CN114664011A - Logistics management method, system, computer device, storage medium and program product - Google Patents

Logistics management method, system, computer device, storage medium and program product Download PDF

Info

Publication number
CN114664011A
CN114664011A CN202210387321.6A CN202210387321A CN114664011A CN 114664011 A CN114664011 A CN 114664011A CN 202210387321 A CN202210387321 A CN 202210387321A CN 114664011 A CN114664011 A CN 114664011A
Authority
CN
China
Prior art keywords
box
information
unpacking
server
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210387321.6A
Other languages
Chinese (zh)
Inventor
罗巨明
朱国平
史大鹏
邵冠军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202210387321.6A priority Critical patent/CN114664011A/en
Publication of CN114664011A publication Critical patent/CN114664011A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present application relates to a logistics management method, system, computer device, storage medium and program product. The method comprises the steps of sending a locking instruction to an anti-dismantling box for loading target articles; receiving first signature locking information sent by the anti-unpacking box, and signing the first signature locking information by using a first user terminal private key to obtain second signature locking information; and sending second signature locking information to the server so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to the block chain, and returns first feedback information to the first user terminal. The logistics management method can improve the safety in the logistics process, and therefore the experience degree of online shopping of a user can be improved.

Description

Logistics management method, system, computer device, storage medium and program product
Technical Field
The present application relates to the field of logistics technology, and in particular, to a logistics management method, a logistics management system, a computer device, a storage medium, and a program product.
Background
With the continuous progress of internet technology, the rapid development of online shopping is promoted, the proportion of the total amount of online transaction in retail accounts is larger and larger, and services such as online reservation, mailing to home and the like are continuously promoted in various service industries.
However, in the process of mailing an item from a merchant to a user through express, if an error occurs, it cannot be determined whether the item mailed by the merchant is in error, a courier exchanges the item in the express process or the user receives the item in error, so that the object in error has disputes and difficult points of identification, the safety of the whole logistics process is extremely low, and the experience degree of user online shopping is reduced.
Disclosure of Invention
In view of the above, it is necessary to provide a logistics management method, a logistics management system, a computer device, a storage medium, and a program product for solving the above technical problems.
In a first aspect, an embodiment of the present application provides a logistics management method, including:
sending a locking instruction to an anti-dismantling box loaded with a target article; the locking instruction is used for indicating the locking of the anti-unpacking box, correspondingly modifying the state information of the anti-unpacking box, and signing the state information by using the anti-unpacking box private key to obtain first signed locking information;
receiving first signature locking information sent by the anti-unpacking box, and signing the first signature locking information by using a first user terminal private key to obtain second signature locking information;
and sending second signature locking information to the server so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to the block chain, and returns first feedback information to the first user terminal.
In one embodiment, the first feedback information includes a verification code, and the method further includes:
and sending the verification code to the anti-disassembly box so that the verification code is displayed on the display component of the anti-disassembly box.
In one embodiment, the verification code is a verification code signed by a server using a server private key, and the verification code is sent to the anti-dismantling box, so that the verification code is displayed on a display component of the anti-dismantling box, and the method includes:
sending the verification code to the anti-dismantling box so that the anti-dismantling box verifies the verification code by using the server public key; and if the verification passes, displaying the verification code on the display component of the anti-dismantling box.
In one embodiment, the method further comprises:
acquiring video information and sending the video information to a server; the video information includes information from the time the target item is placed in the tamper-evident container to the time the verification code is displayed on the tamper-evident container.
In one embodiment, sending second signature locking information to the server to enable the server to update the status information of the anti-unpacking box stored in the server comprises:
sending second signature locking information to the server so that the server verifies the second signature locking information by using the anti-unpacking public key; and if the verification is passed, updating the state information of the anti-unpacking box stored in the server.
In a second aspect, an embodiment of the present application provides a logistics management method, including:
determining whether the anti-unpacking box meets the transportation condition;
if so, sending a transportation instruction to the anti-dismantling box; the transport instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signed transport information;
receiving first signature transportation information sent by the anti-dismantling box, and signing the first signature transportation information by using a logistics terminal private key to obtain second signature transportation information;
and sending second signature transportation information to the server so that the server updates the anti-unpacking state information stored in the server, uploads the updated anti-unpacking state information to the block chain, and returns second feedback information to the logistics terminal.
In one embodiment, the transportation condition includes that the state of the tamper-proof box is a locked state and the tamper-proof box is not damaged, and the determining whether the tamper-proof box meets the transportation condition includes:
determining whether the state of the anti-unpacking box is a locked state according to the state information of the anti-unpacking box acquired from the block chain, and determining whether the state of the anti-unpacking box is the locked state according to the state information of the anti-unpacking box acquired from the server;
determining whether the anti-unpacking box is damaged or not according to the anti-unpacking box state information acquired from the anti-unpacking box; the anti-dismantling box is provided with a detector, and the detector is used for detecting whether the anti-dismantling box is damaged or not.
In one embodiment, when the second feedback information includes the verification code, the transportation condition further includes: the verification code on the tamper evident box is consistent with the verification code obtained from the server.
In a third aspect, an embodiment of the present application provides a logistics management method, including:
determining whether the anti-unpacking box meets the receiving condition;
if so, sending a receiving instruction to the anti-dismantling box; the receiving instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signature unlocking information;
receiving first signature unlocking information sent by the anti-dismantling box, and signing the first signature unlocking information by using a second user terminal private key to obtain second signature unlocking information;
and sending second signature unlocking information to the server so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to the block chain, and returns third feedback information to the second user terminal.
In one embodiment, the receiving condition includes that the anti-unpacking state is a transportation state and the anti-unpacking state is not damaged, and the determining whether the anti-unpacking state meets the receiving condition includes:
determining whether the state of the anti-unpacking box is a transportation state or not according to the state information of the anti-unpacking box acquired from the block chain, and determining whether the state of the anti-unpacking box is a locking state or not according to the state information of the anti-unpacking box acquired from the server;
and determining whether the anti-disassembly box is damaged or not according to the anti-disassembly box state information acquired from the anti-disassembly box.
In one embodiment, when the third feedback information includes the verification code, the receiving condition further includes: the verification code on the tamper evident box is consistent with the verification code obtained from the server.
In a fourth aspect, an embodiment of the present application provides a logistics management system, which includes a first user terminal, a logistics terminal, and a second user terminal, where the first user terminal is configured to execute the steps of the method provided in the foregoing embodiment, the logistics terminal is configured to execute the steps of the method provided in the foregoing embodiment, and the second user terminal is configured to execute the steps of the method provided in the foregoing embodiment.
In a fifth aspect, an embodiment of the present application provides a computer device, which includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the method provided by the foregoing embodiment when executing the computer program.
In a sixth aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the steps of the method provided by the foregoing embodiment.
In a seventh aspect, an embodiment of the present application further provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program implements the steps of the method provided in the foregoing embodiment.
