CN114780992A - Method, system and equipment for managing supply chain of electronic mall - Google Patents

Method, system and equipment for managing supply chain of electronic mall Download PDF

Info

Publication number
CN114780992A
CN114780992A CN202210420919.0A CN202210420919A CN114780992A CN 114780992 A CN114780992 A CN 114780992A CN 202210420919 A CN202210420919 A CN 202210420919A CN 114780992 A CN114780992 A CN 114780992A
Authority
CN
China
Prior art keywords
node
supply chain
nodes
transaction
management system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210420919.0A
Other languages
Chinese (zh)
Inventor
刘胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingcai Technology Group Co ltd
Original Assignee
Jingcai Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingcai Technology Group Co ltd filed Critical Jingcai Technology Group Co ltd
Priority to CN202210420919.0A priority Critical patent/CN114780992A/en
Publication of CN114780992A publication Critical patent/CN114780992A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/45Commerce
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/75Information technology; Communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Automation & Control Theory (AREA)
  • Operations Research (AREA)
  • Databases & Information Systems (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method, a system and equipment for managing a supply chain of an electronic mall, wherein the method comprises the following steps: performing identity verification on the block link points of each supply chain entity to construct a supply chain management system; receiving basic data of a supply chain, and storing the basic data in a supply chain management system after verification; calculating to obtain the trust score of each node according to the historical transaction record between any two nodes, and controlling the next transaction between any two nodes; whether node behavior needs to be supervised. The trust score controls the next transaction between any two nodes, so that data can be safely shared between the entities, the accuracy of data among the entities is avoided from being suspected, and the nodes do not need to waste excessive calculation when block chain transactions are executed, so that the calculation amount can be reduced.

