Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of one or more embodiments of the specification, as detailed in the claims which follow.
It should be noted that: in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described herein. In some other embodiments, the method may include more or fewer steps than those described herein. Moreover, a single step described in this specification may be broken down into multiple steps for description in other embodiments; multiple steps described in this specification may be combined into a single step in other embodiments.
As shown in fig. 1, an exemplary embodiment of the present specification provides a block chain based privacy transaction method. The block chain described in this embodiment may specifically refer to a P2P network system having a distributed data storage structure, where each node device is implemented by a common knowledge mechanism, data in the block chain is distributed in temporally consecutive blocks (blocks), and a subsequent block includes a data digest of a previous block, and full backup of data of all or part of the node devices is implemented according to different specific common knowledge mechanisms (e.g., POW, POS, DPOS, PBFT, etc.). As is well known to those skilled in the art, since the blockchain system operates under a corresponding consensus mechanism, data that has been included in the blockchain database is difficult to be tampered with by any node device, for example, a blockchain with Pow consensus is adopted, and it is possible to tamper with existing data only by an attack that requires at least 51% of effort on the whole network, so the blockchain system has the characteristics of guaranteeing data security and anti-attack tampering that are compared with other centralized database systems.
The transaction (transaction) described in this specification refers to a piece of data that is created by a user through a node device of a blockchain and needs to be finally issued to a distributed database of the blockchain. The transactions in the blockchain are classified into narrow transactions and broad transactions. A narrowly defined transaction refers to a transfer of value issued by a user to a blockchain; for example, in a conventional bitcoin blockchain network, the transaction may be a transfer initiated by the user in the blockchain. While a broad transaction refers to an arbitrary piece of data that a user issues to a blockchain: for example, an operator may build a federation chain based on actual business requirements, and rely on the federation chain to deploy some other types of online businesses unrelated to value transfer (e.g., a house renting business, a vehicle scheduling business, an insurance claim settlement business, a credit service, a medical service, etc.), in which a transaction may be a business message or a business request with a business intention issued by a user in the federation chain; as another example, in an account-type blockchain, the transaction may also be data (e.g., account balance, etc.) sent by the user to the blockchain to alter the user's account status. Therefore, any data issued by a user to the distributed database of the block chain, whether the data is stored in the block of the block, the block header or other positions, may be the "transaction" in the present invention.
In addition, it should be noted that the node device described in this specification may include not only a full node device that backs up the full data of the distributed database with the blockchain, but also a light node device that backs up part of the data of the distributed database with the blockchain, and other terminal devices or clients, which are not limited in this specification.
The block chain based privacy transaction method shown in fig. 1 is applied to node devices of trusted users, where the trusted users are determined by trust setting transactions stored in a distributed database of a block chain, and the trust setting transactions include identifications of all trusted users determined by the block chain users, such as account addresses of the trusted users, public keys of the trusted users, or account names of the trusted users, which can uniquely determine the trusted users. The blockchain user can choose to set a corresponding trusted user based on the trust of the blockchain user on other users, for example, a financial institution, a certification institution, a supervising institution user or other institutions with higher credit can be selected. The trust setting transaction may be issued by the blockchain user directly to the blockchain, or may be issued by the blockchain user invoking an intelligent contract stating that the trusted user setting logic is present, which is not limited herein.
The method shown in fig. 1 comprises: step 102, receiving a first message sent by the blockchain user, where the first message includes first data information that is not privacy-protected and second data information that is privacy-protected, where the second data information that is privacy-protected is converted from the first data information that is not privacy-protected.
The receiving of the first message sent by the blockchain user in step 102 is received by the node device of the trusted user communicating with the blockchain user through an out-of-chain channel. The off-link channel is not in a form of sending transactions into a distributed database of the block chain, but in a private point-to-point communication mode or a network communication mode through other relay nodes. The first data information which is not privacy-protected and the second data information which is privacy-protected, which are included in the first message, may be received in one communication or may be received in a plurality of communications. It is noted that the first message may have the same data content format as the transaction issued on the blockchain, and is therefore referred to herein as a "message" rather than a "transaction" because the first message is not sent into the distributed database of the blockchain, but rather is sent out-of-chain channels. The first data information without privacy protection refers to that the first data information is an information original text which is not encrypted with privacy protection.
The second data information protected by privacy is obtained by converting the first data information without privacy protection, and the specific data conversion rule can be set by a bottom layer protocol of the blockchain or can be set by a user of the blockchain. The conversion process may be an encryption or encoding operation of the first data information to obtain the second data information. In an illustrated embodiment, to ensure that the second data information can only uniquely correspond to the first data information, the second data information can be a hash digest of the first data information.
And step 104, storing the first data information in a local database of the node equipment of the trusted user.
The local database of the node device of the trusted user is different from the block chain distributed database of the node device of the trusted user, and the first data information stored in the local database of the node device is not known by other node devices on the block chain, so that the privacy of the first data information is ensured.
In yet another embodiment, in order to ensure the validity of the content included in the first message, a verification rule may be preset, the node device of the trusted user verifies the first message, and after the verification specified by the preset verification rule passes, the first data information is stored in the local database of the node device of the trusted user. The preset verification rule at least comprises the step of verifying that the second data information which is protected by privacy is converted from the first data information which is not protected by privacy, so that the mutual correspondence between the first data information and the second data information is ensured.
In a further illustrated embodiment, in order to prevent other terminal devices from falsely sending the first message as the blockchain user or tampering with the first message sent by the blockchain user, so that the node device of the trusted user receives the illegally generated first data information and the illegally generated second data information, the first message further includes a first digital signature made by the blockchain user on at least the first data information which is not privacy-protected and a second digital signature made by the blockchain user on at least the second data information which is privacy-protected; or the first message further comprises a third digital signature made by the blockchain user on at least the first data information without privacy protection and the second data information with privacy protection. The node device of the block chain user performs digital signature on the content at least comprising the first data information and the content at least comprising the second data information respectively, or performs digital signature on the content at least comprising the first data information and the second data information, so that not only is the block chain user prevented from being impersonated by other terminal devices, but also the first data information and the second data information included in the first message are prevented from being tampered by other terminal devices.
Correspondingly, the preset validation rule further includes: verifying that the first digital signature was made by the blockchain user on at least the first data information that is not privacy protected, verifying that the second digital signature was made by the blockchain user on at least the second data information that is privacy protected; alternatively, verifying that the third digital signature was made by the blockchain user on at least the first data information and the second data information.
And 106, sending a second transaction to the blockchain, wherein the second transaction comprises the second data information, so that the second transaction is verified by the node device with the consensus authority in the blockchain and then is recorded in a distributed database of the blockchain.
Any node device on the blockchain can obtain second data information in the second transaction in a mode of accessing a distributed database of the blockchain; since the second data information is in a state of being protected by privacy, except for the user of the blockchain sending the first message and the trusted user trusted by the users of the blockchain, other users on the blockchain cannot know the first data information corresponding to the second data information, so that the privacy of the first data information is effectively protected.
The detailed process of causing the second transaction to be included in the distributed database of the blockchain according to the above embodiment may be specifically set according to the consensus mechanism and the verification rule of the blockchain. In an illustrated embodiment, the specific step of listing the second transaction in the distributed database of the blockchain may include:
adding the second transaction to a candidate block by a node device with accounting authority in the block chain;
determining consensus accounting node equipment which meets the block chain consensus mechanism from the node equipment with accounting authority;
the consensus accounting node device broadcasts the candidate blocks to node devices of the block chain;
and after the candidate block passes verification approval that the block chain meets the preset number of node devices, the candidate block is regarded as the latest block and is added into a distributed database of the block chain.
In the above embodiments, the node device with the accounting authority refers to a node device with an authority to generate candidate blocks, and may include a node device with a higher credit user and other node devices in the block chain. According to the consensus mechanism of the block chain, a consensus accounting node device may be determined from the node devices having accounting authority for the candidate block, where the consensus mechanism may include a workload attestation mechanism (PoW), a rights attestation mechanism (PoS), a stock authorization attestation mechanism (DPoS), or a PBFT commonly used in a federation chain.
The verification of the second transaction may generally include verification of the data content format of the second transaction, or verification of all or part of the content of the second transaction, or verification of a digital signature included in the second transaction, and so on. In an illustrated embodiment, to ensure that the node device of the trusted user sending the second transaction belongs to the trusted user set by the blockchain user, the node device of the blockchain should verify whether the identifier of the trusted user is included in the trust setting transaction initiated by the blockchain user; if so, the initiating user of the second transaction is indicated as a legal initiating user.
In a further illustrated embodiment, to prevent any other node device from impersonating the node device of the trusted user from initiating the second transaction, the second transaction further includes a fourth digital signature made by the trusted user on at least the privacy-protected second data information; in order to embody and verify that the second data information included in the second transaction is originally generated by the node device of the blockchain user, the second transaction may further include a second digital signature, included in the first message, of at least the second data information protected by privacy by the blockchain user. Correspondingly, the verification of the second transaction by the node device in the blockchain at least includes the verification of the second digital signature based on the public key of the blockchain user and the verification of the fourth digital signature based on the public key of the trusted user, so that the second transaction is included in the distributed database of the blockchain after the verification is passed.
When a block chain user sets a trusted user, a plurality of trusted users can be set. The user of the block chain can select a trusted user from the plurality of trusted users to send the first message; accordingly, in addition to completing the privacy transaction method based on the blockchain as described in steps 102 to 106 in the foregoing embodiment, the above-mentioned trusted user should also transmit the above-mentioned first message sent by the above-mentioned blockchain user to the node device of other trusted users, so that the other trusted users can backup the first data information which is not privacy-protected and is contained in the first message in the local database of their node device. Specifically, as shown in fig. 2, the step of transmitting the first message sent by the blockchain user to the node devices of other trusted users may include:
step 202, obtaining the trust setting transaction from the distributed database of the block chain;
step 204, confirming other trusted users trusted by the blockchain user based on the trust setting transaction;
step 206, the first message sent by the blockchain user is transmitted to the node device of the other trusted user trusted by the user, so that the first data information is stored in the local database of the node device of the other trusted user.
As described in the above embodiments, the trust setup transaction includes the identification of all trusted users determined by the blockchain user, such as the account address of a trusted user, the public key of a trusted user, or the account name of a trusted user, which may uniquely determine a trusted user. Thus, other trusted users, in addition to themselves, trusted by the blockchain user may be identified based on the trust setting transaction described above.
In order to prevent the first data information contained in the first message from being known by any node device on the blockchain and losing privacy, the node device of the trusted user transmits the first message obtained by the node device of the trusted user to the node devices of other trusted users through an out-of-chain channel. The transmission mode includes but is not limited to the form of out-of-link point-to-point communication, broadcasting, etc.
Similarly, the node device of another trusted user may also verify the first message based on a preset verification rule, so as to store the first data information in the local database of the node device of the other trusted user after the verification passes, where the preset verification rule includes verifying that the second data information protected by privacy is obtained by converting the first data information not protected by privacy, verifying that the first digital signature is performed by the block chain user on at least the first data information not protected by privacy, verifying that the second digital signature is performed by the block chain user on at least the second data information protected by privacy, and so on, which are not described herein again.
It is to be noted that, after the node device of each other trusted user receives the first message, the node device of each other trusted user may transmit a reply, such as that the first message is received completely, or the first message is verified, or the first message is agreed to be stored, to the trusted user. In a further illustrated embodiment, the node device of each other trusted user sends, to the trusted user, each digital signature that is made by each other trusted user at least on the privacy-protected second data information, where each digital signature may express, to the trusted user, that the node device of each other trusted user passes the verification of the first message or that the node device of the other trusted user prompts that the first data information is stored, and the node device of the trusted user may further include each digital signature in the second transaction that is issued to the distributed database of the block chain, so as to support, together with the fourth electronic signature that is made by the node device of the other trusted user, the validity verification of the second data information included in the second transaction by any other node device of the block chain.
The above embodiments provided in this specification provide a privacy transaction method based on a block chain, where the first data information that is not privacy-protected is stored in a local database of a node device of a trusted user, and the node device of the trusted user sends second data information that is privacy-protected to a distributed database of the block chain, so that the node devices of the block chain can backup the second data information that is privacy-protected, and an effect of privacy-protecting the first data information is achieved.
Correspondingly, the specification also provides an application method of the privacy transaction based on the block chain. As shown in fig. 3, when any node device of the blockchain needs to apply the second transaction, the node device may perform the following steps:
step 302, obtaining, from the distributed database of the blockchain, a second transaction sent by a node device of a trusted user, where the second transaction includes second data information protected by privacy, and the trusted user is determined by a trust setting transaction stored in the distributed database of the blockchain, where the trust setting transaction includes identifications of all trusted users corresponding to users of the blockchain.
Step 304, receiving first data information which is not privacy-protected and is sent by the node device of the trusted user, wherein the first data information is stored in a local database of the node device of the trusted user. Any node device of the block chain can obtain the first data information stored in the local database by performing out-of-chain communication with the node device of the trusted user sending the second transaction.
Step 306, verifying whether the privacy-protected second data information is converted from the non-privacy-protected first data information.
If so, the mobile terminal can be started,
step 308, applying logic to the second transaction is performed.
The setting mode of the trust setting transaction, the transformation rule or mode of the first data information and the second data information, the selection mode of the trusted user, and the like are all described in the embodiments of the privacy transaction method based on the block chain, and are not described herein again. The application logic for the second transaction comprises the steps of acquiring first data information which is not privacy-protected and corresponds to second data information which is privacy-protected in the second transaction, or data application or business application which is developed based on the first data information, and the like; the application may include both data applications outside the blockchain and data applications on the blockchain, such as issuing a transaction based on the first data information, and is not limited in this specification.
Compared with the common transaction of setting parameter states or issuing privacy-protected data information, the transfer transaction in the blockchain has some unique characteristic steps due to linkage change of account balance states of at least two users. In the following, the private transaction method provided in this specification is described in detail by taking the example that the blockchain user a sends a transfer transaction to the blockchain user B. Based on the privacy security consideration of the own account, the blockchain user a cooperates with the trusted user SA to set the balance (assumed to be 100) in the account status to a privacy-protected status (e.g., hash digest value hash (100) corresponding to the balance 100) by the method described in one or more embodiments above.
As shown in fig. 4, the process of setting balance 100 in the account status of blockchain user a as hash (100) may include:
step 401, the node device of the blockchain user a sends a trust setting transaction to the distributed database of the blockchain, and sets the user SA as a trusted user.
Step 402, the node device of the blockchain user a sends a first message to the node device of the trusted user SA through the out-of-chain channel, where the first message may include: a first data message-balance 100, a second data message-protected balance hash (100), a digital signature Sign 1 of user a on the first data message, and a digital signature Sign2 of user a on the second data message.
Step 403, the node device of the trusted user SA verifies that the second data information is converted from the first data information according to the data conversion rule, and verifies Sign 1 and Sign 2.
Step 404, after the verification in step 403 is passed, the node device of the trusted user SA stores the first data information, i.e. the balance 100, included in the first message in the local database. Optionally, the node device of the trusted user SA may set a mapping table in the local database, so as to record the first data information and the second data information.
Step 405, the node device of the trusted user SA performs digital signature Sign 4 on the verified second data information.
In step 406, the node device of the trusted user SA sends a second transaction to the blockchain, where the second transaction includes a second data message, the protected balance hash (100), a digital signature Sign2 of the second data message by the user a, and a digital signature Sign 4 of the second data message by the user SA.
Step 407, according to the consensus rule of the blockchain, the consensus node on the blockchain verifies the second transaction, where the verification includes verifying whether the user SA belongs to a trusted user determined by the user a through the trust setting transaction, and verifying that the digital signatures included in the second transaction are respectively made on the second data information by the trusted user SA confirmed by the user a and the user a.
Step 408, when all the verifications described in step 407 pass, the consensus node (the node with the consensus authority) of the blockchain records the block including the second transaction into the distributed database of the blockchain, and all the nodes on the blockchain update the balance status of the user a to the hash (100) in the database.
Similarly, the user B may also protect the balance status in the account, and the specific method may be similar to steps 401 to 408, which is not described herein again.
It should be noted that, when the privacy transaction method provided in this specification is a privacy transfer transaction, in order to ensure that the account balance of the roll-out user and the account balance of the roll-in user can be verified by the node device of the trusted user and corresponding balance changes occur, the roll-out user and the roll-in user should trust at least one same trusted user, that is, the trust setting transaction sent by the roll-out user and the roll-in user should include at least one same identifier of the trusted user.
The process of completing the transfer to the user B by the user a may specifically include:
step 409, the node equipment of the user A sends the transaction message Txab transferred from the user A to the user B to the node equipment of the trusted user SA shared by the user A and the user B; the transaction message Txab includes account identifications (account addresses or public keys) of the user a and the user B, the transfer amount 10, a hash digest hash (10) of the transfer amount 10, a digital signature Sign (10) of the user a on the transfer amount 10, and a digital signature Sign (hash (10)) of the hash digest hash (10) of the user a on the transfer amount 10.
And step 410, the node device of the trusted user SA verifies that the hash digest hash (10) is converted from the transfer amount 10 according to the data conversion rule, verifies whether the account balance 100 of the user A is enough to pay for the transfer, and verifies the Sign (10) and Sign (hash (10)).
Step 411, after the verification in step 410 is passed, the node device of the trusted user SA stores the transfer amount 10 in the transfer message in a local database; based on the transfer, the node device of the trusted user SA should also change the account balance of the user A and the user B in the local database.
Step 412, the node device of the trusted user SA performs digital signature Sign 4(hash (10)) on the verified transfer amount hash (10) protected by privacy; and generating new hash digests of the account balances of the user A and the user B after the transfer is completed, namely hash (account A) and hash (account B), and carrying out digital signatures Sign (hash (account A) and Sign (hash (account B)).
Step 413, the node device of the trusted user SA sends a second transaction to the block chain, where the second transaction includes a transfer amount hash (10) protected by privacy, and after the transfer is completed, account balances of the user a and the user B generate new hash digests hash (account a) and hash (account B), where the digital signature Sign (hash (10)) of the transfer amount hash (10) protected by privacy of the user a, and the digital signature Sign 4(hash (10)), Sign (hash (account a)), Sign (hash (account B)) of the user SA.
Step 414, verifying the second transaction by the consensus node on the block chain according to the consensus rule of the block chain, where the verification includes verifying whether the user SA belongs to a trusted user determined by the user a and the user B through the trust setting transaction, and verifying that the digital signatures Sign (hash (10)) and Sign 4(hash (10)) included in the second transaction are made by the trusted user SA confirmed by the user a and the user a on the hash digest hash (10) of the transfer amount, and the digital signatures Sign (hash (account a)) and Sign (hash (account B)) of the user SA are made by the user SA on the hash digest balances of the new accounts of the user a and the user B, respectively.
Step 415, after all the verifications described in step 414 pass, the consensus node (the node having the consensus authority) of the blockchain records the block including the second transaction into the distributed database of the blockchain, and all the nodes on the blockchain update the balance status of the user a to hash (account a) and the balance status of the user B to hash (account B) in the database thereof.
Optionally, in order to ensure that the node device of the trusted user SA approves the update of the account balances of the user a and the user B after the reconversion occurs, the user a and the user B may further send the updated account balance of themselves, the hash digest of the updated account balance, or/and the digital signature of the updated account balance and the hash digest of the updated account balance to the node device of the trusted user SA, respectively. The above specific process is similar to the process of the trusted user selected by the user to store the second data information of the user protected by privacy in the distributed database of the blockchain described in the embodiments of the present specification, and is not described herein again.
Corresponding to the implementation of the above flow, embodiments of the present specification further provide a privacy transaction apparatus based on a blockchain and an application apparatus for privacy transaction based on a blockchain. The above-mentioned means can be implemented by software, and also can be implemented by hardware or by a combination of software and hardware. Taking a software implementation as an example, the logical device is formed by reading a corresponding computer program instruction into a memory for running through a Central Processing Unit (CPU) of the device. In terms of hardware, in addition to the CPU, the memory, and the storage shown in fig. 7, the device in which the apparatus for implementing the cyber risk service is located generally includes other hardware such as a chip for transmitting and receiving a wireless signal and/or other hardware such as a board card for implementing a network communication function.
Fig. 5 shows a privacy transaction apparatus 50 based on a block chain, which is applied to a node device of a trusted user, wherein the trusted user is determined by a trust setting transaction stored in a distributed database of the block chain, and the trust setting transaction includes identifications of all trusted users corresponding to the block chain users; the device comprises:
a receiving unit 502, configured to receive a first message sent by the blockchain user, where the first message includes first data information that is not privacy-protected and second data information that is privacy-protected, where the second data information that is privacy-protected is converted from the first data information that is not privacy-protected;
a storage unit 504, configured to store the first data information in a local database of the node device of the trusted user;
a sending unit 506, configured to send a second transaction to the blockchain, where the second transaction includes the second data information, so that the second transaction is included in the distributed database of the blockchain after being verified.
In a further illustrated embodiment, the apparatus 50 further comprises:
a verification unit 508, configured to verify the first message based on a preset verification rule, so as to store the first data information in a local database of the node device of the trusted user after the verification passes, where the preset verification rule includes verifying that the privacy-protected second data information is converted from the non-privacy-protected first data information.
In yet another illustrated embodiment, the first message includes a first digital signature by the blockchain user of at least the first data information that is not privacy protected and a second digital signature by the blockchain user of at least the second data information that is privacy protected;
the preset validation rule further comprises: verifying that the first digital signature was made by the blockchain user on at least the first data information that is not privacy protected, and verifying that the second digital signature was made by the blockchain user on at least the second data information that is privacy protected.
In yet another illustrated embodiment, the first message includes a third digital signature by the blockchain user of at least the first non-privacy-protected data information and the second privacy-protected data information;
the preset validation rule further comprises: verifying that the third digital signature was made by the blockchain user on at least the first data information that is not privacy protected and the second data information that is privacy protected.
In yet another illustrated embodiment, the second transaction further includes a fourth digital signature of at least the privacy-protected second data information by the trusted user and a second digital signature of at least the privacy-protected second data information by the blockchain user.
In another illustrated embodiment, the apparatus 50 further comprises:
an obtaining unit 510, configured to obtain the trust setting transaction from a distributed database of the blockchain;
a confirmation unit 512 for confirming other trusted users trusted by the user based on the trust setting transaction;
the transmitting unit 514 is configured to transmit the first message sent by the blockchain user out of the chain to the node device of the other trusted user trusted by the user, so that the first data information is stored in the local database of the node device of the other trusted user.
In yet another illustrated embodiment, the receiving unit 502 of the apparatus 50: receiving a digital signature made by the other trusted user based on at least the second data information;
the second transaction also includes a digital signature made by the other trusted user based at least on the second data information.
In yet another illustrative embodiment, the privacy-protected second data information is a data digest of the non-privacy-protected first data information.
In yet another illustrated embodiment, the first message includes a transfer amount of the blockchain user to other blockchain users; the second transaction includes the transfer amount and privacy account balances of the blockchain user and the other blockchain users;
the trusted user is also the corresponding trusted user of the other users of the block chain in the trust setting transaction.
Fig. 6 shows an application apparatus 60 for block chain based privacy transaction provided by the present specification, including:
an obtaining unit 602, configured to obtain, from a distributed database of the blockchain, a second transaction sent by a node device of a trusted user, where the second transaction includes second data information protected by privacy, where the trusted user is determined by a trust setting transaction stored in the distributed database of the blockchain, and the trust setting transaction includes identifiers of all trusted users corresponding to users of the blockchain;
a receiving unit 604, configured to receive first data information that is not privacy-protected and is sent by the node device of the trusted user, where the first data information is stored in a local database of the node device of the trusted user;
a verification unit 606, configured to verify whether the privacy-protected second data information is converted from the non-privacy-protected first data information;
an application unit 608, executing application logic for the second transaction.
The implementation processes of the functions and actions of each unit in the device are specifically described in the implementation processes of the corresponding steps in the method, and related parts are described in the partial description of the method embodiment, which is not described herein again.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the units or modules can be selected according to actual needs to achieve the purpose of the solution in the specification. One of ordinary skill in the art can understand and implement it without inventive effort.
The apparatuses, units and modules illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
Corresponding to the method embodiment, the embodiment of the present specification further provides a computer device, which includes a memory and a processor. Wherein the memory has stored thereon a computer program executable by the processor; the processor, when executing the stored computer program, performs the steps of the blockchain-based privacy transaction method of the embodiments of the present specification. For a detailed description of the steps of the block chain based private transaction method, please refer to the previous contents, which are not repeated.
Corresponding to the method embodiment, the embodiment of the present specification further provides a computer device, which includes a memory and a processor. Wherein the memory has stored thereon a computer program executable by the processor; the processor, when executing the stored computer program, performs the steps of the block chain based application method for privacy transactions in the embodiments of the present specification. For a detailed description of the steps of the application method of the block chain based privacy transaction, please refer to the previous contents, which are not repeated.
The above description is only a preferred embodiment of the present disclosure, and should not be taken as limiting the present disclosure, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data.
Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.