The embodiment of the application provides a logistics management method, a logistics management system, computer equipment, a storage medium and a program product. According to the logistics management method, when a seller needs to mail an anti-unpacking box for loading a target article, the anti-unpacking box state information is signed through an anti-unpacking box private key, the first signature locking information is signed through a first user terminal private key, the anti-unpacking box state information stored in a server is updated through a server, the updated anti-unpacking box state information is uploaded to a block chain, and first feedback information is returned to a first user terminal. Therefore, the operation of the anti-dismantling box, the first user terminal and the server in the logistics management process is recorded specifically, and whether the mailing error of the seller occurs can be determined definitely when the error occurs in the logistics process. And if it is determined that the seller has an error in mailing, it may be determined which operation among the tamper box, the first user terminal, and the server has an error. That is to say, the whole process of mailing the anti-unpacking box by the seller can be traced, so that the safety of the logistics process can be improved, and the experience degree of online shopping of the user can be improved. In addition, after the state information of the anti-unpacking box is changed, the changed state information is uploaded to the block chain, and the information in the block chain cannot be tampered. Therefore, when the wrong object is identified, the object can be prevented from being repudiated, the information of state change of the anti-dismantling box can be traced, the safety in the logistics process can be improved, and the experience degree of online shopping of a user can be improved.
Drawings
Fig. 1 is a schematic structural diagram of a logistics management system according to an embodiment;
FIG. 2 is a schematic diagram of a tamper evident case according to one embodiment;
FIG. 3 is a schematic view of a tamper-evident case according to another embodiment;
FIG. 4 is a schematic diagram of a tamper-evident lock according to one embodiment;
FIG. 5 is a schematic flow chart illustrating steps of a logistics management method according to an embodiment;
FIG. 6 is a schematic flow chart illustrating steps of a logistics management method according to another embodiment;
FIG. 7 is a schematic flow chart illustrating steps of a logistics management method according to another embodiment;
FIG. 8 is a schematic view of a tamper evident structure according to another embodiment;
FIG. 9 is a schematic view of a tamper evident structure according to another embodiment;
FIG. 10 is a schematic flow chart illustrating steps of a logistics management method according to another embodiment;
FIG. 11 is a schematic flow chart illustrating steps of a logistics management method according to another embodiment;
fig. 12 is a schematic structural view of a logistics management apparatus according to an embodiment;
fig. 13 is a schematic structural view of a physical distribution management apparatus according to another embodiment;
fig. 14 is a schematic structural view of a physical distribution management apparatus according to another embodiment;
fig. 15 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, embodiments accompanying figures are described in detail below. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is capable of embodiments in many different forms than those described herein and that modifications may be made by one skilled in the art without departing from the spirit and scope of the application and it is therefore not intended to be limited to the specific embodiments disclosed below.
The numbering of the components as such, e.g., "first", "second", etc., is used herein only to distinguish the objects as described, and does not have any sequential or technical meaning.
The logistics management method provided by the present application can be applied to the logistics management system 10 shown in fig. 1, where the logistics management system 10 includes a first user terminal (i.e., a seller terminal) 101, a logistics terminal 102, a second user terminal (i.e., a buyer terminal) 103, a tamper-proof box 104, a server (i.e., an online mall server) 105, and a blockchain 106. The first user terminal 101 is communicatively connected to the tamper box 104, the server 105 and the blockchain 106, the logistics terminal 102 is communicatively connected to the tamper box 104, the server 105 and the blockchain 106, the second user terminal 103 is communicatively connected to the tamper box 104, the server 105 and the blockchain 106, and the server 105 is further communicatively connected to the blockchain 106. The blockchain may be a blockchain federation consisting of the server 105, the first user terminal 101, the second user terminal 103, and terminals of other institutions (such as bank terminals). The block chain 106 may include a verification node 1 corresponding to the first user terminal 101, a verification node 2 corresponding to the logistics terminal 102, a verification node 3 corresponding to the second user terminal 103, and a verification node 4 corresponding to other terminals. The verification nodes form a alliance block chain network based on P2P communication technology. The first user terminal 101, the logistics terminal 102 and the second user terminal 103 can obtain information in the block chain through the corresponding verification nodes respectively, and meanwhile, other terminals are prevented from submitting illegal transactions to the block chain through a consensus algorithm to modify the information in the block chain. The present embodiment does not limit the specific structures of the first user terminal 101, the logistics terminal 102, the second user terminal 103, the tamper box 104, the server 105, and the blockchain 106 in the logistics management system 10, as long as the functions thereof can be implemented. The first user terminal 101, the logistics terminal 102, and the second user terminal 103 may be, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, portable wearable devices, and the like. The server 105 may be implemented as a stand-alone server or as a server cluster comprised of multiple servers.
As shown in fig. 2, a specific structure of the tamper resistant box 104 may include a box cover 301, a box body 302, a tamper resistant lock 303, and a controller 304. The case 302 is used for placing a target object, the cover 301 is used for covering and sealing the target object placed in the case 302, and the controller 304 may be used for controlling the locking of the tamper-proof lock 303. The cover 301 and the housing 302 may be completely separable, i.e., the cover 301 may be removed integrally from the housing 302. One side of the box body 302 and one side of the box cover 301 can be movably connected. The cover 301 and the case 302 may be made of plastic, wood, or other materials having the same function. The present embodiment is not limited to the specific shapes of the cover 301 and the case 302, the materials used, and the like, as long as the functions thereof can be achieved. The number of the tamper locks 303 in the tamper resistant box may be plural, and the embodiment is not limited thereto.
As depicted in fig. 3, the tamper resistant case 104 may also include a detector 305, a power source 306, a display component 307, and a wireless communication module 308. The power source 306 is used to provide power to the detector 305, the display assembly 307, and the wireless communication module 308. The wireless communication module 308 is used to communicatively couple the controller 304 with an external terminal. The display component 307 is used to display information that needs to be displayed on the tamper resistant box 104. The detector 305 is used to detect whether the tamper-proof box 104 is damaged, and the embodiment does not limit the specific detection process of the detector 305. The present embodiment does not limit the specific structures of the detector 305, the power supply 306, the display module 305, and the wireless communication module 308, as long as the functions thereof can be realized. The power source 306 is provided with a switch that can only be turned on from the inside of the case 302, and when the target item is placed in the case 302, the switch is turned on and the power source 306 starts to supply power.
As shown in fig. 4, the tamper-proof lock 303 includes an upper lock body 30 and a lower lock body 31. The upper lock body 30 is mounted on the lower edge of the box cover 301, the lower lock body 31 is mounted on the upper edge of the box body 302, and the upper lock body 30 and the lower lock body 31 correspond to each other to lock the anti-detachment lock 303. Alternatively, the upper lock 30 is mounted inside the lower edge of the lid 301 and the lower lock 31 is mounted inside the upper edge of the box 302, i.e., the tamper lock 303 is not visible from the outer side of the lid 301 and the box 302, and the inner side may be visible or invisible. In a specific embodiment, the upper lock 30 includes conductive contacts 1, 2, 3, 4 and the lower lock 31 includes conductive contacts 7, 8, 9, 10. The conductive contacts of the upper latch body 30 and the conductive contacts of the lower latch body 31 are in close contact, so that the anti-removal latch 303 is locked. In an alternative embodiment, the conductive contact of the upper lock 30 or the conductive contact of the lower lock 31 may be designed as a resilient structure, and when the cover 301 covers the box 302, the resilient structure is in a compressed state, so as to ensure that the upper lock 30 and the lower lock 31 do not have poor contact.
The following describes the technical solutions of the present application and how to solve the technical problems with the technical solutions of the present application in detail with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
In one embodiment, as shown in fig. 5, a logistics management method is provided, which is described by taking the method as an example applied to the first user terminal in fig. 1, and includes the following steps:
500, sending a locking instruction to an anti-dismantling box for loading a target article; the locking instruction is used for indicating the anti-unpacking box to be locked, correspondingly modifying the state information of the anti-unpacking box, and signing the state information by using the anti-unpacking box private key to obtain first signature locking information.
Tamper evident loading of the target item means that the seller has placed the target item to be mailed to the buyer in the tamper evident box. That is, after the seller places the target item in the tamper-resistant box, the first user terminal of the seller sends a lock instruction to the tamper-resistant box. After receiving the locking instruction, the controller in the anti-dismantling box controls the anti-dismantling lock to be locked, and correspondingly modifies the state information of the anti-dismantling box, namely modifies the original state information (unlocked or not locked) of the anti-dismantling box to be locked. The state information of the tamper resistant case includes a state in which the tamper resistant case is located at this time. After the anti-unpacking box modifies the state information, the state information is signed by using a private key (anti-unpacking box private key) of the anti-unpacking box, and first signature locking information is obtained. The first signature lockout information may indicate that the status information of the tamper resistant box has been modified.
And step 510, receiving first signature locking information sent by the anti-unpacking box, and signing the first signature locking information by using a first user terminal private key to obtain second signature locking information.
And after the anti-unpacking box obtains the first signature locking information, the anti-unpacking box sends the first signature locking information to the first user terminal. After receiving the first signature locking information, the first user terminal signs the first signature locking information by using a private key of the first user terminal (a private key of the first user terminal) to obtain second signature locking information. The second signature lockout information may indicate that the first user terminal has learned that the tamper resistant status information has been modified and confirmed.
And step 520, sending second signature locking information to the server so that the server updates the anti-unpacking state information stored in the server, uploads the updated anti-unpacking state information to the block chain, and returns first feedback information to the first user terminal.
And after obtaining the second signature locking information, the first user terminal sends the second signature locking information to the server. The server records the state information of the anti-unpacking box, and after receiving the second signature locking information, the server updates the state information of the anti-unpacking box recorded in the server according to the second signature locking information. In other words, the server modifies the status of the anti-unpacking recorded in the server to be the locked status according to the second signature locking information.
And after updating the recorded state information of the anti-unpacking box, the server uploads the updated state information of the anti-unpacking box to the block chain so as to store the updated state information of the anti-unpacking box in the block chain. Specifically, the information (i.e. the uplink information) uploaded to the block chain by the server may include updated status information of the tamper-evident box, a number of the tamper-evident box, a name and a password of a user to which the tamper-evident box belongs, and a transaction time of the target item. The number of the anti-tamper box and the name and the password of the user to which the anti-tamper box belongs may be sent to the server when the user registers in the server.
And after uploading the updated state information of the anti-unpacking box to the block chain, the server returns first feedback information to the first user terminal. The first feedback information is used for informing the first user terminal that the server has modified the recorded state information of the anti-unpacking box and uploaded the state information into the block chain.
According to the logistics management method, when a seller needs to mail an anti-unpacking box for loading a target article, the anti-unpacking box state information is signed through an anti-unpacking box private key, the first signature locking information is signed through a first user terminal private key, the anti-unpacking box state information stored in a server is updated through a server, the updated anti-unpacking box state information is uploaded to a block chain, and first feedback information is returned to a first user terminal. Therefore, the operation of the anti-dismantling box, the first user terminal and the server in the logistics management process is recorded specifically, and whether the mailing error of the seller occurs can be determined definitely when the error occurs in the logistics process. And if it is determined that the seller has an error in mailing, it may be determined which operation among the tamper box, the first user terminal, and the server has an error. That is to say, the whole process of mailing the anti-unpacking box by the seller can be traced, so that the safety of the logistics process can be improved, and the experience degree of online shopping of the user can be improved. In addition, after the state information of the anti-dismantling box is changed, the changed state information is uploaded to the block chain, and the information in the block chain cannot be tampered. Therefore, when the wrong object is identified, the object can be prevented from being repudiated, the information of state change of the anti-dismantling box can be traced, the safety in the logistics process can be improved, and the experience degree of online shopping of a user can be improved.
In one embodiment, when the first feedback information includes the verification code, the method for managing the logistics further includes the following steps:
and sending the verification code to the anti-disassembly box so that the verification code is displayed on the display component of the anti-disassembly box.
The verification code is generated by the server after modifying the anti-unpacking state information stored by the server. After receiving the verification code returned by the server, the first user terminal sends the verification code to the anti-unpacking controller, and the controller displays the verification code on the anti-unpacking display component. The embodiment does not limit the specific structure of the display component on the anti-dismantling box as long as the function thereof can be realized.
In this embodiment, through show the identifying code behind the display module of preventing tearing open the case, can be convenient for follow-up clear and definite identifying code that obtains to prevent tearing open the case and correspond to use this identifying code to verify preventing tearing open the case.
In an alternative embodiment, the verification code may be sent directly to the tamper resistant box by the server, so that the verification code does not need to be transmitted through the first user terminal, and the efficiency of transmitting the verification code can be improved.
In one embodiment, when the verification code is the verification code signed by the server using the server private key, the step involving sending the verification code to the tamper-evident box so that a possible implementation manner of the verification code is displayed on a display component of the tamper-evident box includes:
sending the verification code to the anti-dismantling box so that the anti-dismantling box verifies the verification code by using the server public key; and if the verification passes, displaying the verification code on the display component of the anti-dismantling box.
After the server generates the initial verification code, the server signs the initial verification code by using a private key of the server to obtain the signed verification code. The server public key corresponds to the server private key, and after the first user terminal sends the verification code to the anti-dismantling box, the anti-dismantling box verifies the verification code by using the server public key so as to determine whether the verification is generated by the server. If the anti-tamper box determines that the verification code is generated by the server, the anti-tamper box displays the verification code on the display component; if the tamper evident box determines that the verification code was not generated by the server, it indicates that the verification code was incorrect and cannot be displayed on the display assembly, requiring the verification code to be retrieved.
In this embodiment, the anti-dismantling box verifies the signed verification code by using the server public key, and can verify whether the verification code is generated by the server, so that the security in the logistics process can be improved, and the experience of online shopping of a user can be improved.
In one embodiment, the logistics management method further comprises the following:
acquiring video information and sending the video information to a server; the video information includes information from the time the target item is placed in the tamper-evident container to the time the verification code is displayed on the tamper-evident container.
The video information is captured by the first user terminal and uploaded to the server. When the seller places the target object into the anti-unpacking box, locks the anti-unpacking box and displays the verification code on the anti-unpacking box, the first user terminal shoots the process to form video information.
In this embodiment, the first user terminal sends the video information to the server, so that a user can conveniently determine whether an error exists in a target item mailed by a seller through the video information, the safety of a logistics process can be improved, and the user online shopping experience can be improved.
In one embodiment, the method involves sending second signature lockout information to the server to enable the server to update the status information of the anti-unpacking box stored in the server, and the method includes the following steps:
sending second signature locking information to the server so that the server verifies the second signature locking information by using the anti-unpacking public key; and if the verification is passed, updating the state information of the anti-unpacking box stored in the server.
The second signature locking information sent by the server is signed by the anti-theft box by using the private key of the anti-theft box. The server comprises an anti-unpacking public key corresponding to the anti-unpacking private key, and after receiving the second signature locking information, the server verifies the second signature locking information by using the anti-unpacking public key so as to determine whether the second signature locking information passes through the anti-unpacking signature. If the server determines that the second signature locking information is the anti-unpacking signature, the server updates the anti-unpacking state information stored in the server according to the second signature locking information, namely, the anti-unpacking state (unlocked or unlocked) in the server is updated to be a locked state; if the server determines that the second signature lockout message is not a tamper resistant signature, the server may generate an error message that may be used to indicate that the second signature lockout message was not sent by a tamper resistant to the first user terminal.
In this embodiment, the server verifies the second signature locking information by using the anti-unpacking public key, and can verify whether the second signature locking information is sent to the first user terminal by the anti-unpacking box, so that the security in the logistics process can be improved, and the experience of online shopping of the user can be improved.
In an embodiment, as shown in fig. 6, a logistics management method is provided, which is described by taking the method as an example applied to the logistics terminal in fig. 1, and includes the following steps:
and step 600, determining whether the anti-dismantling box meets the transportation condition.
After receiving the anti-dismantling box which needs to be mailed by the seller, the logistics company determines whether the anti-dismantling box meets the transportation condition through the logistics terminal. In other words, the logistics terminal determines that the anti-tamper box received by the logistics company has no error, that is, determines that the anti-tamper box mailed by the seller has no error. The shipping condition is the basis for determining that no mistake has been made in the case of the anti-tamper box mailed by the seller. The embodiment does not limit the method of specifically determining whether the tamper-evident box meets the transportation condition, as long as the function thereof can be realized.
Step 610, if the condition is met, sending a transportation instruction to the anti-dismantling box; the transport instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signed transport information.
And if the logistics terminal determines that the anti-dismantling box meets the transportation condition, namely the logistics terminal determines that the anti-dismantling box mailed by the seller has no error, the logistics terminal sends a transportation instruction to the anti-dismantling box. The controller of the tamper resistant case modifies the state information of the tamper resistant case, i.e., modifies the state of the tamper resistant case (locked state) to the transportation state, upon receiving the transportation instruction. After the anti-unpacking box modifies the state information, the state information is signed by using a private key (anti-unpacking box private key) of the anti-unpacking box, and first signed transportation information is obtained. The first signed shipping information may indicate that the tamper resistant status information has been modified.
And step 620, receiving the first signature transportation information sent by the anti-dismantling box, and signing the first signature transportation information by using a logistics terminal private key to obtain second signature transportation information.
And after the anti-unpacking box obtains the first signature transportation information, the first signature transportation information is sent to the logistics terminal. After the logistics terminal receives the first signature transportation information, the logistics terminal signs the first signature transportation information by using a private key of the logistics terminal (a logistics terminal private key) to obtain second signature transportation information. The second signature transportation information can indicate that the logistics terminal has obtained the state information of the anti-unpacking box, and the state information of the anti-unpacking box is modified and confirmed.
Step 630, sending the second signature transportation information to the server, so that the server updates the anti-unpacking state information stored in the server, uploads the updated anti-unpacking state information to the block chain, and returns second feedback information to the logistics terminal.
And after the logistics terminal obtains the second signature transportation information, the logistics terminal sends the second signature transportation information to the server. And after receiving the second signature transportation information, the server updates the anti-unpacking state information recorded in the server according to the second signature transportation information. In other words, the server modifies the anti-unpacking status recorded in the server to transportation according to the second signature transportation information.
After updating the recorded state information of the anti-unpacking box, the server uploads the updated state information of the anti-unpacking box to the block chain so as to store the updated state information of the anti-unpacking box in the block chain, namely, store the information of which the anti-unpacking box is in a transportation state in the block chain.
And after uploading the updated state information of the anti-unpacking box to the block chain, the server returns second feedback information to the logistics terminal. The second feedback information is used for informing the logistics terminal that the server modifies the recorded state information of the anti-unpacking box and uploads the modified state information to the block chain.
According to the logistics management method provided by the embodiment of the application, when the logistics company needs to mail the anti-disassembly box, whether the mail anti-disassembly box meets the transportation condition is determined, so that the fact that no error occurs in the mail anti-disassembly box of the logistics company can be determined. The state information of the anti-unpacking box is signed through the anti-unpacking box private key, the first signature transportation information is signed through the logistics terminal private key, the state information of the anti-unpacking box stored in the server is updated through the server, the updated state information of the anti-unpacking box is uploaded to the block chain, and second feedback information is returned to the logistics terminal. Therefore, the operations of the anti-dismantling box, the logistics terminal and the server in the logistics management process are recorded specifically, and when an error occurs in the logistics process, whether the error occurs in the mailing of the logistics company can be determined definitely. And if it is determined that the mailing of the logistics company is in error, it may be determined which operation among the tamper-proof box, the logistics terminal, and the server is in error. That is to say, the whole process of mailing the anti-unpacking box by the logistics company can be traced, so that the safety of the logistics process can be improved, and the experience degree of online shopping of a user can be improved. In addition, after the state information of the anti-unpacking box is changed, the changed state information is uploaded to the block chain, and the information in the block chain cannot be tampered. Therefore, when the wrong object is identified, the object can be prevented from being repudiated, the information of state change of the anti-dismantling box can be traced, the safety in the logistics process can be improved, and the experience degree of online shopping of a user can be improved.
In one embodiment, if the transportation condition includes that the status of the tamper resistant box is the locked status and the tamper resistant box is not broken, the step of determining whether the tamper resistant box satisfies the transportation condition as shown in fig. 7 includes:
step 700, determining whether the state of the anti-unpacking box is a locked state according to the state information of the anti-unpacking box acquired from the block chain, and determining whether the state of the anti-unpacking box is a locked state according to the state information of the anti-unpacking box acquired from the server.
The logistics terminal acquires the anti-unpacking state information of the certificate stored in the block chain by accessing the block chain, and determines whether the anti-unpacking state is the locking state or not according to the anti-unpacking state information of the certificate stored in the block chain. Meanwhile, the logistics terminal obtains the anti-unpacking state information stored in the server, and determines whether the anti-unpacking state is a locked state or not according to the anti-unpacking state information in the server.
Step 710, determining whether the anti-unpacking box is damaged or not according to the anti-unpacking box state information acquired from the anti-unpacking box; the anti-dismantling box is provided with a detector which is used for detecting whether the anti-dismantling box is damaged or not.
The logistics terminal acquires the state information of the anti-unpacking box from the anti-unpacking box and determines whether the anti-unpacking box is damaged or not according to the state information of the anti-unpacking box in the anti-unpacking box. Specifically, the detector included in the tamper resistant box may detect whether the tamper resistant box is damaged in real time, and if the detector detects that the tamper resistant box is damaged, the state of the tamper resistant box may be modified to be damaged.
In an alternative embodiment, the tamper evident case is provided with longitudinal coils, as shown in figure 8, panel a. The box body of the anti-dismantling box is also provided with a latitude coil, as shown in a diagram B in figure 8. The intersection of the longitude coil and the latitude coil arranged on the box body of the anti-disassembly box is insulated. The anti-dismantling box body comprises conductive contacts 5, 6, 11 and 12, wherein the conductive contacts 5 and 6 are respectively connected with the a end point and the b end point of the longitude coil, and the conductive contacts 11 and 12 are respectively connected with the c end point and the d end point of the latitude coil. The detector detects whether the case is broken by detecting whether the longitude coil and the latitude coil are disconnected. Specifically, the detector is a current detector, and whether the box body is damaged or not is determined by detecting current signals on the longitude coil and the latitude coil. Similarly, the anti-dismantling box cover is also provided with a longitude coil and a latitude coil, two end points of the longitude coil can be respectively connected with the conductive contacts 1 and 2 of the upper locking body, two end points of the latitude coil can be respectively connected with the conductive contacts 3 and 4 of the upper locking body, and the detector detects whether the box cover is damaged or not by detecting whether the longitude coil and the latitude coil are disconnected or not. The detector determines that the tamper evident box is not damaged only when it detects that neither the box cover nor the box body is damaged. In particular, the distribution of the longitudinal coils on the tamper evident box may be as shown in fig. 9.
In this embodiment, there are three transportation conditions, one is that the state of the anti-unpacking box in the block chain is a locked state, the other is that the state of the anti-unpacking box in the server is a locked state, and the other is the state information of the anti-unpacking box in the anti-unpacking box, and the anti-unpacking box can be determined to meet the transportation conditions only when the anti-unpacking box meets the three transportation conditions at the same time; and if one of the three transportation conditions is not met, determining that the anti-dismantling box is not met with the transportation conditions.
In this embodiment, before the logistics company transports the anti-unpacking box, it is determined that the anti-unpacking box is not damaged and the state information of the anti-unpacking box in the server and the block chain is accurate, and then the anti-unpacking box is subjected to subsequent processing. Therefore, the situation that the seller is wrongly identified as the commodity distribution company in the process of mailing the commodity can be avoided, the safety of the commodity distribution process can be improved, and the user online shopping experience can be improved.
In one embodiment, when the second feedback information includes the verification code, the transportation condition further includes: the verification code on the tamper evident box is consistent with the verification code obtained from the server.
The verification code in the second feedback information can be obtained from the video information of the server. For the description of the video information, reference may be made to the detailed description in the above embodiments, which is not repeated herein. When the second feedback information returned to the logistics terminal by the server comprises the verification code, the transportation condition further comprises that the verification code on the anti-dismantling box is consistent with the verification code obtained from the server. In other words, when determining whether the anti-tamper box meets the transportation condition, the logistics terminal further needs to determine whether the verification code on the anti-tamper box is consistent with the verification code in the second feedback information (i.e., the verification code obtained from the video information sent by the server).
There are four conditions under transport: the state of preventing the unpacking in the block chain is the locked state, the state of preventing the unpacking in the server is the locked state, the unpacking preventing is not destroyed, and the verification code on the unpacking preventing is consistent with the verification code obtained from the server, and the logistics terminal can determine that the unpacking preventing is consistent with the transportation condition only under the condition that the unpacking preventing is consistent with the four transportation conditions.
In this embodiment, the safety during the logistics process can be further improved by increasing the transportation conditions.
In one embodiment, as shown in fig. 10, a logistics management method is provided, which is described by taking the example that the method is applied to the second user terminal in fig. 1, and includes the following steps:
step 101, determining whether the anti-unpacking box meets the receiving condition.
After receiving the anti-tamper box mailed by the logistics company, the buyer can determine whether the anti-tamper box meets the receiving condition through the second user terminal. In other words, the second user terminal may determine that the anti-tamper box received by the purchaser has no error, i.e., determine that the anti-tamper box mailed by the logistics company has no error. The receiving condition is the basis for determining that the process of mailing the anti-unpacking box by the logistics company has no error. The present embodiment does not limit the method of specifically determining whether the tamper resistant box meets the receiving condition, as long as the function thereof can be implemented.
102, if the data are in accordance with the preset data, sending a receiving instruction to the anti-dismantling box; the receiving instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signature unlocking information.
And if the first user terminal determines that the anti-dismantling box meets the receiving condition, namely the first user terminal determines that the anti-dismantling box mailed by the logistics company has no error, the first user terminal sends a receiving instruction to the anti-dismantling box. After receiving the receiving instruction, the controller of the anti-unpacking box can modify the state information of the anti-unpacking box, namely modifying the state information (transportation) of the anti-unpacking box into unlocking. After the state information is modified by the anti-unpacking box, the state information is signed by using a private key (anti-unpacking box private key) of the anti-unpacking box, and first signature unlocking information is obtained. The first signed unlock message may indicate that the tamper resistant status message has been modified.
And 103, receiving the first signature unlocking information sent by the anti-dismantling box, and signing the first signature unlocking information by using a second user terminal private key to obtain second signature unlocking information.
And after the anti-unpacking box obtains the first signature unlocking information, the first signature unlocking information is sent to the second user terminal. After receiving the first signature unlocking information, the second user terminal signs the first signature unlocking information by using a private key of the second user terminal (a private key of the second user terminal) to obtain second signature unlocking information. The second signed unlock message may indicate that the second user terminal has obtained the tamper resistant status message as modified and confirmed.
And step 104, sending the second signature unlocking information to the server so that the server updates the anti-unpacking state information stored in the server, uploads the updated anti-unpacking state information to the block chain, and returns third feedback information to the second user terminal.
And after the second user terminal obtains the second signature unlocking information, the second user terminal sends the second signature unlocking information to the server. And after receiving the second signature unlocking information, the server updates the state information of the anti-unpacking box recorded in the server according to the second signature unlocking information. In other words, the server modifies the state of the anti-unpacking box recorded in the server to be unlocked according to the second signature unlocking information.
After updating the recorded state information of the anti-unpacking box, the server uploads the updated state information of the anti-unpacking box to the block chain so as to store the updated state information of the anti-unpacking box in the block chain, namely, store the information of which the anti-unpacking box is in an unlocked state in the block chain.
