The content of the invention
In view of this, the present invention proposes a kind of blacklist data exchange method and application server, with solve how specification
The problem of exchange and management of blacklist data.
First, to achieve the above object, the present invention proposes a kind of blacklist data exchange method, applied to application service
Device, the application server are host node, enter row data communication with multiple partial nodes, the method comprising the steps of:
The blacklist data monitored between the partial node exchanges request and response;
It is that each partial node distributes corresponding responsibility according to monitoring result;
The partial node that notice is not involved in this exchange is used as supervision side, and the give-and-take conditions for exchanging both sides are verified;And
The one-to-one carry out data exchange of partial node that notice is verified by give-and-take conditions.
Alternatively, this method also includes step before being monitored:
The blacklist data uploaded to partial node is verified in advance;
Verification classification processing is carried out to the partial node according to pre- check results.
Alternatively, the pre- checking procedure is that host node verifies whether the blacklist data conforms to according to preset rules
Ask, the preset rules include:Data format is correct, can not write privacy of user, it is impossible to has repetition, missing, false data.
Alternatively, the verification classification processing is the partial node according to corresponding to the standard degree of the blacklist data is
Switch-level corresponding to setting, corresponding transaction coin is then authorized and distributed to the partial node.
Alternatively, the verification classification processing also includes:
Set when the standard degree of the blacklist data is higher, the partial node is exchanged to more with less transaction coin
Data;
It is the transaction coin that the partial node distributes respective amount according to the data volume of the blacklist data and preset ratio.
Alternatively, described the step of distributing corresponding responsibility according to monitoring result for each partial node, specifically includes:
The partial node for sending blacklist data exchange request is configured to request of data side, will have agreed to the blacklist data
The partial node for exchanging request is configured to data providing, will not send blacklist data and exchange in request and response or the response
Feedback result be to disagree the blacklist data and exchange the partial node of request or choose wherein one or more to be configured to
Supervision side.
Alternatively, the give-and-take conditions include whether the blacklist data that data providing provides meets the preset rules
And whether request of data side there are enough transaction coin, reach give-and-take conditions when exchanging both sides, i.e. data providing provides black
When list data meets the preset rules and request of data side has enough transaction coin corresponding with the blacklist data, table
Show that verification passes through.
Alternatively, it is described notice by give-and-take conditions verify partial node it is one-to-one progress data exchange the step of specifically wrap
Include:
Request of data side's need are calculated according to the data volume of the switch-level of the request of data side and blacklist data
The transaction coin to be paid;
After the request of data side is paid successfully, by the blacklist data replication synchronization that the data providing uploads to
The request of data side.
In addition, to achieve the above object, the present invention also provides a kind of application server, including memory, processor and deposits
The blacklist data exchange system that can be run on the memory and on the processor is stored up, the blacklist data exchanges
The step of blacklist data exchange method described above is realized when system is by the computing device.
Further, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, the computer
Readable storage medium storing program for executing is stored with blacklist data exchange system, and the blacklist data exchange system can be by least one processor
Perform, so that the step of at least one computing device blacklist data exchange method described above.
Compared to prior art, blacklist data exchange method, application server and computer proposed by the invention can
Storage medium, host node that can be using a central element as block chain are read, other cooperative institutions utilize base as partial node
Blacklist data exchange and its management are carried out in the intelligent contract technology of block chain.Pass through the blacklist data uploaded to partial node
Carry out pre- verification and make verification classification processing, the partial node for being not involved in this exchange is used as supervision side, the exchange bar to exchanging both sides
Part is verified, so as to ensure to exchange the true conjunction rule of data.Because exchange process is Clear & Transparent, blacklist data is shared favorably
Carry out in the business of every mechanism, give up the misgivings that cooperative institution uploads data.Central element can be the quality for exchanging data
Escort, establish the data ecosphere.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, not
For limiting the present invention.Based on the embodiment in the present invention, those of ordinary skill in the art are not before creative work is made
The every other embodiment obtained is put, belongs to the scope of protection of the invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is only used for describing purpose, and can not
It is interpreted as indicating or implies its relative importance or imply the quantity of the technical characteristic indicated by indicating.Thus, define " the
One ", at least one this feature can be expressed or be implicitly included to the feature of " second ".In addition, the skill between each embodiment
Art scheme can be combined with each other, but must can be implemented as basis with those of ordinary skill in the art, when technical scheme
With reference to occurring conflicting or will be understood that the combination of this technical scheme is not present when can not realize, also not in application claims
Protection domain within.
