Supply chain logistics data security sharing method based on block chain

A data security and supply chain technology, applied in logistics, digital data authentication, digital data protection, etc., can solve the problems of inability to guarantee security, illegal acquisition of supply chain logistics data, and inability to adapt to supply chain logistics data, etc. Achieve the effect of ensuring information security sharing, fine-grained access control, and ensuring security

Active Publication Date: 2021-02-26
弘景智业(北京)多式联运咨询有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The above methods have achieved good practical results in the process of data sharing. However, these methods have certain defects in the information security sharing in the complete supply chain logistics. On the one hand, the security cannot be guaranteed; on the other hand, it cannot Adapt to supply chain logistics data, resulting in illegal acquisition of supply chain logistics data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Supply chain logistics data security sharing method based on block chain
  • Supply chain logistics data security sharing method based on block chain
  • Supply chain logistics data security sharing method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] Data has become a new factor of production. It is not only a basic resource and a strategic resource, but also an important productivity. Moreover, data resources can form data assets that can "realize scenarios", especially in the "consumer-centric" In this era, data assets related to customers are the core value of scene realization. Before data sharing, it is not only necessary to confirm data security, but also a process to realize data confidential...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of supply chain logistics, and particularly relates to a supply chain logistics data security sharing method based on a block chain, which comprises the following steps: initializing policy attribute-based encryption, and generating a user certificate and a user decryption key with user attributes by a FabricCA center; encrypting the supply chain logistics data at a specified time and an access strategy of a specified area, and then packaging and uploading the encrypted supply chain logistics data to a block chain; and after the data is successfully uploaded,enabling the data requester to request the wanted data according to the address, limiting the identity of the data requester by verifying whether the sharing request meets the constraint condition ornot, if verification is passed, performing data sharing, and otherwise, refusing the access request. According to the method, the complete supply chain logistics information can be effectively protected, so that the privacy of the supply chain logistics data of the user is realized.

Description

technical field [0001] The invention belongs to the field of supply chain logistics, and in particular relates to a block chain-based method for safely sharing supply chain logistics data. Background technique [0002] Supply chain logistics is a strategic function of comprehensive management for the smooth realization of logistics related to economic activities, coordinated operation of production, supply activities, sales activities and logistics activities. Supply chain logistics takes logistics activities as the core, coordinates production and purchase planning in the supply field, customer service and order processing in the sales field, and inventory control in the financial field. [0003] In recent years, e-commerce has swept the world at a sudden speed. As a result, the total amount of social supply chain logistics in my country has gradually increased, the supply chain logistics service network has been continuously improved, and the supply chain logistics servic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60G06F21/33G06Q10/08
CPCG06F21/64G06F21/602G06F21/33G06Q10/083
Inventor 黄海辉赵娟徐光侠刘俊马创杨敬尊李威唐苏乐谢明月金浩宇沈旭
Owner 弘景智业(北京)多式联运咨询有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products