Description

Method, system and equipment for managing supply chain of electronic mall
Technical Field
The invention belongs to the technical field of supply chain management, and particularly relates to a supply chain management method, a supply chain management system and supply chain management equipment for an electronic mall.
Background
Electronic commerce is a business activity centered on commodity exchange by means of information network technology. With the rise of the internet, more and more people choose to carry out online shopping, and various electronic malls, such as the Alibara, the Smart network, the Jingdong city, the current network and the like, have brought great convenience to the life of people.
The explosion of the electronic marketplace puts higher demands on the supply chain management of the electronic marketplace. The portions of purchase, sale, finance, warehousing, logistics, customer relations and the like in the supply chain need to be cooperated to realize real-time interaction and resource sharing. In the data interaction and resource sharing process, the accuracy of data and strategic business process are very important for all parties in the supply chain management system. If mutual trust is lacked, the system management is obstructed, and the management decision of the enterprise is further influenced.
With the development of the technology, researchers propose to apply the blockchain technology to a trust mechanism for constructing a supply chain management system of an electronic mall, so as to promote mutual trust of transaction parties. However, in the actual supply chain management process, it is difficult for the existing supply chain management system to ensure the data security, transparency, stability, credibility, traceability and information sharing of a series of supply chain activities from production, warehousing, transportation, distribution, to sale and the like of the supply chain.
Disclosure of Invention
The invention aims to provide a method, a system and equipment for managing a supply chain of an electronic mall, which are used for solving at least one technical problem in the prior art.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect, the present invention provides a method for managing a supply chain of an electronic mall, including:
networking and connecting all supply chain entities in an electronic mall through the Internet of things, and performing identity verification on block chain link points corresponding to all the supply chain entities to construct a block chain-based supply chain management system;
receiving supply chain basic data uploaded by each supply chain entity through a block link point controlled by each supply chain entity, and storing the supply chain basic data in the supply chain management system after verification; wherein the supply chain base data comprises transaction data;
calculating the trust score of each node according to the historical transaction record between any two nodes in the supply chain management system, and controlling the next transaction between any two nodes according to the trust score;
and judging whether the node behaviors need to be supervised or not according to the trust score of each node, and if so, carrying out behavior supervision on the supervised node based on the real-time communication state between the supervised node and other peer nodes.
In one possible design, the verifying the identity of the block link point corresponding to each supply chain entity includes:
generating a first random number from the identity verification information of the block chain link point corresponding to each supply chain entity, encrypting the first random number by using an RSA key and creating a timestamp;
decrypting the encrypted first random number by the timestamp;
and querying through a hash function to obtain a second random number, and when the second random number is the same as the decrypted first random number, successfully verifying the identity of the node of the block chain.
In one possible design, the storing the supply chain basic data in the supply chain management system after being verified comprises:
carrying out hash processing on the basic data of the supply chain through a current node to generate a first digital abstract, carrying out digital signature on the first digital abstract, and broadcasting the signed first digital abstract to a supply chain management system based on a block chain;
generating a second digital abstract by other peer nodes by using a Hash algorithm, and verifying the authenticity of data by comparing the decrypted first digital abstract and the second digital abstract;
and when the data is verified to be true, the second digital abstract is stored in the supply chain management system after being stamped with a time stamp.
In a possible design, calculating a trust score of each node according to a historical transaction record between any two nodes in the supply chain management system, and controlling a next transaction between any two nodes according to the trust score, includes:
the trust score S of each node is calculated according to the following formula according to the historical transaction records between any two nodes in the supply chain management system:
Figure BDA0003606711880000031
where n represents the number of transactions of each node with another node, viRepresenting the trust score of another node for the node at the ith transaction;
when any two nodes carry out transaction, if the trust scores of the two nodes exceed the threshold value, the transaction can be continued, otherwise, the two nodes can not carry out transaction.
In one possible design, when the trust scores of two nodes each other exceed a threshold, the method further comprises:
sending a recommendation request for a target node to at least one third node through a source node, receiving trust data between the at least one third node and the target node through the source node, and obtaining an indirect trust score A through calculation, wherein the calculation formula is as follows:
Figure BDA0003606711880000032
wherein S isjRepresenting the trust score between the target node and one of the third nodes, m representing the number of third nodes, and j representing the jth third node in m.
In one possible design, after the transaction is conducted at both nodes, the method further includes:
