Summary of the invention
The purpose of this specification one or more embodiment is to provide a kind of block chain data processing method, device and is
System, to realize the purpose for ensuring the safety of data while using block chain technology.
In order to solve the above technical problems, this specification one or more embodiment is achieved in that
On the one hand, this specification one or more embodiment provides a kind of block chain data processing method, comprising:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, is obscured
At least one target hash afterwards;
Fragment processing is carried out at least one described target hash;
Target hash after fragment is stored respectively into the second block chain.
In one embodiment, described to obscure encryption mode according to preset the multiple hash is mixed
Confuse encryption, at least one target hash after being obscured, comprising:
Hash calculation at least once is carried out to each hash respectively, obtains at least one described target Hash number
According to.
In one embodiment, the fragment handles target hash included in corresponding each fragment and is not more than
Predetermined number.
In one embodiment, the target hash by after fragment is stored respectively into the second block chain, comprising:
It stores target hash included in each fragment as a business record to described second
In block chain.
In one embodiment, multiple Kazakhstan corresponding to multiple business datums of block record in obtaining the first block chain
Before uncommon data, further includes:
Determine that the data of the first block chain check that permission is only visible to the first designated user group;And described in determining
The data of second block chain check that permission is visible to all users.
In one embodiment, the method also includes:
Obscure encryption mode by described and store into third block chain;And determine the data of the third block chain
Check that permission is only visible to the second designated user group.
On the other hand, this specification one or more embodiment provides a kind of block chain data processing equipment, comprising:
Module is obtained, for obtaining multiple Hash numbers corresponding to multiple business datums that block records in the first block chain
According to;
Module is obscured, for obscuring encryption mode according to preset and carrying out obscuring encryption to the multiple hash
Processing, at least one target hash after being obscured;
Fragment module, for carrying out fragment processing at least one described target hash;
First memory module, for being stored the target hash after fragment respectively into the second block chain.
In another aspect, this specification one or more embodiment provides a kind of block chain data processing system, including first
Block chain, data processing node and the second block chain;Wherein:
The first block chain, for recording multiple hash corresponding to multiple business datums;
The data processing node, for obtaining the multiple hash that block records in the first block chain;
The data processing node, be also used to according to it is preset obscure encryption mode to the multiple hash into
Row obscures encryption, at least one target hash after being obscured;To at least one described target hash into
The processing of row fragment;Target hash after fragment is stored respectively into the second block chain;
The second block chain, for storing the target hash after the fragment.
In another aspect, this specification one or more embodiment provides a kind of block chain data processing equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed
Manage device:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, is obscured
At least one target hash afterwards;
Fragment processing is carried out at least one described target hash;
Target hash after fragment is stored respectively into the second block chain.
In another aspect, the embodiment of the present application provides a kind of storage medium, for storing computer executable instructions, it is described can
It executes instruction and realizes following below scheme when executed:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, is obscured
At least one target hash afterwards;
Fragment processing is carried out at least one described target hash;
Target hash after fragment is stored respectively into the second block chain.
Using the technical solution of this specification one or more embodiment, by obtaining block record in the first block chain
Multiple hash corresponding to multiple business datums, and according to it is preset obscure encryption mode to multiple hash into
Row obscures encryption, at least one target hash after being obscured, and at least one target hash
Fragment processing is carried out, and then the target hash after fragment is stored respectively into the second block chain.As it can be seen that the technical solution
By obscuring multiple hash corresponding to multiple business datums, the target hash finally stored is used by outside
Family access, but external user is difficult to analyze it to know the information such as transaction size, transaction magnitude.Therefore block is being ensured
While data are really transparent in chain, additionally it is possible to the safety of data is ensured, to be conducive to user's energy when using block chain
It is enough preferably to protect own service.
Specific embodiment
This specification one or more embodiment provides a kind of block chain data processing method, apparatus and system, to reality
The purpose for ensuring the safety of data while block chain technology is used now.
In order to make those skilled in the art more fully understand the technical solution in this specification one or more embodiment,
Below in conjunction with the attached drawing in this specification one or more embodiment, to the technology in this specification one or more embodiment
Scheme is clearly and completely described, it is clear that and described embodiment is only this specification a part of the embodiment, rather than
Whole embodiments.Based on this specification one or more embodiment, those of ordinary skill in the art are not making creativeness
The model of this specification one or more embodiment protection all should belong in every other embodiment obtained under the premise of labour
It encloses.
Fig. 1 is according to a kind of schematic flow chart of block chain data processing method of one embodiment of this specification, such as Fig. 1
It is shown, this method comprises:
S102 obtains multiple hash corresponding to multiple business datums of block record in the first block chain.
S104 obscures encryption mode and carries out obscuring encryption to multiple hash, mixed according to preset
At least one target hash after confusing.
S106 carries out fragment processing at least one target hash.
S108 stores the target hash after fragment respectively into the second block chain.
In one embodiment, multiple hash corresponding to multiple business datums that block records in the first block chain
Account book for the transaction recorded in the first block chain, which, which can be, only may have access to the node in the first block chain.It should
Account book is stored after obscuring encryption to the second block chain, and the encrypted account book of obscuring stored in the second block chain can be with
It is that may have access to external user.The external user such as public is made to may have access to the account book, on the one hand as a result, to ensure that data are true
Transparent, on the other hand, what is obtained due to external user is account book after obscuring encryption, is difficult to obscuring encrypted account
This is parsed to obtain the relevant information of true sale amount, has also ensured the safety of Transaction Information.
Above-mentioned technical proposal is by obscuring multiple hash corresponding to multiple business datums as a result, so that finally depositing
The target hash of storage can be accessed by external user, but external user is difficult to analyze it to know transaction size, hand over
The information such as easy magnitude.Therefore while data are really transparent in ensureing block chain, additionally it is possible to ensure the safety of data, thus
Own service can preferably be protected when using block chain by being conducive to user.
It should be understood that in the embodiment of the present application, the encryption of obscuring to hash may include various ways.
Optionally, in one implementation, the content that multiple hash form can be subjected to Hash calculation and obtains one
A hash.
For example, it is assumed that 4 in some block of block chain storages record corresponding hash be respectively HashA,
HashB, HashC and HashD, then the hash HashABCD=Hash (HashA+HashB+HashC after obscuring encryption
+ HashD), wherein function Hash () indicates Hash calculation function, such as MD5, SHA-1, SHA-256, SHA-384 and SHA-
512, etc..In bit coin system, the hash algorithm used is SHA-256.
Optionally, in another implementation, the content that any one hash can be divided into multiple portions is distinguished again
Hash calculation is carried out, the corresponding multiple hash of content of the multiple part are obtained.
For example, it is assumed that it is HashA that a storage in some block of block chain, which records corresponding hash, can incite somebody to action
HashA splits into HashA1 and HashA2, then carries out Hash respectively and handles to get HashA1 '=Hash (HashA1) is arrived,
HashA2 '=Hash (HashA2), HashA1 ' and HashA2 ' at this time, which obscure to HashA, to be obtained after encryption
Hash.Certainly, HashA can also be split into 3 parts, 4 parts or even more parts, specifically split into how many a portions
Point, how to split, is configurable.
Optionally, in another implementation, the content that multiple hash form can be separated into multiple portions
Content, and Hash calculation is carried out respectively to the content of each part, obtain the corresponding multiple Hash of content of the multiple part
Data.
For example, it is assumed that 4 in some block of block chain storages record corresponding hash be respectively HashA,
HashB, HashC and HashD, the content HashABCD=(HashA+HashB+HashC+HashD) of composition;It can incite somebody to action
HashABCD is divided into HashABCD1 and HashABCD2, then carries out Hash calculation respectively to HashABCD1 and HashABCD2 and obtain
Hash (HashABCD1) and Hash (HashABCD2), Hash (HashABCD1) and Hash (HashABCD2) are multiple portion
The corresponding multiple hash of content divided.
Furthermore, it is to be understood that the obfuscation schemes of the embodiment of the present application, can also carry out multilayer and obscure encryption, i.e., by one layer
Obscure the hash after encryption, then carry out one or more layers obscure encryption.Different layers obscure encryption
Algorithm, may be the same or different.
For example, it is assumed that 4 in some block of block chain storages record corresponding hash be respectively HashA,
HashB, HashC and HashD, then first layer obscures the Hash information HashABCD=Hash (HashA+HashB after encryption
+HashC+HashD);It is Hash (HashABCD1) and Hash that the second layer, which obscures the hash after encryption,
(HashABCD2), wherein HashABCD=HashABCD1+HashABCD2.
Optionally, in another implementation, one or many fragment processing can be carried out to hash and/or is breathed out
It is uncommon to calculate.Specifically, fragment processing only can be carried out to obtain target hash to hash, by fragment processing and can also breathe out
The uncommon mode calculated, which combines, obscure encryption to hash to obtain target hash.
It is exemplified below and a kind of detailed obscures encryption mode.
Firstly, carrying out fragment processing to hash according to specified fragment rule, multiple first data slots are obtained.
Wherein, specifying fragment rule includes: that the rule of fragment is carried out according to specified data length;For example, specified data are long
Degree is 64KB, then carries out fragment to hash according to the rule that each data slot size is 64KB;Alternatively, according to it is specified when
The long rule for carrying out fragment;For example, it is 1 second a length of when specified, then fragment is carried out according to the hash of interior storage per second, it is such as current
The hash stored in 1 second is a data slot, and the hash stored in lower 1 second is then next data slot.
Secondly, carrying out Hash calculation to each first data slot respectively, multiple second data slots are obtained.
Finally, obscuring encrypted target hash according to the determination of multiple second data slots.Specifically, can directly really
Fixed second data slot is target hash, can also carry out one or many fragments to the second data slot again and handle
And/or Hash calculation, finally obtain target hash.
In the present embodiment, lists and fragment processing is carried out, then to the data slice obtained after fragment to hash first
Duan Jinhang Hash calculation obscures encryption mode.Clearly as obscuring the diversity of encryption mode, add by obscuring
Close treated that target hash is difficult to be known by external user, it is thus ensured that the safety of target hash.
Certainly, except it is above-mentioned enumerate obscure encryption mode in addition to, other also can be used and a variety of obscures encryption side
Formula carries out hash to obscure encryption, handles the mode combined with multiple Hash calculation including multiple fragment, and more
The sequence of secondary fragment processing and multiple Hash calculation is not limited.The number of fragment processing and/or Hash calculation is more, that is, obscures
Encryption mode is more complicated, and the safety of obtained target hash is also higher.
In one embodiment, before hash corresponding to the business datum recorded in obtaining the first block chain,
It can first determine that the data of the first block chain check that permission is only to first designated user's group as it can be seen that as only in the first block chain
Each node is visible;And determine that the data of the second block chain check that permission is to all users as it can be seen that as the external user such as public is equal
It may have access to the data.
Wherein, first designated user's group can be a user or multiple users.
In the present embodiment, since the first block chain is only to first designated user's group as it can be seen that other external users are invisible, because
Multiple hash corresponding to multiple business datums of block storage are difficult to be known by external user in this first block chain, from
And ensure the safety of multiple hash corresponding to multiple business datums;Further, since the second block chain is to all users
As it can be seen that i.e. all users can know the encrypted target hash of obscuring stored in the second block chain, therefore ensure
The transparent authenticity of data in block chain, and even if external user to have known obscuring of storing in the second block chain encrypted
Target hash obscures encryption mode due to not knowing that target hash is corresponding, can not also know business
The truthful data of data, so that it is guaranteed that the safety of business datum, being conducive to user can preferably be protected when using block chain
Protect own service.
In one embodiment, at least one encrypted target hash will be obscured to store into the second block chain
When, fragment processing first can be carried out to obscuring encrypted at least one target hash, and then by the target Hash after fragment
Data are stored respectively into the second block chain.
In the present embodiment, target hash included in the corresponding each fragment of fragment processing not more than predetermined
Number, wherein the total length of predetermined number target hash should be no more than the maximum of block record data in the second block chain
Length.It therefore, can be according in each fragment when to encrypted at least one target hash progress fragment processing is obscured
Mode comprising fixed quantity target hash carries out fragment, wherein fixed quantity should be not more than predetermined number.
In the present embodiment, after obscuring encrypted at least one target hash progress fragment processing, obtain multiple
Fragment.It therefore, can will be included in each fragment when the target hash after fragment is stored respectively into the second block chain
Target hash is respectively as a business record storage into the second block chain.
In one embodiment, it can will obscure encryption mode to store into third block chain, and determine third block
The data of chain check that permission is only visible to the second designated user group.
Wherein, second designated user's group can be a user or multiple users.Second designated user's group can refer to first
It is identical or different to determine user group (i.e. for the first visible user group of block chain).Second designated user's group can be and the firstth area
The relevant staff of data stored in block chain/second block chain, such as the maintenance personnel of block chain, being somebody's turn to do (a little) user can be right
The hash stored in first block chain/second block chain is managed, such as storage, update operation;Alternatively, being somebody's turn to do (a little)
User can also be managed the encryption mode of obscuring stored in third block chain, such as storage, modification operation.
It in the present embodiment, is individually stored by the way that encryption mode will be obscured into third block chain, so that second is specified
User group, which is conveniently known, obscures encryption mode, to obscure encryption mode by acquisition to obtain the true of business datum
Real data.Also, it is external since third block chain is only to second designated user's group as it can be seen that other external users are invisible
User is difficult to know that is stored in third block chain obscures encryption mode, to be difficult to know the true number of business datum
According to, it is ensured that the safety of business datum.
In one embodiment, can also will obscure encryption mode to store into the first block chain, due to the first block
Chain is only to first designated user's group as it can be seen that other external users are invisible, therefore what is stored in the first block chain obscures at encryption
Reason mode is difficult to be known by external user, so that external user be made to be difficult to know the truthful data of business datum, it is ensured that business
The safety of data.
In the present embodiment, encryption mode hash corresponding with business datum will be obscured and be collectively stored in the firstth area
In the chain of domain, the safety of business datum not only can ensure that, moreover it is possible to which saving obscures encryption mode to the occupancy of block chain.
To sum up, the specific embodiment of this theme is described.Other embodiments are in the appended claims
In range.In some cases, the movement recorded in detail in the claims can execute and still in a different order
Desired result may be implemented.In addition, process depicted in the drawing not necessarily requires the particular order shown or continuous suitable
Sequence, to realize desired result.In some embodiments, multitasking and parallel processing can be advantageous.
The above are the block chain data processing methods that this specification one or more embodiment provides, and are thought based on same
Road, this specification one or more embodiment also provide a kind of block chain data processing equipment.
Fig. 2 is according to a kind of schematic block diagram of block chain data processing equipment of one embodiment of this specification, such as Fig. 2 institute
Show, block chain data processing equipment 200 includes:
Module 210 is obtained, for obtaining multiple Kazakhstan corresponding to multiple business datums that block records in the first block chain
Uncommon data;
Module 220 is obscured, for obscuring encryption mode according to preset and carrying out obscuring encryption to multiple hash
Processing, at least one target hash after being obscured;
Fragment module 230, for carrying out fragment processing at least one described target hash;
First memory module 240, for being stored the target hash after fragment respectively into the second block chain.
In one embodiment, obscuring module 220 includes:
Computing unit obtains at least one target for carrying out Hash calculation at least once to each hash respectively
Hash.
In one embodiment, it is not more than predetermined to handle target hash included in corresponding each fragment for fragment
Number.
In one embodiment, the first memory module 240 includes:
Storage unit, for being arrived target hash included in each fragment as a business record storage
In second block chain.
In one embodiment, device 200 further include:
First determining module, for multiple corresponding to multiple business datums of block record in obtaining the first block chain
Before hash, determine that the data of the first block chain check that permission is only visible to the first designated user group;And determine second
The data of block chain check that permission is visible to all users.
In one embodiment, device 200 further include:
Storage and determining module, store for that will obscure encryption mode into third block chain;And determine third area
The data of block chain check that permission is only visible to the second designated user group.
Using the device of this specification one or more embodiment, recorded by block in the first block chain of acquisition multiple
Multiple hash corresponding to business datum, and obscure encryption mode according to preset multiple hash are mixed
Confuse encryption, at least one target hash after being obscured, and at least one target hash is carried out
Fragment processing, and then the target hash after fragment is stored respectively into the second block chain.As it can be seen that the technical solution passes through
Obscure multiple hash corresponding to multiple business datums, the target hash finally stored is visited by external user
It asks, but external user is difficult to analyze it to know the information such as transaction size, transaction magnitude.Therefore in ensureing block chain
While data are really transparent, additionally it is possible to the safety of data is ensured, so that being conducive to user can be more when using block chain
Protect own service well.
It should be understood that above-mentioned block chain data processing equipment can be previously described for realizing
Block chain data processing method, datail description therein should be described with method part above it is similar, it is cumbersome to avoid, it is not another herein
It repeats.
Based on same thinking, this specification one or more embodiment also provides a kind of block chain data processing system.
Fig. 3 is according to a kind of schematic block diagram of block chain data processing system of one embodiment of this specification, such as Fig. 3 institute
Show, block chain data processing system 300 includes the first block chain 310, data processing node 320 and the second block chain 330;Its
In:
First block chain 310, for recording multiple hash corresponding to multiple business datums;
Data processing node 320, for obtaining multiple hash that block records in the first block chain 310;
Data processing node 320 is also used to obscure encryption mode according to preset and mix multiple hash
Confuse encryption, at least one target hash after being obscured;At least one target hash is carried out at fragment
Reason;Target hash after fragment is stored respectively into the second block chain 330;
Second block chain 330, for storing the target hash after fragment.
In one embodiment, data processing node 320 is also used to:
Hash calculation at least once is carried out to each hash respectively, obtains at least one target hash.
In one embodiment, it is not more than predetermined to handle target hash included in corresponding each fragment for fragment
Number.
In one embodiment, data processing node 320 is also used to:
It stores target hash included in each fragment as a business record to described second
In block chain.
In one embodiment, data processing node 320 is also used to:
Determine that the data of the first block chain check that permission is only visible to the first designated user group;And determine the second block
The data of chain check that permission is visible to all users.
In one embodiment, system 300 further include:
Third block chain obscures encryption mode for storing;
Correspondingly, data processing node 320, is also used to determine that third block chain data check that permission is only specified to second
User group is visible.
Using the system of this specification one or more embodiment, recorded by block in the first block chain of acquisition multiple
Multiple hash corresponding to business datum, and obscure encryption mode according to preset multiple hash are mixed
Confuse encryption, at least one target hash after being obscured, and at least one target hash is carried out
Fragment processing, and then the target hash after fragment is stored respectively into the second block chain.As it can be seen that the technical solution passes through
Obscure multiple hash corresponding to multiple business datums, the target hash finally stored is visited by external user
It asks, but external user is difficult to analyze it to know the information such as transaction size, transaction magnitude.Therefore in ensureing block chain
While data are really transparent, additionally it is possible to the safety of data is ensured, so that being conducive to user can be more when using block chain
Protect own service well.
It should be understood that above-mentioned block chain data processing system can be previously described for realizing
Block chain data processing method, datail description therein should be described with method part above it is similar, it is cumbersome to avoid, it is not another herein
It repeats.
Based on same thinking, this specification one or more embodiment also provides a kind of block chain data processing equipment,
As shown in Figure 4.Block chain data processing equipment can generate bigger difference because configuration or performance are different, may include one
Or more than one processor 401 and memory 402, it can store one or more storage applications in memory 402
Program or data.Wherein, memory 402 can be of short duration storage or persistent storage.The application program for being stored in memory 402 can
To include one or more modules (diagram is not shown), each module may include in block chain data processing equipment
Series of computation machine executable instruction.Further, processor 401 can be set to communicate with memory 402, in block chain
The series of computation machine executable instruction in memory 402 is executed on data processing equipment.Block chain data processing equipment may be used also
To include one or more power supplys 403, one or more wired or wireless network interfaces 404, one or one with
Upper input/output interface 405, one or more keyboards 406.
Specifically in the present embodiment, block chain data processing equipment includes memory and one or more
Program, perhaps more than one program is stored in memory and one or more than one program may include one for one of them
A or more than one module, and each module may include executable to the series of computation machine in block chain data processing equipment
Instruction, and be configured to execute this or more than one program by one or more than one processor to include for carrying out
Following computer executable instructions:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, is obscured
At least one target hash afterwards;
Fragment processing is carried out at least one described target hash;
Target hash after the fragment is stored respectively into the second block chain.
Optionally, computer executable instructions when executed, can also make the processor:
Hash calculation at least once is carried out to each hash respectively, obtains at least one described target Hash number
According to.
Optionally, the fragment handles target hash included in corresponding each fragment not more than predetermined
Number.Optionally, computer executable instructions when executed, can also make the processor:
It stores target hash included in each fragment as a business record to described second
In block chain.
Optionally, computer executable instructions when executed, can also make the processor:
In obtaining the first block chain before multiple hash corresponding to multiple business datums of block record, determine
The data of the first block chain check that permission is only visible to the first designated user group;And determine the second block chain
Data check that permission is visible to all users.
Optionally, computer executable instructions when executed, can also make the processor:
Obscure encryption mode by described and store into third block chain;And determine the data of the third block chain
Check that permission is only visible to the second designated user group.
This specification one or more embodiment also proposed a kind of computer readable storage medium, this is computer-readable to deposit
Storage media stores one or more programs, which includes instruction, and it is included multiple application programs which, which works as,
Electronic equipment when executing, the electronic equipment can be made to execute above-mentioned block chain data processing method, and be specifically used for executing:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, is obscured
At least one target hash afterwards;
Fragment module, for carrying out fragment processing at least one described target hash;
Target hash after the fragment is stored respectively into the second block chain.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when specification one or more embodiment.
It should be understood by those skilled in the art that, this specification one or more embodiment can provide for method, system or
Computer program product.Therefore, complete hardware embodiment can be used in this specification one or more embodiment, complete software is implemented
The form of example or embodiment combining software and hardware aspects.Moreover, this specification one or more embodiment can be used one
It is a or it is multiple wherein include computer usable program code computer-usable storage medium (including but not limited to disk storage
Device, CD-ROM, optical memory etc.) on the form of computer program product implemented.
This specification one or more embodiment is referring to according to the method for the embodiment of the present application, equipment (system) and meter
The flowchart and/or the block diagram of calculation machine program product describes.It should be understood that can be realized by computer program instructions flow chart and/
Or the combination of the process and/or box in each flow and/or block and flowchart and/or the block diagram in block diagram.It can
These computer program instructions are provided at general purpose computer, special purpose computer, Embedded Processor or other programmable datas
The processor of equipment is managed to generate a machine, so that holding by the processor of computer or other programmable data processing devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
This specification one or more embodiment can computer executable instructions it is general on
It hereinafter describes, such as program module.Generally, program module includes executing particular task or realization particular abstract data type
Routine, programs, objects, component, data structure etc..The application can also be practiced in a distributed computing environment, at these
In distributed computing environment, by executing task by the connected remote processing devices of communication network.In distributed computing
In environment, program module can be located in the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The foregoing is merely this specification one or more embodiments, are not limited to this specification.For this
For the technical staff of field, this specification one or more embodiment can have various modifications and variations.It is all in this specification one
Any modification, equivalent replacement, improvement and so within the spirit and principle of a or multiple embodiments, should be included in this explanation
Within the scope of the claims of book one or more embodiment.