[go: up one dir, main page]

CN101639889A - Network logistics - Google Patents

Network logistics Download PDF

Info

Publication number
CN101639889A
CN101639889A CN200910112443A CN200910112443A CN101639889A CN 101639889 A CN101639889 A CN 101639889A CN 200910112443 A CN200910112443 A CN 200910112443A CN 200910112443 A CN200910112443 A CN 200910112443A CN 101639889 A CN101639889 A CN 101639889A
Authority
CN
China
Prior art keywords
network
logistics
machine
information
businessman
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910112443A
Other languages
Chinese (zh)
Inventor
刘文祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200910112443A priority Critical patent/CN101639889A/en
Publication of CN101639889A publication Critical patent/CN101639889A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Network logistics and network business are mutually integrated. In order to realize the sharing of logistics information and logistics functions among logistics enterprises, industrial and commercialenterprises and logistics supervision government departments, the network logistics has to be interconnected, intercommunicated and interoperated with network government affairs. The problem of logistics information comprehensive integration among logistics enterprises, industrial and commercial enterprises, financial institutions and government supervision departments in logistics can be effectively solved by means of the government affairs. Network logistics systems are closely related to the network business, the network government affairs, network intelligent traffic systems and the like.The network logistics is based on the network business, the network government affairs, the network intelligent traffic systems and the like. A plurality of identification facilities and a general purpose calculator are mutually connected in a short distance through transmission media according to physical topological structures of a local area network (in a star shape, a ring shape, a tree shapeor a bus shape and the like) to form a logistics network unit. Each identification facility is fixedly distributed in a monitoring area and respectively takes an identification task of cargoes and thelike of the monitoring area in the logistics system.