And after uploading the updated state information of the anti-unpacking box to the block chain, the server returns third feedback information to the second user terminal. The third feedback information is used for informing the second user terminal that the server has modified the recorded state information of the anti-unpacking box and uploaded the state information into the block chain.
According to the logistics management method, when a buyer needs to receive the anti-unpacking box, whether the received anti-unpacking box meets the receiving condition or not is determined, and therefore the fact that the anti-unpacking box received by the buyer does not have errors can be determined. The state information of the anti-unpacking box is signed through the anti-unpacking box private key, the first signature unlocking information is signed through the second user terminal private key, the server updates the state information of the anti-unpacking box stored in the server, the updated state information of the anti-unpacking box is uploaded to the block chain, and third feedback information is returned to the second user terminal. In this way, the operations of the anti-unpacking box, the second user terminal and the server in the logistics management process are recorded specifically, so that when an error occurs in the logistics process, which operation among the anti-unpacking box, the second user terminal and the server has the error can be determined. That is to say, the whole process of receiving the anti-unpacking box by the second user terminal can be traced, so that the safety of the logistics process can be improved, and the experience degree of online shopping of the user can be improved. In addition, after the state information of the anti-dismantling box is changed, the changed state information is uploaded to the block chain, and the information in the block chain cannot be tampered. Therefore, when the wrong object is identified, the object can be prevented from being repudiated, the information of state change of the anti-dismantling box can be traced, the safety in the logistics process can be improved, and the experience degree of online shopping of a user can be improved.
In one embodiment, if the receiving condition includes that the anti-tamper box is in a transportation state and the anti-tamper box is not damaged, the step of determining whether the anti-tamper box satisfies the receiving condition is shown in fig. 11 and includes:
and step 111, determining whether the state of the anti-unpacking box is the transportation state according to the state information of the anti-unpacking box acquired from the block chain, and determining whether the state of the anti-unpacking box is the transportation state according to the state information of the anti-unpacking box acquired from the server.
And the second user terminal acquires the anti-unpacking state information of the certificate stored in the block chain by accessing the block chain, and determines whether the anti-unpacking state is a transportation state or not according to the anti-unpacking state information of the certificate stored in the block chain. Meanwhile, the second user terminal obtains the anti-unpacking state information stored in the server and determines whether the anti-unpacking state is the transportation state or not according to the anti-unpacking state information in the server.
And step 112, determining whether the anti-disassembly box is damaged or not according to the anti-disassembly box state information acquired from the anti-disassembly box.
The second user terminal obtains the state information of the anti-unpacking box from the anti-unpacking box and determines whether the anti-unpacking box is damaged or not according to the state information of the anti-unpacking box in the anti-unpacking box. The specific method for determining whether the anti-unpacking box is damaged or not by the second user terminal may be the same as the method for determining whether the anti-unpacking box is damaged or not by the logistics terminal, and will not be described herein.
In this embodiment, there are three receiving conditions, one is that the anti-unpacking state in the block chain is a transportation state, the other is that the anti-unpacking state in the server is a transportation state, and the other is the state information of the anti-unpacking state, and it can be determined that the anti-unpacking state meets the receiving conditions only when the anti-unpacking state meets the three receiving conditions at the same time; and if one of the three receiving conditions is not met, determining that the anti-dismantling box is not met with the receiving conditions.
In this embodiment, before the second user terminal receives the anti-unpacking box, it is determined that the anti-unpacking box is not damaged and the state information of the anti-unpacking box in the server and the block chain is accurate, and then the anti-unpacking box is subjected to subsequent processing. Therefore, the situation that the logistics company is mistakenly identified as a buyer in the receiving process when the anti-unpacking box is mailed to have an error can be avoided, the safety of the logistics process can be improved, and the experience of online shopping of a user can be improved.
In one embodiment, when the third feedback information includes the verification code, the receiving condition further includes: the verification code on the tamper evident box is consistent with the verification code obtained from the server.
The verification code in the third feedback information can be obtained from the video information of the server. For the description of the video information, reference may be made to the specific description in the foregoing embodiments, and details are not repeated here. When the third feedback information returned by the server to the second user terminal includes the verification code, the receiving condition may further include that the verification code on the tamper resistant box is consistent with the verification code acquired from the server. In other words, when determining whether the anti-tamper box satisfies the receiving condition, the second user terminal further needs to determine whether the verification code on the anti-tamper box is consistent with the verification code in the third feedback information (i.e., the verification code obtained from the video information sent by the server).
There are four reception conditions: the state of the anti-unpacking box in the block chain is a transportation state, the state of the anti-unpacking box in the server is a transportation state, the anti-unpacking box is not damaged, and the verification code on the anti-unpacking box is consistent with the verification code obtained from the server.
In this embodiment, the receiving condition is increased, and the safety in the logistics process can be further improved.
In one embodiment, the logistics management method further comprises: after the buyer receives the target object, the logistics terminal can access the server to determine whether the anti-unpacking state is an unlocking state; the logistics terminal can access the block chain and determine whether the anti-unpacking state is an unlocking state. And if the anti-unpacking states are all unlocking states, determining that the buyer successfully receives the target article.
It should be understood that, although the steps in the flowcharts related to the embodiments as described above are sequentially displayed as indicated by arrows, the steps are not necessarily performed sequentially as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in the flowcharts related to the embodiments described above may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the execution order of the steps or stages is not necessarily sequential, but may be rotated or alternated with other steps or at least a part of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the present application further provides a logistics management apparatus for implementing the above related logistics management method. The implementation scheme for solving the problem provided by the device is similar to the implementation scheme recorded in the method, so the specific limitations in one or more embodiments of the logistics management device provided below can be referred to the limitations of the logistics management method in the above, and are not described herein again.
Referring to fig. 12, an embodiment of the present application provides a logistics management apparatus 20, which includes a first sending module 21, a first receiving module 22, and a second sending module 23. Wherein,
the first sending module 21 is configured to send a locking instruction to a tamper resistant box on which the target item is loaded; the locking instruction is used for indicating the anti-unpacking box to be locked, correspondingly modifying the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signature locking information;
the first receiving module 22 is configured to receive first signature locking information sent by the anti-unpacking box, and sign the first signature locking information by using a first user terminal private key to obtain second signature locking information;
the second sending module 23 is configured to send second signature locking information to the server, so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to the block chain, and returns first feedback information to the first user terminal.
Referring to fig. 13, an embodiment of the present application provides a logistics management apparatus 30, which includes a first determining module 31, a third sending module 32, a second receiving module 33, and a fourth sending module 34. Wherein,
the first determining module 31 is used for determining whether the anti-dismantling box meets the transportation condition;
the third sending module 32 is used for sending a transportation instruction to the anti-dismantling box if the condition is met; the transport instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signed transport information;
the second receiving module 33 is configured to receive the first signed transportation information sent by the anti-tamper box, and sign the first signed transportation information by using the logistics terminal private key to obtain second signed transportation information;
the fourth sending module 34 is configured to send the second signature transportation information to the server, so that the server updates the anti-unpacking state information stored in the server, uploads the updated anti-unpacking state information to the block chain, and returns second feedback information to the logistics terminal.
Referring to fig. 14, an embodiment of the present application provides a logistics management apparatus 40, which includes a second determining module 41, a fifth sending module 42, a third receiving module 43, and a sixth sending module 44. Wherein,
the second determination module 41 is used for determining whether the anti-dismantling box meets the receiving condition;
the fifth sending module 42 is configured to send a receiving instruction to the tamper resistant box if the received instruction is met; the receiving instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signature unlocking information;
the third receiving module 43 is configured to receive the first signature unlocking information sent by the anti-tamper box, and sign the first signature unlocking information by using a second user terminal private key to obtain second signature unlocking information;
the sixth sending module 44 is configured to send the second signature unlocking information to the server, so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to the block chain, and returns third feedback information to the second user terminal.
The respective modules of the physical distribution management apparatus 20, the physical distribution management apparatus 30, and the physical distribution management apparatus 40 described above may be entirely or partially implemented by software, hardware, or a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 15. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a logistics management method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 15 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a computer device comprising a memory and a processor, the memory having stored therein a computer program that when executed by the processor performs the steps of:
sending a locking instruction to an anti-dismantling box loaded with a target article; the locking instruction is used for indicating the anti-unpacking box to be locked, correspondingly modifying the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signature locking information;
receiving first signature locking information sent by the anti-unpacking box, and signing the first signature locking information by using a first user terminal private key to obtain second signature locking information;
and sending second signature locking information to the server so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to the block chain, and returns first feedback information to the first user terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
determining whether the anti-unpacking box meets the transportation condition;
if so, sending a transportation instruction to the anti-dismantling box; the transportation instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box and signing the state information by using an anti-unpacking box private key to obtain first signed transportation information;
receiving first signature transportation information sent by the anti-dismantling box, and signing the first signature transportation information by using a logistics terminal private key to obtain second signature transportation information;
and sending second signature transportation information to the server so that the server updates the anti-unpacking state information stored in the server, uploads the updated anti-unpacking state information to the block chain, and returns second feedback information to the logistics terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
determining whether the anti-unpacking box meets the receiving condition;
if so, sending a receiving instruction to the anti-dismantling box; the receiving instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signature unlocking information;
receiving first signature unlocking information sent by the anti-dismantling box, and signing the first signature unlocking information by using a second user terminal private key to obtain second signature unlocking information;
and sending second signature unlocking information to the server so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to the block chain, and returns third feedback information to the second user terminal.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
sending a locking instruction to an anti-dismantling box loaded with a target article; the locking instruction is used for indicating the anti-unpacking box to be locked, correspondingly modifying the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signature locking information;
receiving first signature locking information sent by the anti-unpacking box, and signing the first signature locking information by using a first user terminal private key to obtain second signature locking information;
and sending second signature locking information to the server so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to the block chain, and returns first feedback information to the first user terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining whether the anti-unpacking box meets the transportation condition;
if so, sending a transportation instruction to the anti-dismantling box; the transportation instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box and signing the state information by using an anti-unpacking box private key to obtain first signed transportation information;
receiving first signature transportation information sent by the anti-dismantling box, and signing the first signature transportation information by using a logistics terminal private key to obtain second signature transportation information;
and sending second signature transportation information to the server so that the server updates the anti-unpacking state information stored in the server, uploads the updated anti-unpacking state information to the block chain, and returns second feedback information to the logistics terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining whether the anti-unpacking box meets the receiving condition;
if yes, sending a receiving instruction to the anti-dismantling box; the receiving instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signature unlocking information;
receiving first signature unlocking information sent by the anti-unpacking box, and signing the first signature unlocking information by using a second user terminal private key to obtain second signature unlocking information;
and sending second signature unlocking information to the server so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to the block chain, and returns third feedback information to the second user terminal.
In one embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, performs the steps of:
sending a locking instruction to an anti-dismantling box loaded with a target article; the locking instruction is used for indicating the anti-unpacking box to be locked, correspondingly modifying the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signature locking information;
receiving first signature locking information sent by the anti-unpacking box, and signing the first signature locking information by using a first user terminal private key to obtain second signature locking information;
and sending second signature locking information to the server so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to the block chain, and returns first feedback information to the first user terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining whether the anti-unpacking box meets the transportation condition;
if so, sending a transportation instruction to the anti-dismantling box; the transport instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signed transport information;
receiving first signature transportation information sent by the anti-dismantling box, and signing the first signature transportation information by using a logistics terminal private key to obtain second signature transportation information;
and sending second signature transportation information to the server so that the server updates the anti-unpacking state information stored in the server, uploads the updated anti-unpacking state information to the block chain, and returns second feedback information to the logistics terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining whether the anti-unpacking box meets the receiving condition;
if so, sending a receiving instruction to the anti-dismantling box; the receiving instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signature unlocking information;
receiving first signature unlocking information sent by the anti-dismantling box, and signing the first signature unlocking information by using a second user terminal private key to obtain second signature unlocking information;
and sending second signature unlocking information to the server so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to the block chain, and returns third feedback information to the second user terminal.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high-density embedded nonvolatile Memory, resistive Random Access Memory (ReRAM), Magnetic Random Access Memory (MRAM), Ferroelectric Random Access Memory (FRAM), Phase Change Memory (PCM), graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others. The databases referred to in various embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing based data processing logic devices, etc., without limitation.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (15)

1. A method for logistics management, the method comprising:
sending a locking instruction to an anti-dismantling box loaded with a target article; the locking instruction is used for indicating the anti-unpacking box to be locked, correspondingly modifying the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signature locking information;
receiving the first signature locking information sent by the anti-unpacking box, and signing the first signature locking information by using a first user terminal private key to obtain second signature locking information;
and sending the second signature locking information to a server so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to a block chain, and returns first feedback information to the first user terminal.
2. The method of claim 1, wherein the first feedback information comprises a verification code, the method further comprising:
and sending the verification code to the anti-disassembly box so that the verification code is displayed on a display component of the anti-disassembly box.
3. The method of claim 2, wherein the verification code is a verification code signed by the server using a server private key, and the sending the verification code to the tamper resistant box to cause the verification code to be displayed on a display component of the tamper resistant box comprises:
sending the verification code to the anti-dismantling box so that the anti-dismantling box verifies the verification code by using a server public key; and if the verification is passed, displaying the verification code on a display component of the anti-disassembly box.
4. The method of claim 2, further comprising:
acquiring video information and sending the video information to the server; the video information includes information of a process from when the target item is put into the tamper-proof case to when the verification code is displayed on the tamper-proof case.
5. The method of claim 1, wherein sending the second signature lockout message to a server to cause the server to update the status information of the tamper evident box stored in the server comprises:
sending the second signature locking information to the server so that the server verifies the second signature locking information by using an anti-unpacking public key; and if the verification is passed, updating the state information of the anti-unpacking box stored in the server.
6. A method for logistics management, the method comprising:
determining whether the anti-unpacking box meets the transportation condition;
if so, sending a transportation instruction to the anti-dismantling box; the transportation instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using an anti-unpacking box private key to obtain first signed transportation information;
receiving first signature transportation information sent by the anti-unpacking box, and signing the first signature transportation information by using a logistics terminal private key to obtain second signature transportation information;
and sending the second signature transportation information to a server so that the server updates the anti-unpacking state information stored in the server, uploads the updated anti-unpacking state information to a block chain, and returns second feedback information to the logistics terminal.
7. The method of claim 6, wherein the transportation condition includes that the status of the tamper evident box is a locked status and the tamper evident box is not breached, and wherein determining whether the tamper evident box satisfies the transportation condition comprises:
determining whether the state of the anti-unpacking box is a locked state according to the state information of the anti-unpacking box acquired from the block chain, and determining whether the state of the anti-unpacking box is the locked state according to the state information of the anti-unpacking box acquired from the server;
determining whether the anti-unpacking box is damaged or not according to the state information of the anti-unpacking box acquired from the anti-unpacking box; the anti-dismantling box is provided with a detector, and the detector is used for detecting whether the anti-dismantling box is damaged or not.
8. The method of claim 7, wherein when the second feedback information comprises a verification code, the shipping condition further comprises: and the verification code on the anti-dismantling box is consistent with the verification code obtained from the server.
9. A method for logistics management, the method comprising:
determining whether the anti-unpacking box meets the receiving condition;
if yes, sending a receiving instruction to the anti-unpacking box; the receiving instruction is used for indicating the anti-unpacking box to correspondingly modify the state information of the anti-unpacking box, and signing the state information by using the anti-unpacking box private key to obtain first signature unlocking information;
receiving first signature unlocking information sent by the anti-unpacking box, and signing the first signature unlocking information by using a second user terminal private key to obtain second signature unlocking information;
and sending the second signature unlocking information to a server so that the server updates the state information of the anti-unpacking box stored in the server, uploads the updated state information of the anti-unpacking box to a block chain, and returns third feedback information to the second user terminal.
10. The method of claim 9, wherein the receiving condition includes that the state of the tamper-proof box is a transport state and the tamper-proof box is not damaged, and the determining whether the tamper-proof box satisfies the receiving condition includes:
determining whether the state of the anti-unpacking box is a transportation state or not according to the state information of the anti-unpacking box, which is acquired from the block chain, and determining whether the state of the anti-unpacking box is a locking state or not according to the state information of the anti-unpacking box, which is acquired from the server;
and determining whether the anti-unpacking box is damaged or not according to the state information of the anti-unpacking box acquired from the anti-unpacking box.
11. The method of claim 10, wherein when the third feedback information comprises an authentication code, the receiving condition further comprises: and the verification code on the anti-dismantling box is consistent with the verification code obtained from the server.
12. A logistics management system, characterized in that the system comprises a first user terminal for performing the steps of the method according to any of claims 1-5, a logistics terminal for performing the steps of the method according to any of claims 6-8, and a second user terminal for performing the steps of the method according to any of claims 9-11.
13. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any one of claims 1 to 11 when executing the computer program.
14. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 11.
15. A computer program product comprising a computer program, characterized in that the computer program realizes the steps of the method of any one of claims 1 to 11 when executed by a processor.
CN202210387321.6A 2022-04-14 2022-04-14 Logistics management method, system, computer device, storage medium and program product Pending CN114664011A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210387321.6A CN114664011A (en) 2022-04-14 2022-04-14 Logistics management method, system, computer device, storage medium and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210387321.6A CN114664011A (en) 2022-04-14 2022-04-14 Logistics management method, system, computer device, storage medium and program product

Publications (1)

Publication Number Publication Date
CN114664011A true CN114664011A (en) 2022-06-24

Family

ID=82034926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210387321.6A Pending CN114664011A (en) 2022-04-14 2022-04-14 Logistics management method, system, computer device, storage medium and program product

Country Status (1)

Country Link
CN (1) CN114664011A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108177871A (en) * 2017-12-18 2018-06-19 合肥凯石投资咨询有限公司 A kind of electronic seal lock and its application in logistics
US20190333304A1 (en) * 2017-08-31 2019-10-31 BinBox, Inc. Secure storage systems and methods
CN110580630A (en) * 2019-09-13 2019-12-17 刘付荣 Product source tracing method and system of block chain supply chain
WO2020258954A1 (en) * 2019-06-25 2020-12-30 北京京东振世信息技术有限公司 Method, apparatus and device for processing logstical information
CN112967425A (en) * 2021-02-03 2021-06-15 中国工商银行股份有限公司 Anti-unpacking monitoring method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190333304A1 (en) * 2017-08-31 2019-10-31 BinBox, Inc. Secure storage systems and methods
CN108177871A (en) * 2017-12-18 2018-06-19 合肥凯石投资咨询有限公司 A kind of electronic seal lock and its application in logistics
WO2020258954A1 (en) * 2019-06-25 2020-12-30 北京京东振世信息技术有限公司 Method, apparatus and device for processing logstical information
CN110580630A (en) * 2019-09-13 2019-12-17 刘付荣 Product source tracing method and system of block chain supply chain
CN112967425A (en) * 2021-02-03 2021-06-15 中国工商银行股份有限公司 Anti-unpacking monitoring method and device

Similar Documents

Publication Publication Date Title
US10412071B2 (en) Secure transaction systems and methods
EP3577593B1 (en) Integrity of data records
US10210527B2 (en) Open registry for identity of things including social record feature
CN109417547B (en) Automation of image verification
US8258924B2 (en) Merchandise-integral transaction receipt
JP6498123B2 (en) Digitally protected electronic titles for supply chain products
US8875280B2 (en) Protecting an electronic device against unathorized hardware use
US20230133756A1 (en) Safe delivery container, and system and method thereof
US9721259B2 (en) Rules-based selection of counterfeit detection techniques
CN112598426B (en) Article anti-counterfeiting tracing method
US11886549B2 (en) Non-fungible physical fabric token system
US20170053116A1 (en) Systems and methods for detecting tampering of an information handling system
CN116745790A (en) QR code initiative: privacy system
CN115546966A (en) Article transaction method, apparatus, computer device, storage medium and program product
CN114519360B (en) Data read-write method, login method and device of service system and computer equipment
US20220044506A1 (en) System and method for accessing secure storage lockers
CN114664011A (en) Logistics management method, system, computer device, storage medium and program product
CN212862482U (en) Accommodation equipment
US11836561B2 (en) Key fob duplication device
US20150326576A1 (en) Secure asset management system
CN111572992B (en) Accommodation apparatus, control method, and system for transporting article
CN112967425B (en) Anti-unpacking monitoring method and device
CN112085469B (en) Data approval method, device, equipment and storage medium based on vector machine model
US20220358458A1 (en) Secure blockchain supply management system
KR20080028195A (en) System and method for product history management using serial number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination