Font Size: a A A

Research On Key Techniques Of Transaction In The Supply Chain And Counterfeits Identifying Based On The Blockchain

Posted on:2019-05-18Degree:MasterType:Thesis
Country:ChinaCandidate:X M ChenFull Text:PDF
GTID:2428330566986579Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Nowadays,mainstream mechanisms for counterfeits identifying use the RFID or QR code as scannable tags,which could be easily forged.Transaction data in their centralized database could be tampered.Under this situation,counterfeits could not be contained properly.Meanwhile,in transactions of the supply chain,transaction fund is secured by the third-party trading platform.However,this kind of security lacks enough restraint,which is unreliable.The decentralized blockchain technology could be used to solve problems mentioned above.However,after using the blockchain,private keys of users lack a reliable backup mechanism.Although the key wallet software could use a key seed to restore private keys,it could not back up the seed.This paper constructs a trading system in the decentralized and traceable supply chain based on the blockchain.Meanwhile,some mechanisms are designed to solve problems about counterfeits identifying,secured transactions and the backup of keys:(1)Transaction data could be easily tampered.The product chain,which is a kind of transaction structure based on the blockchain,stores product transaction data.Through tracing the manufacturer and owner of the product along the product chain,counterfeits identifying could be executed.This kind of structure could not only prevent data from being tampered,but also accelerate the process of identifying counterfeits.(2)The third-party trading platform could not keep the safety of the transaction fund.This paper designs a decentralized security mechanism,which utilizes the smart contract to record rules of the transaction arbitration and settlement.In this way the procedure of transfer could be irreversible and transaction fund could be kept safe.(3)The key seed used to restore private keys in the key wallet software could be lost.This paper designs a cross backup model to choose a place for backing up the seed.It utilizes the network flow and maximum flow algorithm to generate a backup reflection table under the peer-to-peer environment.The seed could be stored in another node according to this table,which could ensure the safety of the seed and private keys.The experiment tests the query effectiveness of transaction data in the product chain,which is proposed in this paper.Compared with the transaction structure of the bitcoin,the query performance of the product chain is better.Meanwhile,to conclude the best scale of the network,the experiment divides an entire transaction network into several sub networks and tests the performance when generating the backup reflection table under various scales of the sub network.To validate the reliability of this table,the repeatability rate of reflection tables generated by various nodes is tested under the peer-to-peer environment.
Keywords/Search Tags:Blockchain, Traceable supply chain, Counterfeit identifying, Secured transaction, Key management
PDF Full Text Request
Related items