Description

Network logistics
Technical field
The present invention relates to network (Networks) technology, infotech (Information Technology, IT), computing machine (Computer) technology, database (Database) technology,, radio frequency identification (Radio Frequency Identification, RFID) technology, automatic control technology, the communication technology, logistics bootstrap technique, microelectric technique, sensing technology and display technique etc.
Background technology
Can be connected to computer network computing machine and electronic logistic system equipment etc. and integrated circuit (IC) chip that have all the various functions in Network Transmission and reception such as processing information flow, bag (packet) or frame (frame), be called interface circuit.It also is applicable to interconnecting between computing machine, electronic logistic system equipment or the network.
Logistics (Logistics) definition: by the combination of basic functions such as production, transaction, storage, loading and unloading and transportation, goods is mobile overall process service from supplier to physical property the needs person (or consumer).It can also pack according to actual needs, process, load and unload, carry, dispensing and article processing etc.
(Electronic Data Interchange is that the standard information with certain architectural feature is handled EDI) to electronic data interchange, and through the data communication dedicated network, makes this information according to agreement exchange automatically between computing machine and opertaing device thereof.
EDI is a kind of electronic instrument of commerce and trade.It becomes the data layout that computing machine can be discerned and handle with business documentation (order, invoice, shipping document, customs declaration and import and export license etc.) by unified standard, continues by private and transmits automatically between trading partner's computing machine.
Electronic transaction (Electronic Transaction) definition:, realize effective and the transaction contract of reliable commodity and the deal contract of product or service with the message exchange form by commercial private wide area network.
Pay (Electronic Payment) definition by mails:, realize effective and reliable flow of fund and payment with the message exchange form by financial private wide area network.
Electronic logistics definition: wait by private wide area network (or virtual MAN) surmount the time, the separation of space and department, the system that high-speed, reliability and validity ground provide the storage, loading and unloading, transportation of business such as the exchange, electronic transaction, E-Payment of information in the logistics and thing etc. to manage.
Ecommerce definition: wait by private wide area network (or virtual MAN) surmount the time, the separation of space and department, the system that provides to high-speed, reliability and validity the business such as information exchange, electronic transaction, E-Payment of commerce and trade and commodity distribution transportation etc. to manage.
E-Government definition: wait by private wide area network (or virtual MAN) surmount the time, the separation of space and department,, reliability high-speed to society provides government information with validity ground, optimizes public service, high-quality and the government function of honesty and the system of raising governability usefulness.
Electronic intelligence traffic system (Electronic Intelligent Transportation Systems, EITS) definition: the LAN (Local Area Network) of each dispersion of traffic unit, by private wide area network (or virtual MAN), form the intelligent traffic system of interconnected between the network of these isomeries of this unit or isomorphism, intercommunication and interoperability.It is a kind of informationization, intellectuality, socialization, comprehensive, traffic system regularly, accurately and efficiently.
The basic comprising of electronic intelligence traffic system generally comprises: advanced traffic information system (ATIS), advanced traffic control system (ATMS), advanced Vehicular system (AVCS), advanced public transportation system (APTS) and commerial vehicle operation system (CVOS).
Electronic logistics is based on systems such as ecommerce, E-Government and electronic intelligence traffic.
The bar code councils of U.S. electronics industry association (EIA) (MH10 SBC-8) etc. have made the sector application standard of two-dimensional bar code in circulation industry.It can be applied to 3 on a large scale: search at a high speed and follow the trail of on (High Speed Sortation and Tracking), the paper electronic bits of data exchange (Paper EDI), the shipment information (Shipping/Receiving Information) of stocking up.
The American National border ANSIMH of VESA Video Electronics Standard Association 10.8 formulates the standard (Two-Dimensional Symbols forUse with Unit loads and Transport Packages) of unit parcel and shipping tag application, and the advice content of its two-dimensional bar code standard comprises:
1) the imports and exports list adopts the PDF417 two-dimensional bar code.
2) information of electronic data interchange (EDI) and associated documents adopt the PDF417 two-dimensional bar code.
3) the Maxicode two-dimensional bar code is adopted in product search and tracking in the conveying, and suggestion is of a size of 1 cun * 1 cun.
The hardware and software that existing each loglstics enterprise designs its system respectively voluntarily is enclosed dedicated system.It has different software and hardware modules, different programming languages, omnifarious man-machine interface, multiple real time operating system, nonstandardized technique interface etc., not only brought the complicacy of using on going up and keeping in repair, returned the system reform and upgrading and brought very big difficulty to the user.
Existing loglstics enterprise adopts the specialized system structure mostly.Advantage such as that this system has is simple in structure, technology maturation, production cost are lower.But, also expose its inherent defect along with the development of technology.For example, because the closure of system hardware causes some newest fruits of computer technology not make things convenient for, is applied to logistlcs technology in time, hindered the upgrading of system.Logistics system function single and extensibility not can not adapt to logistics demand variation and personalized requirement well; The maintenance of system and training cost are also high excessively.
The material of energy transmission signals is called transmission medium.It comprises cable, optical fiber, wireless medium, microwave and laser etc.
Personal computer can be in the logistics environment reliability service; Can with the sensor of logistics object, topworks's direct interface of object, be the microcomputer family of finishing logistics observing and controlling and management role.It can be used for the logistics system scene, finishes the real-time data acquisition of logistics system process, handles and real-time control task in real time, also can be used as an organic component of logistics equipment, finishes the control task of logistics.
The network of existing each logistics system establishes one's own system, and can not pass through the Internet (Internet), makes safety and accurate intercommunication each other.
In the existing logistics system technology, certain logistics unit is scattered in the computer automation logistics system of various places, must be by renting expensive special line or (Virtual Private Network, VPN) technology are set up this internal institution private wide area network by Virtual Private Network.
Rent expensive special line for many small-sized or medium-sized enterprises, even large enterprise, all be a kind of white elephant.
Virtual private network technology since application processor and VLAN (Virtual Local Area Network VLAN) after the technology, in fact changes point-to-point communication into.There is at present two kinds of nets layout that continues: center radiation layout and whole network layout.The center radiation layout is linked to each other with many remote sites by a central site.The Customer Edge router that is positioned at the central site position is very expensive, and its price is relevant with the number of the remote site that links to each other.Packet time delay when simultaneously, substantially exceeding direct communication between two websites its time delay.The whole network tunnel (Tunnel) quantity that layout need be supported that continues increases along with the number of website is geometric series.It is unpractical that the enterprise that website is many a little adopts it.
Security is another significant problem of VPN.Each is connected to the Customer Edge router of the Internet, all must take such as the such safety practice of fire wall, so that guarantee the safety of each website.But each fire wall must (Internet Service Provider, ISP) open, so that the visit relevant devices, this be a potential safety hazard to Internet service provider.When network size was big, managing firewall was also very difficult.(Secure Socket Layer, SSL) VPN only is fit to the connection of website to network to security socket layer, can't realize the safe interoperability between a plurality of networks.
Existing fire wall can't be resisted the infringement of computer virus.
Each LAN (Local Area Network) of loglstics enterprise can't be passed through internet (Internet) and safety and interoperability accurately; Be not easy to form the base unit of this enterprise " global logistics system ".
Summary of the invention
Task of the present invention is to adopt network interconnection technology and logistic information systems technology etc., sets up the modern unified validity and the logistics system of reliability; With the electronic logistics part, on private (comprising E-Government, electronic intelligence traffic, ecommerce, electronic logistics guiding etc.), be extended to open, based on the logistics of internet (comprising government affairs based on the internet, intelligent transportation, commercial affairs, logistics guiding etc.).
Network trading (Net Transaction) definition:, realize validity and the transaction contract of reliability and the deal contract of product or service of commodity with the message exchange form by the internet.
Network payment (Net Payment) definition:, realize effective and reliable flow of fund and payment with the message exchange form by the internet.
Network logistics definition: pass through the internet, surmount the time, the separation of space and department, the system that high-speed, reliability and validity ground provide the storage, loading and unloading, transportation of business such as the exchange, network trading, network payment of information in the logistics and goods etc. to manage.
LAN (Local Area Network) (comprising integrated network) with each dispersion of logistics unit, by common network (being generally the internet), setting up the unified logistic information systems and the goods intelligent transportation system of interconnected (Interconnection), intercommunication (Intercommunication) and interoperability (Interoperability) between the network of these isomeries of this unit or isomorphism, is exactly the network logistics of this unit.It comprises the traffic systems such as transportation of goods reality.
Network business definition: utilize that computing machine public wide area network (being generally the internet) surmounts the time, the separation of space and department, the system that provides to high-speed, reliability and validity the business such as exchange, network trading, network payment of the information of commerce and trade and the dispensing transportation of commodity etc. to manage.
Network government affairs definition: utilize that computing machine public wide area network (being generally the internet) surmounts the time, the separation of space and department, to society fast, reliability provides government information with validity ground, optimizes public service, high-quality and the government function of honesty and the system of raising governability usefulness.
Network intelligence traffic system definition: with the LAN (Local Area Network) of the communications and transportation of each dispersion of unit, by public wide or net (being generally the internet), form interconnected between the network of these isomeries of this unit or isomorphism, intercommunication and the intellectualizing system of interoperability and the system of freight transportation intelligent management.
The network intelligence traffic system is a kind of informationization, intellectuality, socialization, comprehensive, transportation system regularly, accurately and efficiently.
The network business and network logistics are to integrate mutually.Commercial affairs are final purposes of logistics.The information flow that takes place in all commercial activitys, cash flow, logistics; All take as the leading factor by commodity-circulate.Network logistics must have the network business.The network business is the necessary condition of network logistics.
In order to realize logistics information and the logistics function sharing between loglstics enterprise, industrial and commercial enterprises and the logistics supervision government department, network logistics must with the network government affairs can be interconnected, intercommunication and interoperability.By means of the network government affairs, can effectively solve the logistics information comprehensive integration problem between loglstics enterprise in the logistics, industrial and commercial enterprises, financial institution and the government regulator.The network government affairs also are the necessary conditions of network logistics.
The network logistics system and the network business, network government affairs and network intelligence traffic system etc. are closely related.
Network logistics Electronic Business Technology Network Based, network government affairs technology and network intelligence traffic system etc.For realizing logistics information and the logistics function sharing between loglstics enterprise, industrial and commercial enterprises, the logistics supervision department, must set up the INTEGRATED LOGISTICS information platform.Its user is: owner of cargo enterprise; Loglstics enterprise (comprising carrier, store company, harbour, airport, goods yard etc.); Forwarder; Financial institution etc.Its supervision department is: government organs' (comprising departments such as traffic, industrial and commercial administration, examination, commercial affairs, customs, city planning, health quarantine and statistics).
By means of network government affairs basis and network logistics system constructing network logistics integrated information platform, can effectively solve the logistics information comprehensive integration problem between industrial and commercial enterprises in the logistic industry, loglstics enterprise, government regulator and the financial institution.
The electronization of existing every field, comprise ecommerce, E-Government, electronics military task, electric mechanical, electronics chemical industry, electronics oil, electronics exploration, electronics military project, electronics manufacturing, electronic surveying, electronics weaving, electronic logistics or the like system, all based on special-purpose (or virtual) wide area network.When base was opened mutual net platform, the security threat that they face in the internet is mainly: information transmitted was intercepted and captured; The file of transmission may be distorted; Hacker false impersonation identity; The malicious person denies doing transaction etc.Safety problem has a strong impact on the application and the development of every field e commerce transactions.
The networking of every field, comprise that network medical matters, internet insurance, network military task, network machinery, network chemical industry, network oil, network exploration, network military project, network manufacturing, network measure, network are weaved, net continues tourism, the Internet bank or the like system, all carry out based on the internet.And the characteristics of the Internet (Internet) be exactly whenever and wherever possible, convenient easy-to-use, real-time interaction etc.It for the mutual of the information flow of every field miscellaneous service, transaction flow, cash flow, logistics etc. with share, round-the-clockly trans-regionally provide good technical support with low-cost processes and transmission.
In the internal network of unit, have the external service function of this unit needs the most perfect or that this unit basis is externally served and the main frame (host computer) of appointment, be called the multi-purpose computer of advantage function in this network of this unit, be called for short excellent machine.This network can be called excellent machine network.Excellent machine also is a main frame in the excellent machine network.
Respectively and excellent machine network (or excellent machine wherein) and another common network (comprising the internet) interconnected and control the multi-purpose computer of computerized information interoperability between these two networks, be called the specific multi-purpose computer of distinguishing identity in another network, be called for short the machine of distinguishing.This another network (not comprising the machine of distinguishing) of distinguishing that machine connects is called and distinguishes the machine network.
The excellent machine and the machine of distinguishing have all been deposited increases functional network operating system NOS on its original operating system.
The machine of distinguishing can directly be connected with excellent machine interface in the protected excellent machine network by interface, is connected with another network by the net interface that continues simultaneously.Because various computer networks by distinguishing the different interconnection technique schemes of machine, can be built into the internet of various different structures and purposes.
The standard program of distinguishing machine is:
" program of scrutiny program " function: after the machine of distinguishing of source end or Su Duan receives cleartext information, information is checked, find after the random procedure wherein, they are arranged in together, and temporarily be stored in the external storage, simultaneously the first road program be presented on the display screen of designated computer.If some program is the legal procedure that allows its visit; Then the user selects " allowing later on " final election item when prompting occurring for the first time, distinguishes and can not inquire once more when machine is met these programs later on, and allow its visit.When the user does not answer within a certain period of time or selects " not allowing " final election item, the machine of distinguishing just abandons this program.The source end distinguishes that machine and Su Duan distinguish that machine moves this program; Can prevent that virus attack from distinguishing the network that organizational security protects.
" source end encipheror " function: the source end is distinguished machine sends desire by common network cleartext information back, adds the secret key of symmetric cryptography; With this data splitting input one-way hash function (Message Digest), draw hash (Hash) value (being called source end hashed value); Then source end hashed value is added in cleartext information (not comprising key) back, encrypt, become ciphertext with key; The Su Duan that at last this ciphertext seen off distinguishes machine.
" place end decrypted program " function: Su Duan distinguishes that machine with the cipher key shared that unit or enterprise arrange in advance, becomes the decrypt ciphertext that receives expressly, obtains cleartext information and source end hashed value; Key is added in cleartext information (not comprising hashed value) back; With this data splitting, input is the one-way hash function of agreement in advance, obtains hashed value (being called place end hashed value); This place end hashed value is compared with the source end hashed value that receives; If these two hashed values are identical; Confirm that then this information distinguishes that from legal source end machine sends, accept this information; Otherwise abandon this information.
The simple approach of authentication (Authentication) is to set up a username and password database in distinguishing machine.
The machine of distinguishing passes through Access Control List (ACL), and (Access Control List ACL) carries out authentication.This username and password Database Lists is discerned dissimilar source end protected network (distinguishing that with it machine IP address is representative) identity simply.
Authorize (Authorization) to stipulate then what the user after obtaining this network qualification of visit, can do.
Authentication and mandate new method are to set up a user or enterprise's name, IP address, password and authorization privilege database.
The machine of the distinguishing Access Control List (ACL) of enterprise is used for carrying out user's (referring to other enterprises, affiliate enterprise or remote client or tissue) authentication.This tabulation distinguishes that to dissimilar source ends (user name) machine IP address and user's password carries out identification.The password that has only user name, IP address and user with in this Access Control List (ACL) when identical, could guarantee to come into force based on the authentication of address.
Distinguish that facility have computing machine in protected LAN (Local Area Network) of enterprise, be sent to the information of (perhaps receiving) another LAN (Local Area Network) computing machine of this enterprise, after the encryption (or deciphering), be transmitted to the standard program of the Internet (perhaps this LAN (Local Area Network)) etc.; It contains the program of processing information flow etc.
In two protected networks between two computing machines, by Internet carry out safety with communicate by letter accurately as follows:
The source end that is connected with protected network is distinguished machine; " program of scrutiny program ", " source encipheror " and " place end decrypted program " etc. are housed, can encrypt various information, and only allow the information of the computing machine in this source end protected network; after encrypting, enter the internet.
The Su Duan that is connected with protected network distinguishes machine; " program of scrutiny program ", " source end encipheror " and " place end decrypted program " etc. are housed; can decipher the various information of coming in from the internet; and only allow the computerized information in the source-end networks of other source end protected networks of this unit or tissue or affiliate's appointment; after deciphering, enter into the receiving computer of this place end protected network.
Though logistics system process or logistics system task see and directly come very complicatedly that in fact great majority can resolve into some simple logistics system elements (program) sections.Each element section is carried out according to certain step.Each step all is to implement in a certain order; Indispensable, step or wrong order all not all right.Each process all is the subsystem that carries out according to certain rules in these logistics system element sections.
Logistics element section is made up of one or several tactic operations.Operation is the elementary cell of component section; It is the process of in logistics system, finishing basic task continuously.It also is the elementary cell of formulating the logistics system plan, carrying out business accounting.
For same logistics system element section, the method for required solution may be different with step in operational process, should formulate the technology (comprising different operations) of different logistics systems.Therefore essential method and the quality of considering the logistics operational process, and select suitable operation method and the various parameters of logistics system are set.
The logistics program is made up of program segment (Block).Wherein each instruction all has set form.The calculation procedure of different logistics systems, its order format are also different.Therefore need write the logistics instruction according to the order format of Logistics Equipment.The logistics programming will be with reference to the Programming Notes book of Logistics Equipment.
Barcode technology is mainly adopted in existing logistics information collection.The mark that bar code is made up of one group of regularly arranged bar, sky and corresponding digital thereof.International standard ISO 15394-2000 (Packaging-Bar Code and Two-Dimensional Symbols for Shipping, Transportand Receiving Labels) shipping label in the logistics is made stipulations, wherein label comprises one dimension sign indicating number, two-dimension code and word segment.The code system of one dimension sign indicating number mainly adopts 128 yards, 39 yards and EAN128 sign indicating number; Two-dimension code adopts the PDF417 sign indicating number.
1, (Radio Frequency Identification RFID) is a kind of contactless automatic identification technology to radio frequency identification.It reads the information of electronic tag stored by electronic tag and at a distance of the radio communication between several centimetres to several meters the recognizer, can discern article, people and the utensil of electronic tag representative.The RFID technology can be discerned the high-speed mobile object and can discern a plurality of labels, can be operated in the various rugged surroundings, and is swift and convenient to operate.It is made up of electronic tag and identification equipment.Identification equipment comprises antenna, radio frequency device and reader.RFID is applicable to the occasion of non-contact data collection and exchange.
Label of the present invention is formed (Fig. 1) by microwave antenna, reflecting modulator, scrambler, microprocessor, internal memory and display (being generally LCD) etc.Storage is identified the relevant technologies parameter and the identifying information of thing in the storer of label, also contains certain additional information, for example error-checking information.Because label technique and display technique are combined, the function that makes this label have to show the various relevant informations that are identified thing etc.Have the label that shows the various relevant information functions that are identified object, be called display label, abbreviate as to show and sign.Show the function that the scrambler of signing has the data of writing, can onlinely finish; Also can be that off-line is finished.Show storage, rewriting and the remote identification signed to bulk information technical support and assurance are provided.It overcomes some shortcomings of barcode technology, and for example security is relatively poor etc.
