CN116188030A - Secret recipe work tracing method and secret recipe work tracing system - Google Patents

Secret recipe work tracing method and secret recipe work tracing system Download PDF

Info

Publication number
CN116188030A
CN116188030A CN202211478293.5A CN202211478293A CN116188030A CN 116188030 A CN116188030 A CN 116188030A CN 202211478293 A CN202211478293 A CN 202211478293A CN 116188030 A CN116188030 A CN 116188030A
Authority
CN
China
Prior art keywords
secret
key
recipe
ciphertext
secret recipe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211478293.5A
Other languages
Chinese (zh)
Inventor
梁建新
李伟泽
陈雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Huaji Technology Co ltd
Original Assignee
Shenzhen Huaji Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huaji Technology Co ltd filed Critical Shenzhen Huaji Technology Co ltd
Priority to CN202211478293.5A priority Critical patent/CN116188030A/en
Publication of CN116188030A publication Critical patent/CN116188030A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a secret recipe work tracing method and system, and belongs to the technical field of secret recipe tracing. The method comprises the following steps: after the secret recipe is submitted successfully, the secret recipe can be distributed with a unique identifier, and the unique identifier can be transferred to each node along with the secret recipe; checking whether secret prescriptions exist or not, wherein secret prescriptions composed of the same traditional Chinese medicines are not repeatedly submitted into a blockchain; the system encrypts and protects secret recipe content. The secret key AK generated randomly each time is used for providing the security of secret prescription, so that the harm of being cracked is reduced; storing a secret key AK by using an asymmetric encryption algorithm, and signing a ciphertext; the storage problem of the random key AK is safely solved, and the problem of a secret prescription is solved; the block chain technology is used for solving the problem of tamper resistance and providing technical assurance for tracing; a decentralised storage scheme while also reducing the risk of loss; the signature is to calculate the hash value and then sign, so that the security and the performance are considered.