As shown in fig.1, it is each optional application environment schematic diagram of embodiment one of the present invention.
In the present embodiment, present invention can apply to include but not limited to, terminal device 1, application server 2, network
In 3 application environment.The application server 2, block chain network 3 and multiple terminal devices 1 collectively form a block chain
Network system, to carry out the exchange of blacklist data and management.
Wherein, application server 2 is a kind of can to carry out numerical computations automatically according to the instruction for being previously set or storing
And/or the equipment of information processing, for blacklist data centrally stored and that management is to be exchanged, as described block chain network system
The host node of system.The application server 2 can be computer, can also be single network server, multiple webservers
The server group of the composition either cloud being made up of a large amount of main frames or the webserver based on cloud computing.
Block chain network 3 is used to carry out data transmission and interact in the block chain network system.The application service
Device 2 enters row data communication by the block chain network 3 and multiple terminal devices 1, and the network can be intranet
(Intranet), internet (Internet), global system for mobile communications (Global System of Mobile
Communication, GSM), WCDMA (Wideband Code Division Multiple Access,
WCDMA), the wirelessly or non-wirelessly network such as 4G networks, 5G networks, bluetooth (Bluetooth), Wi-Fi.
Terminal device 1 is used for the exchange for carrying out the blacklist data between each other, is the block chain network system
Partial node.The terminal device 1 can be mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (individual
Personal digital assistant), PAD (tablet personal computer), PMP (portable media player), guider, car-mounted device etc. it is removable
Dynamic equipment, and the fixed terminal of such as digital TV, desktop computer, notebook, server etc..
As shown in fig.2, it is the schematic diagram of 2 one optional hardware structure of application server in Fig. 1.In the present embodiment, institute
Stating application server 2 may include, but be not limited only to, and connection memory 11, processor 12, net can be in communication with each other by system bus
Network interface 13.It is pointed out that Fig. 2 illustrate only the application server 2 with component 11-13, it should be understood that simultaneously
All components shown realistic are not applied, the more or less component of the implementation that can be substituted.
Wherein, the memory 11 comprises at least a type of readable storage medium storing program for executing, and the readable storage medium storing program for executing includes
Flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), it is static with
Machine access memory (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), it is programmable only
Read memory (PROM), magnetic storage, disk, CD etc..In certain embodiments, the memory 11 can be described answers
With the hard disk or internal memory of the internal storage unit of server 2, such as the application server 2.In further embodiments, it is described to deposit
Reservoir 11 can also be that the plug-in type being equipped with the External memory equipment of the application server 2, such as the application server 2 is hard
Disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card
(Flash Card) etc..Certainly, the memory 11 can also both include the internal storage unit of the application server 2 or wrap
Include its External memory equipment.In the present embodiment, the memory 11 is generally used for the behaviour that storage is installed on the application server 2
Make system and types of applications software, such as program code of blacklist data exchange system 200 etc..In addition, the memory 11
It can be also used for temporarily storing the Various types of data that has exported or will export.
The processor 12 can be in certain embodiments central processing unit (Central Processing Unit,
CPU), controller, microcontroller, microprocessor or other data processing chips.The processor 12 is generally used for should described in control
With the overall operation of server 2, such as perform the control related with the terminal device 1 progress data interaction or communication and place
Reason etc..In the present embodiment, the processor 12 is used to run the program code stored in the memory 11 or processing data,
Such as run described blacklist data exchange system 200 etc..
The network interface 13 may include radio network interface or wired network interface, and the network interface 13 is generally used for
Communication connection is established between the application server 2 and other electronic equipments.In the present embodiment, the network interface 13 is mainly used
In the application server 2 is connected with one or more terminal devices 1 by the block chain network 3, answered described
Data transmission channel and communication connection are established between server 2 and one or more of terminal devices 1.
So far, oneself is through describing the application environment of each embodiment of the present invention and the hardware configuration and work(of relevant device in detail
Energy.Below, above-mentioned application environment and relevant device will be based on, proposes each embodiment of the present invention.
First, the present invention proposes a kind of blacklist data exchange system 200.
As shown in fig.3, it is the Program modual graph of the first embodiment of blacklist data exchange system 200 of the present invention.
In the present embodiment, described blacklist data exchange system 200 includes a series of be stored on memory 11
Computer program instructions, when the computer program instructions are performed by processor 12, it is possible to achieve various embodiments of the present invention it is black
List data swap operation.In the block chain for carrying out blacklist data exchange, using a central element as host node, other
Cooperative institution is as partial node.The application server 2 is a center list in the block chain of progress blacklist data exchange
Position, i.e. host node.The multiple terminal device 1 is carries out other cooperative institutions in the block chain of blacklist data exchange, i.e.,
Partial node.Using the intelligent contract technology based on block chain, between the individual nodes according to described in the exchange regulation progress of agreement
The exchange and management of blacklist data, ensure that whole data exchange process justice is transparent, cooperative institution obtains the process rule of data
Model is reasonable.
In certain embodiments, the specific operation realized based on the computer program instructions each several part, blacklist number
One or more modules can be divided into according to exchange system 200.For example, in figure 3, the blacklist data exchange system
200 can be divided into monitoring modular 201, distribute module 202, notification module 203.Wherein:
The monitoring modular 201, request and response are exchanged for monitoring the blacklist data between the partial node.
Specifically, each there is the partial node of data exchange demand by the block chain network 3 successively to other partial nodes
Send blacklist data and exchange request.The request include the mark of this request, the information for the blacklist data asked,
Identity of demand partial node etc..The partial node that the blacklist data exchanges request is received, according to self-demand and residue
Transaction coin quantity judges whether to agree to that carrying out this blacklist data exchanges, and then exchanges for the blacklist data and asks
Make response.The response includes the identifying of this response, the information of corresponding blacklist data, the body of demand partial node
Part mark, the identity of response partial node, to feedback result of this request etc..It is described black that the feedback result includes agreement
List data, which exchanges request and disagrees the blacklist data, exchanges request.The feedback result is to disagree the blacklist
Data exchange request does not send the partial node of the response and is not involved in this data exchange.The monitoring modular 201 can supervise
The request and response surveyed between each partial node.The partial node for receiving blacklist data exchange request automated tos respond to, and attempts sum
Start data exchange according to provider, and disclosed to other partial nodes and broadcast this switch-activity.
The distribute module 202, for being that each partial node distributes corresponding responsibility according to monitoring result.
For example, the partial node for sending blacklist data exchange request is configured to request of data side by distribute module 202, will be same
The partial node that the blacklist data of anticipating exchanges request is configured to data providing, will not send blacklist data exchange request and
Response disagrees the blacklist data and exchanges the partial node (or choosing wherein one or more) of request and is configured to supervise
Side.
The notification module 203, for notifying the partial node for being not involved in this exchange to be used as supervision side, to exchanging both sides'
Give-and-take conditions are verified.
Specifically, before the exchange of the blacklist data is carried out, each partial node can (application takes to host node
Business device 2) blacklist data is uploaded, while host node is a number of coin (bit coin) of merchandising of each partial node distribution of meeting, is used
Swapped in subsequently.The supervision side can obtain the blacklist data of data providing offer (i.e. from the host node
Data providing is uploaded to the blacklist data of host node), and verified.The give-and-take conditions provide including data providing
Blacklist data whether meet whether preset rules and request of data side have enough transaction coin.In the present embodiment, it is described
Preset rules can include:Data format is correct, can not write privacy of user, it is impossible to has repetition, missing, false data etc..Separately
Outside, according to the data volume of the blacklist data and preset ratio (ratio between data volume and transaction coin quantity), data please
The side of asking needs to pay the transaction coin of respective numbers.Reach give-and-take conditions, i.e., the black name that data providing provides when exchanging both sides
When forms data meets the preset rules and request of data side there are enough transaction coin corresponding with the blacklist data, represent
Verification passes through, and this exchange can just continue.