and evaluating the satisfaction degree of the target node through the source node according to the transaction with the target node, and automatically updating the trust score of the target node according to the satisfaction degree.
In one possible design, determining whether to supervise node behavior according to the trust score of each node includes:
if the trust score of the current node is larger than the first threshold value, the current node is considered as a trusted node, and supervision is not needed;
if the trust score of the current node is greater than or equal to the second threshold and less than or equal to the first threshold, the current node is considered to be a suspicious node and needs to be supervised or not;
if the trust score of the current node is smaller than a second threshold value, the current node is considered to be a malicious node and needs to be supervised;
wherein the second threshold is less than the first threshold.
In one possible design, the behavior supervision of a supervised node based on real-time communication status between the supervised node and other peer nodes includes:
performing behavior supervision on a supervised node based on real-time transaction time between the supervised node and other peer nodes, wherein the real-time transaction time TB,The calculation formula of (c) is as follows:
Figure BDA0003606711880000041
wherein, aB,Representing the actual distance between a supervised node B and another peer node C, q representing the total number of nodes in the supply chain management system, p representing the p-th node in q, tpkRepresenting the fastest transmission time, t, of any probe packet between nodes in a supply chain management systemplRepresents the sum of tpkThe associated transmission time of the fastest sounding packet.
In a second aspect, the present invention provides an electronic mall supply chain management system, including:
the supply chain management system building module is used for networking and connecting various supply chain entities in the electronic mall through the Internet of things, performing identity verification on block chain link points corresponding to each supply chain entity and building a block chain-based supply chain management system;
the data storage module is used for receiving supply chain basic data uploaded by each supply chain entity through the block link point controlled by each supply chain entity, and storing the supply chain basic data in the supply chain management system after verification; wherein the supply chain infrastructure data comprises transaction data;
the transaction control module is used for calculating the trust score of each node according to the historical transaction record between any two nodes in the supply chain management system and controlling the next transaction between any two nodes according to the trust score;
and the node behavior monitoring module is used for judging whether the node behavior needs to be monitored or not according to the trust score of each node, and if so, performing behavior monitoring on the monitored node based on the real-time communication state between the monitored node and other peer nodes.
In a third aspect, the present invention provides a computer device, comprising a memory, a processor and a transceiver, which are sequentially connected in communication, wherein the memory is used for storing a computer program, the transceiver is used for sending and receiving messages, and the processor is used for reading the computer program and executing the electronic mall supply chain management method as described in any one of the possible designs of the first aspect.
In a fourth aspect, the present invention provides a computer-readable storage medium having stored thereon instructions which, when executed on a computer, perform the method for electronic mall supply chain management as set forth in any one of the possible designs of the first aspect.
In a fifth aspect, the present invention provides a computer program product containing instructions which, when run on a computer, cause the computer to carry out the method of e-mall supply chain management as claimed in any one of the possible designs of the first aspect.
Has the advantages that:
according to the invention, each supply chain entity in the electronic mall is connected in a networking manner through the Internet of things, so that various Internet of things data in a supply chain, such as product data, transaction data and the like, can be supplied and demanded; the identity verification is carried out on the block chain link points corresponding to each supply chain entity, and a supply chain management system based on the block chain is constructed, so that the entities entering the block chain nodes are trusted entities; the method comprises the steps that supply chain basic data uploaded by each supply chain entity through block chain link points controlled by the supply chain entity are received, and the supply chain basic data are verified and stored in a supply chain management system, so that the data stored in the block chain are verified, and the authenticity of the data is guaranteed; calculating the trust score of each node through historical transaction records between any two nodes in the supply chain management system, and controlling the next transaction between any two nodes according to the trust scores, so that data can be safely shared between entities, and the accuracy of data doubted between the entities is avoided; and judging whether the node behaviors need to be supervised or not according to the trust score of each node, and if so, performing behavior supervision on the supervised node based on the real-time communication state between the supervised node and other peer nodes, thereby further ensuring the transaction safety.
Drawings
Fig. 1 is a flowchart of a supply chain management method of an e-mall in the embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are part of the embodiments of the present disclosure, not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments in the present description, belong to the protection scope of the present invention.
Examples
In order to solve the technical problem that it is difficult to ensure data security, transparency, stability, trustiness, traceability and information sharing of a series of supply chain activities from production, storage, transportation, distribution, sale and the like of a supply chain in the prior art, the embodiment provides an electronic mall supply chain management method, which can safely share data among entities and avoid doubts of accuracy of data among the entities; and performing behavior supervision on the supervised node based on the real-time communication state between the supervised node and other peer nodes, thereby further ensuring the transaction safety. The present embodiment will be specifically described below.
As shown in fig. 1, the present embodiment provides a method for managing a supply chain of an electronic mall, which includes but is not limited to steps S1 to S4, and the method includes the following specific steps:
s1, networking and connecting all supply chain entities in an electronic mall through the Internet of things, and performing identity verification on block chain link points corresponding to all the supply chain entities to construct a block chain-based supply chain management system;
it should be noted that, in this embodiment, each supply chain entity of the electronic mall includes, but is not limited to, a purchasing enterprise, a supplying enterprise, a logistics enterprise, an e-commerce enterprise, an industry association, a government regulatory agency, a financial institution, and an electronic mall user, and the like, which is not limited herein; the internet of things technology includes, but is not limited to, an RFID (Radio Frequency identification) technology, a two-dimensional code scanning technology, a satellite positioning technology, an internet of things sensing technology, and the like, and is used for acquiring traceability information of a product and location information of an entity, and the like, and is not limited herein.
In step S1, the verifying the identity of the block link point corresponding to each supply chain entity includes:
s11, generating a first random number from the identity verification information of the block link point corresponding to each supply chain entity, encrypting the first random number by using an RSA (Rivest Shamir Adleman algorithm) key, and creating a time stamp;
it should be noted that, when initializing a block chain node in the supply chain management system, an asymmetric key cryptosystem needs to be used to transmit authentication information of each block chain node, specifically, a first random number is generated for each authentication information, and the first random number is encrypted by using an RSA key and a timestamp is created.
S12, decrypting the encrypted first random number through the timestamp;
specifically, before comparing the first random number with the query result of the hash function, the encrypted first random number needs to be decrypted, and preferably, the encrypted first random number is decrypted by using the timestamp.
And S13, inquiring through a hash function to obtain a second random number, and when the second random number is the same as the decrypted first random number, successfully verifying the identity of the node of the block chain.
S2, receiving supply chain basic data uploaded by each supply chain entity through a block link point controlled by each supply chain entity, and storing the supply chain basic data in the supply chain management system after verification; wherein the supply chain base data comprises transaction data;
it should be noted that the supply chain basic data includes, but is not limited to, production data (e.g., production time of product, production process, etc.), logistics data (e.g., logistics company of carrier, vehicle information, delivery route, car temperature, estimated time, etc.), warehousing data (e.g., product quantity, storage time, storage humidity, temperature, product status, etc.), sales data (sales time, sales price, sales quantity, product warranty period, etc.), transaction data (time of order placement by consumer, payment information, purchase category, etc.).
It should be noted that, in this embodiment, the basic data of each supply chain is obtained through technologies such as an internet of things technology (wireless sensor, radio frequency, GPS (Global Positioning System)), video monitoring, two-dimensional code, and the like, and each supply chain entity is connected in a block chain in a distributed manner through networking of the internet of things. And after the data is uploaded, broadcasting in the full block chain network.
It should be noted that, in this embodiment, the access authority of each supply chain entity is defined through the access control list of the blockchain, specifically, which supply chain entities have the right to write and read data stored in each distributed account of the blockchain are defined, and meanwhile, when data is uploaded, accessed and read, the blockchain records, stores and processes the access based on a predefined rule.
In step S2, storing the supply chain basic data in the supply chain management system after verification includes:
s21, performing hash processing on the supply chain basic data through a current node to generate a first digital abstract, performing digital signature on the first digital abstract, and broadcasting the signed first digital abstract to a supply chain management system based on a block chain;
s22, generating a second digital abstract by other peer nodes through a hash algorithm, and verifying the authenticity of data by comparing the decrypted first digital abstract and the decrypted second digital abstract;
and S23, when the data is verified to be true, the second digital abstract is subjected to time stamping and then is stored in the supply chain management system.
It should be noted that the verified data is stored in each node in a distributed manner, and an RFID tag or a two-dimensional code is generated at each stage, which is convenient for data acquisition and query. Through decentralized and distributed storage modes, a traditional trust mechanism is changed from a trusted person to a trusted machine, and the method is safer and more reliable.
S3, calculating to obtain a trust score of each node according to a historical transaction record between any two nodes in the supply chain management system, and controlling the next transaction between any two nodes according to the trust score;
it should be noted that the historical transaction records between any two nodes include a transaction node ID (Identity card identifier), transaction times, transaction time, a historical trust value, and the like, which is not limited herein.