Description

Secret recipe work tracing method and secret recipe work tracing system
Technical Field
The invention relates to the field of secret recipe tracing, in particular to a secret recipe copyright tracing method and system.
Background
The Chinese medicine is a five thousand year sunflower treasure of Chinese nationality, is experience and theoretical knowledge of countless people struggling with diseases to summarize, and has proved that the Chinese medicine has incomparable curative effect from epidemic diseases in recent years; because of the lack of protection and inheritance, countless secret prescriptions disappear in the long historic river, and each genre only takes care of one mu of land, so that more people cannot benefit, and the inheritance development of traditional Chinese medicine is hindered.
At present, a secret prescription lacks a safe and effective storage and tracing mode, and once the secret prescription is disclosed, an owner cannot prove that the secret prescription belongs to the secret prescription and cannot guarantee the rights and interests of the secret prescription; this phenomenon limits the development of traditional Chinese medicine and also easily leads to inheritance interruption; an effective technical scheme is needed to provide protection and benefit for the group of traditional Chinese medicine, so that the contribution flows to the flow, is applied by other people, and is beneficial to the contributor, a positive feedback effect is formed, the development of traditional Chinese medicine industry is promoted, and more people are benefited.
How to invent a secret recipe work tracing method and system to improve the problems becomes a problem to be solved by the technicians in the field.
Disclosure of Invention
In order to make up for the defects, the invention provides a secret recipe work tracing method and system, and aims to solve the problem that secret recipes lack a safe and effective storage and tracing mode.
The invention is realized in the following way:
the invention provides a secret recipe work tracing method, which comprises the following steps:
after the secret recipe is submitted successfully, the secret recipe can be distributed with a unique identifier, and the unique identifier can be transferred to each node along with the secret recipe;
checking whether secret prescriptions exist or not, wherein secret prescriptions composed of the same traditional Chinese medicines are not repeatedly submitted into a blockchain;
the system encrypts and protects secret party content, the secret party content is also stored in a block chain in a ciphertext mode, and each encryption is carried out by using a randomly generated secret key;
signing secret party encrypted content and storing the secret party encrypted content into a blockchain;
recommending secret prescriptions to other users for use;
secret information is obtained from the blockchain through secret identification information, wherein the secret information comprises a user identification, secret ciphertext, a user signature and a public key PUK;
signing the secret information through the public key; decrypting the secret key ciphertext AKCT through the user private key PRK to obtain a secret key AK, and performing AES decryption through the secret key AK to obtain the secret complete content.
Preferably, the secret recipe information comprises recipe names, chinese medicinal compositions, usage, efficacy, indications and notes; the traditional Chinese medicine composition is prepared by mixing the traditional Chinese medicine components in an additive amount.
Preferably, a list of traditional Chinese medicines of two secret recipes is taken, the traditional Chinese medicines are ordered according to the names of the traditional Chinese medicines, whether the two groups of traditional Chinese medicines are identical or not is judged one by one, and if the two groups of traditional Chinese medicines are identical, the secret recipes are judged to be identical. The secret prescription repeatedly determines whether the dosages are the same or not.
Preferably, the secret content is also stored in the form of ciphertext in the blockchain, and each encryption uses a randomly generated key; the user identification, secret prescription name, traditional Chinese medicine composition, usage, efficacy, main treatment, contraindication and notice are put into a Key-Value object and serialized into a character string, and UTF-8 is used for encoding into a byte array PTB; 64 Hex characters are randomly generated, combined into a 256-bit secret key AK, an AES encryption algorithm is used for encrypting a byte array PTB, and Base64 is used for encoding to obtain an encrypted ciphertext CT.
Preferably, the user has a pair of private key PRK and public key PUK for asymmetric encryption in the system;
encrypting the encryption key AK in the last step by using an asymmetric encryption algorithm and a public key PUK, and encoding by using a Base64 to obtain a key ciphertext AKCT;
splicing a user identifier UID, a secret party identifier SIF, secret party ciphertext CT and key ciphertext AKCT by using underline "_" to obtain a character string, and calculating a hash value H1 of the character string by using a sha256 algorithm;
signing the hash value H1 by using an asymmetric encryption algorithm and a secret key PRK to obtain a signature string S1;
and storing the user identification, secret party ciphertext CTC, key ciphertext AKCT, public key PUK and signature S1 into a blockchain.
Preferably, the step of encrypting the encryption key AK is as follows:
selecting a random number x in an encryption key AK as a private key PRK, and calculating a parameter U1 based on a public key calculation formula according to a public key PUK to obtain a message M;
confirming whether a public key calculation formula is established or not according to the message M, and verifying the validity of the encryption key AK to ensure that the secret formula is legal and not disclosed;
if not, the verification fails, if yes, the parameter U2 is calculated and the private key sk is utilized m Generating an encryption value E to obtain a message M';
calculating anonymous user identification according to the message M' and calculating a parameter V UID And C, obtaining a message M';
the system sets an initial effective value of a secret recipe, and stores the anonymous user identification and registration information to obtain a key ciphertext AKCT.
Preferably, the signing step is as follows:
selecting a random number gamma in an encryption key AK, and calculating R=gamma P;
the encryption key AK calculates a hash value based on the local anonymous identity and the current timestamp;
encryption key AK calculates S using key PRK i And generating a signature S1 corresponding to the message M.
A secret prescription work tracing system applied to secret prescription work tracing method comprises:
secret prescription application module: the secret recipe information at least comprises traditional Chinese medicine composition, dosage, main treatment, efficacy and cases;
and (5) a repeated checking module: for confirming the secret recipe belonged to ensure that it is the first contributor; the secret prescription of the main treatment is refused to ensure the true rights and interests of the contributors;
signature uplink module: the secret recipe is stored in the blockchain, and after the secret recipe is stored in the blockchain, the secret recipe and the affiliated person are always solidified, so that the secret recipe and the affiliated person can be circulated;
flow others employ modules: the secret prescription is subjected to validity verification, clinical curative effects are further collected, and secret prescription with high curative effects is promoted, so that more people benefit;
and the traceability feedback module is used for: is a secret recipe which has been verified to be effective, and the benefit is fed back to the contributor according to the number of users and the curative effect.
The beneficial effects of the invention are as follows:
1. the secret key AK generated randomly each time is used for providing the security of the secret prescription, so that the harm of being cracked is reduced; storing a secret key AK by using an asymmetric encryption algorithm, and signing a ciphertext; the storage problem of the random key AK is safely solved, and the problem of a secret prescription is solved; the block chain technology is used for solving the problem of tamper resistance and providing technical assurance for tracing; a decentralised storage scheme while also reducing the risk of loss; the signature is to calculate the hash value and then sign, so that the security and the performance are considered.
2. The invention solidifies the contribution of secret side contributors through the blockchain, ensures the intellectual property rights of secret side contributors, and is popularized to needed middle doctors and patients through verification; the secret prescriptions can benefit from the Chinese medical science of Chinese nationality, and more Chinese doctors are stimulated to contribute to the secret prescriptions, so that more people benefit from each other, and the development of the whole Chinese medical science is promoted.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some examples of the present invention and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of the overall steps of a secret recipe work tracing method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an encryption step of a secret recipe work tracing method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a secret recipe tracing method signature step provided in the embodiment of the present invention;
FIG. 4 is a schematic flow chart diagram of a secret recipe work tracing method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of an operation flow of a secret recipe work tracing system according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, based on the embodiments of the invention, which are apparent to those of ordinary skill in the art without inventive faculty, are intended to be within the scope of the invention.
Examples
Referring to fig. 1-3, a secret recipe work tracing method includes the following steps:
s1: after the user inputs and submits the secret recipe, the secret recipe can be distributed with a unique identifier, the unique identifier can be transferred to each node along with the secret recipe, and secret recipe information comprises recipe names, traditional Chinese medicine compositions, usage, efficacy, indications, taboos and notes; the traditional Chinese medicine composition is formed by combining the additive amounts of traditional Chinese medicine components;
s2: checking whether secret recipes exist, repeatedly submitting secret recipes composed of the same Chinese medicaments into a blockchain, taking a Chinese medicament list of the two secret recipes, sequencing according to Chinese medicament names, judging whether the two groups of Chinese medicaments are identical one by one, if so, judging that the secret recipes are identical, and not considering whether the dosages are identical;
s3: the system encrypts and protects secret party content, the secret party content is also stored in a block chain in a ciphertext mode, each encryption is performed by using a randomly generated key, the secret party content is also stored in the block chain in a ciphertext mode, and each encryption is performed by using the randomly generated key; the user identification, secret prescription name, traditional Chinese medicine composition, usage, efficacy, main treatment, contraindication and notice are put into a Key-Value object and serialized into a character string, and UTF-8 is used for encoding into a byte array PTB; randomly generating 64 Hex characters, combining the Hex characters into a 256-bit secret key AK, encrypting a byte array PTB by using an AES encryption algorithm, and encoding by using a Base64 to obtain an encrypted ciphertext CT;
the user has a pair of private key PRK and public key PUK for asymmetric encryption in the system;
encrypting the encryption key AK in the last step by using an asymmetric encryption algorithm and a public key PUK, and encoding by using a Base64 to obtain a key ciphertext AKCT;
the encryption key AK is encrypted as follows:
s301: selecting a random number in an encryption key AK
Figure BDA0003960215300000081
As private key PRK and based on public key calculation formula according to public key PUK +.>
Figure BDA0003960215300000082
Calculating a parameter U1 to obtain a message M= { U1, PUK, UID, RC };
s302: validating public key calculation formula from message M
Figure BDA0003960215300000083
Whether the secret formula is established or not is judged, and the validity of the encryption key AK is verified, so that the secret formula is legal and not disclosed;
s303: if not, the verification fails, if yes, the parameters are calculated
Figure BDA0003960215300000084
And uses the private key sk m Generating an encryption value E (U2||DeltaT) i ) A message m= { E (u2||Δt) is obtained i ),PUK};
S304: calculating anonymous user identification UID 'according to the message M' and calculating parameter V UID =h (UID') and c=v UID PUK, obtaining message M '"= { PUK, UID', Δt i };
S305: the system sets an initial effective value Ev of a secret party, and stores anonymous user identification and registration information to obtain a key ciphertext AKCT;
in the above formula:
Figure BDA0003960215300000091
a finite field which is a ciphertext key AK; pk (pk) m And sk m The public key and the private key of the system; the PRK private key and the PUK public key are the private key and the public key of the user; delta T i Is an anonymous identity validity period; t is a time stamp; RC is the area code where the key AK is located; h is a hash function;
splicing a user identifier UID, a secret party identifier SIF, secret party ciphertext CT and key ciphertext AKCT by using underline "_" to obtain a character string, and calculating a hash value H1 of the character string by using a sha256 algorithm;
signing the hash value H1 by using an asymmetric encryption algorithm and a secret key PRK to obtain a signature string S1;
storing a user identifier, a secret party identifier, secret party ciphertext CTC, a key ciphertext AKCT, a public key PUK and a signature S1 into a blockchain;
s4: signing secret party encrypted content and storing the secret party encrypted content into a blockchain;
the signature steps are as follows:
s401: selecting a random number in an encryption key AK
Figure BDA0003960215300000092
And calculating r=γp; wherein P is the generator of the addition group;
s402: encryption key AK computes a hash value based on a local anonymous identity and a current timestamp
Figure BDA0003960215300000093
S403: encryption key AK calculation with key PRK
Figure BDA0003960215300000094
Generating a message M corresponds to signature S1 of (2) = (R) S i );
S5: recommending secret prescriptions to other users for use;
s6: secret information is obtained from the blockchain through secret identification information, wherein the secret information comprises a user identification, secret ciphertext, a user signature and a public key PUK;
s7: and verifying the secret information by the public key, decrypting the secret key ciphertext AKCT by the private key PRK of the user to obtain the secret key ciphertext AK of the secret party, and performing AES decryption by the secret key AK to obtain the complete content of the secret party.
Referring to fig. 4-5, a secret recipe work tracing system applied to a secret recipe work tracing method includes:
secret prescription application module: the secret recipe information at least comprises traditional Chinese medicine composition, dosage, main treatment, efficacy and cases;
and (5) a repeated checking module: for confirming the secret recipe belonged to ensure that it is the first contributor; the secret prescription of the main treatment is refused to ensure the true rights and interests of the contributors;
signature uplink module: the secret recipe is stored in the blockchain, and after the secret recipe is stored in the blockchain, the secret recipe and the affiliated person are always solidified, so that the secret recipe and the affiliated person can be circulated;
flow others employ modules: the secret prescription is subjected to validity verification, clinical curative effects are further collected, and secret prescription with high curative effects is promoted, so that more people benefit;
the validity verification steps are as follows:
the calculation formula is as follows: ev=λ 1 Ev R2 Ev W
Wherein Ev R The effective rate of secret prescription is shown; ev (event) W Indicating inefficiency of the secret recipe; lambda (lambda) 1 And lambda (lambda) 2 Respectively represent the weights of the two, the parameter Ev R And Ev W The calculation process is as follows;
parameter Ev R The value of the secret prescription is positive to the quantity of effective information submitted in the unit periodRelatedly, by the amount of secret recipe, i.e
Figure BDA0003960215300000111
Wherein n is i Represents the number of effective actions produced by the secret recipe in a unit period, delta T t Represents one unit period, w j Weights representing the jth active role;
parameter Ev W The value of the secret is inversely related to the amount of effective information submitted by the secret in a unit period, i.e
Figure BDA0003960215300000112
Wherein m is i Indicating the number of times in a unit period that the secret recipe produces an ineffective effect, c indicating the current period, c j Indicating the time of the jth invalidation of the secret recipe, and alpha (beta) indicating the non-recommended coefficient; after the verification is completed, storing the effectiveness of the secret recipe into a database of the blockchain;
and the traceability feedback module is used for: is a secret recipe which has been verified to be effective, and the benefit is fed back to the contributor according to the number of users and the curative effect.
Example 1: plum doctors, providing fish orange and honeysuckle flower yellow decoction:
the traditional Chinese medicine comprises the following components: 30-50 g of cordate houttuynia, 15-30 g of honeysuckle, wax gourd kernel, 10-15 g of raw pearl barley, 5-10 g of radix platycodi, peach kernel and liquorice, and 50-100 g of fresh reed rhizome;
the dosage is as follows: 1 dose per day, 2 days for 3 doses for the heavy, and water decoction for administration, wherein the dosage is larger for adults and smaller for children;
the main indications are: lung abscess;
case: comfort X, male, 40 years old, farmer; the lung abscess has been more than a year old, the X-ray report is 7X8 cm pus cavity of the right upper lung, and the lung has a level, and the lung is not cured in the past; the appearance is withered, cheeks are red, rapid cough and severe cough, frequent vomiting of foul smell and purulent phlegm, excessive bleeding, red tongue, yellow and greasy coating and smooth and rapid pulse. The syndrome of deficiency of both qi and yin, and the undesirability of toxic heat; modified in the upper part, 60 doses of the medicine are taken, and the medicine is subjected to perspective review: the cavity is closed and healed.
The information shown in example 1 shows that the system can verify the effectiveness of the secret recipe of the fish, orange, honeysuckle, and yellow decoction, and collects one clinical curative effect, and the secret recipe is less in cases and has contingency, so that the accurate effectiveness cannot be verified, and therefore the secret recipe is not promoted by the secret recipe tracing system.
Example 2: a doctor provides lung-tonifying qi-reducing soup;
the traditional Chinese medicine comprises the following components: 15 g of pilose asiabell root, 6 g of Chinese magnoliavine fruit, ephedra, dried orange peel, 10 g of perilla fruit and white mustard seed, and 9 g of mulberry bark and tuckahoe;
the dosage is as follows: decocting 1 dose per day with water, and taking in the morning and evening; .
The efficacy is as follows: 45 cases of emphysema are treated by adding and subtracting the prescription, 28 cases of clinical manifestations, 11 cases of improvement, 4 cases of effectiveness and 2 cases of ineffectiveness;
the main indications are: emphysema;
case: wu X, female, 45 years old, worker; for more than 10 years, chronic bronchitis is treated by a plurality of Chinese and western medicines and still repeatedly attacks; the near daily cause feels exogenous evil, the cough with dyspnea with excessive phlegm like foam, chest distension and fullness, dysphoria, palpitation, insomnia, the limb is under Wen Lve edema, the tongue is light, fat and tender, the tongue coating is thin and white, the pulse is thin and rapid or the knot is substituted, and the chronic emphysema is diagnosed by X-ray; the diagnosis of lung distention (qi deficiency of lung and kidney) in traditional Chinese medicine; for lung qi tonifying, qi receiving and qi descending, qi descending and dyspnea relieving, it is combined with exterior syndrome relieving. The decoction for tonifying lung and reducing qi removes shizandra berry, 12 g of astragalus root, 6 g of dried ginger and cassia twig respectively, 3 g of cinnamon, 1 dose per day are added for decoction for oral administration; the symptoms are obviously improved after 3 doses, the original prescription is modified to take 5 doses, the symptoms disappear, and no recurrence is seen in the follow-up 1 year.
The information displayed in example 2 shows that the system collects the information, collects the curative effect of 45 cases of clinical emphysema treatment, obtains 28 cases of obvious effects, improves 11 cases of effective cases, 4 cases of effective cases and 2 cases of ineffective cases, the effectiveness of the effective cases is 95.6%, and combines with the accurate cases of wu women, the lung-tonifying qi-reducing soup can still have good curative effect under the condition of smaller administration dosage, so that the system can judge that the effectiveness of the lung-tonifying qi-reducing soup is high, and the secret prescription is promoted by the secret prescription tracing system.
Example 3: the schottky practitioner provides the decoction of radix seu herba Cirsii Japonici:
the traditional Chinese medicine comprises the following components: 100 g of dried radix seu herba Cirsii Japonici, 30-60 g of lean pork (or 30 g of pig lung);
the dosage is as follows: decocting with water for 1 dose per day, wherein the decoction is taken continuously for 3 months in the morning and evening for 1 treatment course, and the effective and unhealed patients can continue to take the 2 nd treatment course, and the unhealed patients of the 2 treatment courses stop taking the western medicine anti-tuberculosis medicine during the taking period;
the efficacy is as follows: the method treats 26 cases of pulmonary tuberculosis, wherein 4 cases are cured, 17 cases are improved, and 5 cases are not cured;
the main indications are: tuberculosis of lung;
case: age XX, male, 57 years old; chest radiographs prove to be right upper infiltration type phthisis, and the disease is not improved after western medicine is used for more than half a year; cough, chest pain, night sweat and emaciation are manifested in the symptoms of diagnosis; the chest film is used for rechecking the tuberculosis focus by more than 1/2 of the original treatment course after the treatment from the upper part, and cough, chest pain and night sweat basically disappear; the weight is increased to 52 kg from 46 kg before treatment, and the blood sedimentation is reduced to 38 from 60 kg before treatment; at the end of the 2 nd course, the chest film is reviewed, the upper right lung disease focus has completely absorbed calcification, and blood sedimentation is reduced to 15; no recurrence occurred for 1 year following the visit.
The system collects the information shown in the example 3, and the system can obtain that the Japanese thistle root decoction has 80.7% of effectiveness in the case of treating the phthisis and the Japanese thistle root decoction does not relapse in one year after the treatment of the phthisis through the practical case according to the information shown in the example 3, so the system can judge that the Japanese thistle root decoction has higher effectiveness and the system can popularize the Japanese thistle root decoction
Example 4: the physician provides the bulk-eliminating and liver-softening powder:
the traditional Chinese medicine comprises the following components: astragalus root 40 g, turtle shell, poria peel, giant knotweed, root of red rooted saliva, oyster each 30 g, plantain seed, costustoot, trogopterus dung, chicken's gizzard-skin each 20 g, locust, buthus martensi karsch each 15 g, notoginseng, kansui root (oil burned from flour bag) each 12 g, lilac daphne flower bud 6 g;
dosage is as follows: the medicines are ground into powder, and 5 g of the powder is taken each time; decocting Mel, arillus longan, and fructus Jujubae with water for 3 times daily;
efficacy: the prescription has good curative effect in treating 40 cases of ascites due to cirrhosis;
the main indications are: cirrhosis of the liver;
case: grandchild XX, female, 57 years old; abdominal distension, anorexia, dry stool, and urine for more than 2 months; the symptoms are listlessness, dark complexion, moderate yellow dyeing of scleral skin, edema of lower limbs, 112 cm around abdomen, mobility and voiced sound, pale red tongue, yellow tongue coating, deep, thready and rapid pulse and astringency; the B ultrasonic prompts ascites due to cirrhosis, and the tympanites eliminating and liver softening powder is taken as a method, so that after 7 days, abdominal distension is relieved, stool is smooth, and abdominal circumference is 94 cm; the patient takes the medicine continuously for 50 days, the abdomen is 72 cm, and symptoms disappear.
The system collects the information of example 4, and the system can know that although the treatment case of example 4 reaches 40 cases and has excellent curative effect, the system has specific data, so that the system cannot judge the effectiveness of the system, and the system cannot popularize secret prescription of treating distension and liver.
Table 1 actual condition comparison of each example
Example 1 Example 2 Example 3 Example 4
Secret recipe Fish, orange, silver and yellow soup Decoction for tonifying lung and reducing qi Cirsium japonicum root decoction Swelling-eliminating and liver-softening powder
Number of cases 1 45 26 40
Number of effective components 1 43 21 Unknown
Effectiveness of the method 100% 95.6% 80.7% Unknown
Invalidity of 0% 4.4% 19.3% Unknown
Whether or not to popularize Whether or not Is that Is that Whether or not
As can be seen from the information shown in table 1, although example 1 shows 100% effectiveness, the cases are fewer, and the actual effectiveness cannot be confirmed, so that the system cannot be popularized, while example 4 has a larger number of cases, but the exact effective number cannot be obtained, so that the effectiveness system cannot be judged, and the popularization of example 4 cannot be performed;
and it can also be obtained that when the secret recipe is promoted, the case on which the secret recipe is based is larger than 20, and the secret recipe can be promoted only when the effectiveness of the case exceeds 70%, so that the true effectiveness of the secret recipe can be ensured, and the effective secret recipe can be inherited.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, and various modifications and variations may be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. The secret recipe work tracing method is characterized by comprising the following steps:
after the secret recipe is submitted successfully, the secret recipe can be distributed with a unique identifier, and the unique identifier can be transferred to each node along with the secret recipe;
checking whether secret prescriptions exist or not, wherein secret prescriptions composed of the same traditional Chinese medicines are not repeatedly submitted into a blockchain;
the system encrypts and protects secret party content, the secret party content is also stored in a block chain in a ciphertext mode, and each encryption is carried out by using a randomly generated secret key;
signing secret party encrypted content and storing the secret party encrypted content into a blockchain;
recommending secret prescriptions to other users for use;
secret information is obtained from the blockchain through secret identification information, wherein the secret information comprises a user identification, secret ciphertext, a user signature and a public key PUK;
signing the secret information through the public key; decrypting the secret key ciphertext AKCT through the user private key PRK to obtain a secret key AK, and performing AES decryption through the secret key AK to obtain the secret complete content.
2. The method of claim 1, wherein the secret recipe information comprises recipe name, chinese medicine composition, usage, efficacy, indications, taboo, notes; the traditional Chinese medicine composition is prepared by mixing the traditional Chinese medicine components in an additive amount.
3. The secret recipe work tracing method according to claim 1, wherein the Chinese medicine lists of the two secret recipes are taken, the Chinese medicines are sorted according to the names of the Chinese medicines, whether the two groups of Chinese medicines are identical or not is judged one by one, if all the Chinese medicines are identical, the secret recipe is judged to be identical, and whether the dose is identical or not is not considered when the secret recipe is repeatedly judged.
4. The secret recipe work tracing method according to claim 1, wherein the secret recipe content is also stored in the form of ciphertext in the blockchain, and each encryption uses a randomly generated key; the user identification, secret prescription name, traditional Chinese medicine composition, usage, efficacy, main treatment, contraindication and notice are put into a Key-Value object and serialized into a character string, and UTF-8 is used for encoding into a byte array PTB; 64 Hex characters are randomly generated, combined into a 256-bit secret key AK, an AES encryption algorithm is used for encrypting a byte array PTB, and Base64 is used for encoding to obtain an encrypted ciphertext CT.
5. The secret recipe work tracing method according to claim 1, wherein the user has a pair of private key PRK and public key PUK for asymmetric encryption in the system;
encrypting the encryption key AK in the last step by using an asymmetric encryption algorithm and a public key PUK, and encoding by using a Base64 to obtain a key ciphertext AKCT;
splicing a user identifier UID, a secret party identifier SIF, secret party ciphertext CT and key ciphertext AKCT by using underline "_" to obtain a character string, and calculating a hash value H1 of the character string by using a sha256 algorithm;
signing the hash value H1 by using an asymmetric encryption algorithm and a secret key PRK to obtain a signature string S1;
and storing the user identification, secret party ciphertext CTC, key ciphertext AKCT, public key PUK and signature S1 into a blockchain.
6. The secret recipe work tracing method according to claim 5, wherein the step of encrypting the encryption key AK is as follows:
selecting a random number x in an encryption key AK as a private key PRK, and calculating a parameter U1 based on a public key calculation formula according to a public key PUK to obtain a message M;
confirming whether a public key calculation formula is established or not according to the message M, and verifying the validity of the encryption key AK to ensure that the secret formula is legal and not disclosed;
if not, the verification fails, if yes, the parameter U2 is calculated and the private key sk is utilized m Generating an encryption value E to obtain a message M';
calculating anonymous user identification according to the message M' and calculating a parameter V UID And C, obtaining a message M';
the system sets an initial effective value of a secret recipe, and stores the anonymous user identification and registration information to obtain a key ciphertext AKCT.
7. The secret recipe work tracing method of claim 5, wherein said signing step is as follows:
selecting a random number gamma in an encryption key AK, and calculating R=gamma P;
the encryption key AK calculates a hash value based on the local anonymous identity and the current timestamp;
encryption key AK calculates S using key PRK i And generating a signature S1 corresponding to the message M.
8. A secret prescription work tracing system applied to the secret prescription work tracing method of claims 1-7, comprising:
secret prescription application module: the secret recipe information at least comprises traditional Chinese medicine composition, dosage, main treatment, efficacy and cases;
and (5) a repeated checking module: for confirming the secret recipe belonged to ensure that it is the first contributor; the secret prescription of the main treatment is refused to ensure the true rights and interests of the contributors;
signature uplink module: the secret recipe is stored in the blockchain, and after the secret recipe is stored in the blockchain, the secret recipe and the affiliated person are always solidified, so that the secret recipe and the affiliated person can be circulated;
flow others employ modules: the secret prescription is subjected to validity verification, clinical curative effects are further collected, and secret prescription with high curative effects is promoted, so that more people benefit;
and the traceability feedback module is used for: is a secret recipe which has been verified to be effective, and the benefit is fed back to the contributor according to the number of users and the curative effect.
CN202211478293.5A 2022-11-23 2022-11-23 Secret recipe work tracing method and secret recipe work tracing system Pending CN116188030A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211478293.5A CN116188030A (en) 2022-11-23 2022-11-23 Secret recipe work tracing method and secret recipe work tracing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211478293.5A CN116188030A (en) 2022-11-23 2022-11-23 Secret recipe work tracing method and secret recipe work tracing system

Publications (1)

Publication Number Publication Date
CN116188030A true CN116188030A (en) 2023-05-30

Family

ID=86443079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211478293.5A Pending CN116188030A (en) 2022-11-23 2022-11-23 Secret recipe work tracing method and secret recipe work tracing system

Country Status (1)

Country Link
CN (1) CN116188030A (en)

Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107896213A (en) * 2017-11-16 2018-04-10 重庆忠昇数据处理服务有限公司 Electronic prescription date storage method
CN108831565A (en) * 2018-05-10 2018-11-16 深圳市和和月升科技有限公司 Chinese medicine acupuncture information common recognition system based on block chain
US20190034922A1 (en) * 2017-07-25 2019-01-31 Bank Of America Corporation Real-time processing distributed ledger system
CN110084068A (en) * 2018-01-26 2019-08-02 阿里巴巴集团控股有限公司 Block catenary system and data processing method for block catenary system
JP2019153130A (en) * 2018-03-05 2019-09-12 株式会社Luftホールディングス Data management system and data management application
US20190339668A1 (en) * 2018-05-02 2019-11-07 Rockwell Automation Technologies, Inc. Managing blockchains in an industrial facility
CN110808958A (en) * 2019-10-07 2020-02-18 复旦大学 Medicine separation management system based on CP-ABE and block chain
CN111131130A (en) * 2018-10-30 2020-05-08 北京忆芯科技有限公司 Key management method and system
CN112564906A (en) * 2020-12-28 2021-03-26 广东长盈科技股份有限公司 Block chain-based data security interaction method and system
CN112613061A (en) * 2021-01-06 2021-04-06 上海泰砥科技有限公司 Electronic prescription sharing method and device based on proxy re-encryption
US20210104326A1 (en) * 2019-10-04 2021-04-08 International Business Machines Corporation Detecting prescription drug abuse using a distributed ledger and machine learning
CN112891504A (en) * 2021-02-22 2021-06-04 江西中医药大学 Four-season skin-care epidemic-prevention ginger paste with ginger decoction dregs as base materials and preparation method
CN113111379A (en) * 2021-05-10 2021-07-13 南京邮电大学 Bidirectional anonymous authentication method supporting location privacy protection in intelligent medical treatment
CN113761488A (en) * 2021-09-09 2021-12-07 图易(常熟)信息技术有限公司 Content network copyright tracing encryption system and encryption method
CN113794550A (en) * 2021-08-09 2021-12-14 山东浪潮工业互联网产业股份有限公司 Link random encryption method and system
CN113971358A (en) * 2021-10-26 2022-01-25 扬州大学 Decoupling model-based method for analyzing service life sensitivity of clamping end structure of spike-poking pollination machine
US11258601B1 (en) * 2019-06-04 2022-02-22 Trend Micro Incorporated Systems and methods for distributed digital rights management with decentralized key management
WO2022068358A1 (en) * 2020-09-29 2022-04-07 深圳壹账通智能科技有限公司 Encryption method and apparatus for generating keys on basis of attributes of information, and device
WO2022068362A1 (en) * 2020-09-29 2022-04-07 深圳壹账通智能科技有限公司 Block chain-based information processing method and apparatus, device, and medium
CN114757685A (en) * 2022-04-12 2022-07-15 嘉应学院 Shaddock agricultural product processing safety tracing method and system
CN114785556A (en) * 2022-03-28 2022-07-22 中国建设银行股份有限公司 Encrypted communication method, device, computer equipment and storage medium
CN114996664A (en) * 2022-06-13 2022-09-02 中国科学院沈阳自动化研究所 Block chain-based digital copyright protection method
CN116260662A (en) * 2023-05-15 2023-06-13 成都信息工程大学 Tracing storage method, tracing storage system and tracing system

Patent Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190034922A1 (en) * 2017-07-25 2019-01-31 Bank Of America Corporation Real-time processing distributed ledger system
CN107896213A (en) * 2017-11-16 2018-04-10 重庆忠昇数据处理服务有限公司 Electronic prescription date storage method
CN110084068A (en) * 2018-01-26 2019-08-02 阿里巴巴集团控股有限公司 Block catenary system and data processing method for block catenary system
JP2019153130A (en) * 2018-03-05 2019-09-12 株式会社Luftホールディングス Data management system and data management application
US20190339668A1 (en) * 2018-05-02 2019-11-07 Rockwell Automation Technologies, Inc. Managing blockchains in an industrial facility
CN108831565A (en) * 2018-05-10 2018-11-16 深圳市和和月升科技有限公司 Chinese medicine acupuncture information common recognition system based on block chain
CN111131130A (en) * 2018-10-30 2020-05-08 北京忆芯科技有限公司 Key management method and system
US11258601B1 (en) * 2019-06-04 2022-02-22 Trend Micro Incorporated Systems and methods for distributed digital rights management with decentralized key management
US20210104326A1 (en) * 2019-10-04 2021-04-08 International Business Machines Corporation Detecting prescription drug abuse using a distributed ledger and machine learning
CN110808958A (en) * 2019-10-07 2020-02-18 复旦大学 Medicine separation management system based on CP-ABE and block chain
WO2022068362A1 (en) * 2020-09-29 2022-04-07 深圳壹账通智能科技有限公司 Block chain-based information processing method and apparatus, device, and medium
WO2022068358A1 (en) * 2020-09-29 2022-04-07 深圳壹账通智能科技有限公司 Encryption method and apparatus for generating keys on basis of attributes of information, and device
CN112564906A (en) * 2020-12-28 2021-03-26 广东长盈科技股份有限公司 Block chain-based data security interaction method and system
CN112613061A (en) * 2021-01-06 2021-04-06 上海泰砥科技有限公司 Electronic prescription sharing method and device based on proxy re-encryption
CN112891504A (en) * 2021-02-22 2021-06-04 江西中医药大学 Four-season skin-care epidemic-prevention ginger paste with ginger decoction dregs as base materials and preparation method
CN113111379A (en) * 2021-05-10 2021-07-13 南京邮电大学 Bidirectional anonymous authentication method supporting location privacy protection in intelligent medical treatment
CN113794550A (en) * 2021-08-09 2021-12-14 山东浪潮工业互联网产业股份有限公司 Link random encryption method and system
CN113761488A (en) * 2021-09-09 2021-12-07 图易(常熟)信息技术有限公司 Content network copyright tracing encryption system and encryption method
CN113971358A (en) * 2021-10-26 2022-01-25 扬州大学 Decoupling model-based method for analyzing service life sensitivity of clamping end structure of spike-poking pollination machine
CN114785556A (en) * 2022-03-28 2022-07-22 中国建设银行股份有限公司 Encrypted communication method, device, computer equipment and storage medium
CN114757685A (en) * 2022-04-12 2022-07-15 嘉应学院 Shaddock agricultural product processing safety tracing method and system
CN114996664A (en) * 2022-06-13 2022-09-02 中国科学院沈阳自动化研究所 Block chain-based digital copyright protection method
CN116260662A (en) * 2023-05-15 2023-06-13 成都信息工程大学 Tracing storage method, tracing storage system and tracing system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
CHEN YU等: "Research on the risk of block chain technology in Internet finance supported by wireless network", 《EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING 》, vol. 2020, no. 1, 30 March 2020 (2020-03-30), XP021274744, DOI: 10.1186/s13638-020-01685-6 *
JIAMENG LIU等: "Segmented Encryption: A Quality and Safety Supervisory Model for Herbal Medicine Based on Blockchain Technology", 《2020 IEEE INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM)》, 31 December 2021 (2021-12-31) *
蒋叶兰;李志蜀;潘俊曲;: "RSA加密算法在中药配方颗粒自动发药机中的应用", 四川大学学报(自然科学版), no. 03, 28 June 2008 (2008-06-28) *
贾丽梅;陈雨佳;: "丹连消痤面膜联合中药内服治疗聚合性痤疮的临床观察", 中国中医药科技, no. 04, 20 July 2016 (2016-07-20) *

Similar Documents

Publication Publication Date Title
Monnazzi et al. Treatment of mandibular condyle fractures. A 20‐year review
CN105832837A (en) Traditional Chinese medicine preparation for treating lumbar intervertebral disc protrusion
CN106728937A (en) A kind of Chinese medicine for treating eye illness
CN116188030A (en) Secret recipe work tracing method and secret recipe work tracing system
CN106963921A (en) It is a kind of to treat external medicine composition of the proliferation of mammary gland and preparation method thereof
Skef et al. FPIN's Help Desk Answers: Treatments for de Quervain Tenosynovitis
CN105233188A (en) Traditional Chinese medicine composition for treating liver cancer and application of traditional Chinese medicine composition
CN104013851B (en) A kind of Chinese medicine preparation treating tinea pedis
CN101301452A (en) Medicinal composition for treating gout and rheumatism
CN101007159A (en) Traditional Chinese medicine for preventing and controlling tumor
Zhou et al. Chinese Herb Injections in the Adjuvant Treatment for Ulcerative Colitis: A Network Meta‐Analysis of Randomized Controlled Trials
CN105617042A (en) Traditional Chinese medicine composition for treating headache
CN105412206A (en) Traditional Chinese medicine preparation with relaxing tendon and dissipating hard mass effects
CN104587104A (en) Oral medicine for treating nerve deafness and preparation method thereof
CN101658604A (en) Powder for treating mumps
Guo et al. Analysis of Medication Rules of Traditional Chinese Medicine for Malaria Treatment Based on Data Mining
CN104435437B (en) A kind ofly treat Chinese medicine of the concurrent glossopharyngeal neuralgia of trigeminal neuralgia and preparation method thereof
CN107007787A (en) Treat the Chinese medicine of chronic gastritis
Chen et al. Constitution in Chinese Medicine Clinical Reasoning.
McCarroll et al. An evaluation of physiotherapy in the early treatment of anterior poliomyelitis
CN106177561A (en) One treats phthisical Chinese medicine composition
Chou et al. A Real‐World Study on Ge Gen Tang in Combination with Herbal Medicines for Relieving Common Cold‐Associated Symptoms
CN105999125B (en) Kidney-tonifying and liver-regulating traditional Chinese medicine composition for treating senile osteoarthritis and preparation method thereof
CN106109802A (en) A kind of Chinese medicine composition treating primary dysmenorrhea and its production and use
Zhang et al. Study on Professor Diangui Li's Medication Experience in Treating Atrophic Gastritis Concomitant with Helicobacter Pylori Infection Based on Data Mining

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination