CN117764600A - Supply chain data tracing method, device and processor based on block chain technology - Google Patents

Supply chain data tracing method, device and processor based on block chain technology Download PDF

Info

Publication number
CN117764600A
CN117764600A CN202311493977.7A CN202311493977A CN117764600A CN 117764600 A CN117764600 A CN 117764600A CN 202311493977 A CN202311493977 A CN 202311493977A CN 117764600 A CN117764600 A CN 117764600A
Authority
CN
China
Prior art keywords
data
blockchain
tracing
traceability
calculation result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311493977.7A
Other languages
Chinese (zh)
Inventor
张学义
邓罡
蒙亮
曹源
王敦杰
谢超良
陈俊霏
曹宇
曹恒
林立江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Chenhan Technology Co ltd
Original Assignee
Hunan Chenhan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Chenhan Technology Co ltd filed Critical Hunan Chenhan Technology Co ltd
Priority to CN202311493977.7A priority Critical patent/CN117764600A/en
Publication of CN117764600A publication Critical patent/CN117764600A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The embodiment of the application provides a supply chain data tracing method, a supply chain data tracing device, a supply chain data tracing processor and a storage medium based on a block chain technology. The method comprises the following steps: the data user inputs the traceability number of the product to be queried on the first block chain, and queries whether corresponding traceability data exists on the first block chain; if so, acquiring first traceability data on a first block chain; inputting a traceability number on the second blockchain through the cross-chain communication infrastructure component, and inquiring whether corresponding traceability data exists on the second blockchain; if the data exists, the cross-chain communication infrastructure component acquires second traceability data on a second blockchain and sends the second traceability data to the data user; calculating the first tracing data and/or the second tracing data to obtain corresponding first calculation results and/or second calculation results; verifying through the intelligent contract of the third blockchain; if so, decrypting the first calculation result and/or the second calculation result through the cross-link communication infrastructure component and transmitting the first calculation result and/or the second calculation result to the data user.

Description

Supply chain data tracing method, device and processor based on block chain technology
Technical Field
The application relates to the technical field of blockchain, in particular to a supply chain data tracing method, device, storage medium and processor based on a blockchain technology.
Background
Supply chain management is primarily concerned with production, logistics, inventory management, and sales, emphasizing the coordinated management and optimization throughout the supply chain from suppliers to manufacturers, to distributors, and to final customers. Each node state on the supply chain is dynamic and unstable, and the product or parts of a certain node on the chain presents problems, and the risk of the product or parts rapidly spreads to the whole supply chain to influence the production and circulation of the final product. The supply chain of the prior art has mainly the following problems: supply chain suppliers vary from one product to another, data composition varies greatly, data interpretation is inconsistent, integration and integration become complex and time consuming, and data quality is low.
If a shared approach is used, the supply chain data may result in leakage of sensitive information. Such data may be acquired by unauthorized persons or malicious attackers, resulting in theft, fraud, or other illicit activity. And the data may be subject to abuse and tampering, causing significant loss to the participants. If the sharing mode is not adopted, the internal data of each provider on the supply chain cannot be shared, the traceability of important information is difficult to develop.
Disclosure of Invention
The embodiment of the application aims to provide a supply chain data tracing method, device, storage medium and processor based on a blockchain technology.
To achieve the above object, a first aspect of the present application provides a supply chain data tracing method based on a blockchain technique, including:
the data user inputs the traceability number of the product to be queried on the first block chain, and queries whether the traceability data corresponding to the traceability number exists on the first block chain;
acquiring first traceability data on the first blockchain under the condition that the traceability data corresponding to the traceability number exists on the first blockchain;
inputting a traceability number on the second blockchain through the cross-chain communication infrastructure component, and inquiring whether traceability data corresponding to the traceability number exists on the second blockchain;
under the condition that the tracing data corresponding to the tracing number exists on the second block chain, acquiring second tracing data on the second block chain by the cross-chain communication infrastructure component, and sending the second tracing data to a data user;
calculating the first tracing data and/or the second tracing data to obtain corresponding first calculation results and/or second calculation results;
verifying the first calculation result and/or the second calculation result through the intelligent contract of the third block chain;
and in the case that the verification is passed, decrypting the first calculation result and/or the second calculation result through the cross-link communication infrastructure component, and transmitting the decrypted data to a data user.
In an embodiment of the present application, the method further comprises: before a data user inputs the traceability number of a product to be queried on a first blockchain, uploading original data marked as privacy to a first computing middleware unit corresponding to the data provider by the data provider; the first computing middleware unit generates corresponding metadata according to the data parameters of the original data and distributes the metadata of the original data to the first blockchain.
In an embodiment of the present application, the second tracing data is metadata, and calculating the second tracing data to obtain a corresponding second calculation result includes: the data user combines the data parameters contained in the second traceability data into corresponding first information entropy; hash conversion is carried out on the first information entropy so as to generate a corresponding first hash value; comparing the first hash value with a second hash value of second trace data on a second blockchain; under the condition that the first hash value is consistent with the second hash value, generating a tracing task identifier, communication parameters and an asymmetric encryption key pair corresponding to the second metadata, and sending the tracing task identifier, the communication parameters and the asymmetric encryption key pair to a first computing middleware unit and a third blockchain corresponding to a data provider; and generating a second calculation result and a corresponding certificate aiming at the second tracing data by the first calculation middleware unit based on the first metadata, the tracing task identification, the communication parameters and the asymmetric encryption key pair.
In an embodiment of the present application, verifying the second calculation result by the smart contract of the third blockchain includes: the first computing middleware unit encrypts the second computing result based on the asymmetric encryption key; the first computing middleware unit signs the encrypted second computing result by using a signature private key to generate signature information entropy; issuing a signature information entropy, an encrypted second calculation result and a signature private key pair to a third blockchain, and initiating a verification request to an intelligent contract of the third blockchain based on a tracing task identifier; the smart contract performs trusted verification and signature verification on the second calculation result based on the second calculation result and the corresponding certificate in response to the verification request.
In an embodiment of the present application, the smart contract responding to the verification request, and performing trusted verification and signature verification on the second calculation result based on the second calculation result and the corresponding certificate includes: the intelligent contract obtains a signature private key pair, an asymmetric encryption key pair and a signature information entropy; decrypting the signature information entropy using the public key to generate verification information; comparing the generated verification information with information in signature information entropy; in the case that the generated verification information is consistent with the information in the signature information entropy, verification passing is determined.
In an embodiment of the present application, under a condition that trace data corresponding to a trace number exists on a first blockchain, acquiring the first trace data on the first blockchain includes: under the condition that the tracing data corresponding to the tracing number exists on the first block chain, the earliest tracing data on the first block chain is obtained to serve as the first tracing data.
In an embodiment of the present application, the method further comprises: and if the verification is not passed, returning a prompt of data abnormality to the data user.
A second aspect of the present application provides a processor configured to perform the supply chain data tracing method based on blockchain technology described above.
A third aspect of the present application provides a supply chain data tracing device based on a blockchain technology, including the above processor.
A fourth aspect of the present application provides a machine-readable storage medium having instructions stored thereon that, when executed by a processor, cause the processor to be configured to perform the supply chain data tracing method described above based on blockchain technology.