Apparent label have specific: powered battery, and transmission range is far away, conformance with standardization, field-programmable, it is safe and reliable to encode, but display message.
According to different functions, apparent label can be divided into: active apparent label and passive type show to be signed, and read-only apparent label and read-write show label etc.
The radio frequency device is the equipment (Fig. 2) that microwave produces, transmits and receives.It mainly partly is made up of radio-frequency oscillator, power amplifier (rf processor), radio frequency receiver, detection detuner and prime amplifier etc.The signal process radio-frequency oscillator that it produces becomes the carrier signal of high frequency, after power amplifier (or rf processor) amplifies, launches by antenna again.Show and sign after the carrier signal that the reception identification equipment sends, activated, enter duty rapidly, will show the identifying information reflected back identification equipment of finishing in signing by this request signal.The antenna of identification equipment receives by showing and signs the signal that reflects, and radio frequency receiver is received and dispatched separation, and detection demodulation is then amplified by prime amplifier again, delivers to reader and handles.Reader essence is to read computing machine.Antenna is to show the device that transmits and receives that carries out the data transmission exchange between label and the radio frequency device.
Identification equipment can adopt the multi-processor structure system.This system is made up of an above microprocessor that links together by certain physical topology (star-like, ring-type, tree-like and bus etc.) structure circuit.Each processor is born one the function of being no less than of logistics identification equipment.It can the independent operating assembly routine etc., can pass through communication media circuit or shared storer and other processor exchange messages again, coordinates step, finishes the task that the logistics identification equipment is born in real time.
The data transmission that shows between label and the identification equipment (Fig. 1 and Fig. 2) is to carry out with the form of radiowave by air dielectric.
Bluetooth (Bluetooth) technology is a kind of low cost, short-range microwave interconnection technique.Its transfer rate is designed to 1MHz, carries out full-duplex communication with time division way; Adopt fast frequency modulation and short grouping, and technology such as forward error correction (FEC) coding, reduce and disturb, guarantee the reliability of transmitting.
Frequency range at 2.4GHz-2.4835GHz is industry, science and medical science (Industrial Science Medicine) frequency range, is the public frequency range that does not need to apply for occupancy permit.Adopt the spread spectrum of 2.4GHz to communicate, utilization FM modulation system is to reduce the complicacy of equipment.Bluetooth technology is built up the wireless communication transmissions circuit fast, flexibly, low-power consumption and low-cost in a word.
The RFID technology is applied in the logistics, can realize cargo tracking and information sharing, changes existing supply chain management pattern, and enterprise operation efficient is provided.Its concrete application direction: warehousing management, logistics distribution, retail management, encased conveying, postal service etc.RFID can discern a plurality of electronics simultaneously and show label, and reading time is fast.So lot cargo in warehouse or container, need not remove goods to read piecemeal; Only need the several seconds can finish the task of examining goods with reader.In warehouse system, can set the quantity of some commodity; When these commodity are sold, then can deduct the quantity of having sold in real time; When commodity are less than the setting number, can show automatically; Remind the supvr in time to replenish.
Adopting electronics to show label makes merchandise control not only convenient but also quick.And existing bar code weares and teares easily, also forges easily.
Middleware (Middleware) provides the software of communicating with each other between identification equipment and the network.It is for providing standard interface between identification equipment and the computer network; No matter how the bottom of computing machine and identification equipment upgrades, as long as interface is constant, application software also needn't significantly be revised, and just can transmit cross-platform resource, realizes the effect of sharing.
Portable Data-Acquisition System is with the reader of hand-held the data that electronics shows in signing to be gathered.The data of gathering can pass to computer network system in real time by radiowave; Also can temporarily be stored in batches in the reader, by network interface, be transferred to infosystem then.
In the positioning system of RFID, the apparent label that store position identification information are installed on mobile vehicle, the steamer, or on the starting material that move on the automatic assembly line, semi-manufacture, finished product.Reader (Fig. 3) is installed on certain fixed position of operating environment; Link to each other with computer information system by wireless or wired mode.By reader and the cooperating that shows label, can be used for locating and providing in the automatic processing system in the running location system of vehicle, wheel oceangoing ship etc.
2, by some identification equipments and a multi-purpose computer, according to the physical topological structure of LAN (Local Area Network) (star, annular, tree-like or total linear etc.), connect mutually by the transmission medium short distance, just constitute the logistics network unit.Every identification equipment stationary distribution is born the identification mission of an object such as surveillance zone commodity in the logistics system respectively in surveillance zone.
Multi-purpose computer in the logistics network unit contains operating system software, database and management software thereof, Language Processing (logistics programming and program compiler) software etc.The data layout of logistics network unit holder string routine can in time transmit and handle specific tasks, and drives identification equipment enforcement automatic material flow system.The operating system that is used for the logistics network unit is by ready-made computer network operating platform; Realize control in real time.This type operating system has DOS, UNIX/Linux, Windows etc.This be a kind of be independent of computer hardware platforms, with irrelevant logistics network unit operations system of manufacturer.Computing machine or identification equipment be no less than one processor structure, can control in real time and manage the logistics network unit.
Computing machine in the network element and the communication transmission media between the identification equipment are the passages of their transmission information.Rely on this passage, computing machine transmits through the logistics program of compiling and instruction and gives identification equipment.And identification equipment passback logistics system state and information are given computing machine.
Computing machine in the logistics network unit adopts OO modular design, can make the function wide coverage of logistics network unit, and tailorability strengthens, and is convenient to satisfy requirements of different users.This is the flexibility performance of logistics network unit.It is the logistics system in a kind of modern times.The logistics network unit has the system of following the tracks of movement of objects.
The data of logistics operation link belong to multidate information, and not only data volume is big, a multitude of names; And require high.
Emulation technology is carried out static state or dynamic similation by computing machine to the structure and the logistics system of logistics equipment, thereby predicts or estimate the behavior effect of this logistics system, for decision-making provides information and foundation.Efficient modeling is one of core competitiveness of logistics network unit.
Automatically control-feedback can be implemented in each link of logistics system.
3, with excellent machine, some computing machines, server, client computer, browser, logistics network unit, database and other computer logistics equipment etc., adopt local area network technology, by the LAN (Local Area Network) that network interface unit and telecommunication cable are formed by connecting, be called logistics LAN (Local Area Network) (Fig. 3).
(Network Operating Sestem is to increase the needed function of network on excellent machine and the original operating system of each computing machine NOS) to the network operating system of logistics LAN (Local Area Network).NOS operates on the server class computer, and is shared by the computer user of networking.
The logistics LAN (Local Area Network) has interoperability (interoperability), portable (portability), extensibility (expandability), Ke putting property of Shrink (scalability) and plug and play (plug﹠amp; Play) feature.It generally is with the distributed principle that is controlled to be, the control structure of employing system, subsystem and module stagewise; Its structure is transplantable and transparent.
Excellent facility have microprocessor chip, data-carrier store (EEPROM), working storage (RAM) and program storage (EPROM), and input button, display etc. are housed.Logistics LAN (Local Area Network) operating system is to increase the required function of LAN (Local Area Network) in excellent machine operation system, its Control Network operation.
Each excellent machine all has the input and output interface circuit.Also can directly communicate with business information between the computing machine of excellent machine network or the logistics equipment and exchange by transmission medium.
The demand of loglstics enterprise to information integration greatly satisfied in the networking of logistics network unit, is the fundamental unit that realizes new logistics system pattern (as virtual enterprise and global logistics system).
The logistics LAN (Local Area Network) provides a kind of neutral machine-processed platform that does not rely on concrete loglstics enterprise, is a kind of brand-new logistics system theory.It can by network delivery logistics system code to computing machine, again by its dispensers streaming system task to corresponding logistics equipment, finish the work by logistics equipment then.
For the operation conditions of certain equipment in the monitor network on the logistics equipment in the logistics LAN (Local Area Network), can on every logistics equipment, camera be installed.Adopt multimedia technology, can realize the real-time video issue in the logistics LAN (Local Area Network).
Logistics LAN (Local Area Network) with network function can fully realize the resource and the information sharing in a certain zone of enterprises, adapts to the logistics system pattern of logistics LAN (Local Area Network) oriented mission order fully.
Utilize the logistics LAN (Local Area Network) to the reconfigurability of logistics network unit and the compatibility of data communication, can be the various controllers of large quantities of automatic material flow equipment developments.For example, carry out networking control, and the key equipment of transfer matic in each logistics LAN (Local Area Network) is carried out supporting exploitation the various automated systems in each supplier's in fields such as chemical industry, medicine, pottery, automobile, aircraft manufacturing and foundry industry the factory.
According to the LAN (Local Area Network) principle, any one logistics network unit can carry out interoperability to other logistics network unit in the same logistics LAN (Local Area Network).
4, several logistics LAN (Local Area Network) of certain loglstics enterprise or the excellent machine in the dedicated network all pass through input/output interface separately, are connected with an output/input interface of distinguishing machine respectively; Each distinguishes that machine all is connected with the Internet by router, just sets up into the proprietary logistics system wide area network (Fig. 4) of this enterprise.It is exactly a network logistics.
Network logistics is a kind of logistics system operation mode; Can comprise (Fig. 4) such as browser, server, client computer and database servers.
Each logistics LAN (Local Area Network) all by distinguishing the machine control function, is isolated with the Internet mutually in the network logistics; By distinguishing the control function of machine, make between each logistics LAN (Local Area Network) and utilize the Internet intercommunication again.All logistics LAN (Local Area Network) can both be guaranteed the security of logistics system and validity, reliability and the confidentiality of information; Fundamentally stop some people by network implementation malice or destroy unintentionally etc.
The machine of distinguishing has solved security, authenticity, anonymity and four critical technical problems of separability of information.It is a server class computer.
For mininet, the program module of excellent machine can directly be inserted on the expanded function groove of the machine of distinguishing.The machine of distinguishing directly is connected with protected network.
Network logistics satisfies interactive application and stability requirement; Has interoperability; Can distinguish the different security requirements of each several part of a concrete file; The foundation structure that can use public-key authenticates and encryption key distribution.
In the network logistics, between the main frame, as follows with communicate by letter accurately (Fig. 4) in the different logistics LAN (Local Area Network) by the safety of the Internet:
The information that source end computing machine from the logistics LAN (Local Area Network) sends; Through the excellent machine of source end, arrive the source end " program of scrutiny program " is housed and source ends such as " source end encipherors " is distinguished machine; Through elimination virus with after encrypting; Pass through the Internet; Distinguish machine to the Su Duan that " place end decrypted program " and " program of scrutiny program " etc. are housed; After deciphering and checking virus; Forward the excellent machine of place end to; Arrive place end computing machine at last.Distinguish the information monitoring of machine to turnover logistics LAN (Local Area Network), and the illegal visit to the logistics LAN (Local Area Network) of refusal.
Network logistics can not only be realized remote physical distribution system communication and video monitoring under network environment; And can carry out remote software modification, fault diagnosis to logistics equipment by network, realize team control.
The system backup robotization solution of network logistics can be made up of backup client, active and standby part of server, media server, redundant memory cell and backup management software etc.Backup client typically refers to application program, database or file server; Expression can online storage on reading of data and data are sent to the software portfolio of backup server; Active and standby part server is used for arranging backup and resuming work, and service data deposit medium; Media server is that the instruction according to active and standby part server copies data on the backup medium.Redundant memory cell is data tape, disk or CD etc.
The existing dedicated network of the network interconnection composition of each logistics system at a distance that is distributed in must adopt or rent expensive dedicated line.
Existing fire wall (comprising hardware device, relevant software code and security strategy) or Virtual Private Network (Virtual PrivateNetwork, VPN) technology, adopted " anti-port " technology to capture by hacker (HACK) easily, intruding into the computing machine or the data equipment of the enterprise network of fire wall back, is one of its major defect.Fire wall can't defending computer virus attack, also be one of its major defect.
The network logistics system will be a global-intercommunication, the proprietary wide area network of the modern closely loglstics enterprise of contact.
Between logistics system using computer network such as 5, the logistics of the network logistics of same logistics unit or group of enterprises and this unit transportation, storage keeping, packing move, handling or the dedicated network, by distinguishing that machine links to each other with the Internet and the network of interoperability, be called logistics network (Fig. 5).
Both subsidiary streams systems such as the purchasing of raw materials of certain enterprise, product design and logistics transportation are no less than excellent machine in one the dedicated network, and separately all by distinguishing that machine is connected with the Internet with router, common and network logistics is set up into the logistics network of this enterprise.
In the logistics network, between the main frame of heterogeneous networks, pass through the Internet; Safety and accurately communicate by letter (Fig. 5):
The information that source end computing machine from logistics LAN (Local Area Network) or dedicated network sends; Through the excellent machine of source end, " program of scrutiny program " is housed in arrival and source ends such as " source end encipherors " is distinguished machine; After the elimination virus encryption; Pass through the Internet; Distinguish machine to the Su Duan that " place end decrypted program " and " program of scrutiny program " etc. are housed; After deciphering and checking virus; Forward the excellent machine of place end to; Arrive place end computing machine at last.Like this, distinguishing all for every can be to passing in and out in this network logistics or the information in the dedicated network is monitored, and refusal is illegally to the visit of this logistics network.
The computer network of existing logistics system is not suitable for carrying out virus and detects; Can't defend various virus attack behaviors; It all is its major defect.
On logistics network, the information flow by Internet transmission is through the integrality encryption; Can the guarantee information confidentiality, integrality and authenticity; And ability with opposing assault network.It can also have the function of authentication.
6, the general headquarters of loglstics enterprise and its are distributed in the excellent machine of trans-regional each internal networks such as several branch officeses of diverse geographic location or the excellent machine of proprietary networks such as unit order processing, circulation and process and after sale service, respectively by distinguishing machine and Internet connection, make up a proprietary commercial wide area network of safe and reliable internal institution, be called commerce Net.
The logistics network of enterprise and commerce Net, the common network of forming (comprising the Internet) is called logistics Intranet (Fig. 5).
Between the main frame, as follows with communicate by letter accurately (Fig. 5) in the heterogeneous networks of logistics Intranet by the safety of the Internet:
The information that source end computing machine from excellent machine network sends; Arrive through the excellent machine of source end and " program of scrutiny program " to be housed and source ends such as " source end encipherors " is distinguished machine; Through elimination virus with after encrypting; Pass through the internet; Distinguish machine to the Su Duan that " place end decrypted program " and " program of scrutiny program " etc. are housed; After deciphering; Forward the excellent machine of place end to; Arrive place end purpose computing machine at last.
In the network, each of unit distinguishes that machine is equipped with identical " program of scrutiny program ", " source end encipheror " and " place end decrypted program " standard program in logistics.Like this, distinguish that machine monitors the information that passes in and out excellent machine network for every, and refusal is illegally to the internal institution access to netwoks.
In the logistics Intranet, each of unit distinguishes that machine also can be equipped with identical standard programs such as " to unit authentication and authoring programs ", and these distinguish the Access Control List (ACL) that each Hostname (perhaps address) in other IP address tables of distinguishing machine and each excellent machine network is all arranged in the machine.Like this, distinguish that machine all can monitor the information of the excellent machine network of turnover logistics Intranet for every, and refusal is illegally to the visit of internal institution network.
Existing firewall technology is adopted " anti-port " technology to capture by the hacker easily, intrudes into the computing machine or the data equipment of fire wall back, is one of its major defect.Fire wall can't defending computer virus attack, also be one of its major defect.
7, the logistics network of certain logistics unit or logistics intranets systems, can and the affiliate of this unit internal network between, carry out information interchange and safeguard protection be provided, prevent unauthorized access to this unit logistics network or logistics intranets systems.In order to reach this target, can allow affiliate's the excellent machine of one or several internal networks, by being housed, this unit distinguishes the machine of distinguishing of the standard program of machine, authentication and authoring program respectively, be connected with the Internet.One or several internal networks of the logistics network of this unit or logistics intranets systems and this affiliate link to each other with the Internet by distinguishing machine separately, make up a safe and reliable and information mutual communication proprietary network, are called the logistics extranet (Fig. 5) of unit.
Between two main frames of different logistics Intranets and affiliate's internal network, pass through the Internet; Safety is as follows with accurately communicate by letter (Fig. 5):
The information that source end computing machine from logistics Intranet or affiliate's internal network sends; Through the excellent machine of source end, arrive the source end " program of scrutiny program " is housed and source ends such as " source end encipherors " is distinguished machine; Through elimination virus with after encrypting; Pass through the Internet; Distinguish machine to the Su Duan that " place end decrypted program " and " program of scrutiny program " etc. are housed; After deciphering and checking virus; Forward the excellent machine of place end to; Arrive place end computing machine at last.Like this, distinguish that machine all can monitor the information that passes in and out this logistics Intranet or affiliate's internal network for every, and refusal is illegally to the visit of this logistics extranet.
The existing virtual network technology that outreaches is carried out illegal internal enterprise resources visit and deception for the address that outreaches network or dedicated network by camouflage, and is powerless; Also can't avoid the hacker to get around authentication and authentication scheme, the camouflage identity is destroyed existing inner computer and is connected.
8, the remote client of logistics unit after the Internet is connected, can be logined this unit logistics extranet or logistics Intranet, realizes safe and reliable information interoperability between these networks.The common system that forms in these client computer, logistics extranet or logistics Intranet and the Internet is called logistics unit remote access internet, is called for short logistics visit net (Figure 10).It is by the logistics unit remote client that " program of scrutiny program ", " source end encipheror " and " place end decrypted program " etc. are housed, be connected to after the Internet, with logistics extranet or the common system that forms of logistics Intranet, be used to provide safety and the precise information visit of long-range mobile subscriber to unit logistics extranet or logistics Intranet.
Remote client is equipped with " to the authentication and the authoring program of unit " function etc., can discern the various information of coming in from the internet.It only allows the information of the computing machine in the excellent machine network of source end of this unit, after deciphering, enters into remote client.
Pass through the Internet between the main frame of different logistics Intranets, affiliate's network or remote client; Secure communication (Fig. 5):
The information that source end computing machine from logistics Intranet, affiliate's network or remote client sends; Through the excellent machine of source end, arrive the source end " program of scrutiny program " is housed and source ends such as " source end encipherors " is distinguished machine; Through elimination virus with after encrypting; Pass through the Internet; Distinguish machine to the Su Duan that " place end decrypted program " and " program of scrutiny program " etc. are housed; After deciphering and checking virus; Forward the excellent machine of place end to; Arrive place end computing machine or remote client at last.Distinguish that machine all can monitor the information that passes in and out this logistics Intranet, affiliate's network or remote client for every, and refusal is illegally to the visit of this logistics accesses network.
The method of the granted access that the remote client authentication will realize: the visit information on the Internet, pass through authentication and the mandate of the machine of distinguishing of visit net to this client computer.
Existing remote access vpn technology can't be carried out corresponding safety encipher according to the different safe class of part paragraph in the file; For many address spoofings that carry out illegal internal resource visit by camouflage remote access address, powerless.
The net of the logistics of transmission visit on the internet information flow is through encryption, end-to-end and authentication; Guarantee information confidentiality, integrality and authenticity; Ability with opposing assault network
9, the basic frame structure (Fig. 6) of the government affairs LAN (Local Area Network) of Party committees at all levels and government or the department under it is a multilayered structure; As government affairs extranets, in-house network and three levels of core net.Internet and extranets, extranets and in-house network, in-house network and core net are all carried out isolated controlling by the machine of distinguishing.Wherein the calculation machine of the secret server of each hierarchical network and inner general personnel operation is a logic isolation; According to circumstances, can adopt the non-disk workstation.In a single day when promptly using main frame (client computer or browser etc.), automatic enable logic server, shield the memory devices such as hard disk, CD drive and floppy disk of this main frame, distribute the mirror image hard disk to give main frame by Service Process Server, prevent that the internal staff from arbitrarily duplicating important resource from Intranet.Adopt the non-disk workstation in the special core net, prevent that the internal staff from copying the valuable source in the core net arbitrarily.
The excellent machine of the extranets of each government affairs LAN (Local Area Network) of the whole nation is connected with the internet by distinguishing machine, is built into the proprietary wide area network of government affairs, is called the government affairs internet, is called for short the government affairs net.Wherein small towns government of party committee has only extranets; And there are extranets, in-house network and core net in the Central Committee of the Communist Party of China and State Council.
Operation party committee directly links to each other with the internet with the server that government externally discloses supervision function and responsibility in the government affairs LAN (Local Area Network); Governmental personnel operate the server (www server or ftp server etc.) on these internets, have both guaranteed to talk with on the net with the public and serve; Guarantee that again internal information do not reveal.The main application system of these and the direct-connected server in the Internet: the inquiry of government's public information and issue, economic information inquiry and issue, social information's inquiry and issue, the online tax, online industrial and commercial, online letters and calls, online social security, electronic ID card registration, the registration of logistics enterprise, urban transportation information, various information statistics, declaring and applying for, all kinds of utility information issues and enforcement towards every plan of the whole society.
Between city-level party committee and government administration each (comprising the small towns) at county level party committee and the extranets that have of government (department) down,, make up the proprietary network of safe and reliable and an information mutual communication by the internet; The administrative office network of this outside online operation (comprising the small towns) at county level party committee and government bodies inside.Move all kinds of relatively independent (comprising the small towns) the at county level party committees and the government affairs management and the application system of government on it respectively, its service object mainly is party affairs, government affairs general staff and (comprising the small towns) at county level leader.
Between the in-house network (comprising extranets) by each provincial (comprising city-level) party committee and government (department), respectively by the extranets of internet and this government affairs net, makes up one safe and reliable and believe the proprietary network of intercommunication; It relates to circulation of official document, audit, processing and the interior business etc. of government inside; Official document transmission the in-house network from central authorities to city party committee and government, message exchange and multimedia messages application etc.Its main service object is province, city-level leader and confidential employee.Distinguish on the extranets that the standard program of machine includes the machine of the distinguishing program of the extranets at county level of municipal government's administration.
Between the core net of the Central Committee of the Communist Party of China, the National People's Congress and State Council (comprising its in-house network),, make up the proprietary network of a safe and reliable and information mutual communication by internet, these extranets and in-house network; Core net relates to the very important decision of the Party Central Committee and state leader's core office system, party and state and command system, emergency system, to the government affairs supervision of governments at all levels and the systems such as application of all kinds of core datas.Its main service system: for central authorities leader's affairs are arranged; The analysis of major event, decision-making and commander; The analysis of information such as national security, trade secret or individual privacy and preservation etc.Its service object is central authorities leader and confidential employee.Distinguish on the in-house network that the standard program of machine includes the machine of the distinguishing program of each provincial government.
The Central Committee of the Communist Party of China and State Council have core net, and province, municipal government and the above government organs of city's provincial department level have in-house network, and county, township level government and the above government organs of county's section have extranets.This can also determine according to actual needs.
The government affairs net is based on the level of confidentiality of institute's beared information and application system, and its level of security is divided into multilayer, and adopts and distinguish that machine carries out each layer quarantine measures.
Externally net (or information and service issue layer) is taked unified Network Transmission encrypted tunnel, sets up inner access control rule, dynamic content monitoring and renewal technology automatically, guarantees information integrity and accuracy.
Take unified high-intensity Network Transmission encrypted tunnel at in-house network (or internal application layer); Computer virus control, prevention mechanism and the strict intranet resources visit of setting up the access control rule of each application system inside and covering whole in-house network.
Take very high-intensity Network Transmission encrypted tunnel in core net (or security applications layer).
Existing network government affairs network technology can't be carried out corresponding safety encipher according to the different safe class of part paragraph in the file; For many address spoofings that carry out illegal internal resource visit by camouflage remote access address, powerless; Can't avoid the hacker to get around authentication and authentication scheme, the camouflage identity is destroyed existing the connection.Network government affairs network can't the guarantee information confidentiality, integrality and authenticity; Do not resist the ability of assault network
Government affairs Netcom crosses " source end encipheror ", " place end decrypted program " and the multistage machines of distinguishing such as " programs of scrutiny program " is housed, and can make up the multilayer internal network, to adapt to the different level of security needs of different brackets mechanism; Its on the internet information transmitted through encryption, end-to-end and authentication; Ability with opposing assault network.
10, the network business is the computing machine and the Internet connection of several clients, businessman, and each excellent machine of enterprise and bank of deposit's internal network etc. respectively by distinguishing machine and Internet connection, make up many units proprietary network of a safe and reliable and information mutual communication.This directly by the internet, carry out the network business of safety and accurate online payment, be also referred to as commerce Net (Fig. 7).
It is the commercial operation pattern of online commodity transaction and network payment.Wherein key problem is real-time, safe online transaction and payment.
Transaction such as shopping on the internet, merchandising, auction, logistics receipt and payment are signed a bill and online monetary payoff etc.; Can use the PKI of digital signature and underground client and businessman etc., realize validity authentication each side identity such as online business and logistics business; Can adopt symmetric cryptography key system, carry out the encryption and decryption of information; Can use digital digest (being digital finger-print) algorithm, confirm the true or false of electronic payment information; Can guarantee to participate in client and the bank of deposit, businessman and the bank of deposit thereof of the network business, to the non-repudiation of business or behavior; Businessman can not read client's payment instruction, and bank can not read client's purchase information; Whole online payment and settlement process all is convenient easy-to-use to client, businessman and the bank of deposit, simple procedure; Bank's proprietary network is connected by distinguishing machine with the internet, can ensure the safety of bank's proprietary network; Its safety, client who embodies clients fund utilizes the safety that Web bank concludes the business and the safety of customer privacy.
Existing ecommerce (being the network business) technology by the Internet, for many address spoofings that carry out illegal internal resource visit by camouflage remote access address, powerless; Can't avoid the hacker to get around authentication and authentication scheme, the camouflage identity is destroyed existing the connection.Confidentiality, integrality and the authenticity of its information of can't guaranteeing payment; Do not resist the ability of assault network
The commerce Net information flow, transmission information on the internet is through encryption, end-to-end and authentication; Guarantee information confidentiality, integrality and authenticity; Have the ability of opposing assault network and real-time, safe online transaction and payment.
11, can utilize the machine of distinguishing interconnected, form the logistics internet of dealing with various requirements the logistics network of various difference in functionalitys.
The machine of distinguishing can also be connected with a protected network.A plurality of interfaces of distinguishing machine are connected to a plurality of networks, are called many caves (multihomed) and distinguish machine.In protected network, can also utilize the multistage machine of distinguishing, the higher protected network of level of security is set.The combination of network mode that these are different has embodied the difference in functionality and the safety requirements of each system.
Distinguish the several independent input interface or the output interface of machine, also can be respectively with protected several logistics networks in different excellent machine be connected.
These network interconnection technologies by distinguishing the machine control function, are realized coupled excellent machine network and the isolation between the internet; Again by distinguishing the computer function of machine, realize that each layer at stack carries out safety and accurate information mutual communication between the computing machine among this excellent machine network and the internet.
Existing fire wall shielding main frame technology can't be carried out corresponding safety encipher according to the different safe class of part paragraph in the file; Carry out the ground deception that illegal internal resource is visited for many by camouflage remote access address, powerless; Can't avoid the hacker to get around authentication and authentication scheme, the camouflage identity is destroyed existing the connection.
The machine of distinguishing is interconnected to the logistics network of various not commensurates and function, forms the logistics internet of dealing with various requirements.Its on the internet information transmitted through encryption, end-to-end and authentication; Guarantee information confidentiality, integrality and authenticity; And has an ability of opposing assault network.
Each neck or networking, comprise network factory, travel on the net, network military task, network machinery, network chemical industry, network oil, network exploration, network military project, network manufacturing, network measure, network weaving, network logistics or the like system, all can carry out based on the internet according to method of the present invention equally.And the characteristics of the Internet (Internet) be exactly whenever and wherever possible, convenient easy-to-use, real-time interaction etc.It for the mutual of the information flow of the miscellaneous service of every field, transaction flow, cash flow, logistics etc. with share, round-the-clockly trans-regionally provide good technical support with low-cost processes and transmission.
Description of drawings
Fig. 1 display label schematic diagram.Show to sign and form by microwave antenna, reflecting modulator, scrambler, microprocessor, internal memory and display (being generally LCD) etc.Storage is identified the relevant technologies parameter and the identifying information of thing in showing the storer of signing, and also contains certain additional information.Because label technique and display technique are combined, the function that makes this label have to show the various relevant informations that are identified thing etc.
The principle of reader and display label are basic identical in the identification equipment.
Fig. 2 identification equipment synoptic diagram.The radio frequency device is the equipment that microwave produces, transmits and receives.It mainly partly is made up of radio-frequency oscillator, power amplifier (rf processor), radio frequency receiver, detection detuner and prime amplifier etc.The signal process radio-frequency oscillator that it produces becomes the carrier signal of high frequency, after power amplifier (or rf processor) amplifies, launches by antenna again.
Fig. 3 logistics LAN (Local Area Network) synoptic diagram.It is the excellent machine of Jiang Yitai, some logistics networks unit, computing machine, database server and other logistics system equipment, the LAN (Local Area Network) that directly is formed by connecting by network interface unit and telecommunication cable.The logistics LAN (Local Area Network) has interoperability, portability, extensibility, Ke putting property of Shrink and plug and play feature.It generally is with the distributed principle that is controlled to be, the control structure of employing system, subsystem and module stagewise; Its structure is transplantable and transparent.
Fig. 4 network logistics synoptic diagram.Excellent machine in several logistics LAN (Local Area Network) or the dedicated network all passes through input/output interface separately, distinguishes that with one the machine output/input interface is connected respectively; Each distinguishes that machine all is connected with the Internet by router; Set up into the logistics wide area network.It can either inherit the precious resources of existing logistics system, guarantees the utilization of existing resource and the normal operation of existing internal proprietary network; Can adapt to simultaneously the unified standard of logistic industry again, guarantee the standardization of software, hardware, communication, for enterprise's expansion is in the future allowed some leeway.
Fig. 5 logistics network, logistics Intranet, logistics extranet, logistics visit net synoptic diagram.Logistics network is a network that network logistics and other internal proprietary networks of same logistics unit or group etc. are connected and can interoperability between them.Between two of heterogeneous networks main frames, can pass through the Internet in the logistics network; Carry out safety and communicate by letter accurately.Logistics network can be divided into:
1) logistics Intranet: the general headquarters of loglstics enterprise and its are distributed in the excellent machine of trans-regional each internal networks such as several branch officeses of diverse geographic location, respectively by distinguishing machine, get up with Internet connection, are configured to the logistics Intranet.Each network between the commerce Net can safety and accurately also interconnected, intercommunication, interoperability.
2) logistics extranet: the excellent machine of one or several internal networks of the affiliate of certain loglstics enterprise by the machine of distinguishing of standard program, authentication and authoring program that this enterprise distinguishes machine is housed, is connected with the Internet respectively; One or several internal networks of the intranets systems of this enterprise and this affiliate make up a safe and reliable and information mutual communication proprietary network.
3) logistics visit net: the remote client of loglstics enterprise, after the Internet is connected, can login materials circulation extranet or logistics Intranet, safe and reliable interoperability between realization and these networks; The common system that forms in these client computer, logistics extranet or logistics Intranet and the Internet; Be used to provide safety and the precise information visit of long-range mobile subscriber to materials circulation extranet or logistics Intranet.
The basic frame structure of Fig. 6 network government affairs same area net is: government affairs extranets, in-house network and three levels of core net.Internet and extranets, extranets and in-house network, in-house network and core net all are to be carried out by the machine of distinguishing of different safety class respectively to isolate.The government affairs LAN (Local Area Network) that government affairs extranets, in-house network and core net are formed, internet and the server etc. of inner general personnel operation on it constitute the government affairs net jointly.
Fig. 7 network business is several client computer, business server and Internet connection; The computing machine of enterprise and each excellent machine etc. of bank of deposit's internal network separately respectively by distinguishing machine and Internet connection, make up a safe and reliable internet; It is the commercial operation pattern of online commodity transaction and network payment.
Embodiment
Free, open logistics system network and various combination thereof, can on the various computer platforms of integration, move, can with the network interoperability of other system, and can give owner of cargo enterprise or the people that issues the loan (first party), third-party logistics (Thirt-PartLogistics, TPL) professional person, consignee's (second party) etc. provide a kind of interactive mode of unifying style.
1, display label is formed (Fig. 1) by microwave antenna, reflecting modulator, scrambler, microprocessor, internal memory and display (being generally LCD) etc.The interlock circuit of the radio-frequency receiving-transmitting that display label and reader are made up of radio-frequency antenna, radio receiving transmitting module, wave filter, amplifier etc. respectively.The radiofrequency signal of logistics system transmitting-receiving need be carried out filtering and amplification.The purpose of filtering is to guarantee only to allow the interior signal of frequency band pass through the noise that rejection band is outer; The purpose of amplifying is to improve power to prepare emission or amplify the feeble signal that receives; Radiofrequency signal is changed into digital intermediate frequency signal.Slice microcomputer in display label or the reader (abbreviation single-chip microcomputer) contains identification and Control Software; The digital input interface of LCD receives the TMDS digital signal of TMDS transmitter output; Deliver to the TMDS receiver in the LCD mainboard; The clock signal of its input is delivered to clock generator.The image zoom processor (SCALER) that digital signal is sent to governor circuit through decoding is handled.Treated line synchronizing signal in the LCD governor circuit is sent to phase-locked ring type clock generator circuit, makes the time clock and the locking of line of input synchronizing signal of its generation; Another road be sent to screen show circuit (On Screen Display, OSD).Digital signal is handled through the image zoom processor (SCALER) of the governor circuit of LCD, enable to be fit to the digital signal that liquid crystal board physics is differentiated, together with numeral row/field sync signal, be sent to the liquid crystal board interface circuit, digital video signal be converted to the digital video signal that meets the requirement of liquid crystal board interface circuit.Digital video signal after the liquid crystal board interface circuit will be changed is sent to the timing circuit and the Drive and Control Circuit of liquid crystal board; Drive LCD; Character display, image (Fig. 1) thereon.
The memory capacity of display label is enough to store the full detail of required software, mobile goods and all records of needs up to 64~256KB.Its hardware has voltage and clock detector, the exposure encryption measures such as logic, anti-dissection that crash automatically; Software has encryption methods such as cryptoguard, secure cryptographic algorithm.
The transition minimized differential signaling of display label (Transition Minimized Differential Signaling, TMDS) not only adapt to digital signal interface (the Digital Visual Interface of LCD mainboard, and also need a transmitter and a receiver when carrying out digital transmission DVI).
The liquid crystal display of display label needs and extraneous computing machine intercommunication, so they need provide its identification signal, gives extraneous COMPUTER DETECTION identification.In the input/output interface circuit of LCD, display data passage (Display Data Chnnel, DDC) memory circuitry are set.This storer is that a slice can be wiped and formula ROM (read-only memory) able to programme (EEPROM), stored the display recognition data, be the electronic record data information of display, for example can receive row/field frequency scope, production firm, date, product ID, model, standard indicator pattern and parameter, device data and required data in service or the like.
The DDC storer of display label carries out information mutual communication by DDC serial data pin, DDC serial clock pin and extraneous computing machine, finishes the identification of LCD.Have only extraneous computer Recognition LCD, both could be synchronously, coordinate, stably work.
The digital input interface of the LCD of display label receives the TMDS digital signal that the TMDS transmitter is exported in the extraneous computing machine; Deliver to the TMDS receiver in the LCD mainboard; The clock signal of its output is delivered to clock generator.The image zoom processor that digital signal is sent to governor circuit through decoding is handled.Governor circuit carries out form to received image signal to be judged, image is carried out convergent-divergent processing, framing operation.
Treated line synchronizing signal in the LCD governor circuit of display label is sent to phase-locked ring type clock generator circuit, makes the time clock and the locking of line of input synchronizing signal of its generation; Another road be sent to screen show circuit (On Screen Display, OSD).Screen shows row/field sync signal (HS, VS) that circuit needs, and is not row/field sync signal of directly taking from outside input, but takes from the row/field sync signal of governor circuit output.Even LCD is not when having the signal input, its governor circuit is sent to row/field sync signal that screen shows circuit, the timing data good according to programming in advance, row/the field sync signal that in image zoom processor (SCALER), produces, can guarantee LCD when not having the signal input, also can have normal screen to show and the menu demonstration.
The digital signal of display label is handled through the image zoom processor (SCALER) of the governor circuit of LCD, enable to be fit to the digital signal of liquid crystal board physical resolution, together with numeral row/field sync signal, be sent to the liquid crystal board interface circuit, digital video signal is converted to meets the digital video signal that liquid crystal board draws mouthful circuit requirement.
Digital video signal after the liquid crystal board interface circuit of display label will be changed, is sent to the timing circuit and the Drive and Control Circuit of liquid crystal board at separately (if itself comprises display line/field sync signal) or together with display line/field sync signal; Drive the liquid crystal screen and go up character display, image.
Row/field sync signal that display label receives also has one the tunnel to be sent to microcontroller, and LCD is carried out administration of energy conservation, and the control LCD enters operate as normal, standby, hang-up, closed condition etc.
The LCD of display label is used the DisplayPort interface, can realize cheaply directly drive-type LCD, only needs a connecting line just can all be input to all signals in the video processor of mainboard simultaneously.
Display label is finished after certain task, can return repeated use.Its serviceable life is more than at least 10 years.
Reader in the identification equipment of logistics system and display label software all have encryption, raise the price, modulate and decipher, same software such as decoding, demodulation.Identification equipment also has showing the encryption and decryption software of the secure cryptographic algorithm of signing.It adopts identification code (PIN) to discern the identity of goods.Significant data in the display label also increases message identification code MAC after encrypting.Identification equipment check identification code can be recognized whether display label is distorted, and show on the LCD of knowing knowledge equipment.
Microcontroller in the reader of identification equipment (Fig. 1) contains the main microcomputer basic element of character such as microprocessor, random memory, ROM (read-only memory), interrupt system, timer/counter and I/O and circuit etc.Link together by address bus, data bus and control bus between their circuit, get in touch with by the circuit of input/output interface and extraneous computing machine or controller again.It is a slice microcomputer.It has control on the identification equipment the liquid crystal display displays character and the vital role of image, not only be responsible for coordination and control, and the reading in and storing of burden numeral and parameter to complete machine.
The transition minimized differential signaling that the LCD of reader adopts in the identification equipment not only adapts to the digital signal interface of mainboard on the LCD, and also needs a transmitter and a receiver when carrying out digital transmission.
Because the LCD of reader needs and extraneous computing machine intercommunication in the identification equipment,, give extraneous COMPUTER DETECTION identification so its identification signal need be provided.In the input/output interface circuit of LCD, display data channel memory circuit is set.This storer is that a slice can be wiped and formula ROM (read-only memory) able to programme, storage expanded scope recognition data, be the electronic record data information of display, for example can receive row/field frequency scope, production firm, date, product ID, model, standard indicator pattern and parameter, device data and data in service etc.
The DDC storer of identification equipment carries out information mutual communication by DDC serial data pin, DDC serial clock pin and extraneous computing machine, finishes the identification of LCD.Have only the extraneous high identification LCD of calculating, both could be synchronously, coordinate, stably work.
The digital input interface of the display in the identification equipment receives the TMDS digital signal that the TMDS transmitter is exported in the extraneous computing machine; Deliver to the TMDS receiver in the LCD mainboard; The clock signal of its output is delivered to clock generator.The image zoom processor that digital signal is sent to governor circuit through decoding is handled.Governor circuit carries out form to received image signal to be judged, image is carried out operations such as convergent-divergent processing, framing.
Treated line synchronizing signal in the LCD governor circuit of identification equipment is sent to phase-locked ring type clock generator circuit, makes the time clock and the locking of line of input synchronizing signal of its generation; Another road is sent to screen and is shown circuit.Screen shows row/field sync signal (HS, VS) that circuit needs, and is not row/field sync signal of directly taking from outside input, but takes from the row/field sync signal of governor circuit output.Even LCD is not when having the signal input, its governor circuit is sent to row/field sync signal that screen shows circuit, the timing data good according to programming in advance, row/the field sync signal that in the image zoom processor, produces, can guarantee LCD when not having the signal input, also can have normal screen to show and the menu demonstration.
Digital signal is through the image zoom processor processing on the master control road of LCD in the identification equipment, enable to be fit to the digital signal of liquid crystal board physical resolution, together with numeral row/field sync signal, be sent to the liquid crystal board interface circuit, digital video signal be converted to the digital video signal that meets the requirement of liquid crystal board interface circuit.
Digital video signal after the liquid crystal board interface circuit of identification equipment will be changed, is sent to the timing circuit and the Drive and Control Circuit of liquid crystal board at separately (if itself comprising digital display line/field sync signal) or together with display line/field sync signal; Drive LCD; Character display, image on the liquid crystal screen.
Row/field sync signal that the digital input interface of LCD receives also has one the tunnel to be sent to microcontroller, and LCD is carried out administration of energy conservation, and the control LCD enters operate as normal, standby, hang-up, closed condition etc.
The LCD of identification equipment is used the DisplayPort interface, can realize that cheaply directly the drive-type liquid crystal shows device, only needs a connecting line just can all be input to all signals in the video processor of mainboard simultaneously.
The principle of work of the contactless RFID technology of logistics system is:
The information that identification equipment will send is modulated on the carrier signal of a certain frequency after encrypting, and outwards sends by antenna.The display label that enters this device perform region this pulse signal of meeting sb. at the airport.This signal of relevant circuit in the display label is modulated, is deciphered and decodes, then to judgements such as order, password, authorities.If it is read command, display label are read from storer for information about, encoded, encrypt, after the modulation, send to identification equipment again by antenna; Identification equipment is delivered to its microcomputer and is handled after the information that receives is carried out demodulation, deciphering, decoding.If the write order of the information of modification, the internal charge pump that the relevant controlling signal causes promotes operating voltage, and the content in the flash EEPROM is to make amendment.If through judging that password and authority that it is corresponding are not inconsistent, and then return error message.
Contactless identification equipment mainly is made up of radio-frequency antenna, radio receiving transmitting module, input button and LCD of containing single-chip microcomputer etc.
, can not power by wireless mode, produce the required DC voltage (2~3 volts) of chip operation through the mu balanced circuit in the display label again by identification equipment with the contactless display label of high-energy battery; And receive from (or being sent to) identification equipment wireless signal by radio-frequency interface circuit.
The contactless display label of interior dress high-energy battery is when checking, and identification equipment need not be equipped with battery, can be powered by wireless mode by display label.Circuit in the radio frequency chip is made up of interface circuit, access control and three modules of storer.
The RFID technology is by display label and at a distance of the radio communication between ten centimetres to tens meters display label; Robotization is read process and be need not manual intervention; Can be operated in the various rugged surroundings; General dirt covers on the display label, does not influence the wherein recognition of canned data.The RFID technology can be discerned high-speed moving object, can discern a plurality of display labels simultaneously; Swift and convenient to operate, strong security.
At the critical point that goods is come in and gone out and controlled, the information that identification equipment will send is modulated on the carrier signal of a certain frequency after encrypting, and outwards sends by antenna.When the display label that enters this identification equipment perform region received this pulse signal, the relevant circuit in the display label was modulated, is deciphered and decode this signal, and is judged as read command.Display label reads from storer for information about, and is encoded, encrypt, after the modulation, send to identification equipment again by antenna.Identification equipment is delivered to its microcomputer and is handled after the information that receives is carried out demodulation, deciphering, decoding.Through corresponding routine processes, the identification equipment microprocessor sends write command to showing label; After apparent label was received instruction, the central processing unit computing through self judged whether to be illegal critical point.If not illegal critical point, it allows identification equipment write; Otherwise literal such as " illegal critical points " appears in the write command of its refusal identification equipment, and the sound that gives the alarm on LCD.If password and authority through judging the display label correspondence are not inconsistent, then return various error messages; And on identification equipment, give the alarm, show alert content.
The logistics identification equipment is according to the assembly routine of the logistics system element section task of storage or with ISO (International Standards Organization) (InternationalStandard Organization, ISO) C standard etc., the program and the data thereof of this logistics system element section of writing, control and handle the various functions of logistics equipment, finish the task of this logistics system element section.Owing to adopted single-chip microcomputer, make many logistics system functions that are difficult to realize, can realize by the software and hardware of single-chip microcomputer, improve the Performance And Reliability of logistics equipment.
The hardware configuration of identification equipment is divided into uniprocessor structure and multi-processor structure according to the quantity of CPU.
The uniprocessor structural system is made up of three parts such as central processor CPU, internal storage, input/output interface and signal wire (being generally bus) that they are coupled together.Have only a microprocessor in this system, the whole logistics equipment of centralized control is handled real-time tasks such as programming, management and I/O.It is that special-purpose software is shared by timesharing or interrupt techniques realizes the control of real-time multi-task.
The multi-processor structure system is made up of an above microprocessor that links together by certain physical topology (star-like, ring-type, tree-like and bus etc.) structure circuit.Each processor is born one the function of being no less than of logistics equipment.It can the independent operating assembly routine etc., can pass through communication media line or shared its elsewhere device exchange message of storer again, coordinates step, finishes the logistics system task of logistics equipment in real time.
Adopt the method for this multiprocessor, Linux just can be extended to real-time control system.Simultaneously Linux can also compatible multiple hardwares platform, and can obtain source code.
Linux kernel adopts modular structure, and its main modular comprises: the guiding of storage administration, CPU and management of process, file system management, equipment control and drive software and system, system call etc.The source code of linux kernel is installed in/the usr/src catalogue usually, can offer the user and check and revise.
Can use programmable controller PLC in the logistics.What it was different from multi-purpose computer is: it is specially for logistics on-the-spot field exploitation, has the powerful input/output interface of greater functionality and towards the engineering technical personnel's of every field programming language.PLC is based on its different microcomputers of forming, the difference of counting of interface circuit.For example C28P has 28 points, 16 output interfaces and 12 input interfaces.
The PLC operate as normal also needs supporting with it software.Its hardware and software reliability height, simple, seriation and the universalization easily of programming, modification just can be used for different controlling object a little, and can adapt to abominable logistics system environment.The logistics subsidiary function order that PLC accepted thing stream computing machine sends realizes the sequential control of element section automatic material flow system operational process.In the output module of PLC, have to be directly used in the functional module that drives the forceful electric power coil.In this module, adopted the form of high power transistor and pilot relay to export.So PLC has powerful driving force, generally can both directly drive the coil of carrying out electrical equipment, connect or disconnect the forceful electric power circuit.
The PLC volume is little, in light weight, low in energy consumption, efficient is high, in the switch board of the correlative streaming system of packing into easily, realizes electromechanical integration.
The automatic material flow equipment need be to various material parameter measurements and the control of various switching value.Logistics system link parameter value belongs to multidate information, and not only data volume is big, a multitude of names and complex forms.These logistics system parameters have functions such as follow-ups of quality, guarantee that data accurately and upgrade in time.So the data feedback can be finished by contactless real-time data acquisition system; With guarantee data acquisition in real time, accurately and the data feedback in time.
2, observe (EIA) standard RS-232 of Electronic Industries Association or RS-422 etc., by a multi-purpose computer and some logistics equipments, according to physical topological structure, short distance (line is within 15 meters) is linked together mutually, just constitutes the logistics network unit.
The general employing in logistics network unit all is connected identification equipment in all logistics equipments on the multi-purpose computer.This is a kind of Star topology (startopology) structure.According to specific circumstances, can also adopt annular, tree-like or total topological structure such as linear.
On the connecting line of RS-232 definition, the logistics network cell signal can be transmitted on both direction simultaneously, is exactly full duplex transmission (fullduplex transmisson); If signal transmits on both direction in turn, be exactly half-duplex transmission (half duplex transmisson).
Common computer software in the logistics network unit contains disc operating system (DOS) DOS or UNIX/Linux or Windows etc., Language Processing (as: program compiler etc.) and database and management system thereof etc.The logistics network unit has the processing power of real-time multi-task, and the data layout of holder streaming system task can in time transmit and handle specific tasks, and drives the enforcement of equipment robotization.
Multi-purpose computer generally adopts more than the CPU16 position; More than the main frame frequency 5MHz; The harddisk memory of the above and enough capacity of internal memory 2MB is usually used in depositing the needed fix information of computing machine, the product model data that need as automated programming, logistics system transportation data, logistics system tool data etc.Communication transmission media between it and the logistics equipment is the passage of their transmission information.Rely on this passage, the logistics identification equipment is given in multi-purpose computer convey program and instruction.And the logistics identification equipment returns or passes back the logistics system state and some other information are given multi-purpose computer.Connect with cable by interface circuit between them.
In the logistics network unit, the hardware configuration of multi-purpose computer is divided into uniprocessor structure and multi-processor structure according to needed CPU quantity.
The operating system of multi-purpose computer generally adopts the Linux kernel software.Linux has inherited the design philosophy of UNIX core; Therefore highly effective and safe is stable.Its server continuous operating time generally be with year as unit.Linux supports the multiple hardwares platform.It can be at PC, workstation, even moves on the large scale computer, and can move on the architecture of main flows such as x86/MIPS/PowerPC.Linux is a kind of and the operating system UNIX compatibility.It both can be applied to PC, can be applied to the webserver again.
Linux kernel adopts modular structure, and its main modular comprises: the guiding of storage administration, CPU and management of process, file system management, equipment control and driving, network service and system, system call etc.Linux allows the kernel of user according to the actual disposition customization Linux of own logistics network unit, thereby simplifies linux kernel effectively, improves system start-up speed, and discharges more memory source.
The linux system structure is divided into two attitudes; User's attitude and kernel mode.
In kernel mode, operating system and CR are without any restriction.Program can be carried out all level of privilege instructions, and code can be visited all Installed System Memories.The privilege level of operating system software is higher than application software.By this mechanism, the improper activity of application program can not destroy the stability of system on the whole.
X-Window System can use various window managers, obtains the operation interface of many different-styles.
X-Window System is the project of increasing income, and can obtain source code by network or other approach.
The appearance of X-Window System graphic user interface makes that the operation of Linux is more simple and convenient on the one hand, also provides running environment for many application programs (as PaintShop) on the other hand, enriches the function of Linux.
Common computer software is for the special software of realizing that the every function in logistics network unit is worked out, is also referred to as Control Software.It is in being placed on the EPROM of multi-purpose computer.The function setting and the controlling schemes of various logistics networks unit have nothing in common with each other, and mainly determine according to concrete requirement.
The basic function of logistics network unit is made up of a plurality of functional modules; Different software configurations is also different with way to manage to the arrangement of these functional modules.Its feature is multitask and real-time, and the corresponding software technology that can adopt is that multitask is handled and multiple Real-time Interrupt Processing simultaneously.It is to make multi-purpose computer finish the identical or different work of two or more character at synchronization or in the same time interval that multitask is handled simultaneously.In the multiple Real-time Interrupt Processing system, interrupt management is mainly finished by hardware, and the software configuration of logistics network unit then depends on the interrupt structure of system.The every real-time task in logistics network unit is arranged to other interrupt service routine of different priorities or height order execution according to priority in same interrupt routine.
Adopt the ac digital servomechanism installation of high-speed CPU integrated chip, risc chip, many system control cpus and band high resolution detection element, further improve simultaneously dynamic, the static characteristics of logistics system equipment, can make logistics network unit high speed, high precision and high-level efficiency carry out work.
Emulation technology is used for the analysis design of logistics system task, need set up model by the requirement of modeling, and, check various true process and the danger of logistics network unit in logistics system by the behavioral trait that status tracking or simulation to corresponding model obtain actual logistics system.Simulation method can be used for each stage of each logistics network unit logistics system element section design, combine with model experience mathematics, by the ruuning situation of analogies streaming system, obtain the simulation run data, with the accuracy of the correctness streaming system process of check logistics code.
The input data processor function of multi-purpose computer: the program of reception or fabric streaming system Product transport or logistics system task, the logistics that the logistics program is represented with standard code is that great instruction and data is deciphered, data processing, and assembly routine and data form are in accordance with regulations deposited.Wherein loading routine mainly contains two tasks, and one is from optical mark reader or keyboard input logistics system task, programs and it is left in the task program storer; Another is from the task program storer logistics system program segment to be accessed piecemeal outward, sends into buffer zone, so that decoding is used.
Identical or the different work of two or more character can at one time or be finished in the logistics network unit in the same time interval.This need realize the multi-task parallel processing to each functional module of common computer software.For this reason, can in the common computer software design, adopt the resource timesharing to share parallel processing and the overlapping flowing water parallel processing technique of resource.
Communication transmission media between multi-purpose computer and the logistics equipment is the passage of their transmission information.Rely on this passage, multi-purpose computer transmits through the program of compiling and instruction and gives logistics equipment.And logistics equipment returns or transmit the logistics system state and some other information are given multi-purpose computer.Connect with interface circuit between them.
The logistics network unit is the diversification of loglstics enterprise, is applicable to industry-by-industry in the every field.It by RS-232 and RS-422 serial line interface closely, forms various types of logistics system linear systems row with the logistics equipment of one group of difference in functionality; Carry out the several data exchange with multi-purpose computer.
The logistics network unit uses extensive and VLSI (very large scale integrated circuit), can reduce the failure rate of logistics network unit significantly.It also has the fault diagnosis system of artificial intelligence (AI) function simultaneously, promptly various failure causes and the method for disposal thereof that brainstrust is grasped is stored in the database as knowledge base, with the knowledge base is according to developing software, analyze and search failure cause, proposing the method for fixing a breakdown.
3, logistics LAN (Local Area Network) (Fig. 3) is the product that local area network technology and logistics network monotechnics combine, and depends on the topological structure of shared network.Excellent facility have microprocessor and storer, and input button, display etc. are housed.Its memory integrated circuit has the circuit of data-carrier store (EEPROM), working storage (RAM) and program storage (EPROM).Excellent machine deposit network operating system (Network OperatingSystem, NOS).The resource of its control logistics LAN (Local Area Network), the operation of operation logistics LAN (Local Area Network); And can a plurality of logistics networks of concurrent running unit.
Excellent machine generally adopts more than the CPU32 position; More than the main frame frequency 20MHz; Internal memory 8MB is above and be furnished with the harddisk memory of enough capacity.It is excellent machine server, and the operational network operating system software manages the communication between each logistics network unit, and the resource of management logistics network unit and user are to the use of these resources.
Excellent machine generally adopts wavelength-division, time-division or control in real time; Have processing power multi-functional, multitask, the data layout of holder streaming system task can in time transmit and manage specific tasks, and drives the enforcement of the automatic material flow system of logistics network list.
Each logistics network unit couples together by the communication transmission cable of network interface unit and logistics LAN (Local Area Network), makes can both to intercom mutually between any computing machine and the logistics equipment and can share excellent machine Internet resources (Fig. 3).
NetWare386 has made full use of the microprocessor performance of Intel microcomputer series, is the industrial standard of LAN (Local Area Network).It is a multitask, multiple-user network operating system; Be installed on the excellent machine.The shell of logistics network element memory NetWare (NetWare Sell), user's services request of intercepting logistics network unit, and judged.If to the visit of this logistics network unit, the processing of just request being given the logistics network unit; If, then request is delivered to excellent machine to the request of excellent machine, handle by excellent machine, again the result is sent back to the user.
The multi-purpose computer of excellent machine network or logistics system equipment also can directly communicate with business information by transmission medium and exchanges.
Excellent facility have all logic functions of reading, translating logistics network unit and multi-purpose computer, the various functions of energy identification logistics network unit.
Excellent machine has various standard interface circuit, also has some special interface circuits, so that interconnect with the interface circuit of the residual logistics network of spy unit etc.
Excellent machine also includes excellent machine network is managed, and guarantees its safe and reliable supervisor.The logistics network unit sends the document in the excellent machine network except giving for it, can also be according to the needs of the concrete request of logistics network unit, do some other thing (as the data of input, write database or its data are inquired about, added as processing such as, modification and deletions, and a result who needs is sent to logistics network unit etc.).
The database server of logistics LAN (Local Area Network) stores the logistics system of this enterprise or the data of task among Fig. 3.It in time closes this library file to after the data library file operation, in order to avoid artificial maloperation or other faults take place, and cause the damage of Current Library file.After the list structure definition of database, can make amendment as required.
(Network File System NFS) allows application program to open a telefile to the network file system(NFS) of logistics LAN (Local Area Network), moves to an assigned address hereof, and begins to read and write data in this position.
4, several logistics LAN (Local Area Network) of certain enterprise or the excellent machine in the dedicated network all pass through input/output interface separately, are connected with the machine output/input interface of distinguishing respectively; Each distinguishes that machine all is connected with the Internet by router.This just sets up into the proprietary logistics system wide area network of this enterprise, is also referred to as network logistics (Fig. 4).The machine of distinguishing is generally adopted the CPU figure place more than 32; More than the main frame frequency 20MHz; More than the internal memory 64MB.
Network logistics satisfies interactive application and stability requirement; Has interoperability; Can distinguish the different security requirements of each several part of a concrete file; The foundation structure that can use public-key authenticates and encryption key distribution.
Just in case network logistics suffers virus attack on the Internet, also only distinguish machine paralysis, can't have influence on wherein the network logistics LAN (Local Area Network) and normally move.
The machine of distinguishing also can all external references of detail record; Prevent the unauthorized access of external information on the Internet simultaneously.It makes extraneous excellent machine or computer equipment, for the visit of logistics LAN (Local Area Network), can only concentrate on the machine of distinguishing earlier.This just guarantees the reliable and safety of all excellent machines on the logistics LAN (Local Area Network) or logistics network unit.The machine of distinguishing also allows coupled excellent machine, by the Internet, transmits and and receives the enciphered message of other logistics LAN (Local Area Network) of native system.
In the network logistics, the machine of distinguishing of logistics LAN (Local Area Network) not only contains the program of client computer, (messageauthentication code, MAC) technology is encoded to the transmission data, guarantees to be subjected to the information integrity of malicious attack but also can adopt message authentication codes.Its typical encoding mechanism is cryptographic hash (cryptographic hashing) mechanism.
Backup software provides complete data protection.For example Veritas NetBackup software adopts the level Four hierarchical structure, and centralized management adapts to multiple application structure.Its technical characterstic is that flexible setting, disaster recovery, parallel processing, data are reliable, easy to use, monitoring capacity and system data recovery etc.
For the logistics LAN (Local Area Network) among the network logistics, the miscellaneous service that may handle is placed in online storage (OnStore) equipment at present, guarantees to read at any time these information.For taking precautions against contingent data disaster, use offline storage (OffStore) equipment that these professional data are carried out back-up storage.
Use virtual store (Storage Virtualization) backup management software, a transparent storage system can be provided.According to the instruction of logistics LAN (Local Area Network), automatically the inactive data automatic archiving under the archival back-up catalogue is backuped in nearline storage (NearStore) equipment, the historical data automatic archiving is backuped in the offline storage equipment.
5, in the logistics network (Fig. 5), each distinguishes that machine is equipped with identical " program of scrutiny program ", " source end encipheror " and " place end decrypted program " standard program.Distinguish that machine all can monitor the information that passes in and out excellent machine network for every, and refusal is illegally to the visit of unit logistics network.
For the logistics network that has numerous internal networks, satisfy the requirement of interactive application and stability; Has interoperability; Can distinguish the different security requirements of a concrete file; The foundation structure that can use public-key authenticates and encryption key distribution.
In logistics network, each distinguishes that machine also can be equipped with identical " to unit authentication and authoring program " standard program, and these distinguish the Access Control List (ACL) that each Hostname (perhaps address) in each IP address table of distinguishing machine and each excellent machine network is all arranged in the machine.Like this, distinguish that machine all can monitor the information of excellent machine network of turnover logistics network for every, and refusal is illegally to the visit of internal institution network.
6, in the logistics Intranet (Fig. 5), each of logistics unit distinguishes that machine is equipped with identical " program of scrutiny program ", " source end encipheror " and " place end decrypted program " standard program.Distinguish that machine all can monitor the information of the excellent machine network that passes in and out this logistics unit for every, and refusal is illegally to this internal institution access to netwoks.
In the logistics Intranet, each of unit distinguishes that machine can be equipped with identical " to unit authentication and authoring program " standard program, and these distinguish the Access Control List (ACL) that each Hostname (perhaps address) in each IP address table of distinguishing machine and each excellent machine network is all arranged in the machine.Distinguish that machine all can monitor the information of excellent machine network of turnover the Internet for every, and refusal is illegally to the visit of internal institution network.
7, the excellent machine of one or several internal networks of the affiliate of logistics unit by the machine of distinguishing of this unit " program of scrutiny program ", " source end encipheror " and " place end decrypted program " standard program is housed, is connected with the internet respectively.One or several internal networks of the logistics network of unit or logistics Intranet and the affiliate of this unit so, separately the machine of distinguishing and internet just make up a safe and reliable logistics extranet (Fig. 5).The machine of distinguishing of the logistics network system of affiliate's the machine of distinguishing of identical " program of scrutiny program ", " source end encipheror " and " place end decrypted program " standard program and unit or tissue wherein is housed, the capital is monitored the information that passes in and out excellent machine network, and the illegal visit to logistics network or logistics Intranet of refusal.
In the logistics extranet, each distinguishes the machine of distinguishing that machine is connected with the network of affiliate's appointment, identical " to unit authentication and authoring program " standard program also can be housed, and these distinguish the Access Control List (ACL) of each Hostname (perhaps address) in the network that each IP address table of distinguishing machine and excellent machine network and affiliate's appointment are all arranged in the machine.Like this, distinguish that machine all can monitor the information of the excellent machine network of turnover logistics extranet for every, and refusal is illegally to the visit of internal institution network and affiliate's network.
With the unit or the machine of distinguishing of organizing excellent machine network to be connected, " program of scrutiny program ", " source end encipheror " and " place end decrypted program " etc. are housed, can decipher the various information of coming in from the internet, and only allow the information of the computing machine in the source-end networks of the excellent machine network of other source ends of this unit or tissue or affiliate's appointment, after deciphering, enter into the receiving computer of the excellent machine network of this place end.
The machine of distinguishing that is connected with the network of affiliate's appointment, " program of scrutiny program ", " source end encipheror " and " place end decrypted program " function etc. are housed, can decipher the various information of coming in from the internet, and the computerized information in the excellent machine network of the source end that only allows this unit or tissue, after deciphering, enter into affiliate's the excellent machine of place end, be transmitted to receiving computer again.
In logistics network, each of unit or tissue distinguished the machine of distinguishing that machine is connected with the network of affiliate's appointment, identical " to unit or organize the authentication authoring program " standard program also can be housed, and these distinguish the Access Control List (ACL) of each Hostname (perhaps address) in the network that each IP address table of distinguishing machine and excellent machine network and affiliate's appointment are all arranged in the machine.Distinguish that machine all can monitor the information of the excellent machine network of turnover logistics outer network for every, and refusal is illegally to the visit of unit or organization internal network and affiliate's network.
8, " program of scrutiny program " of logistics unit, the common system that forms in remote client, logistics network and internet of " source end encipheror " and " place end decrypted program " supervisor are housed, are logistics visit net (Fig. 5).Remote client can be logined the logistics network of this logistics unit with after the internet is connected.The machine of the distinguishing function of user's remote client and this unit logistics network sends the user or the information that receives is transmitted guarantee information transmission safety reliability on the internet by ciphertext.
Between the logistics Intranet or extranet in order to ensure remote client and logistics unit, carry out interoperability, also can adopt high data encryption of Cipher Strength and identity identifying method by the internet.General public key algorithm (the Public-Key Crypto-graphic Algorithms) technology that adopts is carried out authentication and key change; Adopt the symmetric cryptography decryption technology to carry out the encryption and decryption of information.
Remote client is equipped with " the unit identity is recognized authoring program " function; The machine of distinguishing of unit logistics network is equipped with after " to user's authentication and authoring program " function, and each of remote client and unit distinguished the Access Control List (ACL) of each Hostname (perhaps address) in IP address table that these client computer far away is all arranged in the machine and distinguish machine and the excellent machine network that is allowed to visit.User's remote client and unit logistics network are distinguished the function of machine, the user are sent or the information that receives is transmitted by ciphertext on the internet, and guarantee information transmission safety reliability prevents that significant data is stolen on the internet.
Be equipped with " to user's authentication and the authoring program " that be connected with the excellent machine network of the logistics Intranet of logistics unit (Fig. 5) distinguishes machine, " to the authentication and the authoring program of unit " remote client perhaps is housed, can encrypt various information, and the information of excellent machine network of the source end that only allows this unit and remote client, after encrypting, enter into the internet.
The machine of distinguishing that is connected with the excellent machine network of logistics unit, " to user's authentication and authoring program " function etc. is housed, can discerns the various information of coming in, and only allow the information of remote client from the internet, after deciphering, enter into the excellent machine network of this place end receiving computer.
Remote client is equipped with " to the authentication and the authoring program of unit " function etc., can discern the various information of coming in from the internet.It only allows the information of the computing machine in the excellent machine network of source end of this unit, after deciphering, enters into remote client.
Main frame in (outward) networking in the remote client of logistics visit net and the logistics is by carrying out safety and communicate by letter accurately in the internet.Being used to provide the secure access of long-range mobile subscriber to unit logistics Intranet, is the private of non-permanent haulage line; For multi-form access technique,, just can realize this technology as long as upgrade the access strategy of dedicated network.
9, the basic frame structure (Fig. 6) of the network government affairs LAN (Local Area Network) of its affiliated department of Party committees at all levels and the person of government is: government affairs extranets, in-house network and three levels of core net.Wherein internet and extranets, extranets and in-house network, in-house network and core net all are to be carried out by the machine of distinguishing respectively to isolate.Some network government affairs LAN (Local Area Network) has only extranets or extranets and in-house network; Perhaps multi-level in-house network structure.Excellent machine in each network government affairs LAN (Local Area Network) is connected with the machine of distinguishing; Each distinguishes that machine is connected with same common network (being generally the internet) again, just is built into the government affairs net
General internal work personnel server on the internet lines of government affairs net is the computing machine that general internal work personnel are direct and the public exchanges visits.It comprises the application service door of WWW (Web) and all kinds of service application modules of client/server (C/S) structure.These servers directly with the internet on public's browser, workstation and interworking server, carry out information interoperability with plaintext with the public by the internal work personnel.
The process (Fig. 6) of the information interoperability between each extranets:
Extranets source end sending computer will send information, be given to the outside network optimization machine of source end, the Internet sources end is distinguished machine; After encrypting, be given to the internet of Su Duan by the internet and distinguish machine; This is distinguished after the machine deciphering, is given to the excellent machine on the end extranets of place, is given to the computing machine of accepting of place end extranets again.
Server on online each extranets of government affairs is installed the inner program of doing of office of party committee and government respectively.The machine of distinguishing on the internet, the machine of the distinguishing program module that standard is housed needs extranets system cipher key shared, public-key cryptography and the private cipher key etc. of interoperability with each, only need oneself key and private key are holded in close confidence management, the information security and the accurate interoperability of computing machine between each extranets just can be provided.Divulge a secret in case find private key, must change private key and PKI immediately.The internal work personnel must use browser, workstation and server.
The process (Fig. 6) of the information interoperability between each in-house network:
In-house network source end sending computer will send information, be given to the excellent machine of source end, extranets source end end is distinguished machine; The source end is distinguished machine with information encryption, and source terminal machine, the Internet sources end be given on the extranets are distinguished machine; After encrypting once more, be given to the internet of Su Duan by the internet and distinguish machine; After this distinguishes that machine is deciphered for the first time, be given to the machine of distinguishing on the end extranets of place; After deciphering for the second time, become expressly; Be given to the excellent machine of in-house network, be given to the computing machine of accepting of place end in-house network again.
Data server on the in-house network, the computing machine of Service Process Server and general internal staff's operation is the client/server architecture of multilayer.It makes the in-house network of government affairs net to have very strong retractility, robustness and maintainability; Can realize the flexible configuration of application service; With the independent independent deployment of service logic, this system is maintained easily.
When the interior business of certain one-level government and functional change, as long as the business logic components of disposing is concentrated in the middle layer, carry out updating maintenance, just can realize the maintenance of this system.
The client/server architecture of this multilayer also can be applied to extranets or core net etc.
Confidential employee's server or workstation on the in-house network circuit of government affairs net are the computing machines that inner confidential employee is direct and other in-house networks are exchanged visits.
Information interoperability between each core net is guaranteed to be perfectly safe and is accurate.
The process (Fig. 6) of the information interoperability between each core net:
Source end sending computer will send information, be given to in-house network source end and distinguish machine; With information encryption, be given to the source end of the excellent machine of in-house network source end, extranets and distinguish machine; This distinguishes that machine encrypts information once more, and the excellent machine of source end, the Internet sources end be given on the extranets are distinguished machine; After encrypting for the third time,, be given to the internet of Su Duan and distinguish machine by the internet; After this Su Duan distinguished that machine is deciphered for the first time, the Su Duan that is given on the extranets distinguished machine; After deciphering for the second time, the Su Duan that is given to in-house network distinguishes machine, after the deciphering, becomes expressly for the third time; Be given to core net place termination and receive computing machine.
Extranets, in-house network, core network system, three keys sharing respectively and the three pairs of public-key cryptography and private cipher key etc. only need hold management in close confidence to the key and the private key of own application.
Distinguish that machine attacked deadlock even the internet of " program of scrutiny program ", " source end encipheror " and " place end decrypted program " etc. is housed, the machine of distinguishing of backup can move immediately.
10, with the proprietary net of computing machine, unit of client, businessman and the network of the bank of deposit separately, link to each other with the internet respectively, constitute commerce Net (Fig. 7).Commerce Net carries out online transaction and payment on open internet, should adopt digital encryption and authentication (digital signature) technology.The general public key algorithm that adopts.Wherein the close algorithm of Chang Yong PKI is a RSA Algorithm.
Businessman, the Hakkas and bank's all covert new method of pair of secret keys (PKI and private key) are separately adopted in commercial affairs online transaction and payment.The buyer in the commerce Net has certain deposit, PKI, password and client's network address the bank of deposit (calling customer bank in the following text), and knows the PKI of this bank; Customer bank is known the PKI of bank of businessman.The seller has password, PKI and the network address of businessman in advance the bank of deposit (calling bank of businessman in the following text), and knows the PKI of this bank; There are clearing account number, password in bank of businessman at customer bank, and knows the PKI of customer bank;
The network trading of the network business (Fig. 7) and the basic procedure of network payment:
(1) client computer (perhaps browser) connects the internet, carries out browsing, select and ordering of commodity with Web browser, fills in network order (comprising the customer bank title); Submit order to businessman on the net.
(2) business server is to client's ordering information, check, confirm that with the private key of businessman the PKI of businessman and businessman's account No. are encrypted, ciphertext is as businessman's digital signature, with each commodity price, total price, businessman's Bank Name, pass to the client together on the net.
(3) after client's confirmation, with private key to its account number and password encryption at customer bank, ciphertext is as client's digital signature, with client's digital signature and businessman's digital signature, Payment Amount, bank of businessman, client's PKI etc., with the public key encryption of customer bank, and these ciphertexts are passed to customer bank.
(4) customer bank with decrypt ciphertext, obtains plaintext, the digital signature of businessman and client's digital signature that the client sends with the private key of oneself; With the client's PKI in the plaintext client's digital signature is decrypted then.The data that customer accounting code after customer bank will be deciphered, password and client retain is checked, and just is confirmed to be the information that the client sends after errorless.
(5) customer bank is with clearing number of the account, the password of bank of businessman at customer bank, with the encrypted private key of oneself, as the customer bank digital signature; With the digital signature of collection amount, customer bank digital signature, businessman etc.,, send to bank of businessman then with bank of businessman public key encryption.
(6) after the ciphertext of customer bank is received by bank of businessman, with decrypt ciphertext, obtain cleartext information and digital signature thereof that customer bank sends with oneself private key, with the customer bank PKI client's digital signature is decrypted then, if success is confirmed to be then that customer bank sends.Bank of businessman is decrypted businessman's digital signature with the PKI of businessman again, if success is confirmed to be then that businessman sends.
(7) bank of businessman with the businessman PKI to after Merchant ID, the password encryption and businessman's amount receivable send businessman together to.After information is received by businessman, with the private key deciphering of oneself.If it is correct that businessman confirms own amount receivable and businessman's account number, password, then goods is sent to the client, service perhaps is provided.
(8) client receives goods, after perhaps accepting to serve, will confirm with the PKI of customer bank to send to customer bank after the information and password encryption of payment.Customer bank uses the private key of oneself with decrypt ciphertext, obtains the client and sends the information and the password of accept money really.Customer bank deducts the shopping money with the client in the account of this bank, bank of businessman is increased this money in the balance account of customer bank, and informs that bank of businessman increases the shopping money on its merchant account.Bank of businessman and customer bank were settled accounts in the designated time.
So far, typical electronic business transaction and online payment process finish.Businessman and client can be by the balance of fundings of network inquiry oneself.
11. the structure of protected network and the deployment that " program of scrutiny program ", " source end encipheror " and " place end decrypted program " wait the machine of distinguishing is housed is the basis of the logistics unit internal network security of each difference in functionality of realization.The machine of distinguishing passes through its control function, realizes the information isolation between two coupled networks; Again by its computer control function, realize carrying out the function of safety and accurate information interoperability between the computing machine among these two networks.The interconnected output interface of distinguishing is connected with excellent machine input interface.The input interface of distinguishing machine is connected with excellent machine output interface.Distinguish the input interface and the output interface of machine, be connected in parallel on its same bus, but independently of one another, uncorrelated mutually; Have only by distinguishing the control of machine, information could intercommunication between two networks of its connection.
This multi-purpose computer must be installed the function program of some standards.It can also increase some other functional programs are installed according to the needs of setting up the difference in functionality network simultaneously.
If many caves distinguish machine and be used for sometimes increasing that network reliability---an excellent machine network breaks down, the machine interface of distinguishing still can be with second excellent machine network, connects to arrive common network.It also can be used for increasing network performance---and connect a plurality of excellent machine networks, make the router that it can directly send information and avoid blocking sometimes.Many caves distinguish that machine has a plurality of internet protocol addresses, and each network connects one.Each internet protocol address, sign be that this distinguishes being connected of machine and a network.
The machine of distinguishing can be by special safety practice, protects that system in the excellent machine network avoids having a mind to or destroys unintentionally.Account of its main users and password; For the application program of excellent machine network and function software add new characteristic, improve function, revise wrong and remedy newfound security breaches, check out that the attack of failure is attempted and the account of Duoing than other account login failure number of times etc. from the record daily record of distinguishing machine.
Utilization distinguishes that machine connects internal lan of certain service unit (or private) and the Internet, just can make up the proprietary wide area network of the reliability and the validity of this service unit.The networking of every field, comprise network factory, travel on the net, network military task, network machinery, network chemical industry, network oil, network exploration, network military project, network manufacturing, network measure, network weaving, network logistics or the like system, all can carry out based on the internet safely according to method of the present invention equally.And the characteristics of the Internet (Internet) be exactly whenever and wherever possible, convenient easy-to-use, real-time interaction etc.It for the mutual of the information flow of the miscellaneous service of every field, transaction flow, cash flow, logistics etc. with share, round-the-clockly trans-regionally provide good technical support with low-cost processes and transmission.

Claims (10)

1, a) the total technical characterictic of display label technology and existing label technique: form by microwave antenna, reflecting modulator, scrambler, microprocessor, internal memory etc.; Storage is identified the relevant technologies parameter and the identifying information of thing in storer, also contains certain additional information; Scrambler has the function of the data of writing, and can onlinely finish; Also can be that off-line is finished.Its technical characterictic: have display (being generally LCD), label technique and display technique are combined, make this label have to show the function of the various relevant informations be identified thing etc.; Can show various logistics informations.
B) the total technical characterictic of the technology of identification equipment technology and existing logistics ground identification equipment: adopt the uniprocessor structural system; This system is made up of a microprocessor that links together by certain physical topology (star-like, ring-type, tree-like and bus etc.) structure circuit.Its technical characterictic is: can adopt the multi-processor structure system; Each processor is born one the function of being no less than of logistics identification equipment; It can the independent operating assembly routine etc., can pass through communication media circuit or shared storer and other processor exchange messages again, coordinates step, finishes the task that the logistics identification equipment is born in real time.
2, the total technical characterictic of logistics local area network technology and active computer logistics local area network technology: adopt local area network technology, the LAN (Local Area Network) that directly is formed by connecting by network interface unit and telecommunication cable; Be on the computer operating system of server category, to increase the needed function of network as network operating system; User's shared resource by the computing machine logistics of networking; Realize internal resource and information sharing.Its technical characterictic is: be made up of excellent machine, some Logistic Units etc., adapt to the production model of the oriented mission order of loglstics enterprise.
3, the total technical characterictic of network logistics technology and active computer logistics dedicated network technology: can not only under network environment, realize remote production and video monitoring; And can carry out remote software modification, fault diagnosis to Logistic Unit or logistics equipment by network, realize team control.Its technical characterictic:, by input/output interface, be connected with an output/input interface of distinguishing machine respectively separately by some excellent machines; Each is distinguished that machine all is connected with the Internet by router and forms wide area network, is a global-intercommunication, gets in touch the proprietary wide area network of robotization of loglstics enterprise closely, defends various virus attacks fully.
4, the total technical characterictic of the network technology of the special use of logistics network technology and active computer logistics: computing machine or its network and the specific computer network of subsidiary functions such as the goods buying of certain loglstics enterprise, packing loading and unloading and freight transportation, form wide area network jointly.Its technical characterictic: be no less than the excellent machine in one the auxiliary dedicated network, separately all by distinguishing that machine is connected with the Internet with router, common and network logistics composition wide area network; Defend various virus attacks fully.
The total technical characterictic of 5, logistics intranet technology and active computer logistics and commercial dedicated network technology: the computing machine of functions such as the order processing of certain loglstics enterprise, cargo tracking, transportation service or the computer network of its network and logistics function, form wide area network jointly.Its technical characterictic: the general headquarters of logistics unit and its are distributed in the excellent machine of dedicated networks such as the excellent machine of trans-regional each internal networks such as several branch officeses of diverse geographic location and unit order processing, cargo tracking, transportation service, the wide area network by distinguishing that machine and Internet connection get up to constitute respectively; Can do not adopted " anti-port " technology to capture by the hacker.
6, the total technical characterictic of logistics extranet technology and active computer logistics special external network technology: the internal network system of certain logistics unit, can and the affiliate of this unit internal network between, form wide area network jointly; Its technical characterictic: allow affiliate's the excellent machine of one or several internal networks, the machine of distinguishing of information encryption, authentication and the authoring program by this unit is housed respectively, be connected with the Internet, one or several internal networks of the logistics network of this unit or logistics intranets systems and this affiliate are formed wide area network jointly; By tracing system, the feedback of logistics service quality is dissolved in each link of research and development and business, obtain the better services quality by improving.
7, the total technical characterictic of logistics visit network technology and existing Telnet technology: the remote client of logistics unit, after the Internet is connected, can login the internal institution network; Its technical characterictic:, be connected to after the Internet and logistics extranet or logistics Intranet are formed wide area network jointly by the unit remote client that " program of scrutiny program ", " source end encipheror " and " place end decrypted program " etc. are housed; The net of the logistics of transmission visit on the internet information flow is handled by information encryption, end-to-end and authentication; Guarantee information confidentiality, integrality and authenticity.
8, the total technical characterictic of network government affairs technology and existing E-Government technology: both guaranteed to talk with on the net with the public and serve; Guarantee that again internal information do not reveal.Its technical characterictic: the basic frame structure of the network government affairs LAN (Local Area Network) of Party committees at all levels and government or the department under it is: government affairs extranets, in-house network and three levels of core net; Internet and extranets, extranets and in-house network, in-house network and core net are respectively by distinguishing machine control function implementation isolation or linking to each other; Excellent machine in several the national E-Government LAN (Local Area Network) that distribute is connected with the internet by distinguishing machine, is built into the government affairs net; Based on the level of confidentiality of institute's loaded information and application system, its level of security is divided into multilayer, can adopt the machine of distinguishing to carry out the physical isolation measure; Information on each extranets can interoperability; Information on each in-house network can interoperability; Information on each core net can interoperability.
9, the total technical characterictic of network business technology and existing e-commerce technology: transaction such as shopping on the internet, merchandising, auction and online monetary payoff etc.The technical characterictic of commerce Net: with the internal network of the computing machine of client, businessman, enterprise and the network of the bank of deposit separately, link to each other with the internet respectively, constitute commerce Net; Can use the methods such as PKI of digital signature and underground client and businessman, realize validity authentication network trade transaction each side identity; Can adopt the symmetric key system, carry out the encryption and decryption of information; Can use digital digest (being digital finger-print) algorithm, confirm the true or false of payment electronic information; Can guarantee to participate in client and the bank of deposit, businessman and the bank of deposit thereof of ecommerce, to the non-repudiation of business or behavior; Businessman can not read client's payment instruction, and bank can not read client's purchase information; Whole online payment and settlement process all is convenient easy-to-use to the client businessman and the bank of deposit, simple procedure; Bank's proprietary network is connected by distinguishing machine with the internet, can ensure the safety of bank's proprietary network; Its safety, client who embodies clients fund utilizes the safety that Web bank concludes the business and the safety of customer privacy;
The transaction of the network business and the basic procedure of payment:
(1) client computer (perhaps browser) connects the internet, carries out browsing, select and ordering of commodity with Web browser, fills in network order (comprising the customer bank title); Submit order to businessman on the net;
(2) business server is to client's ordering information, check, confirm that with the private key of businessman the PKI of businessman and businessman's account No. are encrypted, ciphertext is as businessman's digital signature, with each commodity price, total price, businessman's Bank Name, pass to the client together on the net;
(3) after client's confirmation, with private key to its account number and password encryption at customer bank, ciphertext is as client's digital signature, with client's digital signature and businessman's digital signature, Payment Amount, bank of businessman, client's PKI etc., with the public key encryption of customer bank, and these ciphertexts are passed to customer bank;
(4) customer bank with decrypt ciphertext, obtains plaintext, the digital signature of businessman and client's digital signature that the client sends with the private key of oneself; With the client's PKI in the plaintext client's digital signature is decrypted then.The data that customer accounting code after customer bank will be deciphered, password and client retain is checked, and just is confirmed to be the information that the client sends after errorless;
(5) customer bank is with clearing number of the account, the password of bank of businessman at customer bank, with the encrypted private key of oneself, as the customer bank digital signature; With the digital signature of collection amount, customer bank digital signature, businessman etc.,, send to bank of businessman then with bank of businessman public key encryption;
(6) after the ciphertext of customer bank is received by bank of businessman, with decrypt ciphertext, obtain cleartext information and digital signature thereof that customer bank sends with oneself private key, with the customer bank PKI client's digital signature is decrypted then, if success is confirmed to be then that customer bank sends.Bank of businessman is decrypted businessman's digital signature with the PKI of businessman again, if success is confirmed to be then that businessman sends;
(7) bank of businessman with the businessman PKI to after Merchant ID, the password encryption and businessman's amount receivable send businessman together to.After information is received by businessman, with the private key deciphering of oneself.If it is correct that businessman confirms own amount receivable and Merchant ID, password, then goods is sent to the client, service perhaps is provided;
(8) client receives goods, after perhaps accepting to serve, will confirm with the PKI of customer bank to send to customer bank after the information and password encryption of payment.Customer bank uses the private key of oneself with decrypt ciphertext, obtains the client and sends the information and the password of accept money really.Customer bank deducts the shopping money with the client in the account of this bank, bank of businessman is increased this money in the balance account of customer bank, and informs that bank of businessman increases the shopping money on its merchant account.Bank of businessman and customer bank were settled accounts in the designated time;
So far, typical electronic business transaction and online payment process finish.Businessman and client can be by the balance of fundings of network inquiry oneself.
10, utilization distinguishes that machine connects LAN (Local Area Network) of certain service unit (or private) and the Internet, can make up the safe and reliable wide area network of this unit.The networking of every field, comprise network factory, travel on the net, network military task, network machinery, network chemical industry, network oil, network exploration, network military project, network manufacturing, network measure, network weaving, network data base and online game or the like system, all can carry out based on the internet according to the method for network logistics of the present invention equally.And the characteristics of the Internet (Internet) be exactly whenever and wherever possible, convenient easy-to-use, real-time interaction etc.It for the mutual of the information flow of the miscellaneous service of every field, transaction flow, cash flow, logistics etc. with share, round-the-clockly trans-regionally provide good technical support with low-cost processes and transmission.
CN200910112443A 2009-09-01 2009-09-01 Network logistics Pending CN101639889A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910112443A CN101639889A (en) 2009-09-01 2009-09-01 Network logistics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910112443A CN101639889A (en) 2009-09-01 2009-09-01 Network logistics

Publications (1)

Publication Number Publication Date
CN101639889A true CN101639889A (en) 2010-02-03

Family

ID=41614863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910112443A Pending CN101639889A (en) 2009-09-01 2009-09-01 Network logistics

Country Status (1)

Country Link
CN (1) CN101639889A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101825890A (en) * 2010-03-25 2010-09-08 刘文祥 Object network
WO2011091558A1 (en) * 2010-01-13 2011-08-04 Liu Wenxiang Network service
CN103310319A (en) * 2013-05-11 2013-09-18 苏州才子佳人文化传播有限公司 Mobile mall logistics management system user management module
CN104008355A (en) * 2014-06-06 2014-08-27 中山大学 RFID reader anti-collision resource quadratic programming method
CN104253691A (en) * 2013-09-25 2014-12-31 深圳市华傲数据技术有限公司 Logistics information transmission method, device and system
CN108737113A (en) * 2018-06-08 2018-11-02 北京计算机技术及应用研究所 A method of tracking sensitive articles visiting abroad situation
CN110112870A (en) * 2019-06-11 2019-08-09 上海电机系统节能工程技术研究中心有限公司 A kind of stator and rotor of view-based access control model identification attach together system
CN111882282A (en) * 2020-08-04 2020-11-03 广东货多多物流科技股份有限公司 Shipping cargo matching method, device, equipment and storage medium
CN112783121A (en) * 2020-12-31 2021-05-11 南通市天赫软件科技有限公司 Remote control method and device for automatic textile equipment
CN113222491A (en) * 2021-03-22 2021-08-06 刘智和 Method for constructing network logistics

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011091558A1 (en) * 2010-01-13 2011-08-04 Liu Wenxiang Network service
CN103081411A (en) * 2010-01-13 2013-05-01 刘文祥 Network service
CN101825890A (en) * 2010-03-25 2010-09-08 刘文祥 Object network
CN103310319A (en) * 2013-05-11 2013-09-18 苏州才子佳人文化传播有限公司 Mobile mall logistics management system user management module
CN104253691A (en) * 2013-09-25 2014-12-31 深圳市华傲数据技术有限公司 Logistics information transmission method, device and system
CN104253691B (en) * 2013-09-25 2018-01-23 深圳市华傲数据技术有限公司 A kind of logistics information transmission method and its device and system
CN104008355A (en) * 2014-06-06 2014-08-27 中山大学 RFID reader anti-collision resource quadratic programming method
CN104008355B (en) * 2014-06-06 2017-07-28 中山大学 A kind of RFID reader anticollision resource secondary planing method
CN108737113A (en) * 2018-06-08 2018-11-02 北京计算机技术及应用研究所 A method of tracking sensitive articles visiting abroad situation
CN108737113B (en) * 2018-06-08 2021-08-03 北京计算机技术及应用研究所 Method for tracking external visit condition of sensitive article
CN110112870A (en) * 2019-06-11 2019-08-09 上海电机系统节能工程技术研究中心有限公司 A kind of stator and rotor of view-based access control model identification attach together system
CN111882282A (en) * 2020-08-04 2020-11-03 广东货多多物流科技股份有限公司 Shipping cargo matching method, device, equipment and storage medium
CN111882282B (en) * 2020-08-04 2023-08-04 广东货多多物流科技股份有限公司 Shipping cargo matching method, device, equipment and storage medium
CN112783121A (en) * 2020-12-31 2021-05-11 南通市天赫软件科技有限公司 Remote control method and device for automatic textile equipment
CN112783121B (en) * 2020-12-31 2022-08-30 江苏英迈杰机械有限公司 Remote control method and device for automatic textile equipment
CN113222491A (en) * 2021-03-22 2021-08-06 刘智和 Method for constructing network logistics

Similar Documents

Publication Publication Date Title
CN101639889A (en) Network logistics
Hassija et al. A survey on supply chain security: Application areas, security threats, and solution architectures
CN112036901A (en) Method for protecting supply chain data in block chain and system for recording supply chain information
US20100241467A1 (en) Secure commerce and asset/supply chain management system
Zhang et al. Security and trust issues on digital supply chain
US20170169422A1 (en) Digital Token System for Physical Medium Digitalization and Physical Store Optimization
CN102104589A (en) Private network series
Zelbst et al. RFID for the Supply Chain and operations professional
TW201104611A (en) Identity verification system for monitoring and authorizing transactions
Wang et al. Research on medical waste supervision model and implementation method based on blockchain
Green et al. Blockchain technology and maritime shipping: A primer
CN101615318A (en) E-payment system and device thereof
Kim et al. Role of blockchain technology in IoT applications
Khan et al. Digital transformation for improved industry and supply chain performance
Dash et al. HCSRL: hyperledger composer system for reducing logistics losses in the pharmaceutical product supply chain using a blockchain-based approach
US11836688B1 (en) Method and apparatus to tokenize natural resources
Parry Blockchain technology: enabling decentralized and secure industrial processes in industry 5.0
Vaculík et al. Possibility of RFID in conditions of postal operators
Cavaliere et al. Leveraging Blockchain and Distributed Systems for Improved Supply Chain Traceability and Transparency
Pustokhina et al. Implementation of blockchain technology in supply chain management
Kumarswamy et al. Leveraging Blockchain Technology to Establish a Transparent and Counterfeit-Resistant Pharmaceutical Supply Chain.
Alsafran et al. Solution of iot security and privacy challenges: A systematic literature review
CN110310073A (en) A kind of operation system in mini storehouse
Anu et al. Blockchain-powered authentication and supply chain integration to combat counterfeit drugs
Henninger et al. Distributed Interoperable Records: The Key to Better Supply Chain Management. Computers 2021, 10, 89

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100203