The notification module 203 is additionally operable to the one-to-one carry out data exchange of partial node that notice is verified by give-and-take conditions.
Specifically, after the give-and-take conditions for exchanging both sides, which verify, to be passed through, the notification module 203 notifies request of data side
Data exchange is proceeded by with the partial node of data providing.Data providing to request of data side share its prestore it is black
List data (by related data replication synchronization to request of data side), request of data root is according to switch-level corresponding to the partial node
The transaction coin of respective numbers is paid to data providing with the data volume of the blacklist data.Notification module 203 is needed according to institute
The data volume of the switch-level and blacklist data of stating request of data side calculates the transaction coin that the request of data side needs to pay,
After the request of data side is paid successfully, the blacklist data replication synchronization that the data providing is uploaded is to the number
According to requesting party.
As shown in fig.4, it is the Program modual graph of the second embodiment of blacklist data exchange system 200 of the present invention.This reality
Apply in example, described blacklist data exchange system 200 refers to including a series of computer program being stored on memory 11
Order, when the computer program instructions are performed by processor 12, it is possible to achieve the blacklist data of various embodiments of the present invention exchanges
Operation.In the block chain for carrying out blacklist data exchange, using a central element as host node, other cooperative institution's conducts
Partial node.The application server 2 is a central element in the block chain of progress blacklist data exchange, i.e. host node.
The multiple terminal device 1 is other cooperative institutions in the block chain of progress blacklist data exchange, i.e. partial node.
In the present embodiment, described blacklist data exchange system 200 is except including the monitoring in first embodiment
Outside module 201, distribute module 202, notification module 203, in addition to pre- correction verification module 204 and diversity module 205.
The pre- correction verification module 204 is used to verify the blacklist data that partial node uploads in advance.
Specifically, when a partial node uploads blacklist data to host node (application server 2), with the master
Node is verified in advance.The pre- checking procedure is that pre- correction verification module 204 verifies that the blacklist data is according to preset rules
It is no to meet the requirements.In the present embodiment, the preset rules can include:Data format is correct, can not write privacy of user, no
Can there are repetition, missing, false data etc..
The diversity module 205 is used to carry out verification classification processing to the partial node according to pre- check results.
Specifically, diversity module 205 is carried out at verification classification according to the result to the blacklist data to it
Reason, the switch-level mainly according to corresponding to the standard degree of the blacklist data for the corresponding partial node setting, then
Corresponding transaction coin is authorized and distributed to the partial node.Such as when the standard degree of the blacklist data is higher, institute
State partial node subsequently can exchange to more data with less transaction coin.After the blacklist data is verified, institute
Blacklist data exchange can be carried out by stating partial node described in host node mandate, and according to the data volume of the blacklist data and pre-
If ratio is the transaction coin that the partial node distributes respective amount.
In addition, the present invention also proposes a kind of blacklist data exchange method.
As shown in fig.5, it is the schematic flow sheet of blacklist data exchange method first embodiment of the present invention.It is black in progress
In the block chain that list data exchanges, using a central element as host node, other cooperative institutions are as partial node.It is described to answer
It is a central element in the block chain for carry out blacklist data exchange, i.e. host node with server 2.The multiple terminal is set
Standby 1 is other cooperative institutions in the block chain of progress blacklist data exchange, i.e. partial node.Utilize the intelligence based on block chain
Contract technology, the exchange and management of the blacklist data are carried out according to the exchange regulation of agreement between the individual nodes, is ensured
Whole data exchange process justice is transparent, and the process specification that cooperative institution obtains data is reasonable.
In the present embodiment, can be changed according to different demands, the execution sequence of the step in flow chart shown in Fig. 5
Become, some steps can be omitted.This method comprises the following steps:
Step S600, the blacklist data monitored between the partial node exchange request and response.
Specifically, each there is the partial node of data exchange demand by the block chain network 3 successively to other partial nodes
Send blacklist data and exchange request.The request include the mark of this request, the information for the blacklist data asked,
Identity of demand partial node etc..The partial node that the blacklist data exchanges request is received, according to self-demand and residue
Transaction coin quantity judges whether to agree to that carrying out this blacklist data exchanges, and then exchanges for the blacklist data and asks
Make response.The response includes the identifying of this response, the information of corresponding blacklist data, the body of demand partial node
Part mark, the identity of response partial node, to feedback result of this request etc..It is described black that the feedback result includes agreement
List data, which exchanges request and disagrees the blacklist data, exchanges request.The feedback result is to disagree the blacklist
Data exchange request does not send the partial node of the response and is not involved in this data exchange.The application as host node takes
Business device 2 can monitor the request and response between each partial node.Receive blacklist data and exchange the partial node of request from the sound of something astir
Should, attempt and data providing starts data exchange, and disclosed to other partial nodes and broadcast this switch-activity.
Step S602, it is that each partial node distributes corresponding responsibility according to monitoring result.
For example, the partial node for sending blacklist data exchange request is configured to request of data side by the application server 2,
The partial node that will have agreed to the blacklist data exchange request is configured to data providing, and will not send blacklist data exchange please
Summation response disagrees the blacklist data and exchanges the partial node (or choosing wherein one or more) of request and is configured to
Supervision side.
Step S604, the partial node that notice is not involved in this exchange are used as supervision side, the give-and-take conditions for exchanging both sides are entered
Row verification.
Specifically, before the exchange of the blacklist data is carried out, each partial node can (application takes to host node
Business device 2) blacklist data is uploaded, while host node is a number of coin (bit coin) of merchandising of each partial node distribution of meeting, is used
Swapped in subsequently.The supervision side can obtain the blacklist data of data providing offer (i.e. from the host node
Data providing is uploaded to the blacklist data of host node), and verified.The give-and-take conditions provide including data providing
Blacklist data whether meet whether preset rules and request of data side have enough transaction coin.In the present embodiment, it is described
Preset rules can include:Data format is correct, can not write privacy of user, it is impossible to has repetition, missing, false data etc..Separately
Outside, according to the data volume of the blacklist data and preset ratio (ratio between data volume and transaction coin quantity), data please
The side of asking needs to pay the transaction coin of respective numbers.Reach give-and-take conditions, i.e., the black name that data providing provides when exchanging both sides
When forms data meets the preset rules and request of data side there are enough transaction coin corresponding with the blacklist data, represent
Verification passes through, and this exchange can just continue.
Step S606, the one-to-one carry out data exchange of partial node that notice is verified by give-and-take conditions.
Specifically, after the give-and-take conditions for exchanging both sides, which verify, to be passed through, the application server 2 notifies request of data side
Data exchange is proceeded by with the partial node of data providing.Data providing to request of data side share its prestore it is black
List data (by related data replication synchronization to request of data side), request of data root is according to switch-level corresponding to the partial node
The transaction coin of respective numbers is paid to data providing with the data volume of the blacklist data.The application server 2 needs root
The friendship paid is needed according to the switch-level of the request of data side and the data volume calculating request of data side of blacklist data
Easy coin, after the request of data side is paid successfully, by the blacklist data replication synchronization that the data providing uploads to
The request of data side.
After the transaction coin is finished, partial node can obtain transaction coin again by uploading new blacklist data.
As shown in fig. 6, it is the schematic flow sheet of the second embodiment of blacklist data exchange method of the present invention.The present embodiment
In, the step S704-S710 of the blacklist data exchange method and the step S600-S606 of first embodiment are similar, area
It is not that this method also includes step S700-S702.
This method comprises the following steps:
Step S700, the blacklist data uploaded to partial node are verified in advance.
