A method of traceability information security of agricultural products based on block chain technology
A technology of traceability information and solutions, which is applied in the field of agricultural product traceability information security, and can solve problems such as the inability to meet the dynamic changes of product flow traceability information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] Such as figure 2 As shown, a kind of agricultural product traceability information security solution using block chain technology of the present invention includes:
[0059] Step S101: Improve the consensus mechanism to obtain an improved consensus mechanism. The improved consensus mechanism is: when all physical terminals hold blocks to be submitted for verification, in order to maximize their own benefits, no physical terminal can change its own The verification results of blocks generated by other entity terminals.
[0060] The improved consensus mechanism includes:
[0061] If the calculation time of this round has not ended, for the earliest A i ∈A, and let u i (S i1 ,…S ij ,...,S in )=n, then choose A i The blocks generated by packaging are used as the current round of consensus blocks;
[0062] If the calculation time of this round has ended, such that n>u i (S i1 ,…S ij ,...,S in )> u j (S j1 ,…S ji ,...,S jn ), then select A i The blocks gen...
Embodiment 2
[0092] Such as image 3 As shown, another agricultural product traceability information security solution using blockchain technology of the present invention includes:
[0093] Step S201: Obtain a problem model through problem modeling.
[0094] The security threats faced by the agricultural product traceability information system have the following characteristics:
[0095] (1) The attack source is unlimited, each attacker comes individually, independent of each other, and the attack flow is stable, regardless of the peak period or idle period;
[0096] (2) The arrival of the attacker conforms to the Poisson distribution with parameter λ, where λ is the average value of the arrival attack per unit time;
[0097] (3) The tampering of traceability information caused by each attack obeys the parameter m The negative exponential distribution of ;
[0098] (4) The time interval between the arrival of each attack and the damage caused are independent of each other.
[0099] S...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com