In step S3, calculating a trust score of each node according to a historical transaction record between any two nodes in the supply chain management system, and controlling a next transaction between any two nodes according to the trust score, including:
step S31, calculating the trust score S of each node according to the following formula according to the historical transaction records between any two nodes in the supply chain management system:
Figure BDA0003606711880000101
where n represents the number of transactions of each node with another node, viRepresenting the trust score of another node for the node at the ith transaction;
and S32, when any two nodes carry out transaction, if the trust values of the two nodes exceed the threshold value, the transaction can be continued, otherwise, the transaction cannot be carried out between the two nodes.
It should be noted that, during the operation of the supply chain management system, each node obtains a higher or lower trust value as a reward or penalty, where the trust value depends on how accurately the current node evaluates other nodes, and specifically, when the trust value of a node is high, it indicates that the node has high accuracy in evaluating other peer nodes. Thus, each node may also change its own trust value when evaluating another node.
In a specific embodiment, when the trust score of each of the two nodes exceeds a threshold, the method further comprises:
sending a recommendation request for a target node to at least one third node through a source node, receiving trust data between the at least one third node and the target node through the source node, and obtaining an indirect trust score A through calculation, wherein the calculation formula is as follows:
Figure BDA0003606711880000111
wherein S isjTo represent the eyeAnd (3) the trust score between the target node and one of the third nodes, wherein m represents the number of the third nodes, and j represents the jth third node in m.
It should be noted that, by requesting the trust score of the target node from the other third nodes by the source node, a more accurate evaluation value for the target node can be obtained, thereby more ensuring the accuracy of evaluation and the security of transaction.
In a specific embodiment, after the transaction is performed between the two nodes, the method further comprises:
and evaluating the satisfaction degree of the target node through the source node according to the transaction with the target node, and automatically updating the trust score of the target node according to the satisfaction degree.
That is, after the two nodes perform a transaction, the source node may automatically update the trust score of the target node, and it is understood that the system may also automatically adjust the trust score of the source node according to the accuracy of the source node in evaluating the target node.
And S4, judging whether the node behaviors need to be supervised or not according to the trust score of each node, and if so, carrying out behavior supervision on the supervised node based on the real-time communication state between the supervised node and other peer nodes.
In step S4, determining whether to supervise node behavior according to the trust score of each node includes:
s41, if the trust score of the current node is larger than a first threshold value, the current node is considered to be a trusted node, and supervision is not needed;
s42, if the trust score of the current node is greater than or equal to a second threshold and less than or equal to a first threshold, the current node is considered to be a suspicious node and needs to be supervised or not;
s43, if the trust score of the current node is smaller than a second threshold value, the current node is considered to be a malicious node and needs to be supervised;
wherein the second threshold is less than the first threshold.
It should be noted that, in this embodiment, the monitoring of the node behavior is to prevent the node from evaluating other nodes inaccurately, so when the trust value of the node is greater than or equal to the second threshold and less than or equal to the first threshold, the current node is considered to be a suspicious node, and the node may be punished to ensure that a malicious behavior is punished quickly. Of course, if during the supervision process, the supervised node does not exhibit abnormal behavior, its initial trust value is restored; if the supervised node exhibits abnormal behavior, the trust value will be set to zero.
In a specific embodiment, the behavior supervision of the supervised node based on the real-time communication state between the supervised node and other peer nodes comprises the following steps:
performing behavior supervision on a supervised node based on real-time transaction time between the supervised node and other peer nodes, wherein the real-time transaction time TB,The calculation formula of (c) is as follows:
Figure BDA0003606711880000121
wherein, aB,Representing the actual distance between a supervised node B and another peer node C, q representing the total number of nodes in the supply chain management system, p representing the p-th node in q, tpkRepresenting the fastest transmission time, t, of any probe packet between nodes in a supply chain management systemplRepresents the sum of tpkThe associated transmission time of the fastest sounding packet.
Preferably, the present embodiment further includes a client, where the client is applied to each supply chain entity, and each supply chain entity obtains a public key and a private key through registration, is assigned with different access rights, and performs supply chain system management based on the respective rights, for example, a consumer may trace a source of product information through the client, monitor an operation condition of a block chain network, perform credit rating on a seller, and the like. Enterprises can manage and release enterprise information, realize information sharing, coordinate and integrate enterprise operation, and integrate resources to form a supply chain with quick recombination and responsiveness. The intelligent contracts are used, so that the transaction cost among enterprises can be reduced, and the establishment of long-term contract relations among the enterprises is promoted. The supervision department supervises and checks whether the product reaches the standard through the client, supervises the credit of the enterprise and the signing of the intelligent contract, and the like.
Based on the above disclosure, in the embodiment, the supply chain entities in the electronic mall are connected in a networking manner through the internet of things, so that various internet of things data in the supply chain, such as product data, transaction data and the like, can be supplied and demanded; the identity verification is carried out on the block chain link points corresponding to each supply chain entity, and a supply chain management system based on the block chain is constructed, so that the entities entering the block chain nodes are trusted entities; the method comprises the steps that supply chain basic data uploaded by each supply chain entity through block chain link points controlled by the supply chain entity are received, and the supply chain basic data are verified and stored in a supply chain management system, so that the data stored in the block chain are verified, and the authenticity of the data is guaranteed; calculating the trust score of each node through the historical transaction records between any two nodes in the supply chain management system, and controlling the next transaction between any two nodes according to the trust scores, so that data can be safely shared between entities, and the accuracy of the data suspected between the entities is avoided; by solving multiple trust problems in a decentralized approach, i.e., the nodes do not need to waste too much computing power when performing blockchain transactions, the computational burden can be reduced; and judging whether the node behaviors need to be supervised or not according to the trust score of each node, and if so, performing behavior supervision on the supervised node based on the real-time communication state between the supervised node and other peer nodes, thereby further ensuring the transaction safety.
In a second aspect, the present invention provides an electronic mall supply chain management system, including:
the supply chain management system building module is used for networking and connecting various supply chain entities in the electronic mall through the Internet of things, performing identity verification on block chain link points corresponding to each supply chain entity and building a block chain-based supply chain management system;
the data storage module is used for receiving supply chain basic data uploaded by each supply chain entity through the block link point controlled by each supply chain entity, and storing the supply chain basic data in the supply chain management system after verification; wherein the supply chain base data comprises transaction data;
the transaction control module is used for calculating the trust score of each node according to the historical transaction record between any two nodes in the supply chain management system and controlling the next transaction between any two nodes according to the trust score;
and the node behavior monitoring module is used for judging whether the node behavior needs to be monitored or not according to the trust score of each node, and if so, performing behavior monitoring on the monitored node based on the real-time communication state between the monitored node and other peer nodes.
In a third aspect, the present invention provides a computer device, comprising a memory, a processor and a transceiver, which are sequentially connected in communication, wherein the memory is used for storing a computer program, the transceiver is used for sending and receiving messages, and the processor is used for reading the computer program and executing the electronic mall supply chain management method as described in any one of the possible designs of the first aspect.
In a fourth aspect, the present invention provides a computer readable storage medium having stored thereon instructions which, when executed on a computer, perform a method of electronic mall supply chain management as in any one of the possible designs of the first aspect.
In a fifth aspect, the present invention provides a computer program product containing instructions which, when run on a computer, cause the computer to carry out the method of e-mall supply chain management as claimed in any one of the possible designs of the first aspect.
Finally, it should be noted that: the above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. An electronic mall supply chain management method, comprising:
networking and connecting all supply chain entities in an electronic mall through the Internet of things, and performing identity verification on block chain link points corresponding to all the supply chain entities to construct a block chain-based supply chain management system;
receiving supply chain basic data uploaded by each supply chain entity through a block link point controlled by each supply chain entity, and storing the supply chain basic data after verification in the supply chain management system; wherein the supply chain infrastructure data comprises transaction data;
calculating to obtain the trust score of each node according to the historical transaction record between any two nodes in the supply chain management system, and controlling the next transaction between any two nodes according to the trust score;
and judging whether the node behaviors need to be supervised or not according to the trust score of each node, and if so, carrying out behavior supervision on the supervised node based on the real-time communication state between the supervised node and other peer nodes.
2. The method as claimed in claim 1, wherein the step of authenticating the block link point corresponding to each supply chain entity comprises:
generating a first random number from the identity verification information of the block chain link point corresponding to each supply chain entity, encrypting the first random number by using an RSA key and creating a timestamp;
decrypting the encrypted first random number through the timestamp;
and querying through a hash function to obtain a second random number, and when the second random number is the same as the decrypted first random number, successfully verifying the identity of the node of the block chain.
3. The method for managing the supply chain of the e-mall of claim 1, wherein the step of storing the supply chain basic data in the supply chain management system after the supply chain basic data is verified comprises:
carrying out hash processing on the basic data of the supply chain through a current node to generate a first digital abstract, carrying out digital signature on the first digital abstract, and broadcasting the signed first digital abstract to a supply chain management system based on a block chain;
generating a second digital abstract by other peer nodes by using a Hash algorithm, and verifying the authenticity of data by comparing the decrypted first digital abstract and the second digital abstract;
and when the data is verified to be true, the second digital abstract is subjected to time stamping and then is stored in the supply chain management system.
4. The method for managing the supply chain of the electronic mall according to claim 1, wherein the step of calculating the trust score of each node according to the historical transaction records between any two nodes in the supply chain management system and controlling the next transaction between any two nodes according to the trust score comprises:
the trust score S of each node is calculated according to the following formula according to the historical transaction records between any two nodes in the supply chain management system:
Figure FDA0003606711870000021
where n represents the number of transactions of each node with another node, viRepresenting the trust score of another node to the node at the ith transaction;
when any two nodes carry out transaction, if the trust scores of the two nodes exceed the threshold value, the transaction can be continued, otherwise, the two nodes cannot carry out the transaction.
5. The method for electronic mall supply chain management according to claim 4, wherein when the trust score between two nodes exceeds a threshold value, the method further comprises:
sending a recommendation request for a target node to at least one third node through a source node, receiving trust data between the at least one third node and the target node through the source node, and obtaining an indirect trust score A through calculation, wherein the calculation formula is as follows:
Figure FDA0003606711870000022
wherein S isjRepresenting the trust score between the target node and one of the third nodes, m representing the number of third nodes, and j representing the jth third node in m.
6. The electronic mall supply chain management method according to claim 5, wherein after the transaction between the two nodes, the method further comprises:
and evaluating the satisfaction degree of the target node through the source node according to the transaction with the target node, and automatically updating the trust score of the target node according to the satisfaction degree.
7. The method as claimed in claim 1, wherein determining whether to supervise node behavior according to the trust score of each node comprises:
if the trust score of the current node is larger than the first threshold value, the current node is considered as a trusted node, and supervision is not needed;
if the trust score of the current node is greater than or equal to the second threshold and less than or equal to the first threshold, the current node is considered to be a suspicious node and needs to be supervised or not;
if the trust score of the current node is smaller than a second threshold value, the current node is considered to be a malicious node and needs to be supervised;
wherein the second threshold is less than the first threshold.
8. The e-mall supply chain management method according to claim 7, wherein performing behavior supervision on a supervised node based on a real-time communication state between the supervised node and other peer nodes comprises:
performing behavior supervision on a supervised node based on real-time transaction time between the supervised node and other peer nodes, wherein the real-time transaction time TB,CThe calculation formula of (a) is as follows:
Figure FDA0003606711870000031
wherein, aB,CRepresenting the actual distance between a supervised node B and another peer node C, q representing the total number of nodes in the supply chain management system, p representing the p-th node in q, tpkRepresenting the fastest transmission time, t, of any probe packet between nodes in a supply chain management systemplRepresents and tpkThe associated transmission time of the fastest sounding packet.
9. An electronic mall supply chain management system, comprising:
the supply chain management system building module is used for networking and connecting various supply chain entities in the electronic mall through the Internet of things, performing identity verification on block chain link points corresponding to each supply chain entity and building a block chain-based supply chain management system;
the data storage module is used for receiving the supply chain basic data uploaded by each supply chain entity through the block chain link point controlled by each supply chain entity, and storing the supply chain basic data in the supply chain management system after verification; wherein the supply chain infrastructure data comprises transaction data;
the transaction control module is used for calculating the trust score of each node according to the historical transaction record between any two nodes in the supply chain management system and controlling the next transaction between any two nodes according to the trust score;
and the node behavior monitoring module is used for judging whether the node behavior needs to be monitored or not according to the trust score of each node, and if so, performing behavior monitoring on the monitored node based on the real-time communication state between the monitored node and other peer nodes.
10. A computer device comprising a memory, a processor and a transceiver communicatively connected in sequence, wherein the memory is used for storing a computer program, the transceiver is used for sending and receiving messages, and the processor is used for reading the computer program and executing the electronic mall supply chain management method according to any one of claims 1 to 8.
CN202210420919.0A 2022-04-20 2022-04-20 Method, system and equipment for managing supply chain of electronic mall Pending CN114780992A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210420919.0A CN114780992A (en) 2022-04-20 2022-04-20 Method, system and equipment for managing supply chain of electronic mall

