WO2020125223A1 - 容器检验方法及装置、电子设备 - Google Patents
容器检验方法及装置、电子设备 Download PDFInfo
- Publication number
- WO2020125223A1 WO2020125223A1 PCT/CN2019/114589 CN2019114589W WO2020125223A1 WO 2020125223 A1 WO2020125223 A1 WO 2020125223A1 CN 2019114589 W CN2019114589 W CN 2019114589W WO 2020125223 A1 WO2020125223 A1 WO 2020125223A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- container
- initial
- inspected
- inspection
- blockchain
- Prior art date
Links
- 238000007689 inspection Methods 0.000 title claims abstract description 129
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000012806 monitoring device Methods 0.000 claims abstract description 42
- 238000012795 verification Methods 0.000 claims description 18
- 238000012360 testing method Methods 0.000 claims description 2
- 235000014101 wine Nutrition 0.000 description 155
- 230000000875 corresponding effect Effects 0.000 description 42
- 238000012544 monitoring process Methods 0.000 description 16
- 238000010586 diagram Methods 0.000 description 11
- 235000013361 beverage Nutrition 0.000 description 10
- 230000008569 process Effects 0.000 description 9
- 239000003570 air Substances 0.000 description 3
- 235000013334 alcoholic beverage Nutrition 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- LFQSCWFLJHTTHZ-UHFFFAOYSA-N Ethanol Chemical compound CCO LFQSCWFLJHTTHZ-UHFFFAOYSA-N 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000002427 irreversible effect Effects 0.000 description 2
- 239000007788 liquid Substances 0.000 description 2
- 229920001690 polydopamine Polymers 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000005856 abnormality Effects 0.000 description 1
- 239000012080 ambient air Substances 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000005034 decoration Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 229910021389 graphene Inorganic materials 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 239000002304 perfume Substances 0.000 description 1
- 239000004033 plastic Substances 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Definitions
- One or more embodiments of this specification relate to the field of blockchain technology, and in particular, to a container inspection method and device, and electronic equipment.
- the user when a user holds a container, based on the label on the container, the user's guess, or other user's notification, the user has a certain awareness of the container or its built-in items, but the user often wants Determine whether the container matches the user's perception. For example, when the container is marked with brand A liquor, the user wants to determine whether the liquid inside the container is indeed the brand A liquor, or has been replaced or adulterated by a criminal.
- one or more embodiments of this specification provide a container inspection method and device, and electronic equipment.
- a container inspection method is proposed, which is applied to blockchain nodes; the method includes:
- a container status record is published on the blockchain, and the container status record includes the identification information of the initial container and the reception time of the notification message, wherein The monitoring device terminates operation when the initial container is opened;
- the inspection request including identification information of the initial container obtained by the requesting party from the container to be inspected;
- an inspection result indicating the consistency between the container to be inspected and the initial container is obtained; wherein, the smart contract suitable for container inspection is used according to the block
- the container state record corresponding to the identification information of the initial container in the chain determines the switch state of the initial container at the receiving moment, and determines the inspection based on the switch state of the initial container and the switch state of the container to be inspected result;
- the verification result is returned to the requester.
- a container inspection device which is applied to a blockchain node; the device includes:
- the publishing unit publishes the container status record on the blockchain according to the notification message sent by the monitoring device provided at the initial container according to a preset period, and the container status record contains the identification information of the initial container and the reception of the notification message Moment, where the monitoring device terminates operation when the initial container is opened;
- An inspection request receiving unit receiving an inspection request, the inspection request containing identification information of the initial container obtained by the requesting party from the container to be inspected;
- the result obtaining unit obtains the inspection result indicating the consistency between the container to be inspected and the initial container by calling a smart contract suitable for container inspection; wherein, the smart contract suitable for container inspection is used to Determining the switch state of the initial container in the container state record corresponding to the identification information of the initial container in the blockchain, and according to the switch state of the initial container and the switch state of the container to be inspected Determine the test results;
- the result return unit returns the verification result to the requester.
- an electronic device including:
- Memory for storing processor executable instructions
- the processor implements the container inspection method as described in any one of the foregoing embodiments by running the executable instructions.
- FIG. 1 is a schematic structural diagram of a container inspection system provided by an exemplary embodiment.
- FIG. 2 is a flowchart of a container inspection method provided by an exemplary embodiment.
- FIG. 3 is a schematic diagram of an interaction for identifying authenticity of wine provided by an exemplary embodiment.
- FIG. 4 is a schematic diagram of monitoring a state of a wine bottle through a monitor provided by an exemplary embodiment.
- FIG. 5 is a schematic diagram of authenticity inspection of wine and water provided by an exemplary embodiment.
- FIG. 6 is a schematic structural diagram of an apparatus provided by an exemplary embodiment.
- FIG. 7 is a block diagram of a container inspection device provided by an exemplary embodiment.
- the steps of the corresponding method are not necessarily performed in the order shown and described in this specification.
- the method may include more or fewer steps than described in this specification.
- the single step described in this specification may be decomposed into multiple steps for description in other embodiments; and the multiple steps described in this specification may also be combined into a single step in other embodiments. description.
- FIG. 1 is a schematic structural diagram of a container inspection system provided by an exemplary embodiment. As shown in FIG. 1, the system may include a blockchain node 11, a network 12, a monitoring device 13, and a user device 14.
- the blockchain node 11 may be carried on an electronic device, such as a PC or a server (such as a physical server containing an independent host, or the blockchain node 11 may be a virtual server carried by a host cluster, etc.). During the operation, the blockchain node 11 can be run and implemented as the server of the container inspection system to cooperate with the monitoring device 13 and the user device 14; at the same time, the blockchain node 11 can The container status records and smart contracts are released in the blockchain to implement the container inspection scheme of this specification.
- an electronic device such as a PC or a server (such as a physical server containing an independent host, or the blockchain node 11 may be a virtual server carried by a host cluster, etc.).
- the blockchain node 11 can be run and implemented as the server of the container inspection system to cooperate with the monitoring device 13 and the user device 14; at the same time, the blockchain node 11 can The container status records and smart contracts are released in the blockchain to implement the container inspection scheme of this specification.
- the monitoring device 13 may periodically send a notification message to the blockchain node 11 to cooperate with the blockchain node 11 to implement the inspection of the container.
- the monitoring device 13 can send messages based on any method, such as 2G network, 3G network, 4G network, 5G network, narrow-band Internet of Things (Narrow Band Internet of Things, NB-IoT), etc., one or more embodiments of this specification There is no restriction on this.
- the user equipment 14 may include electronic devices such as the following types: mobile phones, PCs, tablet devices, notebook computers, PDAs (PDAs, Personal Assistants), wearable devices (such as smart glasses, smart watches, etc.), etc.
- electronic devices such as the following types: mobile phones, PCs, tablet devices, notebook computers, PDAs (PDAs, Personal Assistants), wearable devices (such as smart glasses, smart watches, etc.), etc.
- PDAs Personal Assistants
- wearable devices such as smart glasses, smart watches, etc.
- the multiple embodiments do not limit this.
- the electronic device can initiate a request to the blockchain node 11 to implement inspection of the container.
- the network 12 that interacts between the blockchain node 11, the monitoring device 13, and the user device 14, various types of wired or wireless networks may be included.
- the network 12 may include a Public Switched Telephone Network (PSTN) and the Internet; of course, this specification does not limit this.
- PSTN Public Switched Telephone Network
- FIG. 2 is a flowchart of a container inspection method provided by an exemplary embodiment. As shown in Figure 2, this method is applied to blockchain nodes and can include the following steps:
- Step 202 according to the notification message sent by the monitoring device provided at the initial container according to a preset period, publish the container status record on the blockchain, the container status record contains the identification information of the initial container and the reception of the notification message Moment, where the monitoring device terminates operation when the initial container is opened.
- each blockchain node maintains a full amount of accounting information, and through a consensus algorithm It enables these blockchain nodes to reach agreement and ensure that each blockchain node maintains a unified blockchain ledger. Therefore, the above-mentioned blockchain nodes and other blockchain nodes used in this specification maintain a consistent and full amount of blockchain ledgers, so that the blockchain node can publish container status records to the blockchain, thereby Record the container status record in the blockchain ledger.
- the container status records recorded in the blockchain ledger have sufficient reliability and can be trusted by various blockchain nodes, so in the subsequent process based on the container When the state record realizes the container inspection, the information contained in the container state record can be fully trusted to avoid fraudulent activities by criminals.
- the monitoring device may be located inside or outside the initial container, which is not limited in this specification.
- the initial container itself can play a certain role in protecting the monitoring equipment to avoid damage to the monitoring equipment;
- the monitoring equipment can communicate with the initial container in a certain way It is fixed to avoid accidental falling off or deliberate disassembly by criminals, and the monitoring equipment can also be protected to avoid damage.
- the monitoring device may be equipped with a battery, and the battery is powered by the battery to enable it to send notification messages or perform other operations.
- the power provided by the battery can make the normal operation time of the monitoring device not less than the length of the effective period; or, the battery provides The amount of electricity can make the normal operation time of the monitoring equipment not less than the preset time period, which can be the monitoring time period desired by the manufacturer, and does not necessarily relate to the above validity period.
- the operation of the monitoring device may be related to the switching state of the initial container, so that when the initial container is in the closed state, the monitoring device can operate normally, for example, a notification message can be sent to the above-mentioned blockchain node, and When the initial container is in the open state, the monitoring device can terminate the operation in association, thereby stopping sending notification messages to the aforementioned blockchain nodes.
- the operation of the monitoring device is related to the switch state of the initial container, and the monitoring device can only send a notification message to the above-mentioned blockchain node during normal operation, the sending and receiving of the notification message can characterize the switch of the initial container status.
- the monitoring device may be physically associated with the switch state of the initial container. For example, when the initial container is opened, the monitoring device can cause corresponding physical structural changes, such as the power supply of the monitoring device is terminated, the instantaneous high voltage of the power supply line is released and the monitoring device is destroyed, etc., so that the monitoring device passively terminates the operation .
- the monitoring device may actively detect the switching state of the initial container, and actively terminate the operation when it is detected that the initial container is opened.
- the initial container may include a body and a lid, and "opened" may include normal opening based on the lid, or may include abnormal opening caused by damage to the body or lid, which is not limited in this specification. .
- the monitoring device can form a certain physical structure cooperation with the lid body, so that when the lid body is removed normally, the battery stops supplying power to the monitoring device, thereby stopping the operation of the monitoring device; for example, the body of the initial container and the lid body
- the protection circuit connected to the power supply line can be distributed throughout the protection circuit, which can limit the voltage output from the power supply line to the monitoring device in the normal range, and when the body or cover is damaged, the protection line will be damaged, thereby making the power supply line
- the instantaneous high pressure is released to the monitoring equipment, thereby causing irreversible damage to the monitoring equipment, resulting in the termination of the monitoring equipment.
- the above-mentioned preset period may be daily, hourly, every minute, etc., and the value of the preset period may be set or changed according to actual needs, which is not limited in this specification.
- Step 204 Receive an inspection request, where the inspection request includes the identification information of the initial container obtained by the requester from the container to be inspected.
- the technical solution of the present specification can inspect any type of container to be inspected, for example, the container to be inspected can be made of glass, plastic, metal, or other materials, and for example, the container to be inspected can be made as Bottles, barrels, boxes or other forms, for example, the container to be inspected may have a general household capacity of several milliliters to several tens of liters, a commercial capacity of several hundreds of liters or greater, which is not limited in this specification.
- the container to be inspected in this specification may contain any type of article (article to be inspected), for example, the article may be in a gaseous state, a liquid state, a solid state, or other forms, which is not limited in this specification.
- the user can obtain the identification information of the container to be inspected.
- the identification information can be located on the surface of the container to be inspected.
- the user can directly read it or parse it by scanning the bar code graphics, or obtain it by any other method. The manual does not limit this.
- the identification information of the container to be inspected is the identification information of the initial container
- the container to be inspected is different from the initial container, and the items to be inspected built in the container to be inspected are basically not It may be the initial items built into the initial container; the container to be inspected is the initial container.
- the items to be inspected built into the container to be inspected may be the initial items built into the initial container, but may not be the initial items built into the initial container, such as items
- the amount is different (the reason may include leakage, theft, etc.), the type of the item is different (the reason may include being replaced, deteriorated, etc.), the purity of the item is insufficient (the reason may include redeeming other items, etc.), etc. Therefore, the container inspection scheme of the present specification can be used to realize a high-precision guess for one or more of the above situations.
- Step 206 By calling a smart contract suitable for container inspection, an inspection result indicating the consistency between the container to be inspected and the initial container is obtained.
- the smart contract suitable for container inspection is used to determine the switch state of the initial container according to the reception time contained in the container state record corresponding to the identification information of the initial container in the blockchain And determining the inspection result according to the switch state of the initial container and the switch state of the container to be tested.
- the smart contract suitable for container inspection is used to determine the switch state of the initial container by: acquiring the container state corresponding to the identification information of the initial container in the blockchain Record the latest receiving time included; when the latest receiving time is earlier than the request time when the blockchain node receives the verification request, and the time difference is greater than the preset period of time, it indicates that the monitoring device has previously stopped sending Notification message, and because the monitoring device terminates operation when the initial container is opened, it can be determined that the switch state of the initial container is the open state; otherwise, it indicates that the monitoring device is still continuously sending notification messages, and the switch of the initial container can be determined The state is closed.
- the blockchain node can obtain the following inspection result when the switch state of the container to be checked is inconsistent with the switch state of the initial container:
- the inspection container is different from the initial container.
- the switch state of the container to be inspected is inconsistent with the switch state of the initial container, it indicates that the container to be inspected is most likely not the initial container, especially when the identification information obtained by the requester from the container to be inspected is the identification information of the initial container,
- the container to be inspected is likely to be a counterfeit product made by the criminals based on the initial container, so it is highly likely that the object to be inspected built into the container to be inspected is not the initial object built into the initial container.
- the blockchain node can open the container in the switch state of the initial container, and the container in the blockchain corresponding to the identification information of the initial container
- the latest reception time included in the status record is earlier than the opening time of the container to be inspected (at this time, the switch state of the container to be inspected must be the open state), and the time difference (between the most recent receiving time and the opening time) is not greater than the
- the duration of the period is set, the following inspection result is obtained: the container to be inspected is the initial container; otherwise, the following inspection result is obtained: the container to be inspected is different from the initial container.
- the monitoring device When the above-mentioned latest receiving time is earlier than the opening time of the container to be inspected, and the time difference is not greater than the duration of the preset period, it indicates that the monitoring device no longer sends a notification message after the requesting party opens the container to be inspected.
- the device terminates operation when the initial container is opened, so there is a very strong correlation between the opening of the container to be inspected and the opening of the initial container, which can be used to determine that the container to be inspected is the initial container, and the container to be inspected is to be inspected
- the item is likely to be the same as the initial item built into the initial container. Of course, it can be further determined in conjunction with other information.
- the time difference is greater than the duration of the preset period, it indicates that the initial container has been opened before the container to be inspected is opened, or when the above-mentioned recent receiving
- the time is later than the opening time of the container to be inspected, it indicates that the initial container has not been opened after the container to be inspected is opened, that is, there is no obvious correlation between the opening of the container to be inspected and the opening of the initial container, so according to This judges that the container to be inspected is not the initial container, and the item to be inspected built in the container to be inspected is also very likely not the initial item built in the initial container.
- the inspection request when the switch state of the container to be inspected is an open state, the inspection request further includes the opening time of the container to be inspected.
- the inspection request may include two fields, one field is used to characterize the switching state of the container to be inspected, and the other field is used to characterize the opening time of the container to be inspected; in another case, the inspection request may only contain the pending The opening time of the inspection container. If the opening time is empty, it indicates that the container to be inspected is in a closed state. If the opening time is filled with relevant data, it indicates that the container to be inspected must be in an open state.
- the container to be inspected may be the initial container, but if the container to be inspected is not the initial container, both It may be closed at the same time, making accurate judgment impossible.
- the blockchain node can send guidance information to the requester, the guidance information is used to guide the requester to return to the corresponding opening time after opening the container to be inspected; then, by calling Smart contract, the blockchain node can keep the latest receiving time contained in the container status record corresponding to the identification information of the initial container in the blockchain earlier than the opening time of the container to be inspected, and the time difference is not greater than
- the duration of the preset period is obtained, the following inspection result is obtained: the container to be inspected is the initial container; otherwise, the following inspection result is obtained: the container to be inspected is different from the initial container.
- the monitoring device When the above-mentioned recent receiving time changes and remains earlier than the opening time of the container to be inspected, and the time difference is not greater than the duration of the preset period, it indicates that the monitoring device no longer sends a notification message after the requester opens the container to be inspected , And because the monitoring equipment terminates operation when the initial container is opened, there is a very strong correlation between the opening of the container to be inspected and the opening of the initial container, which can be used to determine that the container to be inspected is the initial container and the container to be inspected The built-in items to be inspected are likely to be the same as the initial items in the initial container. Of course, it can be further determined in conjunction with other information.
- the above-mentioned latest receiving time is before the opening time and the time difference is longer than the preset period, it indicates that the initial container has been opened before the container to be detected is opened, or when the above-mentioned latest receiving time is after the opening time, it indicates that the initial container is in After the container to be inspected is still not opened (this is equivalent to an inconsistency in the switching state), in short, there is no obvious correlation between the opening of the container to be inspected and the opening of the initial container, so it is determined that the container to be inspected is not In the initial container, the item to be inspected in the container to be inspected is also very likely not the initial item in the initial container.
- the blockchain node can obtain a risk prompt indicating the consistency between the item to be inspected built in the container to be inspected and the initial item built in the initial container , And feed back the risk warning to the requester.
- the risk warning may include: when the container to be inspected is confirmed as the initial container, the item to be inspected and the There is no consistency risk for the initial object.
- the container status record corresponding to the identification information of the initial container in the blockchain has data missing for a continuous preset number of cycles, it indicates that the initial container is in the time period corresponding to the missing data
- abnormalities such as being opened by criminals and stealing and replacing the built-in initial items, especially when the monitoring equipment "terminates operation" by non-damaged methods such as power off, the criminals may force the monitoring equipment to start , So that the blockchain node receives the corresponding notification message again, so the risk alert may include: when the container to be inspected is confirmed as the initial container, the existence of the object to be inspected and the initial object Inconsistent risk, the degree of risk of the inconsistent risk may be positively correlated with the length of the above-mentioned consecutive preset number of periods.
- the blockchain node may send to the requester At least one of the following information of the preset number of consecutive cycles: start time, duration, end time, etc., so that the requester can make an assessment of the risk of inconsistency accordingly.
- Step 208 Return the verification result to the requester.
- the blockchain node may send the transaction serial number of the container state record corresponding to the identification information of the initial container in the blockchain to the requester, so that the requester can pass other blocks
- the chain nodes query and check the relevant container status records to verify the verification results and risk prompts fed back by the blockchain nodes.
- the blockchain node may receive a query request, the query request includes identification information of the initial container obtained by the requester from the container to be inspected; then, the blockchain node may transfer the blockchain The receiving time contained in the container status record corresponding to the identification information of the initial container and/or its transaction serial number are returned to the requester, so that the requester can use the container corresponding to the identification information of the initial container The receiving moment included in the status record determines the consistency between the container to be inspected and the initial container.
- the requesting party may judge the consistency between the container to be inspected and the initial container by itself according to the receiving time contained in the container status record corresponding to the identification information of the initial container in the blockchain, or entrust any third party to make the judgment
- This specification does not limit this; among them, the judgment logic can refer to the above-mentioned embodiment that occurs at the blockchain node, and will not be repeated here.
- FIG. 3 is an interactive schematic diagram for identifying the authenticity of wine provided by an exemplary embodiment.
- the process of identifying the authenticity of the wine it may involve the authentication server 31, the monitor 32 provided on the bottle of the authentic alcohol during the production process, and the mobile phone 33 used by the user when authenticating the authenticity of the alcohol .
- the interaction process can include the following steps:
- step 301 the monitor 32 monitors the state of the bottle of genuine wine, and sends a notification message to the authentication server 31 when the bottle is closed.
- the monitor 32 may periodically detect the status of the authentic bottle of wine, and the duration of the detection period may be pre-configured by the manufacturer, such as 30 seconds, 1 minute, or other durations.
- the monitor 32 when the monitor 32 detects that the bottle status of the authentic beverage is closed, it may send a notification message to the authentication server 31; the operation of the monitor 32 may be related to the bottle status, so that the bottle status is changed from When the closed state is switched to the open state, the monitor 32 can be triggered to terminate its operation, thereby stopping sending notification messages to the authentication server 31. Therefore, based on the notification message sent from the monitor 32 to the authentication server 31, the state of the wine bottle of the authentic wine can be estimated in reverse.
- the monitor 32 may be passively associated with the bottle status of the genuine liquor, so that when the genuine liquor is turned on, the monitor 32 is forced to terminate the operation.
- FIG. 4 is a schematic diagram of monitoring the state of a wine bottle through a monitor provided by an exemplary embodiment; as shown in FIG. 4, assume that a wine bottle 4 of a brand of wine includes a bottle cap 41 and a bottle body 42, The monitor 32 may be installed at the bottle cap 41, where when the user opens the wine bottle 4 to separate the bottle cap 41 from the bottle body 42, the power supply line of the monitor 32 may be disconnected, so that the monitor 32 terminates operation.
- the monitor 32 can actively detect the state of the bottle of genuine wine and terminate its operation when the genuine wine is turned on.
- the monitor 32 can detect the internal air pressure of the wine bottle 4, when not open, the internal air pressure of the wine bottle 4 can be greater than the external ambient air pressure; and when the user opens the wine bottle 4, the monitor 32 can detect the wine bottle 4 The internal air pressure is reduced, so that the authentic wine is turned on, and the operation is actively terminated.
- the criminals may open the wine bottle 4 by unconventional means, and the monitor 32 can also detect the unconventional opening of the wine bottle 4, And terminate the operation accordingly.
- a criminal may insert a needle into the wine bottle 4 from the bottle cap 41 through a syringe, draw genuine wine out of the wine bottle 4 and inject other low-quality wine, then in this process, the internal pressure of the wine bottle 4 will decrease, Therefore, the monitor 32 can detect that the wine bottle 4 is abnormally opened.
- a protection circuit may be distributed throughout the wine bottle, and the protection circuit is used to adjust the input voltage of the power supply line to the monitor 32; wherein, when the wine bottle 4 is not turned on, the protection circuit makes the input voltage be in the normal range, and When the criminals drill holes in the bottle cap 41 or the bottle body 42 and steal genuine wine, they will damage the protection circuit, so that the power supply line inputs an instantaneous high voltage to the monitor 32, so the monitor 32 can be subjected to the instantaneous high voltage Lost and terminated the operation.
- step 302 the authentication server 31 generates a container status record according to the notification message sent by the monitor 32 and publishes it to the blockchain.
- the authentication server 31 can run a blockchain client, so that the authentication server 31 is configured as a blockchain node, so that by creating a transaction in the blockchain, the container status record can be published to the zone In the blockchain.
- the container status record generated by the authentication server 31 may include the number of the authentic beverage and the time of receiving the notification message, where the number is used for the authentic beverage and other beverages The distinction is made between the two, and the receiving moment is used to indicate that the genuine liquor is still closed at least at the receiving moment.
- step 303 the mobile phone 33 sends a verification request to the authentication server 31.
- the user may obtain a bottle of the above-mentioned brand of wine through purchase or other means.
- the information conveyed to the user by the packaging and decoration of the wine indicates that it belongs to the above-mentioned brand, as mentioned above, the criminals It is possible to falsify by various means, making the actual situation completely different. Therefore, the user can send a verification request to the authentication server 31 through the mobile phone 33, so that the authentication server 31 checks the alcoholic beverage to be checked held by the user.
- step 304 the authentication server 31 calls the smart contract according to the received inspection request and obtains the corresponding inspection result, and then returns the inspection result to the mobile phone 33.
- the authentication server 31 can call the smart contract and use the information contained in the verification request as the input parameter of the smart contract, so that the smart contract can be based on the verification request and published to the container status record in the blockchain , To check the above-mentioned wine to be tested to determine whether it is genuine.
- the smart contract contains executable logic code, which is executed to obtain the above verification result; the following describes the functional logic implemented by the logic code in conjunction with FIG. 5, wherein FIG. 5 is provided by an exemplary embodiment A schematic diagram of authenticity inspection of wine. As shown in FIG. 5, the functional logic for checking the wine may include the following steps:
- Step 502 Determine the latest reception time t1 of the corresponding beverage according to the beverage number.
- a bar code 421 may be provided on the bottle body 42 such as shown in FIG. 4, and the bar code 421 may contain the corresponding drink number, which is equivalent to the identity ID of each drink.
- the bottle of the wine to be inspected held by the user may also be provided with a barcode containing its number, which can be parsed by the mobile phone 33 and added to the inspection request.
- the smart contract can find the container status record containing the wine number X in the blockchain.
- the smart contract may not be able to find the container status record containing the wine number X in the blockchain, indicating that the wine number X is not the number of genuine wine, so the wine to be tested is most likely a counterfeit made by a criminal commodity.
- the smart contract finds a container status record containing the wine number X in the blockchain, it indicates that the wine number X is the number of genuine wine.
- the possibility that the wine still exists as non-genuine is still to be tested-
- the criminal may have faked the number of the authentic liquor, so it can be further determined by the subsequent logic whether the liquor to be tested is indeed the authentic liquor with the number X.
- Step 504 Determine the switch status of the authentic liquor with the number X according to the acquired latest reception time t1 and the request time t2 when the authentication server 31 receives the verification request.
- the period for the monitor 32 to send a notification message is t0.
- the latest reception time t1 is earlier than the request time t2, and t2-t1>t0, it indicates that the monitor 32 terminates operation after the latest reception time t1 and between the request time t2, and because the monitor 32 is opened in the bottle of genuine wine
- the operation is terminated, it indicates that the authentic wine with the number X is turned on at the request time t2.
- the latest reception time t1 is earlier than the request time t2 and t2-t1 ⁇ t0, or the latest reception time t1 is later than the request time t2, it indicates that the monitor 32 is still continuously sending notification messages, and because the monitor 32 is When the wine bottle is opened, the operation is terminated, indicating that the genuine wine with the number X is in the closed state at the request time t2.
- step 506A when the bottle of genuine wine has been opened, the switch state of the wine to be checked is determined.
- the inspection request sent by the user may include the switch status of the wine to be inspected, that is, whether the wine bottle of the wine to be inspected has been opened.
- the user may also inform the authentication server 31 of the switch status of the wine to be checked in other ways.
- the authentic wine of the number X when the authentic wine of the number X is turned on, that is, the wine bottle of the authentic wine of the number X has been opened, if the wine bottle of the wine to be inspected has not been opened, it indicates that the authentic wine of the number X and the wine to be inspected The switch status of is not consistent, so it can be determined that although the wine to be inspected is marked with the number X, the bottle of the wine to be inspected is not genuine wine.
- the criminals may use the bottle of genuine wine with the number X, and fill it with fake and inferior wine, and then repackage to form the above-mentioned wine to be inspected; for example, the criminals may use counterfeit A wine bottle, and a number X is set on the counterfeit wine bottle, and the counterfeit wine bottle is filled with counterfeit inferior wine, and finally packaged to form the above-mentioned wine to be inspected.
- Step 508A when both the authentic liquor of number X and the liquor to be inspected are turned on, it is determined whether the turning-on times of the two are consistent.
- the user can add the opening time of the wine to be checked in the check request.
- the opening time can be used as a parameter independent of the switch state; in another case, the opening time can be used to express both "switch state" and "time information" without including the switch in the inspection request Status and opening time: When the opening time is not set, it indicates that it is in the closed state, and when the opening time is set, it indicates that it is in the open state and the corresponding time information can be obtained.
- the authentication server 31 should not receive after the opening time t3
- the notification message sent to the monitor 32 so that the latest reception time t1 (equivalent to the opening time of the authentic drink of number X) included in the container status record containing the number X on the blockchain should be no later than the opening time t3, and
- the monitor 32 terminates the operation due to the opening of the wine bottle at time t3, and it can be operated normally before, so it should satisfy t3-t1 ⁇ t0.
- the wine to be inspected is of the number X if t1 is not later than t3 and t3-t1 ⁇ t0 Genuine wine and bottles to be inspected are filled with genuine wine.
- the latest reception time t1 is not later than the opening time t3 but t3-t1 ⁇ t0, it indicates that the authentic liquor of the number X is already in the open state before the liquor to be inspected is turned on, so the liquor to be inspected is non-genuine, not the number The authentic liquor of X; the relevant situation is similar to the embodiment where the liquor bottle of the liquor to be inspected is not opened in step 506A, and the liquor bottle of the authentic liquor of number X has been opened, which will not be repeated here.
- the latest reception time t1 is later than the opening time t3
- the authentic wine of the number X is not in the open state when the wine to be inspected is turned on
- the authentic wine of the number X is turned on after the wine to be inspected is turned on Therefore, the wine to be inspected is non-genuine and is not the authentic wine with the number X.
- the criminals probably used counterfeit wine bottles and set the number X on the counterfeit wine bottles, and the counterfeit wine bottles were filled with counterfeit inferior wines, and finally packaged to form the above-mentioned to-be-tested wines.
- Step 506B When the bottle of genuine wine is not opened, determine the switch state of the wine to be inspected.
- step 506A when the authentic wine of the number X is in a closed state, that is, the wine bottle of the authentic wine of the number X is not opened, if the wine bottle to be inspected has been opened, it indicates the number X
- the switch status of the authentic wine and the wine to be inspected are inconsistent, so it can be determined that although the wine to be inspected is marked with the number X, the bottle of the wine to be inspected is not genuine wine.
- a criminal may use a counterfeit wine bottle, and set a number X on the counterfeit wine bottle, and the counterfeit wine bottle is filled with counterfeit inferior wine, and finally encapsulated to form the above-mentioned wine to be inspected.
- Step 508B when the wine bottle to be inspected is not opened, guidance information is sent to the user.
- the wine to be inspected may be either the authentic wine or a counterfeit product, which needs to be judged in combination with other information.
- the guidance information sent to the user may guide the user to send the opening time t3 to the authentication server 31 after opening the wine to be checked, so as to accurately determine whether the wine to be checked is genuine wine based on the opening time t3.
- Step 510 Obtain the opening time of the wine to be checked.
- the user can record the corresponding turning-on time t3 and feed it back to the authentication server 31.
- step 512 it is determined whether the opening time of the authentic liquor with the number X is consistent with the liquor to be tested.
- the latest reception time t1 corresponding to the number X will be updated, so that the process proceeds to the step At 512, the latest received time t1 used has a different value from the latest received time t1 in step 502.
- the latest receiving time t1 when the latest receiving time t1 is later than the opening time t3, it indicates that the authentic beverage of the number X is not in the open state when the beverage to be inspected is turned on, and the number of X after the beverage to be inspected is turned on
- the genuine wine is only turned on, and even the genuine wine with the number X has not been turned on in step 512, which means that the opening time of the genuine wine with the number X is later than the wine to be inspected, and the opening time of the two is inconsistent, so the wine to be inspected is Non-genuine, non-genuine liquor of this number X.
- the criminals probably used counterfeit wine bottles and set the number X on the counterfeit wine bottles, and the counterfeit wine bottles were filled with counterfeit inferior wines, and finally packaged to form the above-mentioned to-be-tested wines.
- the authentication server 31 should not receive after the opening time t3 To the notification message sent by the monitor 32, so that the latest reception time t1 corresponding to the number X should be kept no later than the opening time t3 and satisfy t3-t1 ⁇ t0.
- the wine to be checked is the number if t1 is maintained not later than t3 and t3-t1 ⁇ t0 X's genuine wine and the bottles of the wine to be inspected are filled with genuine wine.
- the alcoholic beverage to be inspected is non-genuine authentic alcoholic beverage which is not the number X.
- the criminals probably used counterfeit wine bottles and set the number X on the counterfeit wine bottles, and the counterfeit wine bottles were filled with counterfeit inferior wines, and finally packaged to form the above-mentioned to-be-tested wines.
- the smart contract can also be used to count the container status records containing the number X on the blockchain to determine the data integrity of the container status records corresponding to each cycle. For example, when there are missing data for n consecutive cycles (that is, there is no container state record corresponding to the consecutive n cycles containing the number X on the blockchain), the criminal may take advantage of the time of the n consecutive cycles In the paragraph, open the bottle of genuine wine and replace the genuine wine therein, and then restart the monitor 32 (especially when the monitor 32 does not undergo irreversible damage when the operation is terminated).
- the smart contract can also generate a corresponding risk reminder, especially when the wine to be inspected is determined to be genuine wine based on the above embodiment, the user can be prompted so that the user can pass other
- the dimension makes a more comprehensive and comprehensive identification of the wine to be tested.
- the value of n can be set according to the actual situation, for example, the continuous n cycles should not be too short, for example, the monitor 32 may be affected by environmental factors, network conditions, etc., so that some notification messages cannot be sent to
- the authentication server 31 should prevent similar situations from being identified as risk scenarios; for example, the continuous n cycles should not take too long. For example, the criminals may only need 10 minutes to complete the relevant illegal activities, then the continuous n cycles should not More than 10 minutes.
- FIG. 6 is a schematic structural diagram of a device provided by an exemplary embodiment. Please refer to FIG. 6.
- the device includes a processor 602, an internal bus 604, a network interface 606, a memory 608, and a non-volatile memory 610. Of course, it may include hardware required for other services.
- the processor 602 reads the corresponding computer program from the non-volatile memory 610 into the memory 608 and then runs it to form a container inspection device at a logical level.
- one or more embodiments of this specification do not exclude other implementations, such as logic devices or a combination of hardware and software, etc., that is to say, the execution body of the following processing flow is not limited to each
- the logic unit may also be a hardware or logic device.
- the container inspection device can be applied to a blockchain node; the device includes:
- the publishing unit 701 publishes the container status record on the blockchain according to the notification message sent by the monitoring device provided at the initial container according to a preset period, where the container status record contains the identification information of the initial container and the notification message Receiving moment, wherein the monitoring device terminates operation when the initial container is opened;
- the inspection request receiving unit 702 receives an inspection request, and the inspection request includes identification information of the initial container obtained by the requester from the container to be inspected;
- the result obtaining unit 703 obtains the inspection result indicating the consistency between the container to be inspected and the initial container by calling a smart contract suitable for container inspection; wherein, the smart contract suitable for container inspection is used for
- the switch state of the initial container is determined according to the reception time contained in the container state record corresponding to the identification information of the initial container in the blockchain, and according to the switch state of the initial container and the switch of the container to be inspected The status determines the inspection result;
- the result return unit 704 returns the verification result to the requester.
- the smart contract suitable for container inspection is used to determine the switch state of the initial container in the following manner:
- the initial container switch state is the on state; otherwise, It is determined that the switch state of the initial container is a closed state.
- the result obtaining unit 703 is specifically used to:
- the result obtaining unit 703 is specifically used to:
- the container state record corresponding to the identification information of the initial container in the blockchain contains the latest reception time earlier than the
- the opening time of the container to be inspected and the time difference is not greater than the duration of the preset period the following inspection result is obtained: the container to be inspected is the initial container; otherwise, the following inspection result is obtained: the container to be inspected Different from the initial container.
- the inspection request further includes the opening time of the container to be inspected.
- It also includes a guidance unit 705, which sends guidance information to the requester when the initial container switch state and the container to be checked switch state are both closed, and the guidance information is used to guide the requester Return to the corresponding opening time after opening the container to be inspected;
- the result obtaining unit 703 is specifically configured to: by calling a smart contract suitable for container inspection, the latest receiving time contained in the container status record corresponding to the identification information of the initial container in the blockchain is kept earlier than all
- the opening time of the container to be inspected and the time difference is not greater than the duration of the preset period
- the following inspection result is obtained: the container to be inspected is the initial container; otherwise, the following inspection result is obtained: the container to be inspected The container is different from the initial container.
- Optional also includes:
- the prompt obtaining unit 706 obtains a risk prompt indicating the consistency between the items to be inspected built in the container to be inspected and the initial items built in the initial container by calling a smart contract suitable for item inspection; wherein:
- the risk warning includes: when the container to be inspected is confirmed to be In the initial container, there is no risk of consistency between the item to be inspected and the initial object;
- the risk prompt includes: when the container to be inspected is confirmed as the During the initial container, there is a risk of inconsistency between the item to be inspected and the initial object;
- the prompt feedback unit 707 feeds back the risk prompt to the requester.
- Optional also includes:
- the information sending unit 708 sends the continuous preset number to the requester when there is missing data in the container state record corresponding to the identification information of the initial container in the blockchain that reaches a continuous preset number of cycles At least one of the following information for each cycle: start time, duration, and end time.
- Optional also includes:
- the serial number sending unit 709 sends the transaction serial number of the container state record corresponding to the identification information of the initial container in the blockchain to the requester.
- Optional also includes:
- the query request receiving unit 710 receives the query request, and the query request includes the identification information of the initial container obtained by the requester from the container to be inspected;
- the data return unit 711 returns the reception time and/or its transaction serial number contained in the container status record corresponding to the identification information of the initial container in the blockchain to the requester, so that the requester
- the reception time included in the container state record corresponding to the identification information of the initial container determines the consistency between the container to be inspected and the initial container.
- the system, device, module or unit explained in the above embodiments may be specifically implemented by a computer chip or entity, or implemented by a product having a certain function.
- a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email sending and receiving device, and a game control Desk, tablet computer, wearable device, or any combination of these devices.
- the computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- processors CPUs
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- the memory may include non-permanent memory, random access memory (RAM) and/or non-volatile memory in a computer-readable medium, such as read only memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
- RAM random access memory
- ROM read only memory
- flash RAM flash memory
- Computer readable media including permanent and non-permanent, removable and non-removable media, can store information by any method or technology.
- the information may be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic disk storage, quantum memory, graphene-based storage media or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices.
- computer-readable media does not include temporary computer-readable media (transitory media), such as modulated data signals and carrier waves.
- first, second, third, etc. may use the terms first, second, third, etc. to describe various information, the information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
- first information may also be referred to as second information, and similarly, the second information may also be referred to as first information.
- word "if” as used herein may be interpreted as "when” or “when” or “in response to a determination”.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Marketing (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Finance (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Details Of Rigid Or Semi-Rigid Containers (AREA)
- Alarm Systems (AREA)
Abstract
本说明书一个或多个实施例提供一种容器检验方法及装置、电子设备,应用于区块链节点;所述方法可以包括:根据初始容器处设置的监测设备按照预设周期发送的通知消息,向区块链上发布容器状态记录,其中所述监测设备在所述初始容器被开启时终止运行;接收检验请求,所述检验请求包含请求方从待检验容器上获取的所述初始容器的标识信息;通过调用适于容器检验的智能合约,获得表明所述待检验容器与所述初始容器之间的一致性的检验结果;向所述请求方返回所述检验结果。
Description
本说明书一个或多个实施例涉及区块链技术领域,尤其涉及一种容器检验方法及装置、电子设备。
在相关技术中,当用户持有某一容器时,基于该容器上的标注、该用户的猜测或其他用户的告知,用户对该容器或其内置物品存在某一认知,但该用户往往希望确定该容器是否与该用户的认知相符。譬如,当该容器上标注为A品牌的酒水时,该用户希望确定该容器内置的液体是否确实为该A品牌的酒水,还是被不法分子进行了更换或掺假等。
发明内容
有鉴于此,本说明书一个或多个实施例提供一种容器检验方法及装置、电子设备。
为实现上述目的,本说明书一个或多个实施例提供技术方案如下:
根据本说明书一个或多个实施例的第一方面,提出了一种容器检验方法,应用于区块链节点;所述方法包括:
根据初始容器处设置的监测设备按照预设周期发送的通知消息,向区块链上发布容器状态记录,所述容器状态记录包含所述初始容器的标识信息和所述通知消息的接收时刻,其中所述监测设备在所述初始容器被开启时终止运行;
接收检验请求,所述检验请求包含请求方从待检验容器上获取的所述初始容器的标识信息;
通过调用适于容器检验的智能合约,获得表明所述待检验容器与所述初始容器之间的一致性的检验结果;其中,所述适于容器检验的智能合约被用于根据所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的接收时刻确定所述初始容器的开关状态,以及根据所述初始容器的开关状态和所述待检验容器的开关状态确定所述检验结果;
向所述请求方返回所述检验结果。
根据本说明书一个或多个实施例的第二方面,提出了一种容器检验装置,应用于区块链节点;所述装置包括:
发布单元,根据初始容器处设置的监测设备按照预设周期发送的通知消息,向区块链上发布容器状态记录,所述容器状态记录包含所述初始容器的标识信息和所述通知消息的接收时刻,其中所述监测设备在所述初始容器被开启时终止运行;
检验请求接收单元,接收检验请求,所述检验请求包含请求方从待检验容器上获取的所述初始容器的标识信息;
结果获取单元,通过调用适于容器检验的智能合约,获得表明所述待检验容器与所述初始容器之间的一致性的检验结果;其中,所述适于容器检验的智能合约被用于根据所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的接收时刻确定所述初始容器的开关状态,以及根据所述初始容器的开关状态和所述待检验容器的开关状态确定所述检验结果;
结果返回单元,向所述请求方返回所述检验结果。
根据本说明书一个或多个实施例的第三方面,提出了一种电子设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器通过运行所述可执行指令实现如上述实施例中任一所述的容器检验方法。
图1是一示例性实施例提供的一种容器检验系统的架构示意图。
图2是一示例性实施例提供的一种容器检验方法的流程图。
图3是一示例性实施例提供的一种辨别酒水真伪的交互示意图。
图4是一示例性实施例提供的一种通过监测器对酒瓶状态进行监测的示意图。
图5是一示例性实施例提供的一种对酒水进行正品检验的示意图。
图6是一示例性实施例提供的一种设备的结构示意图。
图7是一示例性实施例提供的一种容器检验装置的框图。
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本说明书一个或多个实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本说明书一个或多个实施例的一些方面相一致的装置和方法的例子。
需要说明的是:在其他实施例中并不一定按照本说明书示出和描述的顺序来执行相应方法的步骤。在一些其他实施例中,其方法所包括的步骤可以比本说明书所描述的更多或更少。此外,本说明书中所描述的单个步骤,在其他实施例中可能被分解为多个步骤进行描述;而本说明书中所描述的多个步骤,在其他实施例中也可能被合并为单个步骤进行描述。
图1是一示例性实施例提供的一种容器检验系统的架构示意图。如图1所示,该系统可以包括区块链节点11、网络12、监测设备13、用户设备14。
区块链节点11可以承载于某一电子设备上,比如PC或服务器(譬如包含一独立主机的物理服务器,或者该区块链节点11可以为主机集群承载的虚拟服务器等)。在运行过程中,区块链节点11可以运行并实现为容器检验系统的服务端,以配合于实现与监测设备13、用户设备14之间的交互;同时,该区块链节点11可以向区块链中发布容器状态记录、调用智能合约等,从而实现本说明书的容器检验方案。
监测设备13可以定期向区块链节点11发送通知消息,以配合区块链节点11实现对容器的检验。例如,监测设备13可以基于任意方式实现消息发送,比如2G网络、3G网络、4G网络、5G网络、窄带物联网(Narrow Band Internet of Things,NB-IoT)等,本说明书一个或多个实施例并不对此进行限制。
用户设备14可以包括诸如下述类型的电子设备:手机、PC、平板设备、笔记本电脑、掌上电脑(PDAs,Personal Digital Assistants)、可穿戴设备(如智能眼镜、智能手表等)等,本说明书一个或多个实施例并不对此进行限制。在运行过程中,该电子设备可以向区块链节点11发起请求,以实现对容器的检验。
而对于区块链节点11、监测设备13、用户设备14之间进行交互的网络12,可以包括多种类型的有线或无线网络。在一实施例中,该网络12可以包括公共交换电话网络(Public Switched Telephone Network,PSTN)和因特网;当然,本说明书并不对此进行 限制。
图2是一示例性实施例提供的一种容器检验方法的流程图。如图2所示,该方法应用于区块链节点,可以包括以下步骤:
步骤202,根据初始容器处设置的监测设备按照预设周期发送的通知消息,向区块链上发布容器状态记录,所述容器状态记录包含所述初始容器的标识信息和所述通知消息的接收时刻,其中所述监测设备在所述初始容器被开启时终止运行。
在一实施例中,区块链上存在若干区块链节点,这些区块链节点之间采用分布式记账的形式,每个区块链节点分别维护有全量记账信息,并且通过共识算法使得这些区块链节点之间能够达成一致,确保各个区块链节点之间共同维护了统一的区块链账本。因此,应用于本说明书中的上述区块链节点与其他区块链节点均维护有内容一致、全量的区块链账本,使得该区块链节点能够向区块链中发布容器状态记录,从而将该容器状态记录记录于区块链账本中。由于登记于区块链内的数据具有不可篡改的特性,使得区块链账本中记录的容器状态记录具有足够的可靠性、能够受到各个区块链节点的信任,因此在后续过程中基于该容器状态记录实现容器检验时,可以充分信赖该容器状态记录中包含的信息,避免不法分子弄虚作假。
在一实施例中,监测设备可以位于初始容器的内部或外部,本说明书并不对此进行限制。当监测设备位于初始容器内部时,初始容器本身可以对该监测设备起到一定的保护作用,避免使监测设备受损;当监测设备位于初始容器外部时,该监测设备可以通过一定方式与初始容器进行固定,以避免意外脱落或被不法分子故意拆卸,还可以针对该监测设备进行一定保护、避免受损。
在一实施例中,监测设备可以配备电池,并通过该电池对该监测设备供电、以使其能够发送通知消息或实施其他操作。当初始容器内的初始物品具有一定时长的有效期时(譬如该初始物品为饮料或香水等),电池所提供的电量可使监测设备的正常运行时长不小于该有效期的长度;或者,电池所提供的电量可使监测设备的正常运行时长不小于预设时长,该预设时长可以为厂商所希望的监测时长,而并不一定与上述的有效期相关。
在一实施例中,监测设备的运行情况可以与初始容器的开关状态相关,使得当初始容器处于关闭状态时,该监测设备可以正常运行,譬如可以向上述的区块链节点发送通知消息,而当初始容器处于开启状态时,该监测设备可以相关联地终止运行,从而停止向上述的区块链节点发送通知消息。相应地,由于监测设备的运行情况与初始容器的开 关状态相关,并且监测设备仅正常运行时能够向上述的区块链节点发送通知消息,因而该通知消息的收发情况即可表征初始容器的开关状态。
在一实施例中,监测设备可以与初始容器的开关状态存在物理性的关联。例如,当初始容器被开启时,可使监测设备产生相应的物理结构变化,比如该监测设备的供电终止、供电线路释放瞬间高压而使得该监测设备被破坏等,从而使得监测设备被动地终止运行。
在一实施例中,监测设备可以主动检测初始容器的开关状态,并在检测到初始容器被开启时,主动终止运行。举例而言,初始容器可以包括本体和盖体,“被开启”可以包括基于盖体的正常开启,也可以包括对本体或盖体进行破坏而导致的非正常开启,本说明书并不对此进行限制。例如,监测设备可以与盖体之间形成一定的物理结构配合,使得盖体被正常取下时,电池终止向监测设备供电,从而使得监测设备终止运行;再例如,初始容器的本体和盖体内部可以遍布与供电线路相连的保护线路,该保护线路可以限制供电线路向监测设备输出的电压处于正常范围,而当本体或盖体遭到破坏时,会导致保护线路被破坏,从而使得供电线路向监测设备释放瞬间高压,从而对监测设备造成不可逆的破坏,导致监测设备终止运行。
在一实施例中,上述的预设周期可以为每天、每小时、每分钟等,并且该预设周期的数值可以根据实际需求进行设定或更改,本说明书并不对此进行限制。
步骤204,接收检验请求,所述检验请求包含请求方从待检验容器上获取的所述初始容器的标识信息。
在一实施例中,本说明书的技术方案可以针对任意类型的待检验容器进行检验,比如该待检验容器可以采用玻璃、塑料、金属或其他材质制成,再比如该待检验容器可以被制作为瓶、桶、盒或其他形态,又比如该待检验容器可以具有数毫升至数十升的一般家用容量、数百升的商用容量或更大容量,本说明书并不对此进行限制。
在一实施例中,本说明书中的待检验容器可以内置任意类型的物品(待检验物品),比如该物品可以为气态、液态、固态或其他形态,本说明书并不对此进行限制。
在一实施例中,用户可以获取待检验容器的标识信息,例如该标识信息可以位于待检验容器的表面,用户可以直接读取或通过扫描条码图形而解析得到,或者通过其他任意方式获得,本说明书并不对此进行限制。
在一实施例中,当待检验容器的标识信息为初始容器的标识信息时,可能存在多种 情形,例如:待检验容器区别于初始容器,此时该待检验容器内置的待检验物品基本不可能是初始容器内置的初始物品;待检验容器为初始容器,此时该待检验容器内置的待检验物品有可能是初始容器内置的初始物品,但是也可能并非初始容器内置的初始物品,比如物品量不同(原因可能包括泄露、窃取等)、物品类型不同(原因可能包括被更换、变质等)、物品纯度不足(原因可能包括兑入其他物品等)等。因此,可以通过本说明书的容器检验方案,对上述的一种或多种情形实现精准度较高的推测。
步骤206,通过调用适于容器检验的智能合约,获得表明所述待检验容器与所述初始容器之间的一致性的检验结果。
在一实施例中,所述适于容器检验的智能合约被用于根据所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的接收时刻确定所述初始容器的开关状态,以及根据所述初始容器的开关状态和所述待检验容器的开关状态确定所述检验结果。
在一实施例中,所述适于容器检验的智能合约被用于通过下述方式确定所述初始容器的开关状态:获取所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻;当所述最近接收时刻早于所述区块链节点收到所述检验请求的请求时刻,且时差大于所述预设周期的时长时,表明监测设备先前已经停止发送通知消息,又因为监测设备在初始容器被开启时终止运行,因而可以确定所述初始容器的开关状态为开启状态;否则,表明监测设备仍然在持续发送通知消息,可以确定所述初始容器的开关状态为关闭状态。
在一实施例中,通过调用适于容器检验的智能合约,区块链节点可以在所述待检验容器的开关状态与所述初始容器的开关状态不一致时,获得下述检验结果:所述待检验容器区别于所述初始容器。当待检验容器的开关状态与初始容器的开关状态不一致时,表明该待检验容器很可能并非初始容器,尤其当请求方从该待检验容器上获取到的标识信息为初始容器的标识信息时,该待检验容器很可能是不法分子根据初始容器制作的仿冒品,因而该待检验容器内置的待检验物品也极有可能并非初始容器内置的初始物品。
在一实施例中,通过调用适于容器检验的智能合约,区块链节点可以在所述初始容器的开关状态为开启状态、所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻早于所述待检验容器的开启时刻(此时待检验容器的开关状态必然为开启状态)、且(最近接收时刻与开启时刻之间的)时差不大于所述预设周期的时长时,获得下述检验结果:所述待检验容器为所述初始容器;否则,获得下述检验结果:所述待检验容器区别于所述初始容器。当上述的最近接收时刻早于所述待检验容器的开 启时刻、且时差不大于所述预设周期的时长时,表明请求方开启待检验容器后导致监测设备不再发送通知消息,而由于监测设备在初始容器被开启时终止运行,因而待检验容器的开启与初始容器的开启之间存在极大程度的强关联,可以据此判定待检验容器为初始容器,而待检验容器内置的待检验物品很可能与初始容器内置的初始物品一致,当然还可以结合其他信息进一步判定。当上述的最近接收时刻早于所述待检验容器的开启时刻、且时差大于所述预设周期的时长时,表明初始容器在待检验容器被开启之前就已经被开启,或者当上述的最近接收时刻晚于所述待检验容器的开启时刻时,表明初始容器在待检验容器被开启之后仍然未被开启,即待检验容器的开启与初始容器的开启之间不存在明显的关联性,因而据此判定待检验容器并非初始容器,该待检验容器内置的待检验物品也极有可能并非初始容器内置的初始物品。
在一实施例中,当所述待检验容器的开关状态为开启状态时,所述检验请求还包含所述待检验容器的开启时刻。换言之,请求方在向区块链节点发起检验请求时,如果待检验容器已经处于开启状态,那么请求方可以直接在检验请求中标注待检验容器的开启时刻,而无需区块链节点单独询问、减少交互次数。一种情况下,检验请求可以包括两个字段,一个字段用于表征待检验容器的开关状态,另一个字段用于表征待检验容器的开启时刻;另一种情况下,检验请求可以仅包含待检验容器的开启时刻,如果该开启时刻为空,则表明待检验容器处于关闭状态,如果该开启时刻被填入相关数据,则表明待检验容器必然处于开启状态。
在一实施例中,在所述初始容器的开关状态和所述待检验容器的开关状态均为关闭状态时,待检验容器可能为初始容器,但是如果待检验容器并非初始容器,两者也很可能同时处于关闭状态,无法做出准确判断。因此,区块链节点可以向所述请求方发送引导信息,所述引导信息用于引导所述请求方在开启所述待检验容器后返回相应的开启时刻;然后,通过调用适于容器检验的智能合约,区块链节点可以在所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻保持为早于所述待检验容器的开启时刻、且时差不大于所述预设周期的时长时,获得下述检验结果:所述待检验容器为所述初始容器;否则,获得下述检验结果:所述待检验容器区别于所述初始容器。当上述的最近接收时刻变化并保持为早于所述待检验容器的开启时刻、且时差不大于所述预设周期的时长时,表明请求方开启待检验容器后导致监测设备不再发送通知消息,而由于监测设备在初始容器被开启时终止运行,因而待检验容器的开启与初始容器的开启之间存在极大程度的强关联,可以据此判定待检验容器为初始容器,而待检验容器内置的待检验物品很可能与初始容器内置的初始物品一致,当然还可以结合其他信息 进一步判定。当上述的最近接收时刻在开启时刻之前、且时差大于预设周期的时长时,表明初始容器在待检测容器开启之前已经开启,或者当上述的最近接收时刻在开启时刻之后时,表明初始容器在待检测容器开启之后仍然未开启(此时相当于出现了开关状态的不一致),总之表明待检验容器的开启与初始容器的开启之间不存在明显的关联性,因而据此判定待检验容器并非初始容器,该待检验容器内置的待检验物品也极有可能并非初始容器内置的初始物品。
在一实施例中,通过调用适于物品检验的智能合约,区块链节点可以获得表明所述待检验容器内置的待检验物品与所述初始容器内置的初始物品之间的一致性的风险提示,并向所述请求方反馈所述风险提示。在一种情况下,当所述区块链中对应于所述初始容器的标识信息的容器状态记录不存在达到连续预设数量个周期的数据缺失时,表明初始容器始终保持关闭状态、未被开启过,不法分子无法对初始容器内的初始物品进行窃取、替换等,因而所述风险提示可以包括:在所述待检验容器被确认为所述初始容器时,所述待检验物品与所述初始物体不存在一致性风险。在另一种情况下,当所述区块链中对应于所述初始容器的标识信息的容器状态记录存在达到连续预设数量个周期的数据缺失时,表明初始容器在缺失数据对应的时间段内可能存在异常,比如被不法分子开启并对内置的初始物品进行窃取、替换等,尤其是当监测设备通过断电等非受损方式“终止运行”时,不法分子可能对监测设备进行强制启动,使得区块链节点重新收到相应的通知消息,因而所述风险提示可以包括:在所述待检验容器被确认为所述初始容器时,所述待检验物品与所述初始物体之间存在不一致风险,该不一致风险的风险程度可以与上述连续预设数量个周期的时间段长度呈正相关。
在一实施例中,当所述区块链中对应于所述初始容器的标识信息的容器状态记录存在达到连续预设数量个周期的数据缺失时,区块链节点可以向所述请求方发送所述连续预设数量个周期的下述信息中至少之一:开始时刻、持续时长、终止时刻等,以使得请求方可以据此对不一致风险做出评估。
步骤208,向所述请求方返回所述检验结果。
在一实施例中,区块链节点可以将所述区块链中对应于所述初始容器的标识信息的容器状态记录的交易流水号发送至所述请求方,使得请求方可以通过其他区块链节点对相关容器状态记录进行查询、核对,以对区块链节点反馈的检验结果、风险提示等进行核验确认。
在一实施例中,区块链节点可以接收查询请求,所述查询请求包含请求方从待检验 容器上获取的所述初始容器的标识信息;然后,区块链节点可以将所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的接收时刻和/或其交易流水号返回至所述请求方,以使所述请求方根据对应于所述初始容器的标识信息的容器状态记录包含的接收时刻,确定所述待检验容器与所述初始容器之间的一致性。例如,请求方可以根据区块链中对应于所述初始容器的标识信息的容器状态记录包含的接收时刻,自行判断待检验容器与初始容器之间的一致性,或者委托任意的第三方进行判断,本说明书并不对此进行限制;其中,判断逻辑可以参考上述发生于区块链节点处的实施例,此处不再赘述。
为了便于理解,下面以某一品牌酒水的真伪辨别为例,对本说明书的容器检验方案进行介绍。其中,图3是一示例性实施例提供的一种辨别酒水真伪的交互示意图。如图3所示,在辨别酒水真伪的过程中,可以涉及鉴别服务器31、生产过程中在正品酒水的酒瓶上设置的监测器32,以及用户在鉴别酒水真伪时采用的手机33等,交互过程可以包括以下步骤:
步骤301,监测器32监测正品酒水的酒瓶状态,在酒瓶为关闭状态时向鉴别服务器31发送通知消息。
在一实施例中,监测器32可以周期性地检测正品酒水的酒瓶状态,检测周期的时长可以由生产厂家进行预配置,比如30秒、1分钟或其他时长。
在一实施例中,当监测器32检测到正品酒水的酒瓶状态为关闭状态时,可以向鉴别服务器31发送通知消息;监测器32的运行可以与酒瓶状态相关,使得该酒瓶状态由关闭状态切换为开启状态时,可以触发该监测器32终止运行,从而停止向鉴别服务器31发送通知消息。因此,根据监测器32向鉴别服务器31发送的通知消息,可以反向推测出正品酒水的酒瓶状态。
在一实施例中,监测器32可以被动关联至正品酒水的酒瓶状态,使得当正品酒水被开启时,该监测器32被迫终止运行。例如,图4是一示例性实施例提供的一种通过监测器对酒瓶状态进行监测的示意图;如图4所示,假定某一品牌酒水的酒瓶4包括瓶盖41和瓶身42,监测器32可以装配于瓶盖41处,其中当用户开启酒瓶4使得瓶盖41与瓶身42分离时,可以造成该监测器32的供电线路断开,从而使得监测器32终止运行。
在一实施例中,监测器32可以主动检测正品酒水的酒瓶状态,并在正品酒水被开启时终止自身的运行。例如,监测器32可以检测酒瓶4的内部气压,当未开启时酒瓶4 的内部气压可以大于外部的环境气压;而当用户开启酒瓶4时,监测器32可以检测到酒瓶4的内部气压降低,从而判定正品酒水被开启,并主动终止运行。
在一实施例中,除了通过瓶盖41来正常开启酒瓶4之外,不法分子可能通过非常规手段对酒瓶4进行开启,监测器32同样可以检测酒瓶4发生的非常规开启情况,并相应地终止运行。例如,不法分子可能通过注射器从瓶盖41处将针管插入酒瓶4内部,将正品酒从酒瓶4中吸出并注入其他劣质酒,那么在此过程中会导致酒瓶4的内部气压降低,从而使得监测器32能够检测出酒瓶4发生了非正常的开启。又例如,在整个酒瓶内部可以遍布保护线路,该保护线路用于调整供电线路向监测器32的输入电压;其中,在酒瓶4未被开启时,保护线路使得输入电压处于正常范围,而在不法分子在瓶盖41或瓶身42上钻孔、窃取正品酒时,会对保护线路造成破坏,从而使得供电线路向该监测器32输入瞬间高压,因而监测器32可以在瞬间高压下受损而终止运行。
步骤302,鉴别服务器31根据监测器32发送的通知消息,生成容器状态记录并发布至区块链中。
在一实施例中,鉴别服务器31可以运行区块链的客户端,使得该鉴别服务器31被配置为一区块链节点,从而可以通过在区块链中创建交易,将容器状态记录发布至区块链中。
在一实施例中,针对收到的每条通知消息,鉴别服务器31生成的容器状态记录中可以包括正品酒水的编号和对该通知消息的接收时刻,其中编号用于对该正品酒水与其他酒水之间进行区分,而接收时刻用于表明该正品酒水至少在该接收时刻仍处于关闭状态。
步骤303,手机33向鉴别服务器31发送检验请求。
在一实施例中,用户可能通过购买或其他方式获得了一瓶上述品牌的酒水,虽然该酒水的包装、装饰等向用户传达的信息表明其属于上述品牌,但是正如上文所述,不法分子可能通过各种手段进行造假,使得实际情况完全不同。因此,用户可以通过手机33向鉴别服务器31发送检验请求,从而由鉴别服务器31对该用户持有的待检验酒水进行检验。
步骤304,鉴别服务器31根据收到的检验请求,调用智能合约并获取相应的检验结果,然后将检验结果返回至手机33。
在一实施例中,鉴别服务器31可以调用智能合约,并将检验请求中包含的信息作为该智能合约的输入参数,从而使得智能合约能够基于该检验请求和发布至区块链中的容 器状态记录,对上述的待检验酒水进行检验、确定其是否为正品。
其中,智能合约包含可执行的逻辑代码,该逻辑代码被执行以得到上述的检验结果;下面结合图5对该逻辑代码所实现的功能逻辑进行介绍,其中图5是一示例性实施例提供的一种对酒水进行正品检验的示意图。如图5所示,用于检验酒水的功能逻辑可以包括以下步骤:
步骤502,根据酒水编号确定对应酒水的最近接收时刻t1。
在一实施例中,在诸如图4所示的瓶身42上可以设有条码421,该条码421可以包含相应酒水的编号,相当于各个酒水的身份ID。类似地,用户持有的待检验酒水的酒瓶上也可以设有包含其编号的条码,可以通过手机33对该条码包含的酒水编号进行解析,并添加至检验请求中。
假定检验请求中包含酒水编号X,智能合约可以在区块链中查找包含该酒水编号X的容器状态记录。在一些情况下,智能合约可能无法在区块链中查找到包含该酒水编号X的容器状态记录,表明该酒水编号X并非正品酒水的编号,因而待检验酒水极有可能是不法分子制作的仿冒商品。在其他情况下,智能合约如果在区块链中查找到了包含该酒水编号X的容器状态记录,表明该酒水编号X是正品酒水的编号,当然待检验酒水仍然存在为非正品的可能性——比如不法分子可能仿冒了正品酒水的编号,因此可以通过后续逻辑进一步确定该待检验酒水是否确实为编号X的正品酒水。
通过调用智能合约,可以查找到区块链中包含编号X的容器状态记录,并获取这些查找到的容器状态记录分别包含的接收时刻,其中包括最近接收时刻t1。
步骤504,根据获取的最近接收时刻t1和鉴别服务器31收到检验请求的请求时刻t2,判断编号X的正品酒水的开关状态。
在一实施例中,假定监测器32发送通知消息的周期长度为t0。当最近接收时刻t1早于请求时刻t2,并且t2-t1>t0,表明监测器32在最近接收时刻t1之后、请求时刻t2之间终止运行,而由于监测器32在正品酒水的酒瓶被开启时终止运行,表明编号X的正品酒水在请求时刻t2处于开启状态。而当最近接收时刻t1早于请求时刻t2并且t2-t1≤t0,或者最近接收时刻t1晚于请求时刻t2时,表明监测器32仍然在持续发送通知消息,而由于监测器32在正品酒水的酒瓶被开启时终止运行,表明编号X的正品酒水在请求时刻t2处于关闭状态。
步骤506A,当正品酒水的酒瓶已开启时,确定待检验酒水的开关状态。
在一实施例中,用户发送的检验请求中可以包括待检验酒水的开关状态,即该待检验酒水的酒瓶是否已开启。当然,用户还可以通过其他方式将待检验酒水的开关状态告知鉴别服务器31。
在一实施例中,当编号X的正品酒水处于开启状态,即该编号X的正品酒水的酒瓶已开启时,如果待检验酒水的酒瓶尚未开启,表明编号X的正品酒水与待检验酒水的开关状态不一致,因而可以判定:虽然该待检验酒水上标注为编号X,但是该待检验酒水的酒瓶内装的并非正品酒。此时可能存在多种情况,例如不法分子可能使用了编号X的正品酒水的酒瓶,并灌入了假冒的劣质酒,然后重新封装形成上述的待检验酒水;又例如不法分子可能使用了假冒酒瓶,并在该假冒酒瓶上设置了编号X,而该假冒酒瓶内灌入了假冒的劣质酒,最后封装形成上述的待检验酒水。
步骤508A,当编号X的正品酒水与待检验酒水均处于开启状态时,确定两者的开启时刻是否一致。
在一实施例中,用户可以在检验请求中添加待检验酒水的开启时刻。一种情况下,开启时刻可以作为独立于开关状态之外的参数;另一种情况下,开启时刻可以同时用于表达“开关状态”和“时刻信息”,而无需在检验请求中同时包含开关状态和开启时刻:当未设置开启时刻时表明处于关闭状态,当设置有开启时刻时表明处于开启状态并且可以获得相应的时刻信息。
在一实施例中,如果待检验酒水为正品,即该待检验酒水就是编号X的正品酒水,那么当待检验酒水的开启时刻为t3时,鉴别服务器31在该开启时刻t3之后就不应当接收到监测器32发送的通知消息,使得区块链上包含编号X的容器状态记录中包含的最近接收时刻t1(相当于编号X的正品酒水的开启时刻)应当不晚于该开启时刻t3,并且该监测器32由于酒瓶在t3时刻被开启而终止运行、此前可以正常运行,因而应当满足t3-t1<t0。
那么,通过获取待检验酒水的开启时刻t3与编号X的正品酒水对应的最近接收时刻t1,可以在满足t1不晚于t3、t3-t1<t0的情况下,判定待检验酒水为编号X的正品酒水、待检验酒水的酒瓶中灌装了正品酒。
而当最近接收时刻t1不晚于开启时刻t3但t3-t1≥t0时,表明编号X的正品酒水在待检验酒水被开启之前就已经处于开启状态,因而待检验酒水为非正品、不是该编号X的正品酒水;相关情况与步骤506A中待检验酒水的酒瓶未开启、编号X的正品酒水的 酒瓶已开启的实施例类似,此处不再赘述。
而当最近接收时刻t1晚于开启时刻t3时,表明待检验酒水被开启时该编号X的正品酒水并未处于开启状态,而在该待检验酒水被开启之后,编号X的正品酒水才被开启,因而待检验酒水为非正品、不是该编号X的正品酒水。其中,不法分子很可能是使用了假冒酒瓶,并在该假冒酒瓶上设置了编号X,而该假冒酒瓶内灌入了假冒的劣质酒,最后封装形成上述的待检验酒水。
步骤506B,当正品酒水的酒瓶未开启时,确定待检验酒水的开关状态。
在一实施例中,与步骤506A相类似的,当编号X的正品酒水处于关闭状态,即该编号X的正品酒水的酒瓶未开启时,如果待检验酒水的酒瓶已开启,表明编号X的正品酒水与待检验酒水的开关状态不一致,因而可以判定:虽然该待检验酒水上标注为编号X,但是该待检验酒水的酒瓶内装的并非正品酒。例如不法分子可能使用了假冒酒瓶,并在该假冒酒瓶上设置了编号X,而该假冒酒瓶内灌入了假冒的劣质酒,最后封装形成上述的待检验酒水。
步骤508B,当待检验酒水的酒瓶未开启时,向用户发送引导信息。
在一实施例中,当待检验酒水与编号X的正品酒水均处于关闭状态时,待检验酒水既有可能是该正品酒水,也可能是仿冒品,需要结合其他信息进行判断。而发送至用户的引导信息,可以引导用户在开启待检验酒水后,将开启时刻t3发送至鉴别服务器31,以便基于该开启时刻t3准确判断待检验酒水是否为正品酒水。
步骤510,获取待检验酒水的开启时刻。
在一实施例中,基于上述引导信息,使得用户在开启待检验酒水后,可以记录相应的开启时刻t3,并反馈至鉴别服务器31。
步骤512,确定编号X的正品酒水与待检验酒水的开启时刻是否一致。
在一实施例中,在编号X的正品酒水在步骤504中被判定为处于关闭状态后,在步骤504至步骤512之间,该编号X对应的最近接收时刻t1会发生更新,使得转入步骤512时,所使用的最近接收时刻t1与步骤502中的最近接收时刻t1具有不同取值。
在一实施例中,当最近接收时刻t1晚于开启时刻t3时,表明待检验酒水被开启时该编号X的正品酒水并未处于开启状态,而在该待检验酒水被开启之后该编号X的正品酒水才被开启,甚至该编号X的正品酒水在步骤512中尚未被开启,均表明该编号X 的正品酒水的开启时刻晚于待检验酒水、两者的开启时刻不一致,因而待检验酒水为非正品、不是该编号X的正品酒水。其中,不法分子很可能是使用了假冒酒瓶,并在该假冒酒瓶上设置了编号X,而该假冒酒瓶内灌入了假冒的劣质酒,最后封装形成上述的待检验酒水。
在一实施例中,如果待检验酒水为正品,即该待检验酒水就是编号X的正品酒水,那么当待检验酒水的开启时刻为t3时,鉴别服务器31在该开启时刻t3之后就不应当接收到监测器32发送的通知消息,使得编号X对应的最近接收时刻t1应当保持为不晚于该开启时刻t3且满足t3-t1<t0。因此,通过获取待检验酒水的开启时刻t3与编号X的正品酒水对应的最近接收时刻t1,可以在满足t1保持为不晚于t3、t3-t1<t0的情况下,判定待检验酒水为编号X的正品酒水、待检验酒水的酒瓶中灌装了正品酒。
在一实施例中,当最近接收时刻t1保持为不晚于开启时刻t3但t3-t1≥t0时,表明编号X的正品酒水在步骤504之后、待检验酒水被开启之前就已经处于开启状态,因而待检验酒水为非正品、不是该编号X的正品酒水。其中,不法分子很可能是使用了假冒酒瓶,并在该假冒酒瓶上设置了编号X,而该假冒酒瓶内灌入了假冒的劣质酒,最后封装形成上述的待检验酒水。
此外,智能合约还可以用于对区块链上包含编号X的容器状态记录进行统计,确定该容器状态记录在各个周期对应的数据完整度。例如,当存在连续n个周期的数据缺失(即区块链上未存有对应于该连续n个周期的包含编号X的容器状态记录)时,不法分子可能趁着该连续n个周期的时间段内,打开正品酒水的酒瓶并替换其中的正品酒,然后对监测器32实施重启(尤其是当监测器32在终止运行时并未发生不可逆的损坏时)。因此,对于上述的数据缺失情况,智能合约还可以生成相应的风险提示,尤其是当待检验酒水被基于上述实施例而判定为正品酒水的情况下,可以对用户进行提示,使得用户可以通过其他维度对该待检验酒水进行更为综合全面的鉴别。其中,n的取值可以根据实际情况进行设定,比如该连续n个周期不应时间过短,例如监测器32可能由于环境因素、网络条件等方面的影响而导致部分通知消息无法被发送至鉴别服务器31,应当避免类似情况被识别为风险场景;又比如该连续n个周期不应时间过长,例如不法分子可能仅需10分钟即可完成相关不法行为,那么该连续n个周期应当不大于10分钟。
图6是一示例性实施例提供的一种设备的示意结构图。请参考图6,在硬件层面,该设备包括处理器602、内部总线604、网络接口606、内存608以及非易失性存储器610,当然还可能包括其他业务所需要的硬件。处理器602从非易失性存储器610中读 取对应的计算机程序到内存608中然后运行,在逻辑层面上形成容器检验装置。当然,除了软件实现方式之外,本说明书一个或多个实施例并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。
请参考图7,在软件实施方式中,该容器检验装置可以应用于区块链节点;所述装置包括:
发布单元701,根据初始容器处设置的监测设备按照预设周期发送的通知消息,向区块链上发布容器状态记录,所述容器状态记录包含所述初始容器的标识信息和所述通知消息的接收时刻,其中所述监测设备在所述初始容器被开启时终止运行;
检验请求接收单元702,接收检验请求,所述检验请求包含请求方从待检验容器上获取的所述初始容器的标识信息;
结果获取单元703,通过调用适于容器检验的智能合约,获得表明所述待检验容器与所述初始容器之间的一致性的检验结果;其中,所述适于容器检验的智能合约被用于根据所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的接收时刻确定所述初始容器的开关状态,以及根据所述初始容器的开关状态和所述待检验容器的开关状态确定所述检验结果;
结果返回单元704,向所述请求方返回所述检验结果。
可选的,所述适于容器检验的智能合约被用于通过下述方式确定所述初始容器的开关状态:
获取所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻;
当所述最近接收时刻早于所述区块链节点收到所述检验请求的请求时刻,且时差大于所述预设周期的时长时,确定所述初始容器的开关状态为开启状态;否则,确定所述初始容器的开关状态为关闭状态。
可选的,所述结果获取单元703具体用于:
通过调用适于容器检验的智能合约,在所述待检验容器的开关状态与所述初始容器的开关状态不一致时,获得下述检验结果:所述待检验容器区别于所述初始容器。
可选的,所述结果获取单元703具体用于:
通过调用适于容器检验的智能合约,在所述初始容器的开关状态为开启状态、所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻早于所述待检验容器的开启时刻、且时差不大于所述预设周期的时长时,获得下述检验结果:所述待检验容器为所述初始容器;否则,获得下述检验结果:所述待检验容器区别于所述初始容器。
可选的,当所述待检验容器的开关状态为开启状态时,所述检验请求还包含所述待检验容器的开启时刻。
可选的,
还包括:引导单元705,在所述初始容器的开关状态和所述待检验容器的开关状态均为关闭状态时,向所述请求方发送引导信息,所述引导信息用于引导所述请求方在开启所述待检验容器后返回相应的开启时刻;
所述结果获取单元703具体用于:通过调用适于容器检验的智能合约,在所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻保持为早于所述待检验容器的开启时刻、且时差不大于所述预设周期的时长时,获得下述检验结果:所述待检验容器为所述初始容器;否则,获得下述检验结果:所述待检验容器区别于所述初始容器。
可选的,还包括:
提示获得单元706,通过调用适于物品检验的智能合约,获得表明所述待检验容器内置的待检验物品与所述初始容器内置的初始物品之间的一致性的风险提示;其中:
当所述区块链中对应于所述初始容器的标识信息的容器状态记录不存在达到连续预设数量个周期的数据缺失时,所述风险提示包括:在所述待检验容器被确认为所述初始容器时,所述待检验物品与所述初始物体不存在一致性风险;
当所述区块链中对应于所述初始容器的标识信息的容器状态记录存在达到连续预设数量个周期的数据缺失时,所述风险提示包括:在所述待检验容器被确认为所述初始容器时,所述待检验物品与所述初始物体之间存在不一致风险;
提示反馈单元707,向所述请求方反馈所述风险提示。
可选的,还包括:
信息发送单元708,当所述区块链中对应于所述初始容器的标识信息的容器状态 记录存在达到连续预设数量个周期的数据缺失时,向所述请求方发送所述连续预设数量个周期的下述信息中至少之一:开始时刻、持续时长、终止时刻。
可选的,还包括:
流水号发送单元709,将所述区块链中对应于所述初始容器的标识信息的容器状态记录的交易流水号发送至所述请求方。
可选的,还包括:
查询请求接收单元710,接收查询请求,所述查询请求包含请求方从待检验容器上获取的所述初始容器的标识信息;
数据返回单元711,将所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的接收时刻和/或其交易流水号返回至所述请求方,以使所述请求方根据对应于所述初始容器的标识信息的容器状态记录包含的接收时刻,确定所述待检验容器与所述初始容器之间的一致性。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。
在一个典型的配置中,计算机包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带、磁盘存储、量子存储器、基于石墨烯的存储介质或其他磁性存储设备或任何其 他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。
在本说明书一个或多个实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本说明书一个或多个实施例。在本说明书一个或多个实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本说明书一个或多个实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本说明书一个或多个实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
以上所述仅为本说明书一个或多个实施例的较佳实施例而已,并不用以限制本说明书一个或多个实施例,凡在本说明书一个或多个实施例的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本说明书一个或多个实施例保护的范围之内。
Claims (21)
- 一种容器检验方法,应用于区块链节点;所述方法包括:根据初始容器处设置的监测设备按照预设周期发送的通知消息,向区块链上发布容器状态记录,所述容器状态记录包含所述初始容器的标识信息和所述通知消息的接收时刻,其中所述监测设备在所述初始容器被开启时终止运行;接收检验请求,所述检验请求包含请求方从待检验容器上获取的所述初始容器的标识信息;通过调用适于容器检验的智能合约,获得表明所述待检验容器与所述初始容器之间的一致性的检验结果;其中,所述适于容器检验的智能合约被用于根据所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的接收时刻确定所述初始容器的开关状态,以及根据所述初始容器的开关状态和所述待检验容器的开关状态确定所述检验结果;向所述请求方返回所述检验结果。
- 根据权利要求1所述的方法,所述适于容器检验的智能合约被用于通过下述方式确定所述初始容器的开关状态:获取所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻;当所述最近接收时刻早于所述区块链节点收到所述检验请求的请求时刻,且时差大于所述预设周期的时长时,确定所述初始容器的开关状态为开启状态;否则,确定所述初始容器的开关状态为关闭状态。
- 根据权利要求1所述的方法,所述通过调用适于容器检验的智能合约,获得表明所述待检验容器与所述初始容器之间的一致性的检验结果,包括:通过调用适于容器检验的智能合约,在所述待检验容器的开关状态与所述初始容器的开关状态不一致时,获得下述检验结果:所述待检验容器区别于所述初始容器。
- 根据权利要求1所述的方法,所述调用适于容器检验的智能合约,获得表明所述待检验容器与所述初始容器之间的一致性的检验结果,包括:通过调用适于容器检验的智能合约,在所述初始容器的开关状态为开启状态、所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻早于所述待检验容器的开启时刻、且时差不大于所述预设周期的时长时,获得下述检验结果:所述待检验容器为所述初始容器;否则,获得下述检验结果:所述待检验容器区别于所述初始容器。
- 根据权利要求4所述的方法,所述待检验容器的开启时刻位于所述检验请求中。
- 根据权利要求1所述的方法,还包括:在所述初始容器的开关状态和所述待检验容器的开关状态均为关闭状态时,向所述请求方发送引导信息,所述引导信息用于引导所述请求方在开启所述待检验容器后返回相应的开启时刻;所述调用适于容器检验的智能合约,获得表明所述待检验容器与所述初始容器之间的一致性的检验结果,包括:通过调用适于容器检验的智能合约,在所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻保持为早于所述待检验容器的开启时刻、且时差不大于所述预设周期的时长时,获得下述检验结果:所述待检验容器为所述初始容器;否则,获得下述检验结果:所述待检验容器区别于所述初始容器。
- 根据权利要求1所述的方法,还包括:通过调用适于物品检验的智能合约,获得表明所述待检验容器内置的待检验物品与所述初始容器内置的初始物品之间的一致性的风险提示;其中:当所述区块链中对应于所述初始容器的标识信息的容器状态记录不存在达到连续预设数量个周期的数据缺失时,所述风险提示包括:在所述待检验容器被确认为所述初始容器时,所述待检验物品与所述初始物体不存在一致性风险;当所述区块链中对应于所述初始容器的标识信息的容器状态记录存在达到连续预设数量个周期的数据缺失时,所述风险提示包括:在所述待检验容器被确认为所述初始容器时,所述待检验物品与所述初始物体之间存在不一致风险;向所述请求方反馈所述风险提示。
- 根据权利要求7所述的方法,还包括:当所述区块链中对应于所述初始容器的标识信息的容器状态记录存在达到连续预设数量个周期的数据缺失时,向所述请求方发送所述连续预设数量个周期的下述信息中至少之一:开始时刻、持续时长、终止时刻。
- 根据权利要求1所述的方法,还包括:将所述区块链中对应于所述初始容器的标识信息的容器状态记录的交易流水号发送至所述请求方。
- 根据权利要求1所述的方法,还包括:接收查询请求,所述查询请求包含请求方从待检验容器上获取的所述初始容器的标识信息;将所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的接收时刻和/或其交易流水号返回至所述请求方,以使所述请求方根据对应于所述初始容器的标识信息的容器状态记录包含的接收时刻,确定所述待检验容器与所述初始容器之间的一致性。
- 一种容器检验装置,应用于区块链节点;所述装置包括:发布单元,根据初始容器处设置的监测设备按照预设周期发送的通知消息,向区块链上发布容器状态记录,所述容器状态记录包含所述初始容器的标识信息和所述通知消息的接收时刻,其中所述监测设备在所述初始容器被开启时终止运行;检验请求接收单元,接收检验请求,所述检验请求包含请求方从待检验容器上获取的所述初始容器的标识信息;结果获取单元,通过调用适于容器检验的智能合约,获得表明所述待检验容器与所述初始容器之间的一致性的检验结果;其中,所述适于容器检验的智能合约被用于根据所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的接收时刻确定所述初始容器的开关状态,以及根据所述初始容器的开关状态和所述待检验容器的开关状态确定所述检验结果;结果返回单元,向所述请求方返回所述检验结果。
- 根据权利要求11所述的装置,所述适于容器检验的智能合约被用于通过下述方式确定所述初始容器的开关状态:获取所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻;当所述最近接收时刻早于所述区块链节点收到所述检验请求的请求时刻,且时差大于所述预设周期的时长时,确定所述初始容器的开关状态为开启状态;否则,确定所述初始容器的开关状态为关闭状态。
- 根据权利要求11所述的装置,所述结果获取单元具体用于:通过调用适于容器检验的智能合约,在所述待检验容器的开关状态与所述初始容器的开关状态不一致时,获得下述检验结果:所述待检验容器区别于所述初始容器。
- 根据权利要求11所述的装置,所述结果获取单元具体用于:通过调用适于容器检验的智能合约,在所述初始容器的开关状态为开启状态、所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻早于所述待检验容器的开启时刻、且时差不大于所述预设周期的时长时,获得下述检验结果:所述待检验容器为所述初始容器;否则,获得下述检验结果:所述待检验容器区别于所 述初始容器。
- 根据权利要求14所述的装置,当所述待检验容器的开关状态为开启状态时,所述检验请求还包含所述待检验容器的开启时刻。
- 根据权利要求11所述的装置,还包括:引导单元,在所述初始容器的开关状态和所述待检验容器的开关状态均为关闭状态时,向所述请求方发送引导信息,所述引导信息用于引导所述请求方在开启所述待检验容器后返回相应的开启时刻;所述结果获取单元具体用于:通过调用适于容器检验的智能合约,在所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的最近接收时刻保持为早于所述待检验容器的开启时刻、且时差不大于所述预设周期的时长时,获得下述检验结果:所述待检验容器为所述初始容器;否则,获得下述检验结果:所述待检验容器区别于所述初始容器。
- 根据权利要求11所述的装置,还包括:提示获得单元,通过调用适于物品检验的智能合约,获得表明所述待检验容器内置的待检验物品与所述初始容器内置的初始物品之间的一致性的风险提示;其中:当所述区块链中对应于所述初始容器的标识信息的容器状态记录不存在达到连续预设数量个周期的数据缺失时,所述风险提示包括:在所述待检验容器被确认为所述初始容器时,所述待检验物品与所述初始物体不存在一致性风险;当所述区块链中对应于所述初始容器的标识信息的容器状态记录存在达到连续预设数量个周期的数据缺失时,所述风险提示包括:在所述待检验容器被确认为所述初始容器时,所述待检验物品与所述初始物体之间存在不一致风险;提示反馈单元,向所述请求方反馈所述风险提示。
- 根据权利要求17所述的装置,还包括:信息发送单元,当所述区块链中对应于所述初始容器的标识信息的容器状态记录存在达到连续预设数量个周期的数据缺失时,向所述请求方发送所述连续预设数量个周期的下述信息中至少之一:开始时刻、持续时长、终止时刻。
- 根据权利要求11所述的装置,还包括:流水号发送单元,将所述区块链中对应于所述初始容器的标识信息的容器状态记录的交易流水号发送至所述请求方。
- 根据权利要求11所述的装置,还包括:查询请求接收单元,接收查询请求,所述查询请求包含请求方从待检验容器上获取 的所述初始容器的标识信息;数据返回单元,将所述区块链中对应于所述初始容器的标识信息的容器状态记录包含的接收时刻和/或其交易流水号返回至所述请求方,以使所述请求方根据对应于所述初始容器的标识信息的容器状态记录包含的接收时刻,确定所述待检验容器与所述初始容器之间的一致性。
- 一种电子设备,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器通过运行所述可执行指令实现如权利要求1-10中任一项所述的容器检验方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811565643.5A CN110009369A (zh) | 2018-12-20 | 2018-12-20 | 容器检验方法及装置、电子设备 |
CN201811565643.5 | 2018-12-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020125223A1 true WO2020125223A1 (zh) | 2020-06-25 |
Family
ID=67165174
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/114589 WO2020125223A1 (zh) | 2018-12-20 | 2019-10-31 | 容器检验方法及装置、电子设备 |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN110009369A (zh) |
TW (1) | TWI700660B (zh) |
WO (1) | WO2020125223A1 (zh) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110009369A (zh) * | 2018-12-20 | 2019-07-12 | 阿里巴巴集团控股有限公司 | 容器检验方法及装置、电子设备 |
CN110659106B (zh) * | 2019-09-12 | 2022-03-22 | 北京浪潮数据技术有限公司 | 一种容器状态检查方法及装置 |
CN111274576B (zh) * | 2020-01-17 | 2022-08-02 | 山东浪潮科学研究院有限公司 | 智能合约运行环境的控制方法及系统、设备、介质 |
CN113296872B (zh) * | 2020-04-13 | 2022-05-06 | 阿里巴巴集团控股有限公司 | 容器状态查询方法、装置、设备、存储介质和系统 |
FR3111041B1 (fr) * | 2020-05-26 | 2023-10-27 | Idealwine Com | Pastille comprenant des caractéristiques d’un contenant et procédé de récupération desdites caractéristiques et d’authentification du contenant. |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108711063A (zh) * | 2018-05-27 | 2018-10-26 | 黄晓峰 | 一种基于区块链的包装主动防伪和追溯上线结构 |
CN108974621A (zh) * | 2018-07-02 | 2018-12-11 | 贵州三佳科技有限公司 | 一种酒品防伪装置的制造方法、酒品防伪方法 |
CN109034851A (zh) * | 2018-09-05 | 2018-12-18 | 深圳正品创想科技有限公司 | 基于区块链的商品防伪溯源方法及其装置、区块链节点 |
CN109034832A (zh) * | 2018-06-13 | 2018-12-18 | 湖南搜云网络科技股份有限公司 | 区块链的信息处理方法及装置、信息处理节点及存储介质 |
CN110009369A (zh) * | 2018-12-20 | 2019-07-12 | 阿里巴巴集团控股有限公司 | 容器检验方法及装置、电子设备 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018183768A1 (en) * | 2017-03-29 | 2018-10-04 | Innit International S.C.A. | Trusted food traceability system and method and sensor network |
TWI632507B (zh) * | 2017-06-03 | 2018-08-11 | 蔡政育 | 實物履歷識別碼之輸出系統 |
TWI636411B (zh) * | 2017-09-13 | 2018-09-21 | 現代財富控股有限公司 | 對非區塊鏈節點提供交易不可否認性之系統及其方法 |
CN107835166A (zh) * | 2017-10-31 | 2018-03-23 | 济南浪潮高新科技投资发展有限公司 | 一种基于区块链的高价值晶体追溯方法及装置 |
CN108848119B (zh) * | 2018-04-03 | 2020-04-28 | 阿里巴巴集团控股有限公司 | 跨区块链的交互方法及装置、系统、电子设备 |
CN108734483A (zh) * | 2018-05-23 | 2018-11-02 | 北京智牛信息科技有限公司 | 物品防伪系统 |
-
2018
- 2018-12-20 CN CN201811565643.5A patent/CN110009369A/zh active Pending
-
2019
- 2019-10-07 TW TW108136240A patent/TWI700660B/zh active
- 2019-10-31 WO PCT/CN2019/114589 patent/WO2020125223A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108711063A (zh) * | 2018-05-27 | 2018-10-26 | 黄晓峰 | 一种基于区块链的包装主动防伪和追溯上线结构 |
CN109034832A (zh) * | 2018-06-13 | 2018-12-18 | 湖南搜云网络科技股份有限公司 | 区块链的信息处理方法及装置、信息处理节点及存储介质 |
CN108974621A (zh) * | 2018-07-02 | 2018-12-11 | 贵州三佳科技有限公司 | 一种酒品防伪装置的制造方法、酒品防伪方法 |
CN109034851A (zh) * | 2018-09-05 | 2018-12-18 | 深圳正品创想科技有限公司 | 基于区块链的商品防伪溯源方法及其装置、区块链节点 |
CN110009369A (zh) * | 2018-12-20 | 2019-07-12 | 阿里巴巴集团控股有限公司 | 容器检验方法及装置、电子设备 |
Also Published As
Publication number | Publication date |
---|---|
CN110009369A (zh) | 2019-07-12 |
TWI700660B (zh) | 2020-08-01 |
TW202025049A (zh) | 2020-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020125223A1 (zh) | 容器检验方法及装置、电子设备 | |
US20180174097A1 (en) | Tracking shipments with a local and remote blockchain | |
US8981939B2 (en) | System and method for verifying patient compliance | |
US20220227551A1 (en) | Container Security System | |
WO2019168795A1 (en) | Blockchain-based system and method for supply chain control | |
US20160103716A1 (en) | Method for using shared device in apparatus capable of operating two operating systems | |
US20070096918A1 (en) | Package opened indicating device | |
US20230047625A1 (en) | Method and system for generalized provenance solution for blockchain supply chain applications | |
WO2017092599A1 (zh) | 一种库存异常数据的检测方法、装置及电子设备 | |
WO2020082583A1 (zh) | 一种盗损险理赔方法、装置、服务器及介质 | |
CN108734483A (zh) | 物品防伪系统 | |
WO2020098369A1 (zh) | 容器状态的监测方法及装置、电子设备 | |
CN112330134A (zh) | 一种物品质保状态检测方法及检测系统 | |
US20220391884A1 (en) | Method and System for Transferring a Product | |
US12073417B2 (en) | Anti-counterfeiting system for bottled products | |
CN115879964A (zh) | 检验方法、检验设备、系统及存储介质 | |
TWI708931B (zh) | 容器狀態的檢測方法及裝置、電子設備 | |
CN107592310A (zh) | 一种基于物联网的防伪和位置跟踪系统 | |
GB2495480A (en) | Product authentication using unique code | |
EP3582161A1 (en) | Method, system and computer programm product for tracking a finite amount of liquid volume individualized in volume units | |
US20220351126A1 (en) | A system and a method for unlocking item/s | |
US11610177B2 (en) | Method, system and computer program product for tracking of a finite amount of liquid volume which is individualized in volume units | |
CN111582890B (zh) | 防伪溯源、定位系统、商品、方法、装置、平台及介质 | |
CN204129781U (zh) | 计量器具套件 | |
US20220113863A1 (en) | Displaying information related to the item/s |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19898624 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19898624 Country of ref document: EP Kind code of ref document: A1 |