Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with this specification one or more embodiment.Phase
Instead, they are only some aspects phases with the one or more embodiments of as detailed in the attached claim, this specification
The example of consistent device and method.
It should be understood that the sequence that might not show and describe according to this specification in other embodiments executes
The step of correlation method.In some other embodiments, step included by method can than described in this specification more
It is more or less.In addition, single step described in this specification, may be broken down into other embodiments multiple steps into
Row description;And multiple steps described in this specification, it may also be merged into single step progress in other embodiments
Description.
As shown in Figure 1, one illustrative examples of this specification provide a kind of privacy method of commerce based on block chain.This
Block chain described in embodiment, specifically can refer to it is that each node device is reached by common recognition mechanism, deposited with distributed data
The P2P network system of storage structure, data distribution in the block chain connected in time " block (block) " one by one it
Interior, latter block includes the data summarization of previous block, and according to specific common recognition mechanism (such as POW, POS, DPOS or PBFT
Deng) difference, reach the data full backup of all or part of node device.Those skilled in the art is known, due to block chain
System is run under corresponding common recognition mechanism, has been included to the data in block chain database and has been difficult to be usurped by arbitrary node device
Change, for example, by using the block chain of Pow common recognition, the attack at least needing the whole network 51% to calculate power is possible to distort data with existing, because
This block catenary system have other centralization Database Systems institute's methods compare guarantee data security, the characteristic that attack protection is distorted.
Transaction (transaction) described in this specification refers to that user is created by the node device of block chain
The data built, and need finally to be distributed in the distributed data base of block chain.Wherein, the transaction in block chain, exists
Point of the transaction of the transaction and broad sense of narrow sense.The transaction of narrow sense refers to the value Transfer that user issues to block chain;Example
Such as, in traditional bit coin block chain network, transaction can be one that user initiates in block chain and transfer accounts.And broad sense
Transaction refers to the arbitrary data that user issues to block chain: for example, operator can be taken based on actual business demand
Build alliance's chain, rely on alliance's chain dispose it is some it is unrelated with value Transfer it is other types of in line service (for example, renting a house
Business, vehicle scheduling business, settlement of insurance claim business, credit services, medical services etc.), and in this kind of alliance's chain, transaction can be with
It is the service message or service request with business intention that user issues in alliance's chain;For another example, in account type
In block chain, which can also be that user sends to block chain, data (such as account of account status to change user
Remaining sum etc.).Therefore, as long as the arbitrary data that user issues to the distributed data base of block chain, no matter the arbitrary data quilt
It is stored in the block body, block head or other positions of block, can each belong to " transaction " of the present invention.
Moreover, it is noted that node device described in this specification, not only may include the distribution that backup has block chain
The full node device of the full dose data of formula database may also include the partial data for backing up the distributed data base for having block chain
Light node device, and other terminal devices or client, in the present specification without limitation.
Privacy method of commerce shown in FIG. 1 based on block chain is applied to the node device of trusted user, wherein described
The trust setting transaction that trusted user is stored by the distributed data base of block chain determines that the trust setting transaction includes institute
The mark for stating all trusted users that block chain user determines, such as the account address of trusted user, the public affairs of trusted user
Key or trusted user.name etc. can uniquely determine the information of trusted user.Block chain user can be based on itself
To the trust of other users, chooses and set its corresponding trusted user, such as the higher financial institution of credit, certification can be selected
Mechanism, supervisory organ user or other mechanisms.Above-mentioned trust setting transaction can directly be issued to block chain from block chain user,
Statement can also be called to have the intelligent contract of trusted user setting logic to issue by block chain user, it is not limited here.
Method shown in FIG. 1 includes: step 102, receives the first message that the block chain user sends, described first disappears
Breath includes the first data information of non-secret protection and the second data information by secret protection, wherein described by secret protection
The second data information be by the non-secret protection the first data information conversion gained.