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210420919.0A CN114780992A (en) 2022-04-20 2022-04-20 Method, system and equipment for managing supply chain of electronic mall

Publications (1)

Publication Number Publication Date
CN114780992A true CN114780992A (en) 2022-07-22

Family

ID=82431469

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210420919.0A Pending CN114780992A (en) 2022-04-20 2022-04-20 Method, system and equipment for managing supply chain of electronic mall

Country Status (1)

Country Link
CN (1) CN114780992A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117610897A (en) * 2024-01-24 2024-02-27 工品行(苏州)数字科技有限公司 Supply chain service management system and method based on data analysis

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117610897A (en) * 2024-01-24 2024-02-27 工品行(苏州)数字科技有限公司 Supply chain service management system and method based on data analysis
CN117610897B (en) * 2024-01-24 2024-04-09 工品行(苏州)数字科技有限公司 Supply chain service management system and method based on data analysis

Similar Documents

Publication Publication Date Title
US11362814B1 (en) Autonomous devices
CN110609869B (en) Block chain-based data storage method, related equipment and storage medium
US11909887B2 (en) Architecture for secure IoT interactions
CN109544160B (en) Transaction authenticity verification method and system based on block chain and intelligent contract
US20180144292A1 (en) Apparatus and method for tracking consumer premises inventory
Omar et al. Supply chain inventory sharing using ethereum blockchain and smart contracts
CN109754250B (en) Data transaction method and system, platform and storage medium
CN101937528A (en) Systems and methods for implementing supply chain visibility policies
WO2019243848A1 (en) Container tracking
US20180357603A1 (en) Systems and methods for delivering retail items
CN108932649A (en) A kind of digital asset method of commerce, system and storage medium based on block chain
Malik et al. PrivChain: Provenance and privacy preservation in blockchain enabled supply chains
Sangeetha et al. Blockchain for IoT enabled supply chain management-A systematic review
WO2019152385A1 (en) System and method for crowdsource loaned code with blockchain
CN114780992A (en) Method, system and equipment for managing supply chain of electronic mall
US20230206231A1 (en) Laundering detection in second layer networks
Hasan et al. A novel blockchain federated safety-as-a-service scheme for industrial IoT using machine learning
Chauhan et al. Framework for enhancing the traceability in supply chain using blockchain
Zhang et al. Appb: Anti-counterfeiting and privacy-preserving blockchain-based vehicle supply chains
Rodrigues et al. On trust, blockchain, and reputation systems
CN116596551A (en) Supply chain product tracing method based on block chain, storage medium and electronic equipment
US20210248616A1 (en) Value warranty data validation and encryption system
CN112926972B (en) Information processing method based on block chain, block chain system and terminal
CN114445218A (en) Logistics financing method, device, equipment and medium based on block chain
Liu et al. An Intelligent Optimization Control Method for Enterprise Cost Under Blockchain Environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination