Unlock instant, AI-driven research and patent intelligence for your innovation.

Supply chain transaction data security supervision method and system based on double chains

A transaction data and supply chain technology, applied in digital data protection, data processing applications, electronic digital data processing, etc., can solve problems such as unrecoverable data, low security and inconsistency of regulatory data

Pending Publication Date: 2021-09-10
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1) Enterprises report their own purchase and sales records. A transaction in the supply chain will have two records in the database of the regulatory department. Inconsistency, which makes regulatory data less credible
[0004] 2) Saving a large amount of transaction data in the central database makes the security of regulatory data low
[0005] 3) There is a possibility of data tampering in the process of using the central server to calculate the hash of transaction data, and the data before tampering cannot be recovered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Supply chain transaction data security supervision method and system based on double chains
  • Supply chain transaction data security supervision method and system based on double chains
  • Supply chain transaction data security supervision method and system based on double chains

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. For the step numbers in the following embodiments, it is only set for the convenience of illustration and description, and the order between the steps is not limited in any way. The execution order of each step in the embodiments can be adapted according to the understanding of those skilled in the art sexual adjustment.

[0070] In the description of the present invention, it should be understood that the orientation descriptions, such as up, down, front, back, left, right, etc. indicated orientations or positional relationships are based...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a supply chain transaction data security supervision method and system based on double chains. The method comprises: a data coarse-grained access control scheme, wherein the data coarse-grained access control scheme comprises a transaction data chaining step: separately storing transaction data to double chains through a block chain double-chain model composed of a commodity chain and a fund chain, and carrying out transaction data chaining judgment and the like; and a transaction data security association step: calculating an encrypted order number, obtaining a product circulation record and a fund circulation record, merging the records and the like. The invention provides a coarse-grained access control scheme of data, a double-chain structure is formed by a commodity chain and a fund chain, commodity circulation information and fund circulation information in complete transaction data are isolated by using double chains, and different circulation information is provided for different supervision departments; therefore, the privacy security of the enterprise transaction sensitive data can be better protected on the premise of meeting the supervision requirements of supervision departments, and the method and the system can be widely applied to the block chain technology and application field.

Description

technical field [0001] The present invention relates to the field of block chain technology and application, in particular to a double-chain-based supply chain transaction data security supervision method and system. Background technique [0002] Applying blockchain to supply chain regulation can endow regulatory data with greater security. At present, in projects applying blockchain to supply chain supervision, most of the original data reported by enterprises are stored in the central database, and the hash value of the original data is calculated by the central server and stored in the blockchain to prevent Data has been tampered with. The problems that exist in this are: [0003] 1) Enterprises report their own purchase and sales records. A transaction in the supply chain will have two records in the database of the regulatory department. Inconsistency, which makes the regulatory data less credible. [0004] 2) Saving a large amount of transaction data in the central...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q40/04G06Q30/00G06F21/60
CPCG06Q40/04G06Q30/018G06F21/602
Inventor 徐杨向阳芬李东
Owner SOUTH CHINA UNIV OF TECH