity and the commodity normally flows in the first node when the third decryption character string is consistent with the commodity ID; and when the third decryption character string is inconsistent with the commodity ID, determining that the commodity is not a genuine commodity, and the information deviation of the commodity occurs when the commodity flows through the first node.
Optionally, the method further comprises: when the commodity is determined to be a genuine commodity, the fourth node sends a notice that the commodity is the genuine commodity to the supervision node; and when the supervision node receives the notification, the supervision node associates the owner of the commodity as the fourth node and uploads the information of the owner of the commodity to the block chain.
Optionally, the method further comprises: when the supervising node acquires the third signature character string from the blockchain, the supervising node associates the owner of the commodity as the third node and uploads the information of the owner of the commodity to the blockchain.
Optionally, the related information of the commodity includes information of an owner of the commodity and factory time, and the supervision node encrypts and splices the information of the owner of the commodity and the factory time to obtain the commodity ID.
Optionally, the method further comprises: the supervision node manages registration applications of the first node, the second node, the third node and the fourth node on the blockchain, wherein the first node uploads relevant information of the commodity to the blockchain after successful registration on the blockchain.
The second aspect of the present invention provides a computer device, where the computer device includes a memory and a processor, where the memory is used to store at least one instruction, and the processor is used to execute the at least one instruction to implement the block chain-based commodity tracing method.
The third aspect of the present invention provides a computer-readable storage medium, which stores at least one instruction, and when the at least one instruction is executed by a processor, the at least one instruction implements the method for tracing commodities based on a blockchain.
Compared with the prior art, the method can solve the problems of serious information barrier phenomenon, easy information tampering, high tracing difficulty and the like in the conventional tracing anti-counterfeiting system.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a product tracing method according to a preferred embodiment of the present invention.
Fig. 2 is a schematic diagram of a product traceability system according to an embodiment of the present invention.
FIG. 3 is a block diagram of a computer device according to a preferred embodiment of the present invention.
The following detailed description will further illustrate the invention in conjunction with the above-described figures.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a detailed description of the present invention will be given below with reference to the accompanying drawings and specific embodiments. It should be noted that the embodiments of the present invention and features of the embodiments may be combined with each other without conflict.
In the following description, numerous specific details are set forth to provide a thorough understanding of the present invention, and the described embodiments are merely a subset of the embodiments of the present invention, rather than a complete embodiment. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
Fig. 1 is a flowchart of a commodity tracing method based on a block chain according to a preferred embodiment of the present invention.
Referring to fig. 2, in the present embodiment, the commodity tracing method based on the block chain may be applied to a commodity tracing system 100 formed by a monitoring node 10 and a plurality of other nodes that are communicatively connected to each other. In this embodiment, each node corresponds to a computer device. The structure of the computer device corresponding to each node may be the structure of the computer device 6 shown in fig. 3.
In this embodiment, the supervision node 10 may be a node corresponding to an industrial and commercial administration. The plurality of other nodes includes a first node 1 corresponding to a manufacturer of the goods, a second node 2 corresponding to a logistics dealer that transfers the goods, a third node 3 corresponding to a distributor of the goods, and a fourth node 4 corresponding to a consumer that consumes the goods.
In this embodiment, the supervisory node 10 may be used as a master node, and is configured to manage and control the first node 1, the second node 2, the third node 3, and the fourth node 4, and specific details of the management and control refer to the detailed description of fig. 1 below.
In this embodiment, the supervising node 10, the first node 1, the second node 2, the third node 3, and the fourth node 4 are respectively added to the public link as a node. In one embodiment, a Smart contract (Smart contract) may be deployed on a computer device corresponding to each node to manage each node through the Smart contract to implement the corresponding function of each node. The smart contract is a computer protocol that propagates, validates, or enforces contracts in an informational manner.
As shown in fig. 1, the commodity source tracing method based on the blockchain specifically includes the following steps, and according to different requirements, the order of the steps in the flowchart may be changed, and some steps may be omitted.
Step S1, the supervisory node 10 manages registration applications of the first node 1, the second node 2, the third node 3, and the fourth node 4 on the blockchain.
In this embodiment, the supervision node 10 is taken as a node corresponding to a business administration, the first node 1 is a node corresponding to a commodity manufacturer, the second node 2 is a node corresponding to a logistics provider for transferring commodities, the third node 3 is a node corresponding to a commodity distributor, and the fourth node 4 is a node corresponding to a consumer for consuming the commodities.
In this embodiment, the supervising node 10 receives a registration application submitted by any one of the first node 1, the second node 2, the third node 3, and the fourth node 4. The supervisory node 10 determines whether to allow the registration of any node on the blockchain according to registration information (e.g., contacts, contact addresses, contact phones, certificate information, etc.) carried in a registration application submitted by any node.
In this embodiment, the determining whether to allow the arbitrary node to register on the blockchain according to the registration information carried in the registration application submitted by the arbitrary node includes: when the registration information carried by the registration application submitted by any node meets a preset rule, registering the any node in the block chain; and when the registration information carried by the registration application submitted by any node does not accord with the preset rule, the block chain is not registered for any node.
In an embodiment, when the first node 1 is a node corresponding to a commodity manufacturer, the supervisory node 10 registers the first node 1 in the block chain when the registration information carried in the registration application submitted by the first node 1 meets the preset rule and is consistent with the pre-stored business registration information.
In one embodiment, the preset rule may indicate that the registration information satisfies a corresponding requirement, for example, the contact phone is a mobile phone or a landline phone number, the id card information satisfies a length required by an id card character, and the like.
In one embodiment, the supervisory node 10 pre-stores the manufacturer registration information for each manufacturer.
In one embodiment, the supervising node 10 registering with the blockchain for the any one node includes uploading registration information of the any one node to the blockchain. In one embodiment, only nodes that register successfully on the blockchain may upload or download relevant information from the blockchain.
Step S2, the first node 1 uploads the information related to the commodity to the block chain and performs signature in combination with the commodity ID assigned by the supervisory node 10 for the commodity and the key assigned by the first node, so as to obtain a first signature string.
In this embodiment, the first node 1 uploads the relevant information of the commodity to the blockchain after the successful registration on the blockchain.
In one embodiment, after uploading the information related to the commodity to the blockchain, the first node 1 may further set, in response to an input from a user, that the commodity is sequentially circulated among the second node 2, the third node 3, and the fourth node 4.
In this embodiment, the information related to the product includes information of an owner of the product and factory time. It should be noted that, when the commodity is not yet circulated to other nodes, the current owner of the commodity is the manufacturer of the commodity.
In one embodiment, after the first node 1 uploads the information related to the commodity to the blockchain, the supervisory node 10 obtains the information related to the commodity from the blockchain, generates the commodity ID based on the information related to the commodity, and uploads the commodity ID to the blockchain.
In one embodiment, the generating the article ID based on the related information of the article includes: and carrying out encryption splicing on the information of the owner of the commodity and the factory time to obtain the ID of the commodity.
In one embodiment, the supervising node 10 may generate a set of keys including a public key and a private key for each of the first node 1, the second node 2, and the third node 3, associate each of the first node 1, the second node 2, and the third node 3 with the corresponding key, correspondingly send the private keys associated with each of the first node 1, the second node 2, and the third node 3 to the first node 1, the second node 2, and the third node 3, and upload the public keys associated with each of the first node 1, the second node 2, and the third node 3 to the blockchain, so that the first node 1, the second node 2, the third node 3, and the fourth node 4 may obtain the public key of the other party from the blockchain.
In one embodiment, the supervising node 10 generates keys corresponding to an elliptic curve digital signature algorithm for the first node 1, the second node 2 and the third node 3, respectively, wherein the keys generated for the first node 1, the second node 2 and the third node 3, respectively, are different from each other.
For example, the supervising node 10 generates a key a for the first node 1 (key a includes a public key a1 and a private key a2), a key B for the second node 2 (key B includes a public key B1 and a private key B2), and a key C for the third node 3 (key C includes a public key C1 and a private key C2), which keys A, B, C are different from each other. The supervising node 10 associates the first node 1 with key a, the second node 2 with key B and the third node 3 with key C. The supervising node 10 also sends a private key a2 associated with the first node 1 to the first node 1, a private key B2 associated with the second node 2 to the second node 2, and a private key C2 associated with the third node 3 to the third node 3. The supervising node 10 also uploads to the blockchain the public key a1 associated with the first node 1, the public key B1 associated with the second node 2, and the public key C1 associated with the third node 3.
In this embodiment, the first node 1 receives the key associated with the first node 1 sent by the supervising node 10, the second node 2 receives the key associated with the second node 2 sent by the supervising node 10, and the third node 3 receives the key associated with the third node 3 sent by the supervising node 10. The first node 1, the second node 2, and the third node 3 respectively store (e.g., store in respective memories) the corresponding associated private keys.
In this embodiment, the first node 1 obtains the commodity ID from the block chain, and signs the commodity ID by using a private key associated with the first node 1 to obtain the first signature character string.
For example, the first node 1 performs elliptic curve digital signature on the commodity ID by using a private key associated with the first node 1 to obtain the first signature string.
Step S3, in response to the first request signal, the first node 1 sends the first signature string to the second node 2.
In one embodiment, the first node 1 also uploads the first signature string to the blockchain.
In one embodiment, for example, the first node 1 is a node corresponding to a manufacturer, and the first request signal may be a signal that requests the second node 2 to change the state of the commodity. For example, a request to change the status of the goods to reach a logistics merchant.
Step S4, in response to a second request signal, the second node 2 performs signature on the key assigned to the second node 2 by combining the first signature string and the key assigned to the second node 2 by the supervisory node 1, obtains a second signature string, and sends the second signature string to the third node.
In one embodiment, the second node 2 receives the first signature string, signs the first signature string with a private key associated with the second node 2, obtains the second signature string, and sends the second signature string to the third node 3. In one embodiment, the second node 2 also uploads the second signature string to the blockchain.
For example, the second node 2 performs elliptic curve digital signature on the first signature string by using a private key associated with the second node to obtain the second signature string.
In an embodiment, taking the second node 2 as a node corresponding to a logistics provider as an example, the second request signal may be a signal that is sent by the third node 3 and requests to change the state of the commodity. For example, a request to change the status of the item to reach a dealer.
Step S5, in response to the third request signal, the third node 3 performs signature on the key allocated to the third node 3 by combining the second signature string and the supervisory node 1, obtains a third signature string, and sends the third signature string to the fourth node.
In one embodiment, the third node 3 receives the second signature string, signs the second signature string with a private key associated with the third node 3, obtains the third signature string, and sends the third signature string to the fourth node 4. In one embodiment, the third node 3 also uploads the third signature string to the blockchain.
For example, the third node 3 performs elliptic curve digital signature on the second signature string by using a private key associated with the third node 3 to obtain the third signature string.
In one embodiment, taking the third node 3 as a node corresponding to a dealer as an example, the third request signal may be a signal that is sent by the fourth node 4 and requests to change the state of the product. For example, a request to change the status of the item to an item to reach the consumer.
In one embodiment, when the supervisory node 10 obtains the third signature string from the blockchain, the supervisory node 10 associates the owner of the good as the third node 3 and uploads information of the current owner of the good to the blockchain.
In one embodiment, when the third node 3 becomes the owner of the good, the third node 3 may also publish the good on the blockchain.
Step S6, in response to a fourth request signal, the fourth node 4 verifies the third signature string in combination with the third signature string, the commodity ID, and keys respectively allocated by the supervisory node 10 to the first node 1, the second node 2, and the third node 3, and obtains a circulation path of the commodity.
In one embodiment, the fourth node 4 receives the third signature string, and obtains the public key and the product ID respectively associated with the first node 1, the second node 2, and the third node 3 from the blockchain. The fourth node 4 verifies the validity of the third signature string based on the public keys respectively associated with the first node 1, the second node 2, and the third node 3 and the product ID, thereby verifying the authenticity of the product.
In one embodiment, the combining the third signature string, the commodity ID, and the keys respectively allocated by the supervisory node 10 to the first node 1, the second node 2, and the third node 3 to verify the third signature string, and acquiring the circulation path of the commodity includes:
acquiring public keys respectively distributed by the supervisory node 10 for the first node 1, the second node 2 and the third node 3 from the block chain, and acquiring the first signature character string and the second signature character string from the block chain;
decrypting the third signature character string by using the public key distributed to the third node 3 by the supervisory node 10 to obtain a first decrypted character string, and determining that the commodity normally flows in the third node 3 when the first decrypted character string is consistent with the second signature character string; when the first decryption character string is inconsistent with the second signature character string, determining that information deviation occurs when the commodity flows through the third node 3;
decrypting the first decryption character string by using the public key distributed to the second node 2 by the supervisory node 10 to obtain a second decryption character string, and determining that the commodity normally flows in the second node 2 when the second decryption character string is consistent with the first signature character string; when the second decryption character string is inconsistent with the first signature character string, determining that information deviation occurs when the commodity flows through the second node 2;
decrypting the second decryption character string by using the public key distributed to the first node 1 by the supervisory node 10 to obtain a third decryption character string, and determining that the commodity is a genuine commodity and the commodity normally flows in the first node 1 when the third decryption character string is consistent with the commodity ID; and when the third decryption character string is inconsistent with the commodity ID, determining that the commodity is not a genuine commodity, and the information deviation of the commodity occurs when the commodity flows through the first node 1.
In an embodiment, taking the fourth node 4 as a node corresponding to the consumer as an example, the fourth request signal may be a signal that is input by the consumer at a computer device corresponding to the fourth node 4 to request the verification of the commodity.
In one embodiment, when it is determined that the commodity is genuine, the fourth node 4 may further send a notification that the commodity is genuine to the supervising node 10; upon receiving the notification, the supervisory node 10 associates the current owner of the good with the fourth node 4, and uploads the information of the owner of the good to the blockchain. In one embodiment, upon determining that the article is not genuine, the fourth node 4 sends a notification to the supervising node 10 that the article is not genuine.
In other embodiments, to encourage the progress of the commodity transaction, the supervisory node 10 may also correspondingly create a fund account for each of the plurality of other nodes. When the first node 1 is successfully registered, the administrative node 10 may also allocate a first preset amount of virtual currency to the fund account of the first node 1. The first node 1 may also establish a fund account including a second preset amount of virtual currency for the commodity when the commodity is released. When the commodity flows to any one of the second node 2, the third node 3 and the fourth node 4, the supervising node 10 may extract a third preset amount of virtual currency from the fund account of the commodity and send the virtual currency to the fund account of the any one node. In other embodiments, when the supervising node 10 receives the notification that the commodity sent by the fourth node 4 is not genuine, the supervising node 10 may send a verification notification to the first node 1, the second node 2, and the third node 3, and when the supervising node 10 receives the verification feedback sent by the first node 1, the second node 2, or the third node 3, extract a fourth preset amount of virtual currency from the fund account of the commodity and correspondingly send the fourth preset amount of virtual currency to the fund account of the first node 1, the second node 2, or the third node 3. Thus, the nodes participating in the verification can all obtain corresponding rewards.
In summary, the commodity tracing method in the embodiment of the invention can solve the problems of serious information barrier phenomenon, easy information tampering and great tracing difficulty in the anti-counterfeiting technical level of the current tracing anti-counterfeiting system.
The above-mentioned fig. 1 introduces the commodity tracing method of the present invention in detail, and below, with reference to fig. 3, introduces a software system for implementing the commodity tracing method based on the blockchain and a hardware device architecture for implementing the commodity tracing method based on the blockchain.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
In some embodiments, computer program 610 is run in computer device 6. The computer program 610 may comprise a plurality of functional modules comprised of program code segments. The program codes of the program segments in the computer program 610 may be stored in the memory 61 of the computer device 6 and executed by the at least one processor 62 of the computer device 6 to implement the product tracing function described in fig. 1. For example, when the computer device 6 corresponds to the supervisory node 10, the at least one processor 62 may implement the corresponding functions of the supervisory node 10 in step S1 of fig. 1 by executing the computer program 610. When the computer device 6 corresponds to the first node 1, the at least one processor 62 may implement the corresponding functions of the first node 1 in steps S2 and S3 of fig. 1 by executing the computer program 610. When the computer device 6 corresponds to the second node 2, the at least one processor 62 may implement the corresponding functions of the second node 2 in step S4 of fig. 1 by executing the computer program 610. When the computer device 6 corresponds to the third node 3, the at least one processor 62 can implement the corresponding function of the third node 3 in step S5 of fig. 1 by executing the computer program 610. When the computer device 6 corresponds to the fourth node 4, the at least one processor 62 may implement the corresponding functions of the fourth node 4 in step S6 of fig. 1 by executing the computer program 610. The module referred to herein is a series of computer program segments capable of being executed by at least one processor and capable of performing a fixed function and is stored in memory.
Referring to fig. 3, in the preferred embodiment of the present invention, the computer device 6 further includes a memory 61, at least one processor 62, and a display screen 63. It will be appreciated by those skilled in the art that the configuration of the computer apparatus shown in fig. 3 does not constitute a limitation of the embodiments of the present invention, and may be either a bus-type configuration or a star-type configuration, and that the computer apparatus 6 may also include more or less hardware or software than shown, or a different arrangement of components.
In some embodiments, the computer device 6 includes a terminal capable of automatically performing numerical calculations and/or information processing according to instructions set or stored in advance, and the hardware includes but is not limited to a microprocessor, an application specific integrated circuit, a programmable gate array, a digital processor, an embedded device, and the like.
It should be noted that the computer device 6 is only an example, and other electronic products that are currently available or may come into existence in the future, such as electronic products that can be adapted to the present invention, should also be included in the scope of the present invention, and are included herein by reference.
In some embodiments, the memory 61 is used for storing program codes and various data, such as a computer program 610 installed in the computer device 6, and realizes high-speed and automatic access to the program or data during the operation of the computer device 6. The Memory 61 includes a Read-Only Memory (ROM), a Random Access Memory (RAM), a Programmable Read-Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), a One-time Programmable Read-Only Memory (OTPROM), an electronically Erasable rewritable Read-Only Memory (EEPROM), a Compact Disc Read-Only Memory (CD-ROM) or other optical Disc Memory, a magnetic disk Memory, a tape Memory, or any other medium readable by a computer that can be used to carry or store data.
In some embodiments, the at least one processor 62 may be composed of an integrated circuit, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The at least one processor 62 is a Control Unit (Control Unit) of the computer device 6, connects various components of the entire computer device 6 by using various interfaces and lines, and executes various functions of the computer device 6 and processes data, such as functions for identifying automobile parts, by running or executing programs or modules stored in the memory 61 and calling data stored in the memory 61.
Although not shown, the computer device 6 may further include a power source (such as a battery) for supplying power to the various components, and preferably, the power source may be logically connected to the at least one processor 62 through a power management device, so as to implement functions of managing charging, discharging, and power consumption through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The computer device 6 may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The integrated unit implemented in the form of a software functional module may be stored in a computer-readable storage medium. The software functional module is stored in a storage medium and includes instructions for causing a computer device (which may be a server, a personal computer, etc.) or a processor (processor) to perform parts of the methods according to the embodiments of the present invention.
In a further embodiment, in conjunction with fig. 2, the at least one processor 62 may execute operating devices of the computer device 6 as well as installed various types of application programs (e.g., the computer program 610), program code, and the like.
The memory 61 has program code stored therein, and the at least one processor 62 can call the program code stored in the memory 61 to perform related functions such as the functions of the corresponding nodes described in fig. 1.
In one embodiment of the present invention, the memory 61 stores a plurality of instructions that are executed by the at least one processor 62 for purposes of tracing the source of the commodity. The specific steps are shown in fig. 1, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or that the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A commodity tracing method based on a block chain is characterized in that the method is applied to a supervision node and a plurality of other nodes which are in communication connection with each other, wherein the other nodes comprise a first node, a second node, a third node and a fourth node, and the method comprises the following steps:
the first node uploads the related information of the commodity to a block chain, and performs signature by combining the commodity ID distributed by the supervision node for the commodity and the key distributed by the first node to obtain a first signature character string;
in response to a first request signal, the first node transmitting the first signature string to the second node;
in response to a second request signal, the second node performs signing on the key distributed by the second node in combination with the first signature string and the supervisory node to obtain a second signature string, and sends the second signature string to the third node;
in response to a third request signal, the third node performs signing on the key distributed by the third node in combination with the second signature string and the supervisory node to obtain a third signature string, and sends the third signature string to the fourth node; and
in response to a fourth request signal, the fourth node verifies the third signature string in combination with the third signature string, the commodity ID, and keys respectively allocated to the first node, the second node, and the third node by the supervisory node, and acquires a circulation path of the commodity.
2. The commodity tracing method based on the blockchain as claimed in claim 1, wherein the supervision node is the first node, the second node, and the third node respectively assigned different keys; the secret key comprises a public key and a private key; and the monitoring node uploads the public keys respectively distributed by the first node, the second node and the third node to the block chain.
3. The block chain-based commodity tracing method according to claim 2, wherein the method further comprises:
the first node, the second node, and the third node upload the first signature string, the second signature string, and the third signature string to the blockchain, respectively.
4. The method according to claim 3, wherein the combining the third signature string, the commodity ID, and the key distributed by the supervisory node to the first node, the second node, and the third node respectively verifies the third signature string, and obtains the circulation path of the commodity specifically includes:
acquiring public keys respectively distributed by the supervision node as the first node, the second node and the third node from the block chain, and acquiring the first signature character string and the second signature character string from the block chain;
decrypting the third signature character string by using the public key distributed to the third node by the supervisory node to obtain a first decrypted character string, and determining that the commodity normally flows in the third node when the first decrypted character string is consistent with the second signature character string; when the first decryption character string is inconsistent with the second signature character string, determining that information deviation occurs when the commodity flows through the third node;
decrypting the first decryption character string by using the public key distributed to the second node by the supervision node to obtain a second decryption character string, and determining that the commodity normally flows in the second node when the second decryption character string is consistent with the first signature character string; when the second decryption character string is inconsistent with the first signature character string, determining that information deviation occurs when the commodity flows through the second node;
decrypting the second decryption character string by using the public key distributed to the first node by the supervision node to obtain a third decryption character string, and determining that the commodity is a genuine commodity and the commodity normally flows in the first node when the third decryption character string is consistent with the commodity ID; and when the third decryption character string is inconsistent with the commodity ID, determining that the commodity is not a genuine commodity, and the information deviation of the commodity occurs when the commodity flows through the first node.
5. The block chain-based commodity tracing method according to claim 4, wherein the method further comprises:
when the commodity is determined to be a genuine commodity, the fourth node sends a notice that the commodity is the genuine commodity to the supervision node; and
when the supervision node receives the notification, the supervision node associates the owner of the commodity as the fourth node, and uploads the information of the owner of the commodity to the block chain.
6. The method for tracing commodity source based on block chain as claimed in claim 1, wherein the method further comprises:
when the supervising node acquires the third signature character string from the blockchain, the supervising node associates the owner of the commodity as the third node and uploads the information of the owner of the commodity to the blockchain.
7. The method as claimed in claim 1, wherein the information related to the commodity includes information of an owner of the commodity and factory time, and the supervision node encrypts and splices the information of the owner of the commodity and the factory time to obtain the commodity ID.
8. The method for tracing commodity source based on block chain as claimed in claim 1, wherein the method further comprises:
the supervision node manages registration applications of the first node, the second node, the third node and the fourth node on the blockchain, wherein the first node uploads relevant information of the commodity to the blockchain after successful registration on the blockchain.
9. A computer device, comprising a memory and a processor, wherein the memory is used for storing at least one instruction, and the processor is used for executing the at least one instruction to implement the method for tracing commodities based on blockchain according to any one of claims 1 to 8.
10. A computer-readable storage medium, wherein the computer-readable storage medium stores at least one instruction, and the at least one instruction when executed by a processor implements the method for tracing commodity source based on block chain according to any one of claims 1 to 8.
CN202110988090.XA 2021-08-26 2021-08-26 Commodity tracing method based on block chain, computer device and storage medium Pending CN113657914A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110988090.XA CN113657914A (en) 2021-08-26 2021-08-26 Commodity tracing method based on block chain, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110988090.XA CN113657914A (en) 2021-08-26 2021-08-26 Commodity tracing method based on block chain, computer device and storage medium

Publications (1)

Publication Number Publication Date
CN113657914A true CN113657914A (en) 2021-11-16

Family

ID=78492969

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110988090.XA Pending CN113657914A (en) 2021-08-26 2021-08-26 Commodity tracing method based on block chain, computer device and storage medium

Country Status (1)

Country Link
CN (1) CN113657914A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114726535A (en) * 2022-03-30 2022-07-08 北京理工大学 Privacy protection anti-counterfeiting automobile supply chain method based on block chain

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108880789A (en) * 2018-05-23 2018-11-23 众安信息技术服务有限公司 The anti-fake source tracing method of hardware product, node device and system
CN109034833A (en) * 2018-06-16 2018-12-18 复旦大学 A kind of product back-tracing information management system and method based on block chain
CN110097376A (en) * 2019-04-12 2019-08-06 阿里巴巴集团控股有限公司 Commodity source tracing method, device, equipment and storage medium
CN110599209A (en) * 2019-09-25 2019-12-20 北京艾摩瑞策科技有限公司 Wine circulation information tracing method and device based on block chain
CN110706008A (en) * 2019-10-14 2020-01-17 北京慧眼智行科技有限公司 Traceability processing method based on block chain and block chain distributed traceability system
CN111079190A (en) * 2019-12-31 2020-04-28 深圳市网心科技有限公司 Block chain supply chain transaction hiding dynamic supervision system and method
CN111160931A (en) * 2019-12-31 2020-05-15 深圳四方精创资讯股份有限公司 Wine information tracing method, device, equipment and storage medium based on block chain
CN111311282A (en) * 2020-02-20 2020-06-19 支付宝(杭州)信息技术有限公司 Commodity anti-counterfeiting verification method and system based on block chain
US20200226618A1 (en) * 2017-09-29 2020-07-16 Beijing Jingdong Shangke Information Technology Co., Ltd. Platform, method and device for tracing an object
CN111882335A (en) * 2020-08-05 2020-11-03 黄灿楠 Block chain-based object anti-counterfeiting tracing method and device
WO2020233325A1 (en) * 2019-05-21 2020-11-26 深圳壹账通智能科技有限公司 Blockchain-based tracing data acquisition method, and related apparatus

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200226618A1 (en) * 2017-09-29 2020-07-16 Beijing Jingdong Shangke Information Technology Co., Ltd. Platform, method and device for tracing an object
CN108880789A (en) * 2018-05-23 2018-11-23 众安信息技术服务有限公司 The anti-fake source tracing method of hardware product, node device and system
CN109034833A (en) * 2018-06-16 2018-12-18 复旦大学 A kind of product back-tracing information management system and method based on block chain
CN110097376A (en) * 2019-04-12 2019-08-06 阿里巴巴集团控股有限公司 Commodity source tracing method, device, equipment and storage medium
WO2020233325A1 (en) * 2019-05-21 2020-11-26 深圳壹账通智能科技有限公司 Blockchain-based tracing data acquisition method, and related apparatus
CN110599209A (en) * 2019-09-25 2019-12-20 北京艾摩瑞策科技有限公司 Wine circulation information tracing method and device based on block chain
CN110706008A (en) * 2019-10-14 2020-01-17 北京慧眼智行科技有限公司 Traceability processing method based on block chain and block chain distributed traceability system
CN111079190A (en) * 2019-12-31 2020-04-28 深圳市网心科技有限公司 Block chain supply chain transaction hiding dynamic supervision system and method
CN111160931A (en) * 2019-12-31 2020-05-15 深圳四方精创资讯股份有限公司 Wine information tracing method, device, equipment and storage medium based on block chain
CN111311282A (en) * 2020-02-20 2020-06-19 支付宝(杭州)信息技术有限公司 Commodity anti-counterfeiting verification method and system based on block chain
CN111882335A (en) * 2020-08-05 2020-11-03 黄灿楠 Block chain-based object anti-counterfeiting tracing method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114726535A (en) * 2022-03-30 2022-07-08 北京理工大学 Privacy protection anti-counterfeiting automobile supply chain method based on block chain
CN114726535B (en) * 2022-03-30 2023-10-20 北京理工大学 Privacy protection anti-fake automobile supply chain method based on blockchain

Similar Documents

Publication Publication Date Title
US12028459B2 (en) Multi-access edge computing node with distributed ledger
US10755226B1 (en) Information management system using blockchain functionalities
CA2891446C (en) Digitally secured electronic titles for products in supply chains
CN109862041A (en) A kind of digital identification authentication method, unit, system and storage medium
JP7479393B2 (en) SYSTEM AND METHOD FOR A VIRTUAL DISTRIBUTED LEDGER NETWORK
CN112527912B (en) Data processing method and device based on block chain network and computer equipment
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
CN111553792A (en) Data verification method and device based on block chain
CN111416709B (en) Voting method, device, equipment and storage medium based on block chain system
EP3598333B1 (en) Electronic device update management
CN110601896A (en) Data processing method and equipment based on block chain nodes
CN111639347A (en) Electronic warehouse receipt verification method, device, terminal and storage medium
CN111125778A (en) Copyright transaction information processing method and device
Nawale et al. Blockchain & IoT based drugs traceability for pharma industry
CN115701078B (en) Cross-chain transaction processing method, device, electronic equipment and storage medium
CN117916735A (en) Security element, method for registering a token and token reference register
CN111654375A (en) Block chain-based edge calculation security encryption method, device and system
CN113657914A (en) Commodity tracing method based on block chain, computer device and storage medium
CN114329565A (en) Data sharing method, device and storage medium
CN113435910A (en) Sales-under-sale signing method and device, electronic equipment and storage medium
CN113141404A (en) Intelligent gateway and data sharing system
CN112070567B (en) Quality control system based on block chain and control method thereof
CN105279670B (en) Application automatic publishing method and system based on trusted service management platform
CN113657972A (en) Article transaction method based on block chain, computer device and storage medium
CN113949632B (en) Dynamic node configuration method and device for block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20240913

AD01 Patent right deemed abandoned