LU504018B1 - Floriculture tracking system and method of applying the same - Google Patents
Floriculture tracking system and method of applying the same Download PDFInfo
- Publication number
- LU504018B1 LU504018B1 LU504018A LU504018A LU504018B1 LU 504018 B1 LU504018 B1 LU 504018B1 LU 504018 A LU504018 A LU 504018A LU 504018 A LU504018 A LU 504018A LU 504018 B1 LU504018 B1 LU 504018B1
- Authority
- LU
- Luxembourg
- Prior art keywords
- data
- unit
- control unit
- private key
- blockchain
- Prior art date
Links
- 238000009363 floriculture Methods 0.000 title claims abstract description 34
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000003993 interaction Effects 0.000 claims abstract description 46
- 230000004048 modification Effects 0.000 claims abstract description 31
- 238000012986 modification Methods 0.000 claims abstract description 31
- 238000007781 pre-processing Methods 0.000 claims abstract description 18
- 230000002159 abnormal effect Effects 0.000 claims description 21
- 238000007637 random forest analysis Methods 0.000 claims description 6
- 239000002689 soil Substances 0.000 claims description 6
- 238000004422 calculation algorithm Methods 0.000 claims description 3
- 230000006872 improvement Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 241001164374 Calyx Species 0.000 description 1
- 241001573881 Corolla Species 0.000 description 1
- 241000196324 Embryophyta Species 0.000 description 1
- 241000218922 Magnoliophyta Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000009395 breeding Methods 0.000 description 1
- 230000001488 breeding effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 241000894007 species Species 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
- G06F16/215—Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Medical Informatics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The present invention discloses a blockchain-based floriculture tracking system and method, the system including an information collection system, a data pre-processing unit, a control unit, a decryption unit, an encryption unit, a human-machine interaction unit, and a blockchain system; wherein the blockchain system includes multiple blocks and multiple nodes, each node corresponding to a cultivator and having a public key and an independent target private key, the control unit obtains the public key, and the encryption unit encrypts the i-th to-be-stored data according to the public key to obtain the i-th encrypted data, which are written by the control unit into the i-th block. All the nodes follow a consensus rule, which is defined as follows: when the control unit asks the nodes whether they agree to the i-th modification request, all the nodes need to reach a consensus before the subsequent modification can be made. The present invention realizes the automatic recording of flower characteristic data during cultivation, which greatly improves the security and confidentiality of data and avoids the phenomenon of data being maliciously modified or destroyed.
Description
FLORICULTURE TRACKING SYSTEM LU504018
AND METHOD OF APPLYING THE SAME
[0001] The present invention belongs to the field of blockchain technology, and specifically relates to a blockchain-based floriculture tracking system and method.
[0002] Flowers are herbaceous plants with ornamental value, usually sun-loving and cold-tolerant.
There are various forms of flowers, and a flower is usually composed of a pedicel, a receptacle, a calyx, a corolla, a perianth, and an androecium. China is the world’s largest country in terms of floriculture area, and has a vast consumer market. Before cultivating and planting flowers, a person usually needs to know the species of flowering plants he/she chooses and their growth habits. The process of cultivation usually comprises the following steps: preparing the soil, breeding seedlings, and maintaining and managing.
[0003] However, in the floriculture process, a cultivator needs to monitor and track the parameters of stem length, moisture, flower openness and petal chromaticity during the growth of flowers, so as to determine whether the flowers are thriving. This manual tracking of the growth process of flowers consumes most of the cultivator’s time and energy. Moreover, it is difficult to prevent some malicious individuals from modifying or destroying the flower-related information entered by the cultivator, resulting in extremely poor confidentiality and security of the flower-related information.
[0004] A blockchain is a chain consisting of a plurality of blocks, these blocks each storing certain information and connected into a chain in the chronological order in which they are generated.
This chain is kept in all servers, and the entire blockchain is secure as long as one server in the entire system is operational. These servers are called nodes in the blockchain system, and they provide storage space and computing power support for the entire blockchain system. If a person wants to modify information in the blockchain, he/she has to obtain the consent of more than half of the nodes and modify the information in all the nodes, which are usually in the hands of different subjects. Therefore, tampering with the information in the blockchain is an extremely difficult task.
[0005] The purpose of the present invention is to provide a blockchain-based floriculture tracking system and method to solve one or more technical problems existing in the prior art, at least providing a useful option or creating conditions.
[0006] The solution of the present invention to solve its technical problem is to providk 704018 blockchain-based flower cultivation tracking system, which includes an information collection system, a data pre-processing unit, a control unit, a decryption unit, an encryption unit, a human-machine interaction unit, and a blockchain system;
[0007] the blockchain system consists of a plurality of blocks linked together and includes multiple nodes, each node corresponding to a cultivator and having a public key and an independent target private key;
[0008] the information collection system 1s used to collect growth characteristic data of a target flower in an i-th cycle to obtain i-th growth characteristic data;
[0009] the data pre-processing unit is used to remove noise data from the 1-th growth characteristic data to obtain i-th to-be-stored data:
[0010] the control unit 1s used to obtain the public key from any node and pass the public key to the encryption unit; the encryption unit is used to encrypt the i-th to-be-stored data using a preset public key to obtain i-th encrypted data, which are written by the control unit into an i-th block;
[0011] the human-machine interaction unit is used to obtain an actual private key provided by an cultivator;
[0012] the control unit is also used to obtain the actual private key from the human-machine interaction unit, and match the actual private key with the target private key and, when the match is successful, pass the actual private key to the decryption unit; the decryption unit decrypts the stored data in the i-th block of the blockchain system based on the actual private key to obtain i-th decrypted data; the control unit passes the i-th decrypted data to the human-machine interaction unit for the cultivator to view the i-th decrypted data through the human-machine interaction unit;
[0013] the human-machine interaction unit is also used to obtain an i-th modification request entered by the cultivator;
[0014] the control unit is also used to obtain the i-th modification request from the human-machine interaction unit and ask the nodes whether they agree to the i-th modification request; when all the nodes agree to modify the i-th modification request, the control unit obtains the actual private key from the human-machine interaction unit, and matches the actual private key with the target private key and, when the match is successful, passes the actual private key to the decryption unit; the decryption unit decrypts the stored data in the i-th block of the blockchain system based on the actual private key to obtain i-th decrypted data;
[0015] the control unit modifies the i-th decrypted data to obtain i-th modified data; and
[0016] the control unit obtains the public key from any node and passes the public key to the encryption unit; the encryption unit encrypts the i-th modified data using the preset public key to obtain i-th encrypted modified data, which are written by the control unit into the i-th block. LU504018
[0017] As a further improvement of the above technical solution, a data processing program comprising the following is recorded in the data pre-processing unit: unifying the i-th growth characteristic data into the same data type; finding missing data in the i-th growth characteristic data, and using random forest to fill in the missing data; setting a rejection threshold, calculating significance levels of the i-th growth characteristic data, treating data with a significance level less than or equal to the rejection threshold as abnormal data, and discarding the abnormal data; and calculating the average value of the i-th growth characteristic data after filling in the missing data and discarding the abnormal data, thus generating the i-th to-be-stored data.
[0018] As a further improvement of the above technical solution, the i-th growth characteristic data comprise moisture information of the soil in which the target flower is located, light information of the environment where the target flower is located, stem length information of the target flower, openness information of the target flower, and petal chromaticity information of the target flower in the i-th cycle.
[0019] As a further improvement of the above technical solution, the i-th cycle is the i-th time cycle of the target flower during cultivation.
[0019] As a further improvement of the above technical solution, the i-th time cycle is 7 days.
[0021] As a further improvement of the above technical solution, all the nodes follow a consensus rule, which is defined as follows: when the control unit asks the nodes whether they agree to the i-th modification request, all the nodes need to reach a consensus before the control unit can obtain the actual private key from the human-machine interaction unit.
[0022] As a further improvement of the above technical solution, the consensus rule is implemented through any of POW, POS, DPOS, PBFT and RAFT consensus algorithms.
[0023] A blockchain-based floriculture tracking method is applied to the blockchain-based floriculture tracking system, characterized in that: the method comprises steps of writing, querying and modifying the growth characteristic data of the target flower;
[0024] the step of writing the growth characteristic data of the target flower comprises the following steps:
[0025] S100: the information collection system collects the growth characteristic data of the target flower in the i-th cycle to obtain the i-th growth characteristic data;
[0026] S110: the data pre-processing unit removes noise data from the i-th growth characteristic data to obtain the i-th to-be-stored data;
[0027] S120: the control unit obtains the public key from any node and passes the public key to the encryption unit; and
[0028] S130: the encryption unit encrypts the i-th to-be-stored data using a preset public key- {704018 obtain the i-th encrypted data, which are written by the control unit into the i-th block;
[0029] the step of querying the growth characteristic data of the target flower comprises the following steps:
[0030] S200: the cultivator enters the actual private key through the human-machine interaction unit;
[0031] S210: the control unit obtains the actual private key from the human-machine interaction unit, and matches the actual private key with the target private key and, when the match is successful, passes the actual private key to the decryption unit;
[0032] S220: the decryption unit decrypts the stored data in the i-th block of the blockchain system based on the actual private key to obtain the i-th decrypted data; and
[0033] S230: the control unit passes the i-th decrypted data to the human-machine interaction unit, through which the cultivator views the i-th decrypted data;
[0034] the step of modifying the growth characteristic data of the target flower comprises the following steps:
[0035] S300: the cultivator enters the i-th modification request through the human-machine interaction unit;
[0036] S310: the control unit obtains the i-th modification request from the human-machine interaction unit and asks the nodes whether they agree to the i-th modification request, when all the nodes agree to modify the i-th modification request, the control unit obtains the actual private key from the human-machine interaction unit;
[0037] S320: the control unit matches the actual private key with the target private key and, when the match is successful, passes the actual private key to the decryption unit, and the decryption unit decrypts the stored data in the i-th block of the blockchain system based on the actual private key to obtain the i-th decrypted data;
[0038] S330: the control unit modifies the i-th decrypted data to obtain the i-th modified data; and
[0039] S340: the control unit obtains the public key from any node and passes the public key to the encryption unit, and the encryption unit encrypts the i-th modified data using the preset public key to obtain the i-th encrypted modified data, which are written by the control unit into the i-th block.
[0040] As a further improvement of the above technical solution, the data pre-processing unit removes noise data from the i-th growth characteristic data to obtain the i-th to-be-stored data; the method further comprises the following steps:
[0041] S111: unifying the i-th growth characteristic data into the same data type;
[0042] S112: finding missing data in the i-th growth characteristic data, and using random folddp04018 to fill in the missing data;
[0043] S113: setting a rejection threshold, calculating significance levels of the i-th growth characteristic data, treating data with a significance level less than or equal to the rejection 5 threshold as abnormal data, and discarding the abnormal data; and
[0044] S114: calculating the average value of the i-th growth characteristic data after filling in the missing data and discarding the abnormal data, thus generating the i-th to-be-stored data.
[0045] The present invention has the following beneficial effects: The present invention provides a blockchain-based floriculture tracking system and method, so as to store the i-th growth characteristic data in blocks in a blockchain system, thereby achieving automatic recording of flower characteristic data during cultivation based on the characteristics of flowers in the cultivation process and improving the efficiency of recording flower characteristics. The cultivator needs to provide the correct actual private key to view the stored data in the i-th block; moreover, when the cultivator wants to modify the stored data in the i-th block, he/she needs to get confirmation from all the other cultivators before modifying the data, which greatly improves the security and confidentiality of floriculture data and prevents malicious individuals from maliciously modifying or destroying the floriculture data.
[0046] In order to illustrate the technical solution in the examples of the present invention more clearly, the drawings that need to be used in the examples will be briefly described below.
Obviously, the described examples are only some, not all, examples of the present invention.
Based on these drawings, those skilled in the art can obtain other design solutions and drawings without making creative efforts.
[0047] Fig. 1 is a schematic diagram of modules for a blockchain-based floriculture tracking system;
[0048] Fig. 2 is a schematic diagram of the structure of a blockchain system for the blockchain-based floriculture tracking system;
[0049] Fig. 3 is a flowchart of the step of writing the growth characteristic data of a target flower according to a blockchain-based floriculture tracking method;
[0050] Fig. 4 is a flowchart of the step of querying the growth characteristic data of a target flower according to the blockchain-based floriculture tracking method;
[0049] Fig. 5 is a flowchart of the step of modifying the growth characteristic data of a target flower according to the blockchain-based floriculture tracking method; and
[0052] Fig. 6 is a flowchart of a data pre-processing unit removing noise data from the i-th growth characteristic data according to the blockchain-based floriculture tracking method. LUS04018
[0053] In order to make the purpose, technical solutions and advantages of this application more clearly, this application will be further described below in detail in conjunction with drawings and examples. It should be understood that the specific examples described here are only used to explain, but not to limit, this application.
[0054] It should be noted that although functional modules are delineated in the system diagram and a logical order is illustrated in the flowchart, the steps shown or described may be executed in some cases in a different order from that in the module delineation in the system or in the flowchart. The terms “first”, “second” and the like in the description and claims as well as in the aforementioned drawings are used to distinguish similar objects, and need not be used to describe a particular order or sequence.
[0055] Regarding a blockchain-based floriculture tracking system and method in the example of the present invention, please refer to the description and introduction provided in Figs. 1 to 6 for the present invention.
[0056] A blockchain-based floriculture tracking system is provided, including an information collection system 100, a data pre-processing unit 200, a control unit 300, a decryption unit 400, an encryption unit 500, a human-machine interaction unit 600, and a blockchain system 700;
[0057] the blockchain system 700 consists of a plurality of blocks linked together and includes multiple nodes, each node corresponding to a cultivator and having a public key and an independent target private key;
[0058] the information collection system 100 is used to collect growth characteristic data of a target flower in an i-th cycle to obtain i-th growth characteristic data;
[0059] the data pre-processing unit 200 is used to remove noise data from the i-th growth characteristic data to obtain i-th to-be-stored data;
[0060] the control unit 300 is used to obtain the public key from any node and pass the public key to the encryption unit 500; the encryption unit 500 is used to encrypt the i-th to-be-stored data using a preset public key to obtain the i-th encrypted data, which are written by the control unit 300 into the i-th block;
[0061] the human-machine interaction unit 600 is used to obtain an actual private key provided by an cultivator;
[0062] the control unit 300 is also used to obtain the actual private key from the human-machine interaction unit 600, and match the actual private key with the target private key and, when the match is successful, pass the actual private key to the decryption unit 400; the decryption unit 400 decrypts the stored data in the i-th block of the blockchain system 700 based on the actual privat@0401 8 key to obtain i-th decrypted data; the control unit 300 passes the i-th decrypted data to the human-machine interaction unit 600 for the cultivator to view the i-th decrypted data through the human-machine interaction unit 600;
[0063] the human-machine interaction unit 600 is also used to obtain an i-th modification request entered by the cultivator;
[0064] the control unit 300 is also used to obtain the i-th modification request from the human-machine interaction unit 600 and ask the nodes whether they agree to the i-th modification request; when all the nodes agree to modify the i-th modification request, the control unit 300 obtains the actual private key from the human-machine interaction unit 600, and matches the actual private key with the target private key and, when the match is successful, passes the actual private key to the decryption unit 400; the decryption unit 400 decrypts the stored data in the i-th block of the blockchain system 700 based on the actual private key to obtain the i-th decrypted data;
[0065] the control unit 300 modifies the i-th decrypted data to obtain i-th modified data; and
[0066] the control unit 300 obtains the public key from any node and passes the public key to the encryption unit 500; the encryption unit 500 encrypts the i-th modified data using the preset public key to obtain the i-th encrypted modified data, which are written by the control unit into the i-th block.
[0067] In this example, a data processing program comprising the following is recorded in the data pre-processing unit 200: unifying the i-th growth characteristic data into the same data type; finding missing data in the i-th growth characteristic data, and using random forest to fill in the missing data; setting a rejection threshold, calculating significance levels of the i-th growth characteristic data, treating data with a significance level less than or equal to the rejection threshold as abnormal data, and discarding the abnormal data; and calculating the average value of the i-th growth characteristic data after filling in the missing data and discarding the abnormal data, thus generating the i-th to-be-stored data.
[0068] In this example, the i-th cycle is the i-th time cycle of the target flower during cultivation.
[0069] In this example, the i-th time cycle is 7 days.
[0070] In other examples of this application, the i-th time cycle may be determined as appropriate.
[0071] In this example, the i-th growth characteristic data comprise moisture information of the soil in which the target flower is located, light information of the environment where the target flower is located, stem length information of the target flower, openness information of the target flower, and petal chromaticity information of the target flower in the i-th cycle.
[0072] Specifically, the information collection system 100 includes a moisture sensing modul&UR04018 light sensing module, a camera and an image processing module, the moisture sensing module being used to obtain moisture information of the soil in which the target flower is located,
[0073] the camera, located directly above and to the side of a target flower, takes top and side views of the target flower and transmits these views to the image processing module;
[0074] the image processing module is used to process the top and side views to obtain information about the openness, petal chromaticity and stem length of the target flower; and
[0075] the light sensing module is used to obtain light information of the environment where the target flower is located.
[0076] Example 1
[0077] During the i-th cycle, the information collection system 100 collects information about the target flower comprising moisture information of the soil in which the target flower is located, light information of the environment where the target flower is located, stem length information of the target flower, openness information of the target flower, and petal chromaticity information of the target flower, which collectively constitute the i-th growth characteristic data, wherein the moisture information is denoted as Ainiiat = {Ainitiall, Ainitial2, Ainitial3... }, the light information is denoted as Binitaa = {Binitial1, Binitial2, Binitias… }, the stem length information is denoted as Cinitial = {Cinitiat, Cinitial2, Cinitial. .. }, the openness information is denoted as Diniiat = {Dinitiat1, Dinitial2,
Dinitiai3... }, and the petal chromaticity information is denoted as Einitia = {Einidau, Einitial2,
Eiitiais... }.
[0078] The data pre-processing unit 200 removes noise data from the i-th growth characteristic data, which is specifically as follows:
[0079] unifying all the moisture information Ainitia, light information Biniia, stem length information Cinitial, Openness information Dinitiar and petal chromaticity information Einitiai into the same data type;
[0080] finding missing data in the moisture information Ainitia, light information Binita, Stem length information Cinita, Openness information Dinitia and petal chromaticity information Einitial, and using random forest to fill in the missing data;
[0081] setting a rejection threshold, calculating significance levels of the moisture information
Ainitia, light information Binita, stem length information Cinita, Openness information Dinitiai and petal chromaticity information Einitia, treating data with a significance level less than or equal to the rejection threshold as abnormal data, and discarding the abnormal data; and
[0082] obtaining the moisture information A = {A1, Az, As… }, light information B = {B1, Bs,
Bs...}, stem length information C = {Ci, C2, Cs... }, openness information D = {D1, D3, p+V5p4018 and petal chromaticity information E = {Eı, Es, E;...} after filling in the missing data and discarding the abnormal data, and calculating the average value of each type of the information, with the average value of each type of the information together constituting the i-th to-be-stored data.
[0083] In this example, the public key is used for the encryption unit 500 to encrypt the i-th to-be-stored data to obtain the i-th encrypted data, which are then locked; the independent target private key is used to unlock the i-th encrypted data in the i-th block, with the target private key possessed by each cultivator depending on the cultivator’s permission during floriculture.
[0084] In general, in the blockchain systems 700, public and private keys appear in pairs, with one public key corresponding to one secret key; the public key is disclosed to each node of the blockchain system 700, and each node has an independent target private key. In special cases, one public key can correspond to multiple secret keys. In the example of this application, the public keys of all the nodes are each uniform and identical, and each cultivator has a different target secret key according to his/her permission during floriculture; the control unit 300 may obtain the public key through any of the nodes; when the control unit 300 needs to write the i-th to-be-stored data into the i-th block, the control center obtains the public key directly and passes it to the encryption unit 500; the encryption unit 500 encrypts the i-th to-be-stored data using a predetermined public key to obtain the i-th encrypted data, which may be written at this point by the control unit 300 into the i-th block without the need for the cultivator to write all the data one by one into the blockchain system 700 through public key encryption, greatly improving the accuracy of data writing and saving the cultivator’s time.
[0085] In this example, for modifying the stored data in the i-th block, each node in the blockchain system 700 needs to agree to the i-th modification request.
[0086] Specifically, all the nodes follow a consensus rule, which is defined as follows: when the control unit 300 asks the nodes whether they agree to the i-th modification request, all the nodes need to reach a consensus before the control unit 300 can obtain the actual private key from the human-machine interaction unit 600.
[0087] Specifically, the consensus rule is implemented through any of POW, POS, DPOS, PBFT and RAFT consensus algorithms.
[0088] As shown in Figs. 3 to 5, this application provides a blockchain-based floriculture tracking method, which is applied to the blockchain-based floriculture tracking system in the above example and comprises the following steps:
[0089] writing, querying and modifying the growth characteristic data of the target flower; LUS04018
[0090] the step of writing the growth characteristic data of the target flower comprises the following steps:
[0091] S100: the information collection system collects the growth characteristic data of the target flower in the i-th cycle to obtain the i-th growth characteristic data;
[0092] S110: the data pre-processing unit removes noise data from the i-th growth characteristic data to obtain the i-th to-be-stored data;
[0093] S120: the control unit obtains the public key from any node and passes the public key to the encryption unit; and
[0094] S130: the encryption unit encrypts the i-th to-be-stored data using a preset public key to obtain the i-th encrypted data, which are written by the control unit into the i-th block;
[0095] the step of querying the growth characteristic data of the target flower comprises the following steps:
[0096] S200: the cultivator enters the actual private key through the human-machine interaction unit;
[0097] S210: the control unit obtains the actual private key from the human-machine interaction unit, and matches the actual private key with the target private key and, when the match is successful, passes the actual private key to the decryption unit;
[0098] S220: the decryption unit decrypts the stored data in the i-th block of the blockchain system based on the actual private key to obtain the i-th decrypted data; and
[0099] S230: the control unit passes the i-th decrypted data to the human-machine interaction unit, through which the cultivator views the i-th decrypted data;
[0100] the step of modifying the growth characteristic data of the target flower comprises the following steps:
[0101] S300: the cultivator enters the i-th modification request through the human-machine interaction unit;
[0102] S310: the control unit obtains the i-th modification request from the human-machine interaction unit and asks the nodes whether they agree to the i-th modification request, when all the nodes agree to modify the i-th modification request, the control unit obtains the actual private key from the human-machine interaction unit;
[0103] S320: the control unit matches the actual private key with the target private key and, when the match is successful, passes the actual private key to the decryption unit, and the decryption unit decrypts the stored data in the i-th block of the blockchain system based on the actual private key to obtain the i-th decrypted data;
[0104] S330: the control unit modifies the i-th decrypted data to obtain the i-th modified data; aht=04018
[0105] S340: the control unit obtains the public key from any node and passes the public key to the encryption unit, and the encryption unit encrypts the i-th modified data using the preset public key to obtain the i-th encrypted modified data, which are written by the control unit into the i-th block.
[0106] As shown in Fig. 6, the data pre-processing unit removes noise data from the i-th growth characteristic data to obtain the i-th to-be-stored data, which further comprises the following steps:
[0107] S111: unifying the i-th growth characteristic data into the same data type;
[0108] S112: finding missing data in the i-th growth characteristic data, and using random forest to fill in the missing data;
[0109] S113: setting a rejection threshold, calculating significance levels of the i-th growth characteristic data, treating data with a significance level less than or equal to the rejection threshold as abnormal data, and discarding the abnormal data; and
[0110] S114: calculating the average value of the i-th growth characteristic data after filling in the missing data and discarding the abnormal data, thus generating the i-th to-be-stored data.
[0111] The preferred embodiments of the present invention have been specifically described above, but the present invention is not limited to the examples. Without departing from the spirit of the present invention, those skilled in the art can also make various equivalent modifications or substitutions, which are all included in the scope defined by the claims of this application.
Claims (9)
1. A blockchain-based floriculture tracking system, characterized in that: the system includes an information collection system, a data pre-processing unit, a control unit, a decryption unit, an encryption unit, a human-machine interaction unit, and a blockchain system; the blockchain system consists of a plurality of blocks linked together and includes multiple nodes, each node corresponding to a cultivator and having a public key and an independent target private key; the information collection system is used to collect growth characteristic data of a target flower in an i-th cycle to obtain i-th growth characteristic data; the data pre-processing unit is used to remove noise data from the i-th growth characteristic data to obtain i-th to-be-stored data; the control unit is used to obtain the public key from any node and pass the public key to the encryption unit; the encryption unit is used to encrypt the i-th to-be-stored data using a preset public key to obtain i-th encrypted data, which are written by the control unit into an i-th block; the human-machine interaction unit is used to obtain an actual private key provided by an cultivator; the control unit is also used to obtain the actual private key from the human-machine interaction unit, and match the actual private key with the target private key and, when the match is successful, pass the actual private key to the decryption unit; the decryption unit decrypts the stored data in the i-th block of the blockchain system based on the actual private key to obtain i-th decrypted data; the control unit passes the i-th decrypted data to the human-machine interaction unit for the cultivator to view the i-th decrypted data through the human-machine interaction unit; the human-machine interaction unit is also used to obtain an i-th modification request entered by the cultivator; the control unit is also used to obtain the i-th modification request from the human-machine interaction unit and ask the nodes whether they agree to the i-th modification request; when all the nodes agree to modify the i-th modification request, the control unit obtains the actual private key from the human-machine interaction unit, and matches the actual private key with the target private key and, when the match is successful, passes the actual private key to the decryption unit; the decryption unit decrypts the stored data in the i-th block of the blockchain system based on the actual private key to obtain i-th decrypted data; the control unit modifies the i-th decrypted data to obtain i-th modified data; and the control unit obtains the public key from any node and passes the public key to the encryption unit; the encryption unit encrypts the i-th modified data using the preset public key-tp0401 8 obtain i-th encrypted modified data, which are written by the control unit into the i-th block.
2. The blockchain-based floriculture tracking system according to claim 1, characterized in that a data processing program comprising the following is recorded in the data pre-processing unit: unifying the i-th growth characteristic data into the same data type; finding missing data in the i-th growth characteristic data, and using random forest to fill in the missing data; setting a rejection threshold, calculating significance levels of the i-th growth characteristic data, treating data with a significance level less than or equal to the rejection threshold as abnormal data, and discarding the abnormal data; and calculating the average value of the i-th growth characteristic data after filling in the missing data and discarding the abnormal data, thus generating the i-th to-be-stored data.
3. The blockchain-based floriculture tracking system according to claim 1, characterized in that: the i-th growth characteristic data comprise moisture information of the soil in which the target flower is located, light information of the environment where the target flower is located, stem length information of the target flower, openness information of the target flower, and petal chromaticity information of the target flower in the i-th cycle.
4. The blockchain-based floriculture tracking system according to claim 1, characterized in that: the i-th cycle is an i-th time cycle of the target flower during cultivation.
5. The blockchain-based floriculture tracking system according to claim 4, characterized in that: the i-th time cycle is 7 days.
6. The blockchain-based floriculture tracking system according to claim 1, characterized in that all the nodes follow a consensus rule, which is defined as follows: when the control unit asks the nodes whether they agree to the i-th modification request, all the nodes need to reach a consensus before the control unit can obtain the actual private key from the human-machine interaction unit.
7. The blockchain-based floriculture tracking system according to claim 6, characterized in that: the consensus rule is implemented through any of POW, POS, DPOS, PBFT and RAFT consensus algorithms.
8. A blockchain-based floriculture tracking method, applied to the blockchain-based floriculture tracking system according to any of claims 1-7, characterized in that: the method comprises steps of writing, querying and modifying the growth characteristic data of the target flower: the step of writing the growth characteristic data of the target flower comprises the following steps:
S100: the information collection system collects the growth characteristic data of the tar dp04018 flower in the i-th cycle to obtain the i-th growth characteristic data;
S110: the data pre-processing unit removes noise data from the i-th growth characteristic data to obtain the i-th to-be-stored data;
S120: the control unit obtains the public key from any node and passes the public key to the encryption unit; and
S130: the encryption unit encrypts the i-th to-be-stored data using a preset public key to obtain the i-th encrypted data, which are written by the control unit into the i-th block;
the step of querying the growth characteristic data of the target flower comprises the following steps:
S200: the cultivator enters the actual private key through the human-machine interaction unit;
S210: the control unit obtains the actual private key from the human-machine interaction unit, and matches the actual private key with the target private key and, when the match 1s successful, passes the actual private key to the decryption unit;
S220: the decryption unit decrypts the stored data in the i-th block of the blockchain system based on the actual private key to obtain the 1-th decrypted data; and
S230: the control unit passes the i-th decrypted data to the human-machine interaction unit, through which the cultivator views the i-th decrypted data;
the step of modifying the growth characteristic data of the target flower comprises the following steps:
S300: the cultivator enters the i-th modification request through the human-machine interaction unit;
S310: the control unit obtains the i-th modification request from the human-machine interaction unit and asks the nodes whether they agree to the i-th modification request, when all the nodes agree to modify the i-th modification request, the control unit obtains the actual private key from the human-machine interaction unit;
S320: the control unit matches the actual private key with the target private key and, when the match is successful, passes the actual private key to the decryption unit, and the decryption unit decrypts the stored data in the i-th block of the blockchain system based on the actual private key to obtain the i-th decrypted data;
S330: the control unit modifies the i-th decrypted data to obtain the i-th modified data; and
S340: the control unit obtains the public key from any node and passes the public key to the encryption unit, and the encryption unit encrypts the i-th modified data using the preset public key to obtain the i-th encrypted modified data, which are written by the control unit into the i-th block.
9. The blockchain-based floriculture tracking method according to claim 8, characterized-#p04018 that: the data pre-processing unit removes noise data from the i-th growth characteristic data to obtain the i-th to-be-stored data; the method further comprises the following steps:
S111: unifying the i-th growth characteristic data into the same data type;
S112: finding missing data in the i-th growth characteristic data, and using random forest to fill in the missing data;
S113: setting a rejection threshold, calculating significance levels of the i-th growth characteristic data, treating data with a significance level less than or equal to the rejection threshold as abnormal data, and discarding the abnormal data; and
S114: calculating the average value of the i-th growth characteristic data after filling in the missing data and discarding the abnormal data, thus generating the i-th to-be-stored data.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210425314.0A CN114896333A (en) | 2022-04-22 | 2022-04-22 | Flower cultivation tracking system and method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
LU504018B1 true LU504018B1 (en) | 2023-10-23 |
Family
ID=82717703
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
LU504018A LU504018B1 (en) | 2022-04-22 | 2023-04-21 | Floriculture tracking system and method of applying the same |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114896333A (en) |
LU (1) | LU504018B1 (en) |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108460605B (en) * | 2018-02-09 | 2021-01-15 | 深圳市优权天成科技有限公司 | Block chain-based tracing and anti-counterfeiting method and system for paper artwork |
CN109241756B (en) * | 2018-08-20 | 2020-01-31 | 深圳市腾讯网络信息技术有限公司 | Data processing method, system, server and medium based on block chain |
CN109919490A (en) * | 2019-03-08 | 2019-06-21 | 重庆工商大学 | Chrysanthemum quality tracing system and method based on block chain |
CN110059503B (en) * | 2019-04-24 | 2023-03-24 | 成都派沃特科技股份有限公司 | Traceable social information anti-leakage method |
CN111178903B (en) * | 2019-12-17 | 2023-11-10 | 江苏大学 | Greenhouse product traceability system and method based on block chain |
CN112182626B (en) * | 2020-10-19 | 2024-03-22 | 苏州智慧精融供应链科技发展有限公司 | Supply chain financial risk management system based on blockchain technology |
CN112702354B (en) * | 2020-12-29 | 2023-08-11 | 国家电网有限公司大数据中心 | Data resource sharing traceability method and device based on blockchain technology |
CN113093985B (en) * | 2021-06-09 | 2021-09-10 | 中国南方电网有限责任公司超高压输电公司广州局 | Sensor data link abnormity detection method and device and computer equipment |
CN113556363B (en) * | 2021-09-18 | 2021-12-17 | 中国人民解放军国防科技大学 | Data sharing method and system based on decentralized and distributed proxy re-encryption |
-
2022
- 2022-04-22 CN CN202210425314.0A patent/CN114896333A/en active Pending
-
2023
- 2023-04-21 LU LU504018A patent/LU504018B1/en active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
CN114896333A (en) | 2022-08-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7593548B2 (en) | Secure and anonymous storage and accessibility for sensitive data | |
US20190340381A1 (en) | Method and System for Search Pattern Oblivious Dynamic Symmetric Searchable Encryption | |
CN110457926A (en) | It is a kind of industry Internet of Things in based on data encryption storage data sharing method | |
CN107508812A (en) | A kind of industry control network date storage method, call method and system | |
CN111445272A (en) | Agricultural product traceability information processing system and method based on block chain | |
Gross et al. | Modeling controlled burning and trampling reduction for conservation of Hudsonia montana | |
FR2760871A1 (en) | STORAGE AND USE OF SENSITIVE INFORMATION IN A SECURITY MODULE, AND ASSOCIATED SECURITY MODULE | |
CN111858519B (en) | System and method for sharing confidential data on blockchain | |
CN108171066A (en) | The cross-domain searching method of keyword and system in a kind of medical treatment cloud under secret protection | |
CN108322447A (en) | Data sharing method and system, terminal under cloud environment and Cloud Server | |
CN106686010A (en) | Multi-mechanism attribute-based encryption method supporting strategy dynamic updating | |
CN115296817B (en) | Data access control method based on block chain technology and attribute encryption | |
US20150220746A1 (en) | Encrypted data store for records | |
US20230138102A1 (en) | Method and system for managing decentralized data using attribute-based encryption | |
CN112115199A (en) | Data management system based on block chain technology | |
LU504018B1 (en) | Floriculture tracking system and method of applying the same | |
EP3980913A1 (en) | Dynamic encryption/decryption of genomic information | |
CN111091396A (en) | Chinese-medicinal material system of traceing back based on block chain technique | |
Xu et al. | Efficient outsourcing of secure k-nearest neighbour query over encrypted database | |
di Vimercati et al. | Three-server swapping for access confidentiality | |
CN106446697A (en) | Method and device for saving private data | |
JAVED et al. | from perception to adaptation to climate change: farm-level evidence from Pakistan | |
CN114254374A (en) | Data tracing method and system | |
De Capitani di Vimercati et al. | Supporting concurrency and multiple indexes in private access to outsourced data | |
CN112329030A (en) | Agricultural product tracing method and system based on edge calculation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FG | Patent granted |
Effective date: 20231023 |