Specifically, when a partial node uploads blacklist data to host node (application server 2), with the master
Node is verified in advance.The pre- checking procedure is that host node verifies whether the blacklist data conforms to according to preset rules
Ask.In the present embodiment, the preset rules can include:Data format is correct, can not write privacy of user, it is impossible to has weight
Multiple, missing, false data etc..
Step S702, verification classification processing is carried out to the partial node according to pre- check results.
Specifically, the host node carries out verification classification processing to it according to the result to the blacklist data,
The switch-level mainly according to corresponding to the standard degree of the blacklist data for the corresponding partial node setting, then to institute
State partial node and authorized and distributed corresponding transaction coin.Such as when the standard degree of the blacklist data is higher, described point
Node subsequently can exchange to more data with less transaction coin.After the blacklist data is verified, the master
Partial node described in node mandate can carry out blacklist data exchange, and the data volume according to the blacklist data and default ratio
Example distributes the transaction coin of respective amount for the partial node.
Step S704, the blacklist data monitored between the partial node exchange request and response.
Specifically, each there is the partial node of data exchange demand by the block chain network 3 successively to other points
Node sends blacklist data and exchanges request.The request includes the mark of this request, the blacklist data asked
The identity etc. of information, demand partial node.Receive the partial node that the blacklist data exchanges request, according to self-demand and
Residue transaction coin quantity judges whether to agree to that carrying out this blacklist data exchanges, and then exchanges for the blacklist data
Response is made in request.The response includes the identifying of this response, the information of corresponding blacklist data, demand partial node
Identity, response partial node identity, to feedback result of this request etc..The feedback result includes agreeing to institute
Blacklist data is stated to exchange request and disagree the blacklist data exchange request.The feedback result is described black to disagree
List data exchange asks or not sent the partial node of the response to be not involved in this data exchange.Answered as described in host node
The request and response between each partial node can be monitored with server 2.Receive blacklist data and exchange the partial node of request certainly
Dynamic response, is attempted and data providing starts data exchange, and is disclosed to other partial nodes and broadcasted this switch-activity.
Step S706, it is that each partial node distributes corresponding responsibility according to monitoring result.
For example, the partial node for sending blacklist data exchange request is configured to request of data side by the application server 2,
The partial node that will have agreed to the blacklist data exchange request is configured to data providing, and will not send blacklist data exchange please
Summation response disagrees the blacklist data and exchanges the partial node (or choosing wherein one or more) of request and is configured to
Supervision side.
Step S708, the partial node that notice is not involved in this exchange are used as supervision side, the give-and-take conditions for exchanging both sides are entered
Row verification.
Specifically, the supervision side can obtain the blacklist data of data providing offer (i.e. from the host node
Data providing is uploaded to the blacklist data of host node), and verified.The give-and-take conditions provide including data providing
Blacklist data whether meet whether the preset rules and request of data side have enough transaction coin.Reached when exchanging both sides
To give-and-take conditions, i.e., data providing provides blacklist data meets the preset rules and request of data side have with it is described black
Corresponding to list data during enough transaction coin, represent that verification passes through, this exchange can just continue.
Step S710, the one-to-one carry out data exchange of partial node that notice is verified by give-and-take conditions.
Specifically, after the give-and-take conditions for exchanging both sides, which verify, to be passed through, the application server 2 notifies request of data side
Data exchange is proceeded by with the partial node of data providing.Data providing to request of data side share its prestore it is black
List data (by related data replication synchronization to request of data side), request of data root is according to switch-level corresponding to the partial node
The transaction coin of respective numbers is paid to data providing with the data volume of the blacklist data.The application server 2 needs root
The friendship paid is needed according to the switch-level of the request of data side and the data volume calculating request of data side of blacklist data
Easy coin, after the request of data side is paid successfully, by the blacklist data replication synchronization that the data providing uploads to
The request of data side.
After the transaction coin is finished, partial node can obtain transaction coin again by uploading new blacklist data.
In addition, the table in the pre- verification situation and data exchange process of the blacklist data subsequently uploaded according to partial node
It is existing, switch-level corresponding to the partial node can be adjusted.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, clothes
Be engaged in device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.