The first message that the reception block chain user sends described in step 102, is the node of above-mentioned trusted user
Equipment, which is communicated with block chain user by chain outer tunnel, to be received.The chain outer tunnel refers to not with to block chain
The form of transaction is sent in distributed data base but is led to point-to-point communication privately or by the network of other relay nodes
Letter mode.First data information of non-secret protection included by above-mentioned first message and by secret protection the second data believe
Breath can both be received in primary communication and be obtained, and can also be received and be obtained in multiple communication.On it is worth noting that,
Identical data content format can be had with the transaction issued on block chain by stating first message, why be referred to here as
" message " rather than " transaction " are to be sent by non-into the distributed data base of block chain due to above-mentioned first message, but outside chain
Channel is sent.First data information of non-secret protection refers to that first data information is the information without secret protection encryption
Original text.
Above-mentioned the second data information by secret protection is the first data information conversion gained by non-secret protection, specifically
Data transformation rule can be set by the underlying protocol of the block chain, can also be by block chain user's sets itself.Above-mentioned turn
Change process can be by the encryption of above-mentioned first data information or encoding operation to obtain above-mentioned second data information.Shown in one
In embodiment, to guarantee that the second data information only can uniquely correspond to above-mentioned first data information, the second data information can be with
For the Hash digest of the first data information.
Step 104, first data information is stored in the local data base of the node device of the trusted user.
The local data base of the node device of above-mentioned trusted user is the node device for being different from trusted user
For block chain distributed data base, the first data information for being stored in the local data base of node device will not be by block chain
On other node devices know, hereby it is ensured that the privacy of the first data information.
It, can also be preparatory for the legitimacy for the content that the above-mentioned first message of guarantee is included in the another embodiment shown
Proof rule is set, above-mentioned first message is verified by the node device of above-mentioned trusted user, and in preset verifying
After being verified as defined in rule, first data information is stored in the local number of the node device of the trusted user
According to library.Above-mentioned preset proof rule at least may include verifying it is described by the second data information of secret protection be by described not hidden
First data information of private protection converts gained, to guarantee the reciprocal correspondence property of the first data information and the second data information.
In the another embodiment shown, to prevent other terminal devices from above-mentioned block chain user being pretended to be to send above-mentioned the
One message, or the first message that above-mentioned block chain user sends is distorted, so that the node device of trusted user receives illegally
The first data information and the second data information generated, which further includes the block chain user at least to described not hidden
First digital signature and the block chain user made by first data information of private protection are at least to described by secret protection
Second digital signature made by second data information;Or the first message further include the block chain user at least to it is described not
Third digital signature made by first data information of secret protection and the second data information by secret protection.Above-mentioned block chain
The node device of user passes through respectively to the content for including at least the first data information and including at least in the second data information
Appearance is digitally signed, or is digitally signed to the content for including at least the first data information and the second data information, is both prevented
Stopped other terminal devices and pretended to be above-mentioned block chain user, but prevent the first data information included by above-mentioned first message and
Second data information is distorted by other terminal devices.
Correspondingly, it is by the block chain that above-mentioned preset proof rule, which should also include: verifying first digital signature,
User at least makees the first data information of the non-secret protection, and verifying second digital signature is by the block chain
User at least makees second data information by secret protection;Alternatively, verifying the third digital signature is by described
Block chain user at least makees first data information and second data information.
Step 106, Xiang Suoshu block chain sends the second transaction, and second transaction includes second data information, with
Point of the block chain is embodied in after making second transaction that there is the node device verifying of common recognition permission in the block chain
In cloth database.
Arbitrary node equipment on the block chain can be by way of accessing the distributed data base of block chain, in acquisition
State the second data information in the second transaction;Since the second data information is in by the state of secret protection, in addition to above-mentioned transmission
The trusted user that the block chain user itself of first message and above-mentioned block chain user are trusted, other use on the block chain
Corresponding first data information of second data information cannot be known per family, to be effectively protected the hidden of the first data information
Private.
It is included second transaction described in above-described embodiment detailed into the distributed data base of the block chain
Thin process, can according to the block chain common recognition mechanism and proof rule and specifically set.In the embodiment shown in one, institute
The specific steps that the second transaction is admitted in the distributed data base of the block chain are stated, may include:
There is the node device of book keeping operation permission second transaction is added to candidate block in the block chain;
The common recognition book keeping operation section for meeting the block chain common recognition mechanism is determined from the node device with book keeping operation permission
Point device;
The common recognition accounting nodes equipment broadcasts the candidate block to the node device of the block chain;
After meeting the verifying approval of the node device of preset quantity by the block chain in the candidate block, the time
Constituency block is considered as newest block, is added in the distributed data base of the block chain.
In the above-described embodiment, the node device with book keeping operation permission refers to the node for generating candidate block permission
Equipment, it may include the node device with higher credit customer and other node devices in above-mentioned block chain.According to the area
The common recognition mechanism of block chain can have determining common recognition accounting nodes in the node device of book keeping operation permission to the candidate block from above-mentioned
Equipment, above-mentioned common recognition mechanism may include that proof of work mechanism (PoW) or right prove mechanism (PoS) or share warrant
The PBFT etc. that bright mechanism (DPoS) etc. or alliance's chain generally use.
It usually may include the verifying to the data content format of the second transaction about the verifying to above-mentioned second transaction, or
The verifying of all or part of the content of second transaction, or to the verifying of digital signature etc. that the second exchange includes.Show one
In embodiment out, set to guarantee that the node device for sending the trusted user that above-mentioned second trades belongs to above-mentioned block chain user
Fixed trusted user, the node device of block chain should verify above-mentioned trusted user identify whether be included in above-mentioned block chain
Client-initiated is trusted in setting transaction;If so, showing that the initiation user of second transaction is legal initiation user.
In the another embodiment shown, the node to prevent any other node device from pretending to be above-mentioned trusted user is set
Preparation plays above-mentioned second transaction, and above-mentioned second transaction further includes the trusted user at least to described by the second of secret protection
4th digital signature made by data information;It is initially to embody and depositing the second data information demonstrate,proved and include in above-mentioned second transaction
It is made by the node device generation of above-mentioned block chain user, above-mentioned second transaction may also include included by above-mentioned first message
, the block chain user is at least to the second digital signature made by second data information by secret protection.Correspondingly,
The verifying of node device in block chain to above-mentioned second transaction at least should include the public key based on above-mentioned block chain user to the
The verifying of two digital signature and verifying of the public key to the 4th digital signature based on trusted user will with after being verified
Above-mentioned second transaction is embodied in the distributed data base of block chain.
Multiple trusted users can be set when trusted user is arranged in block chain user.Block chain user can be from upper
One trusted user of selection in multiple trusted users is stated, above-mentioned first message is sent;Correspondingly, said one is credible appoints
It family, should also be by above-mentioned area except the privacy method of commerce based on block chain completed as described in step 102 to 106 in above-described embodiment
The above-mentioned first message that block chain user sends is transmitted at the node device of other trusted users, so that other trusteds
User backs up the first data information of the non-secret protection for including in the first message in the local data base of its node device.
Particularly, as shown in Fig. 2, the above-mentioned first message that above-mentioned block chain user sends is transmitted to other trusted users'
The step of at node device may include:
Step 202, the trust setting transaction is obtained from the distributed data base of the block chain;
Step 204, based on other trusteds user for trusting block chain users to trust described in setting trade confirmation;
It step 206, can by other for being transmitted to the users to trust outside the first message chain of block chain user transmission
The node device of user is trusted, so that first data information is saved in the node device of other trusteds user
In local data base.
As described in above-described embodiment, trusting setting transaction includes all trusted users that the block chain user determines
Mark, such as the account address of trusted user, the public key of trusted user or trusted user.name can uniquely really
Determine the information of trusted user.Therefore, the block chain user letter in addition to itself can be confirmed based on the setting transaction of above-mentioned trust
Other trusteds user appointed.
The first data information to prevent first message from being included is known and lost by the arbitrary node equipment on block chain
The node device of privacy, above-mentioned trusted user is transmitted to other trusteds by the first message that chain outer tunnel is obtained
The node device of user.The outer transmission mode of above-mentioned chain includes but is not limited to the forms such as chain outer point-to-point communication, broadcast.
Similarly, the node device of other trusteds user may be based on preset proof rule verifying described first and disappear
Breath, first data information to be stored in the sheet of the node device of other trusteds user after described be verified
Ground database, wherein the preset proof rule include verifying it is described by the second data information of secret protection be by it is described not
First data information of secret protection converts gained, and verifying first digital signature is by the block chain user at least to institute
The first data information for stating non-secret protection is made, and verifying second digital signature is by the block chain user at least to institute
It states and is made by the second data information of secret protection, etc., details are not described herein.
It is worth noting that, after the node device of each other trusteds user receives above-mentioned first message, it is each
The node device of other trusteds user can transmit first message to above-mentioned trusted user and receive or disappear to described first
Breath is verified or agrees to the replies such as the above-mentioned first message of storage.In the another embodiment shown, it is above-mentioned it is each other
The node device of trusted user sends other each trusted users at least to described by secret protection to above-mentioned trusted user
The second data information made by each digital signature, above-mentioned each digital signature can both express to above-mentioned trusted user
The node device of each other trusteds user indicates or has stored the first data information to being verified for above-mentioned first message
Prompt, above-mentioned each digital signature can also be included in its distributed number to block chain by the node device of above-mentioned trusted user
According in the second transaction of library publication, so that the 4th electronic signature made with the node device of above-mentioned trusted user is together, it is
Any other node device of block chain makes support to the legitimate verification for the second data information that the second exchange includes.
Provided by this specification above examples provide performed by the node device of trusted user based on block
The privacy method of commerce of chain, by store non-secret protection in the local data base of the node device of trusted user first
Data information, the node device of trusted user send the second data by secret protection into the distributed data base of block chain
Information has reached secret protection so that the node device of block chain can back up above-mentioned the second data information by secret protection
The effect of above-mentioned first data information.
Correspondingly, this specification additionally provides a kind of application method of privacy transaction based on block chain.As shown in figure 3,
When any node equipment of block chain is needed using the above-mentioned second transaction, which can be performed following steps:
Step 302, the sent by the node device of trusted user is obtained from the distributed data base of the block chain
Two transaction, second transaction include the second data information by secret protection, the trusted user by block chain distribution
The trust setting transaction of formula database purchase determines, trusts setting transaction including the block chain user it is corresponding it is all can
Trust the mark of user.
Step 304, the first data information of the non-secret protection of the node device transmission of the trusted user, institute are received
State the local data base that the first data information is saved in the node device of the trusted user.Any node of the block chain
Equipment, which passes through, communicate outside chain with the node device for the trusted user for sending above-mentioned second transaction, be can get this and credible is appointed
The first data information that the node device at family stores in the local database.
Step 306, whether verifying second data information by secret protection is counted by the first of the non-secret protection
It is believed that breath conversion gained.
If so,
Step 308, the application logic to second transaction is executed.
About above-mentioned trust setting transaction set-up mode, the first data information and the second data information transformation rule or
Mode, selection mode of trusted user etc., multiple implementations described in the above-mentioned privacy method of commerce based on block chain
It was described in example, details are not described herein.The above-mentioned application logic to the second transaction, including obtain in the second transaction by secret protection
The second data information corresponding to non-secret protection the first data information or based on first data information carry out data
Using or service application etc.;The application be may include that data application outside block chain may also comprise data application on block chain,
The transaction based on first data information is such as issued, is not construed as limiting in the present specification.
Compared to general setting parameter state or publication by the transaction of the data information of secret protection, in block chain
Money transfer transactions have some exclusive spies due to needing to be related to the account balance state generation linkage variation of at least two users
Levy step.Hereinafter, this specification elaborates this explanation so that block chain user A sends money transfer transactions to block chain user B as an example
Privacy method of commerce provided by book.Considered based on the personal secrets to itself account, block chain user A cooperates with its credible to appoint
Family SA is set the remaining sum (being assumed to be 100) in its account status to by method described in said one or multiple embodiments
By the state (for example, Hash digest value hash (100) corresponding to remaining sum 100) of secret protection.
As shown in figure 4, the process that the remaining sum 100 in block chain user's A account status is set as hash (100) can be wrapped
It includes:
Step 401, the node device of block chain user A sends trust setting into the distributed data base of block chain and hands over
Easily, its trusted user is set by user SA.
Step 402, the node device of block chain user A is sent by chain outer tunnel to the node device of trusted user SA
First message, the first message can include: the first data information --- remaining sum 100, the second data information --- by protection remaining sum
The digital signature Sign 1 of hash (100), user A to the first data information, digital signature of the user A to the second data information
Sign2。
Step 403, it is by that the node device of trusted user SA, which verifies the second data information according to data transformation rule,
One data information is converted and is obtained, and verifies above-mentioned Sign 1, Sign 2.
Step 404, after the verifying described in step 403 all passes through, the node device of trusted user SA is by first message
The first data information for being included --- remaining sum 100 saves in the local database.Optionally, the node of trusted user SA is set
It is standby that a mapping form can be set in the local database, to record above-mentioned first data information and the second data information.
Step 405, the node device of trusted user SA is digitally signed the second data information by verifying
Sign 4。
Step 406, the node device of trusted user SA sends the second transaction to block chain, which includes second
Data information --- by protection remaining sum hash (100), user A is to the digital signature Sign2 of the second data information, and user SA is to
The digital signature Sign 4 of two data informations.
Step 407, according to the consensus rules of the block chain, the common recognition node on block chain tests above-mentioned second transaction
Card, above-mentioned verifying include verifying user SA whether to belong to user A by trusting the determining trusted user of setting transaction, verifying the
The digital signature that two transaction include is the trusted user SA of user A and user A confirmation respectively to made by the second data information
's.
Step 408, after all verifyings described in the step 407 pass through, the common recognition node of the block chain (has common recognition power
The node of limit) it will include that the above-mentioned second block traded is indexed in the distributed data base of above-mentioned block chain, on the block chain
All nodes the balance status of user A is updated to hash (100) in its database.
Similarly, user B can also get up the balance status secret protection in its account, specific method can with step 401 to
408 is similar, and details are not described herein.
It is worth noting that, when the privacy method of commerce provided by this specification is privacy money transfer transactions, to guarantee to turn
The account balance of square user and the account balance of the side of being transferred to user can be verified by the node device of trusted user out, and phase occurs
The remaining sum answered changes, and the side of producing user should at least believe any one identical trusted user, that is, the side of producing with the side of being transferred to user
It should include the mark of at least one identical trusted user in the trust setting transaction that user sends with the side of being transferred to user, at this
In embodiment, trusted user SA is the trusted user of user A, is also the trusted user of user B.
User A completes to may particularly include to the process that user B transfers accounts:
Step 409, the node device of user A by the user A transaction message Txab to transfer accounts to user B be sent to user A with
The node device of user B common trusted user SA;Above-mentioned transaction message Txab includes the account identification of user A, user B
The Hash digest hash (10) of (account address or public key), transfer amounts 10, transfer amounts 10, user A is to transfer amounts 10
Digital signature Sign (hash of the digital signature Sign (10) and user A to the Hash digest hash (10) of transfer amounts 10
(10))。
Step 410, the node device of trusted user SA, which verifies Hash digest hash (10) according to data transformation rule, is
Whether the account balance 100 for being converted by transfer amounts 10 and being obtained, verify user A, which is enough to pay this, is transferred accounts, verifies above-mentioned Sign
(10)、Sign(hash(10))。
Step 411, after the verifying described in step 410 all passes through, the node device of trusted user SA is transferred accounts above-mentioned
Transfer amounts 10 in message save in the local database;It is transferred accounts based on this, the node device of trusted user SA is also answered
The account balance of user A and user B are changed in the local database.
Step 412, the node device of trusted user SA is to the transfer amounts hash by secret protection by verifying
(10) Sign 4 (hash (10)) are digitally signed;And it is generated for the account balance of user A and user B after the completion of transferring accounts new
Hash digest hash (account A), hash (account B) be digitally signed Sign (hash (account A)),
Sign(hash(account B))。
Step 413, the node device of trusted user SA sends the second transaction to block chain, which includes hidden
The transfer amounts hash (10) of private protection, the account balance of user A and user B after the completion of transferring accounts generate new Hash digest
Hash (account A) and hash (account B), user A are signed to by the number of the transfer amounts hash (10) of secret protection
Name Sign (hash (10)) and the digital signature Sign 4 (hash (10)) of user SA, Sign (hash (account A)),
Sign(hash(account B))。
Step 414, according to the consensus rules of the block chain, the common recognition node on block chain tests above-mentioned second transaction
Card, above-mentioned verifying include whether verifying user SA belongs to credible the appointing that transaction determination is arranged by trusting by user A and user B
Family, digital signature Sign (hash (10)), the Sign 4 (hash (10)) that the second transaction of verifying includes are user A and user respectively
The trusted user SA of A confirmation is to made by the Hash digest hash (10) of above-mentioned transfer amounts and the number of user SA is signed
Name Sign (hash (account A)), Sign (hash (account B)) are user SA respectively to the new of user A and user B
Made by Hash digest hash (account A), the hash (account B) of account balance.
Step 415, after all verifyings described in the step 414 pass through, the common recognition node of the block chain (has common recognition power
The node of limit) it will include that the above-mentioned second block traded is indexed in the distributed data base of above-mentioned block chain, on the block chain
All nodes the balance status of user A is updated to hash (account A) in its database, by the remaining sum shape of user B
State is updated to hash (account B).
Optionally, account of the node device to user A and user B after generation of transferring accounts to guarantee above-mentioned trusted user SA
The approval of user A and user B are passed through in the update of remaining sum, and user A and user B can also be respectively to the nodes of above-mentioned trusted user SA
Equipment sends the Hash digest of itself updated account balance and updated account balance and/or to above-mentioned updated
The digital signature of the Hash digest of account balance and updated account balance.The above specific process and each reality of this specification
The trusted user that applies the selection of user described in example stored in the distributed data base of block chain user by secret protection
The process of second data information is similar, and details are not described herein.
Corresponding with the realization of above-mentioned process, the embodiment of this specification additionally provides a kind of privacy transaction dress based on block chain
Set the application apparatus with a kind of privacy transaction based on block chain.Above-mentioned apparatus can be by software realization, can also be by hard
The mode of part or software and hardware combining is realized.It taking software implementation as an example, is by place equipment as the device on logical meaning
CPU (Central Process Unit, central processing unit) corresponding computer program instructions are read into memory operation
It is formed.For hardware view, other than CPU shown in Fig. 7, memory and memory, the realization of network risks business
Equipment where device also typically includes other hardware such as chip for carrying out wireless signal transmitting-receiving, and/or for realizing net
Other hardware such as board of network communication function.
Fig. 5 show a kind of privacy the transaction device 50 based on block chain, applied to the node device of trusted user,
In, the trust setting transaction that the trusted user is stored by the distributed data base of block chain determines that the trust setting is handed over
It easily include the mark of the corresponding all trusted users of the block chain user;Described device includes:
Receiving unit 502, receives the first message that the block chain user sends, and the first message is protected including non-privacy
The first data information protected and the second data information by secret protection, wherein second data information by secret protection
It is the first data information conversion gained by the non-secret protection;
First data information is stored in the local number of the node device of the trusted user by storage unit 504
According to library;
Transmission unit 506, Xiang Suoshu block chain send the second transaction, and second transaction includes that second data are believed
Breath, so that second transaction is embodied in the distributed data base of the block chain after being verified.
In the another embodiment shown, described device 50 further include:
Authentication unit 508 verifies the first message based on preset proof rule, with after described be verified by institute
The local data base that the first data information is stored in the node device of the trusted user is stated, wherein the preset verifying rule
It then include described in verifying by the first data information conversion institute that the second data information of secret protection is by the non-secret protection
?.
In the another embodiment shown, the first message includes that the block chain user at least protects the non-privacy
First digital signature made by first data information of shield and the block chain user are at least to described by the second of secret protection
Second digital signature made by data information;
The preset proof rule further include: verifying first digital signature is at least right by the block chain user
First data information of the non-secret protection is made, and it is at least right by the block chain user for verifying second digital signature
Second data information by secret protection is made.
In the another embodiment shown, the first message includes that the block chain user at least protects the non-privacy
Third digital signature made by the first data information and second data information by secret protection of shield;
The preset proof rule further include: it is at least right by the block chain user for verifying the third digital signature
First data information of the non-secret protection and second data information by secret protection are made.
In the another embodiment shown, second transaction further includes the trusted user at least to described by privacy
4th digital signature and the block chain user made by second data information of protection are at least to described by the of secret protection
Second digital signature made by two data informations.
In the another embodiment shown, the device 50, further includes:
Acquiring unit 510 obtains the trust setting transaction from the distributed data base of the block chain;
Confirmation unit 512, based on other trusteds user for trusting users to trust described in setting trade confirmation;
The first message chain that the block chain user sends is transmitted to its of the users to trust by transmission unit 514 outside
The node device of his trusted user, so that the node that first data information is saved in other trusteds user is set
In standby local data base.
In the another embodiment shown, the receiving unit 502 of the device 50: other trusteds user is received
At least based on digital signature made by second data information;
Second transaction further includes that other trusteds user is at least based on number made by second data information
Word signature.
In the another embodiment shown, second data information by secret protection is the of the non-secret protection
The data summarization of one data information.
In the another embodiment shown, the first message includes the block chain user to other blocks chain user
Transfer amounts;Second transaction includes by the transfer amounts of secret protection and the block chain user and other described areas
The account balance by secret protection of block chain user;
The trusted user is also other described block chain users corresponding trusted user in trusting setting transaction.
The application apparatus 60 for the privacy transaction based on block chain that Fig. 6 show that present description provides a kind of, comprising:
Acquiring unit 602 is obtained from the distributed data base of the block chain and is sent by the node device of trusted user
The second transaction, second transaction includes the second data information by secret protection, wherein the trusted user is by block
The trust setting transaction of the distributed data base storage of chain determines that the trust setting transaction includes that the block chain user is corresponding
All trusted users mark;
Receiving unit 604 receives the first data letter of the non-secret protection of the node device transmission of the trusted user
Breath, first data information are saved in the local data base of the node device of the trusted user;
Authentication unit 606, whether verifying second data information by secret protection is by the of the non-secret protection
One data information conversion gained;
Applying unit 608 executes the application logic to second transaction.
The function of each unit and the realization process of effect are specifically detailed in the above method and correspond to step in above-mentioned apparatus
Realization process, the relevent part can refer to the partial explaination of embodiments of method, and details are not described herein.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member
It is physically separated with being or may not be, component shown as a unit may or may not be physics mould
Block, it can it is in one place, or may be distributed on multiple network modules.It can be selected according to the actual needs
In some or all of unit or module realize the purpose of this specification scheme.Those of ordinary skill in the art are not paying
In the case where creative work, it can understand and implement.
Device that above-described embodiment illustrates, unit, module can specifically be realized, Huo Zheyou by computer chip or entity
Product with certain function is realized.A kind of typically to realize that equipment is computer, the concrete form of computer can be a
People's computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media player, navigation
It is any several in equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment
The combination of kind equipment.
Corresponding with above method embodiment, the embodiment of this specification additionally provides a kind of computer equipment, the calculating
Machine equipment includes memory and processor.Wherein, the computer program that can be run by processor is stored on memory;Processing
For device in the computer program of operation storage, the privacy method of commerce based on block chain is each in execution this specification embodiment
Step.Content before referring to the detailed description of each step of the privacy method of commerce based on block chain, is not repeated.
Corresponding with above method embodiment, the embodiment of this specification additionally provides a kind of computer equipment, the calculating
Machine equipment includes memory and processor.Wherein, the computer program that can be run by processor is stored on memory;Processing
Device executes the application method of the privacy transaction in this specification embodiment based on block chain in the computer program of operation storage
Each step.In before being referred to the detailed description of each step of the application method of the privacy transaction based on block chain
Hold, is not repeated.
The foregoing is merely the preferred embodiments of this specification, all in this explanation not to limit this specification
Within the spirit and principle of book, any modification, equivalent substitution, improvement and etc. done should be included in the model of this specification protection
Within enclosing.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or
Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to
Herein defines, and computer-readable medium does not include temporary computer readable media (transitory media), such as modulation
Data-signal and carrier wave.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that the embodiment of this specification can provide as the production of method, system or computer program
Product.Therefore, the embodiment of this specification can be used complete hardware embodiment, complete software embodiment or combine software and hardware side
The form of the embodiment in face.Moreover, it wherein includes that computer is available that the embodiment of this specification, which can be used in one or more,
It is real in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form for the computer program product applied.