According to the technical scheme, on the basis of privacy calculation, the method for reliably tracing the supply chain data based on the blockchain technology and the privacy calculation technology is further provided, and the method mainly aims at realizing deep tracing of the supply chain data on the premise of guaranteeing important data privacy of complex and precise products. The method combines the supply chain data with the blockchain technology based on the characteristics of tamper resistance, decentralization, anonymity and safety of the blockchain technology by establishing unified data standards and specifications, and solves the problems of difficult tracing of complex products and complex flow. The privacy computing technology is utilized to protect the privacy data of the product and the privacy data of the raw material, and the problem of sensitive information disclosure is solved. An effective supervision mechanism and an omnibearing credible evaluation system are established, a supply chain core service management mechanism is established, and the credibility of the supplier multiparty supervision evaluation system, the smooth information circulation, the credibility of the whole-flow supervision mechanism and the credibility of the supply chain tracing are realized.
Additional features and advantages of embodiments of the present application will be set forth in the detailed description that follows.
Drawings
The accompanying drawings are included to provide a further understanding of embodiments of the present application and are incorporated in and constitute a part of this specification, illustrate embodiments of the present application and together with the description serve to explain, without limitation, the embodiments of the present application. In the drawings:
FIG. 1 schematically illustrates a flow diagram of a supply chain data tracing method based on blockchain techniques in accordance with embodiments of the present application;
FIG. 2 schematically illustrates a flow diagram of a supply chain data tracing method based on blockchain technology according to another embodiment of the present application;
FIG. 3 schematically illustrates a supply chain data tracing schematic based on blockchain techniques in accordance with embodiments of the present application;
FIG. 4 schematically illustrates a schematic diagram of data tracing based on a privacy computing technique according to an embodiment of the present application;
fig. 5 schematically shows an internal structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it should be understood that the specific implementations described herein are only for illustrating and explaining the embodiments of the present application, and are not intended to limit the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present application based on the embodiments herein.
Fig. 1 schematically illustrates a flowchart of a supply chain data tracing method based on a blockchain technique according to an embodiment of the present application. As shown in fig. 1, the method comprises the steps of:
step 102, the data consumer inputs the traceability number of the product to be queried on the first blockchain, and queries whether the traceability data corresponding to the traceability number exists on the first blockchain.
Step 104, obtaining the first tracing data on the first blockchain under the condition that the tracing data corresponding to the tracing number exists on the first blockchain.
And step 106, inputting the traceability number on the second block chain by the cross-chain communication infrastructure component, and inquiring whether the traceability data corresponding to the traceability number exists on the second block chain.
Step 108, under the condition that the trace data corresponding to the trace number exists on the second block chain, the cross-chain communication infrastructure component acquires the second trace data on the second block chain and sends the second trace data to the data user.
Step 110, calculating the first tracing data and/or the second tracing data to obtain a corresponding first calculation result and/or a second calculation result.
Step 112, verifying the first calculation result and/or the second calculation result through the intelligent contract of the third blockchain.
Step 114, in the case of passing the verification, decrypting the first calculation result and/or the second calculation result by the cross-link communication infrastructure component, and transmitting the decrypted data to the data consumer.
The blockchain is used as a decentralization platform technology, the data on the chain is stored on each node, the privacy safety of the data on the platform is ensured by adopting an encryption storage mode, and meanwhile, the characteristics of the blockchain, such as non-falsifiability, whole trace, traceability, collective maintenance and the like, are utilized to realize a cooperative paradigm model of a supply chain with extremely high data safety.
In this application, the same product refers to multiple supply chains. To achieve complete deep tracing of the supply chain, the supply chain needs to be layered. For example, the product is a computer. The computer comprises a computer host and a display. Then there may be a supply chain a for the host computer, with the supply chain a storing supply chain data for the host computer. Meanwhile, there may be a supply chain B for the display, on which supply chain data of the display is stored, for the display. Specifically, the chain a may be composed of a computer manufacturer-user, including a computer manufacturer, a carrier, a computer retail store, a home appliance maintenance party, a supervisor, and a user, and each link from factory to user needs to be linked, where the manufacturer needs to link all integrated components and form a traceability number. The B chain can be a raw material supplier, raw material information, raw material processing, circulation, transportation and key processing procedures required by a display manufacturing link of a computer display manufacturer, and also can be used for linking key part models and forming a traceability number.
Specifically, as shown in fig. 2, when a data user wants to acquire supply chain data of a certain product, a traceability number of the product to be queried may be input on the first blockchain a, and whether the traceability data corresponding to the traceability number of the product exists on the first blockchain a is queried. It will be appreciated that each product has its unique traceability number. And if the tracing data corresponding to the tracing number is queried on the first block chain A, the tracing data of the product to be queried is stored on the first block chain A. Thus, the first traceability data on the first blockchain a can be obtained.
When a user wishes to communicate messages between different supply chains and obtain the necessary block information, a cross-chain communication infrastructure component can be built. Based on the cross-chain communication infrastructure components, different blockchain instances can communicate with each other and can periodically synchronize data to one instance. This instance obtains all the data and may modify parameters on other instances. Thus, the trace-source number may be entered on the second blockchain B by the cross-chain communication infrastructure component C for querying whether trace-source data corresponding to the trace-source number is present on the second blockchain B. Similarly, if the tracing data corresponding to the tracing number is queried on the second blockchain B, it is indicated that the tracing data of the product to be queried is stored on the second blockchain B. Thus, the second traceability data on the second blockchain B can be obtained. In the case where there is trace data on the second blockchain B corresponding to the trace number, the cross-chain communication infrastructure component C may obtain the second trace data on the second blockchain B. The cross-chain communication infrastructure component C may then also send the second trace data to the data consumer. Further, the data consumer may calculate the first traceable data and/or the second traceable data to obtain a corresponding first calculation result and/or a second calculation result, and the data consumer may issue the first calculation result and/or the second calculation result to the third blockchain D through the cross-chain communication infrastructure component C. The first calculation result and/or the second calculation result may then be verified by the smart contract of the third blockchain D. If the verification is passed, then in case of the verification being passed, the first calculation result and/or the second calculation result may be decrypted by the cross-link communication infrastructure component C and the decrypted data may be sent to the data consumer.
In one embodiment, the method further comprises: before a data user inputs the traceability number of a product to be queried on a first blockchain A, uploading original data marked as privacy to a first computing middleware unit corresponding to the data provider by the data provider; the first computing middleware unit generates corresponding metadata according to the data parameters of the original data and distributes the metadata of the original data to the first blockchain A.
A data provider refers to a user who will provide supply chain data. The data provider may upload a plurality of supply chain data to the first blockchain in advance. Specifically, since the supply chain data includes data that can be disclosed and data that is not disclosed. The data that is not disclosed may be understood as "private data", or data that needs to be kept secret. Thus, a data provider may tag the data type for data it uploads before uploading it. If the data is marked as private, the data provider may upload the original data marked as private to a first computing middleware unit corresponding to the data provider. The first computing middleware unit may then generate corresponding metadata according to the data parameters of the original data and issue the metadata of the original data to the first blockchain a. It can be appreciated that the above manner is also adopted when the data provider uploads the data to the second blockchain B, and will not be described herein. In addition, for each user, i.e., for each data provider, there is a first computing middleware unit corresponding thereto for enabling data interaction between the user and the blockchain. When uploading data (such as key technology, manufacturing parameters of cpu, etc.), if the tag class does not disclose the data, the specific data value in the data will not be entered when uploading the data. That is, for the non-public data, i.e. the category is marked as "non-public data which cannot be obtained", the hash value, the tracing number, the marking type and the timestamp corresponding to the data type can be combined into the information entropy, the new hash value is obtained through conversion, and meanwhile, the information entropy is encrypted and is stored together with the new hash value in a uplink manner.
In one embodiment, privacy calculations are used as a method of calculation to protect the privacy of participants during data processing and analysis so that the data remains private during sharing. It allows multiple parties to calculate without exposing private data, and without providing any data details to the requesting user to prove the validity of the assertion. Through privacy calculations, participants can securely share sensitive data without fear of misuse or improper use of the data. Privacy calculations provide a good technical support for the protection of important data. Provides safer guarantee for cross-organization cooperation and data exchange. Specifically, the second tracing data is metadata, and calculating the second tracing data to obtain a corresponding second calculation result includes: the data user combines the data parameters contained in the second traceability data into corresponding first information entropy; hash conversion is carried out on the first information entropy so as to generate a corresponding first hash value; comparing the first hash value with a second hash value of second traceable data on a second blockchain B; under the condition that the first hash value is consistent with the second hash value, generating a tracing task identifier, communication parameters and an asymmetric encryption key pair corresponding to the second metadata, and sending the tracing task identifier, the communication parameters and the asymmetric encryption key pair to a first computing middleware unit and a third blockchain D corresponding to a data provider; and generating a second calculation result and a corresponding certificate aiming at the second tracing data by the first calculation middleware unit based on the first metadata, the tracing task identification, the communication parameters and the asymmetric encryption key pair.
After the second traceability data on the second blockchain B is obtained, the data user can combine the data parameters into the corresponding first information entropy based on the data parameters contained in the second traceability data. Specifically, the data parameters included in the second trace data may include one or more of a data type, trace number, tag type, and timestamp of the second trace data. And after the second traceability data is stored in the second blockchain B, a unique hash value corresponding to the second traceability data is generated based on the second traceability data. Therefore, after determining the first information entropy, the data consumer may perform hash conversion on the first information entropy to generate a corresponding first hash value, and may compare the first hash value with a second hash value of the second trace data on the second blockchain B. In the case where the first hash value is consistent with the second hash value, the data consumer may generate a traceability task identifier, a communication parameter, and an asymmetric encryption key pair corresponding to the second metadata. The data consumer may then send the data to the first computing middleware unit and the third blockchain D corresponding to the data provider. Further, the first computing middleware unit may generate a second computing result and a corresponding proof file for the second tracing data based on the first metadata, the tracing task identification, the communication parameters, and the asymmetric encryption key pair.
In one embodiment, validating the second calculation result by the smart contract of the third blockchain D includes: the first computing middleware unit encrypts the second computing result based on the asymmetric encryption key; the first computing middleware unit signs the encrypted second computing result by using a signature private key to generate signature information entropy; issuing a signature information entropy, an encrypted second calculation result and a signature private key pair to a third blockchain D, and initiating a verification request to an intelligent contract of the third blockchain D based on a tracing task identifier; the smart contract performs trusted verification and signature verification on the second calculation result based on the second calculation result and the corresponding certificate in response to the verification request.
Wherein in one embodiment, the smart contract, in response to the verification request, performing trusted verification and signature verification of the second calculation result based on the second calculation result and the corresponding certificate comprises: the intelligent contract obtains a signature private key pair, an asymmetric encryption key pair and a signature information entropy; decrypting the signature information entropy using the public key to generate verification information; comparing the generated verification information with information in signature information entropy; in the case that the generated verification information is consistent with the information in the signature information entropy, verification passing is determined.
The asymmetric encryption key pair is used for encrypting and decrypting the traceability result, and the public key for encryption is sent to the data provider middleware. The middleware of the data provider may receive the public key for encryption and then generate an asymmetric key pair for digital signing and send the public key for signing to the smart contract. The smart contract may obtain information such as a signature private key pair, an asymmetric encryption key pair, signature information entropy, etc., and then decrypt the signature information entropy using the public key to generate corresponding verification information. The smart contract may compare the generated verification information with information in the signature information entropy. In the event that the generated verification information is consistent with information in the signature information entropy, the smart contract may determine that the verification passes. In case the verification is passed, the first calculation result and/or the second calculation result may be decrypted by the cross-link communication infrastructure component C, and the cross-link communication infrastructure component C may transmit the decrypted data to the data consumer.
Further, in one embodiment, in a case that the trace data corresponding to the trace number exists on the first blockchain a, obtaining the first trace data on the first blockchain a includes: under the condition that the tracing data corresponding to the tracing number exists on the first block chain A, the earliest tracing data on the first block chain A is obtained to serve as the first tracing data.
Under the condition that the tracing data corresponding to the tracing number exists on the first block chain A, whether the obtained tracing data is initial data or not can be judged, if not, the tracing data corresponding to the tracing number is traversed again until the tracing data which is earliest in time on the first block chain A and corresponds to the tracing number is obtained as the first tracing data.
In one embodiment, the method further comprises: and if the verification is not passed, returning a prompt of data abnormality to the data user.
In one embodiment, as shown in FIG. 3, a supply chain data tracing diagram based on blockchain technology is provided. It is assumed that for the product S there is a supply chain a corresponding to the integrated supplier-user, as well as a supply chain B corresponding to the raw material supplier, i.e. the component manufacturer. Supply chain a and supply chain B have supply chain data of the product S stored thereon, respectively. The data consumer may obtain supply chain data for product S from supply chain a and supply chain B, respectively. Wherein the arrow direction in fig. 3 is denoted as information uplink (save to blockchain). As shown in fig. 4, both the data provider and the data consumer have computing middleware corresponding thereto. The data provider and the data consumer may upload data based on respective computing middleware or obtain supply chain data from the blockchain, respectively.
In the scheme, on the basis of privacy calculation, a supply chain data credible tracing method based on a blockchain technology and a privacy calculation technology is further provided, and the supply chain data deep tracing is realized on the premise of ensuring important data privacy of complex and precise products. The method combines the supply chain data with the blockchain technology based on the characteristics of tamper resistance, decentralization, anonymity and safety of the blockchain technology by establishing unified data standards and specifications, and solves the problems of difficult tracing of complex products and complex flow. The privacy computing technology is utilized to protect the privacy data of the product and the privacy data of the raw material, and the problem of sensitive information disclosure is solved. An effective supervision mechanism and an omnibearing credible evaluation system are established, a supply chain core service management mechanism is established, and the credibility of the supplier multiparty supervision evaluation system, the smooth information circulation, the credibility of the whole-flow supervision mechanism and the credibility of the supply chain tracing are realized.
FIG. 1 is a flow chart of a supply chain data tracing method based on a blockchain technique in one embodiment. It should be understood that, although the steps in the flowchart of fig. 1 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly stated herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 1 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of other steps or sub-steps of other steps.
In one embodiment, a supply chain data tracing apparatus based on blockchain technology is provided. The supply chain data tracing device based on the blockchain technology comprises a processor and a memory, wherein the processor executes the program modules stored in the memory to realize corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel can be provided with one or more than one kernel, and the supply chain data tracing method based on the blockchain technology is realized by adjusting kernel parameters.
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
The embodiment of the application provides a storage medium, and a program is stored on the storage medium, and when the program is executed by a processor, the supply chain data tracing method based on the blockchain technology is realized.
The embodiment of the application provides a processor for running a program, wherein the program runs to execute the supply chain data tracing method based on the block chain technology.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 5. The computer device includes a processor a01, a network interface a02, a memory (not shown) and a database (not shown) connected by a system bus. Wherein the processor a01 of the computer device is adapted to provide computing and control capabilities. The memory of the computer device includes internal memory a03 and nonvolatile storage medium a04. The nonvolatile storage medium a04 stores an operating system B01, a computer program B02, and a database (not shown in the figure). The internal memory a03 provides an environment for the operation of the operating system B01 and the computer program B02 in the nonvolatile storage medium a04. The database of the computer device is for storing supply chain data. The network interface a02 of the computer device is used for communication with an external terminal through a network connection. The computer program B02, when executed by the processor a01, implements a supply chain data tracing method based on a blockchain technique.
It will be appreciated by those skilled in the art that the structure shown in fig. 5 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
The embodiment of the application provides equipment, which comprises a processor, a memory and a program stored on the memory and capable of running on the processor, wherein the processor realizes the steps of a supply chain data tracing method based on a block chain technology when executing the program.
The present application also provides a computer program product adapted to perform a program initialized with supply chain data tracing method steps based on a blockchain technique as follows when executed on a data processing device.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flowchart and/or block of the flowchart illustrations and/or block diagrams, and combinations of flowcharts and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. that fall within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.

Claims (10)

1. A supply chain data tracing method based on a blockchain technology, the method comprising:
the method comprises the steps that a data user inputs a traceability number of a product to be queried on a first block chain, and whether traceability data corresponding to the traceability number exists on the first block chain is queried;
acquiring first traceability data on the first blockchain under the condition that the traceability data corresponding to the traceability number exists on the first blockchain;
inputting the traceability number on a second blockchain through a cross-chain communication infrastructure component, and inquiring whether traceability data corresponding to the traceability number exists on the second blockchain;
under the condition that the tracing data corresponding to the tracing number exists on the second blockchain, the cross-chain communication infrastructure component acquires the second tracing data on the second blockchain and sends the second tracing data to the data user;
the data user calculates the first tracing data and/or the second tracing data to obtain a corresponding first calculation result and/or a second calculation result;
verifying the first calculation result and/or the second calculation result through an intelligent contract of a third blockchain;
and under the condition that verification is passed, decrypting the first calculation result and/or the second calculation result through the cross-link communication infrastructure component, and transmitting the decrypted data to the data user.
2. The method according to claim 1, wherein the method further comprises:
before the data user inputs the traceability number of a product to be queried on a first blockchain, uploading original data marked as privacy to a first computing middleware unit corresponding to the data provider by the data provider;
the first computing middleware unit generates corresponding metadata according to the data parameters of the original data, and distributes the metadata of the original data to the first blockchain.
3. The method of claim 1, wherein the second trace data is metadata, and calculating the second trace data to obtain the corresponding second calculation result includes:
the data user combines the data parameters contained in the second traceability data into corresponding first information entropy;
hash conversion is carried out on the first information entropy so as to generate a corresponding first hash value;
comparing the first hash value with a second hash value of second trace-source data on the second blockchain;
generating a traceability task identifier, a communication parameter and an asymmetric encryption key pair corresponding to the second metadata under the condition that the first hash value is consistent with the second hash value, and sending the traceability task identifier, the communication parameter and the asymmetric encryption key pair to a first computing middleware unit and the third blockchain corresponding to the data provider;
and generating a second calculation result and a corresponding proof file aiming at the second tracing data by the first calculation middleware unit based on the first metadata, the tracing task identification, the communication parameters and the asymmetric encryption key pair.
4. The method of claim 3, wherein validating the second calculation result by a third blockchain smart contract comprises:
the first computing middleware unit encrypts the second computing result based on the asymmetric encryption key pair;
the first computing middleware unit signs the encrypted second computing result by using a signature private key to generate signature information entropy;
issuing the signature information entropy, the encrypted second calculation result and the signature private key pair to the third blockchain, and initiating a verification request to an intelligent contract of the third blockchain based on the tracing task identifier;
and responding to the verification request by the intelligent contract, and carrying out trusted verification and signature verification on the second calculation result based on the second calculation result and the corresponding certificate.
5. The method of claim 4, wherein the smart contract, in response to the verification request, performing trusted verification and signature verification of the second calculation based on the second calculation and a corresponding certificate comprises:
the intelligent contract obtains the signature private key pair, the asymmetric encryption key pair and the signature information entropy;
decrypting the signature information entropy using a public key to generate verification information;
comparing the generated verification information with the information in the signature information entropy;
and determining that the generated verification information is passed under the condition that the generated verification information is consistent with the information in the signature information entropy.
6. The method of claim 1, wherein, in the case where trace data corresponding to the trace number exists on the first blockchain, obtaining the first trace data on the first blockchain comprises:
and under the condition that the tracing data corresponding to the tracing number exists on the first block chain, acquiring the tracing data with earliest time on the first block chain as the first tracing data.
7. The method according to claim 1, wherein the method further comprises:
and returning a prompt of data abnormality to the data user under the condition that the verification is not passed.
8. A processor configured to perform the supply chain data tracing method based on blockchain technology of any one of claims 1 to 7.
9. A supply chain data traceability device based on a blockchain technology, characterized in that the device comprises a processor according to claim 8.
10. A machine-readable storage medium having instructions stored thereon, which when executed by a processor cause the processor to be configured to perform the blockchain technology-based supply chain data tracing method of any of claims 1 to 7.
CN202311493977.7A 2023-11-09 2023-11-09 Supply chain data tracing method, device and processor based on block chain technology Pending CN117764600A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311493977.7A CN117764600A (en) 2023-11-09 2023-11-09 Supply chain data tracing method, device and processor based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311493977.7A CN117764600A (en) 2023-11-09 2023-11-09 Supply chain data tracing method, device and processor based on block chain technology

Publications (1)

Publication Number Publication Date
CN117764600A true CN117764600A (en) 2024-03-26

Family

ID=90320829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311493977.7A Pending CN117764600A (en) 2023-11-09 2023-11-09 Supply chain data tracing method, device and processor based on block chain technology

Country Status (1)

Country Link
CN (1) CN117764600A (en)

Similar Documents

Publication Publication Date Title
CN111914269B (en) Data security sharing method and system in blockchain and cloud storage environment
JP7267293B2 (en) Systems and methods of device identification and blockchain services for enrollment and registration of connected endpoint devices
CN111523110B (en) Authority query configuration method and device based on chain codes
CN112131298B (en) Data conversion method and device based on block chain
JP2022141772A (en) Cryptographic datashare control for blockchain
CN112395353A (en) Intelligent electric energy meter quality data sharing method and system based on alliance chain
US20170200225A1 (en) Secure Customer Key Injection for Build-to-Stock Systems
CN111127021B (en) Service request method and device based on block chain
CN109255250A (en) A kind of data safety encryption device and application method based on alliance's chain
CN115412269A (en) Service processing method, device, server and storage medium
CN113743955A (en) Food material traceability data security access control method based on intelligent contract
CN103400063A (en) Method and device for executing script file
CN110189440A (en) A kind of smart lock monitoring equipment and its method based on block chain
CN113965370A (en) Data transmission method and device, computer equipment and readable storage medium
CN117764600A (en) Supply chain data tracing method, device and processor based on block chain technology
CN115048672A (en) Data auditing method and device based on block chain, processor and electronic equipment
CN112559976B (en) Product authorization method and system
CN114024692B (en) Signing method, device and system
CN112035426A (en) Supply chain data anti-counterfeiting method, device, equipment and computer readable medium
CN114301710B (en) Method for determining whether message is tampered, secret pipe platform and secret pipe system
CN112448928B (en) Credential obtaining method and device
CN114944949B (en) Data authorization method, system, device and storage medium based on block chain
CN113901498B (en) Data sharing method, device, equipment and storage medium
CN115037548B (en) System, method, device, medium and equipment for secure multiparty computation of data based on blockchain
CN113946864B (en) Confidential information acquisition method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination