CN110046509A - The method and device that the transaction of a kind of pair of write-in block chain is hidden - Google Patents

The method and device that the transaction of a kind of pair of write-in block chain is hidden Download PDF

Info

Publication number
CN110046509A
CN110046509A CN201910101446.6A CN201910101446A CN110046509A CN 110046509 A CN110046509 A CN 110046509A CN 201910101446 A CN201910101446 A CN 201910101446A CN 110046509 A CN110046509 A CN 110046509A
Authority
CN
China
Prior art keywords
transaction
data
block chain
hash
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910101446.6A
Other languages
Chinese (zh)
Other versions
CN110046509B (en
Inventor
杨新颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Chain Technology Co ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910101446.6A priority Critical patent/CN110046509B/en
Publication of CN110046509A publication Critical patent/CN110046509A/en
Application granted granted Critical
Publication of CN110046509B publication Critical patent/CN110046509B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Disclose the method and device that the transaction of a kind of pair of write-in block chain is hidden.If some transaction of write-in block chain is sensitive transactions (including unsuitable disclosed sensitive content), it is possible to which the transaction in block chain to be substituted for the concealment data of the transaction Hash including the transaction.

Description

The method and device that the transaction of a kind of pair of write-in block chain is hidden
Technical field
What the transaction that this specification embodiment is related to information technology field more particularly to a kind of pair of write-in block chain was hidden Method and device.
Background technique
Block chain network is a kind of decentralization, the distributed data-storage system participated in by multiple nodes.Data one Denier is written into the block chain on each node, on the one hand, mean that data are disclosed in the whole network, on the other hand, write-in block chain Data are also difficult to be deleted and distort.Based on this, card field is deposited in data, block chain technology has great application prospect.
In addition, centralization equipment can also (the block chain that can be considered as centralization be deposited using the storage of class block chain in practice Storage) mode data are stored, the block in block chain is identical as the generating principle of block in class block chain.Obviously, If the data in write-in class block chain are deleted, except decentralization equipment all deletes the entire class block chain of storage.Therefore, The class block chain storage of centralization, which is also compared, to be suitably applied data and deposits card business.Herein by the class of block chain and other centralizations Block chain is referred to as block chain.
However, in practical applications, some contents (herein referred to as sensitive content) are once written into block chain, will result in It is difficult to the hazard analysis and HACCP eliminated.
Summary of the invention
It is be easy to cause hazard analysis and HACCP in order to solve the problems, such as that sensitive content is written into block chain, this specification embodiment provides one The method and device that kind hides the transaction of write-in block chain, technical solution are as follows:
According to the 1st of this specification embodiment the aspect, the method that the transaction of a kind of pair of write-in block chain is hidden is provided, is wrapped It includes:
Receive hide instruction;The hide instruction is identified comprising target transaction;
According to the hide instruction, concealmentization data are determined;The concealmentization data include the target transaction mark pair The transaction Hash for the transaction answered;
The transaction for corresponding to target transaction mark in block chain is substituted for the concealmentization data, and, it will be described Target transaction identify corresponding exchange the label of block be determined as specified label.
According to the 2nd of this specification embodiment the aspect, the device that the transaction of a kind of pair of write-in block chain is hidden is provided, is wrapped It includes:
Receiving module receives hide instruction;The hide instruction is identified comprising target transaction;
Determining module determines concealmentization data according to the hide instruction;The concealmentization data include that the target is handed over Easily identify the transaction Hash of corresponding transaction;
The transaction for corresponding to target transaction mark in block chain is substituted for the concealmentization data by processing module, with And by the target transaction identify corresponding exchange the label of block be determined as specified label.
Technical solution provided by this specification embodiment, if some transaction of write-in block chain is that sensitive transactions (include Have unsuitable disclosed sensitive content), it is possible to which the transaction in block chain to be substituted for the hidden of the transaction Hash including the transaction Hideing data.On the one hand, the transaction Hash of the transaction is calculated using one-way Hash algorithm (i.e. hash algorithm) the transaction Arrive, by the transaction transaction Hash can not backstepping go out the transaction, therefore, which is substituted for concealmentization data, is equivalent to The clear content of the transaction of publicity in block chain irretrievably is hidden.On the other hand, which is substituted for concealment Change data, will not influence the exchange in the stability of the corresponding Mei Keer tree of block, would not also influence for other Simple payment verification (the Simplified Payment of transaction (being located at the transaction in same block with the transaction) Verification, SPV) accuracy, to ensure that data deposit the normal operation of card business.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not This specification embodiment can be limited.
In addition, any embodiment in this specification embodiment does not need to reach above-mentioned whole effects.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only The some embodiments recorded in this specification embodiment for those of ordinary skill in the art can also be attached according to these Figure obtains other attached drawings.
Fig. 1 is the structural schematic diagram of this Mei Keer tree for illustrating to provide;
Fig. 2 is the method hidden of transaction for a kind of pair of write-in block chain that this specification embodiment provides, process show It is intended to;
Fig. 3 is the process schematic for the construction concealmentization data that this specification embodiment provides;
Fig. 4 is another process schematic for the construction concealmentization data that this specification embodiment provides;
Fig. 5 is the process signal for the method that the transaction for a kind of pair of write-in block chain that this specification embodiment provides is hidden Figure;
Fig. 6 is the schematic diagram of the content field that this specification embodiment provides and identification field;
Fig. 7 is that the process for the method that a kind of transaction to write-in block chain that this specification embodiment provides is hidden is shown It is intended to;
Fig. 8 is a kind of schematic diagram for concealmentization data comprising non-sensitive content that this specification embodiment provides;
Fig. 9 is the process signal for the method that the transaction for a kind of pair of write-in block chain that this specification embodiment provides is hidden Figure;
Figure 10 is that the process for the method that the transaction for a kind of pair of write-in block chain that this specification embodiment provides is hidden is shown It is intended to;
Figure 11 is a kind of process signal of the method for the corresponding Mei Keer tree of building block that this specification embodiment provides Figure;
Figure 12 is that the process for the method that the transaction for a kind of pair of write-in block chain that this specification embodiment provides is hidden is shown It is intended to;
Figure 13 is that the process of the method for the corresponding Mei Keer tree of another building block that this specification embodiment provides is shown It is intended to;
Figure 14 is a kind of flow diagram for simple payment verification method that this specification embodiment provides;
Figure 15 is that the structure for the device that the transaction for a kind of pair of write-in block chain that this specification embodiment provides is hidden is shown It is intended to;
Figure 16 is that this illustrates that the structure for the device that the transaction for a kind of pair of write-in block chain that Soviet Union's embodiment provides is hidden is shown It is intended to;
Figure 17 is that this illustrates that the structure for the device that the transaction for a kind of pair of write-in block chain that Soviet Union's embodiment provides is hidden is shown It is intended to;
Figure 18 is that this illustrates that the structure for the device that the transaction for a kind of pair of write-in block chain that Soviet Union's embodiment provides is hidden is shown It is intended to;
Figure 19 is that this illustrates that the structure for the device that the transaction for a kind of pair of write-in block chain that Soviet Union's embodiment provides is hidden is shown It is intended to;
Figure 20 is a kind of structural representation of the device for the corresponding Mei Keer tree of building block that this specification embodiment provides Figure;
Figure 21 is a kind of structural schematic diagram for simple payment verification device that this specification embodiment provides;
Figure 22 is the structural schematic diagram for configuring a kind of computer equipment of this specification embodiment device.
Specific embodiment
As previously mentioned, in practical applications, sensitive content is once written into block chain, after will result in the harm for being difficult to eliminate Fruit.
For example, Zhang San calumniates Li Si, and the text file for calumniating speech is uploaded into block chain network and is deposited Card, causes this article this document to be written into block chain, causes not eliminable injury to the fame of Li Si.For another example, company A steals B The trade secret of company, and the trade secret stolen is submitted to and is deposited using the centralization equipment of class block chain storage mode Card, causes the trade secret to be written into class block chain, and in order to eliminate harm, the entire class of storage can only be deleted by centralization equipment Block chain, the cost paid are excessively huge.
It should be noted that transaction (transaction) described in this specification, refers to one in write-in block chain Data.Transaction is a kind of data structure arranged in block chain agreement or class block chain agreement, and a data will be stored in block Chain, it is necessary to be packaged into transaction.
In the case where the data based on block chain deposit card scene, transaction is just difficult to delete and distort once being written into block chain.However, In practical applications, it is identified if the transaction of write-in block chain is subsequent comprising unsuitable disclosed sensitive content, how to protect Under the premise of demonstrate,proving block chain storage service normal operation, the sensitive content of write-in block chain is no longer disclosed, and is just become one and is difficult to solve The technical issues of.
It should be noted that assume directly to delete the sensitive transactions (transaction comprising sensitive content) of write-in block chain, that It easilys lead to deposit card business based on the data that block chain is run and be unable to operate normally.Reason specifically:
Common block chain technology (the class block chain of block chain or centralization) is often supported simply to pay SPV verifying.SPV is Refer to for some transaction, verifies whether the transaction has been written into block chain.The principle of SPV is (area, checking request bearing data storage side Block chain node or centralization equipment) requests verification some transaction (referred to as target transaction) whether have been written into block chain, data storage side The block (referred to as target block) where the target transaction can be positioned first, each transaction building being then based in target block Mei Keer tree (Merkle trees) then determines the corresponding path Mei Keer of target transaction, and by the corresponding plum of target transaction Cryptographic Hash associated by the path Ke Er returns to checking request side.The cryptographic Hash that meeting data storage side, checking request side returns, is tested It whether correct demonstrate,proves the corresponding path Mei Keer of target transaction, i.e., is returned according to the transaction Hash of target transaction and data storage side Cryptographic Hash, according to the corresponding path Mei Keer of the target transaction, what the root Hash of calculating Mei Keer tree, and judgement were calculated Whether the root Hash in root Hash and the block head of target block is consistent, if unanimously, it is assumed that being verified, it was demonstrated that target is handed over Easily had been written in block chain really.
Fig. 1 is the structural schematic diagram of this Mei Keer tree for illustrating to provide.As shown in Figure 1, in Mei Keer tree, each leaf section Point is corresponded with each transaction stored in target block.Cryptographic Hash on each leaf node is breathed out to corresponding transaction The transaction Hash that uncommon operation obtains.And it is directed to each father node, the cryptographic Hash on the father node is two sons to the father node Cryptographic Hash on node carries out what Hash operation obtained.
Assuming that target transaction transaction 1.Checking request side needs to verify whether transaction 1 is written into block chain.Then, verifying is asked Direction any data storage side is asked to send request, data storage side can determine whether target block first and construct as shown in Figure 1 Mei Keer tree.Then, data storage side can determine whether transaction the 1 corresponding path Mei Keer associated by cryptographic Hash be Hash2, Hash10, Hash14, and Hash2, Hash10, Hash14 are returned into checking request side.Checking request root (is handed over according to Hash1 Easy 1 transaction Hash), Hash2, Hash10, Hash14, according to transaction the 1 corresponding path Mei Keer, so that it may plum is calculated Then the root Hash of Ke Er tree stores in the block head of the checking request Fang Ruo discovery root Hash being calculated and target block Root Hash it is consistent, it is assumed that transaction 1 has been written to block chain really.
Obviously, before triggering the simple payment verification for target transaction, data storage side usually requires to be based on target Each transaction in block constructs Mei Keer tree.In this way, could be cryptographic Hash associated by the corresponding path Mei Keer of target transaction Checking request side is returned to, to carry out SPV for target transaction.This also means that any transaction in transaction 1~transaction 8 It is tampered or is deleted, the root Hash (i.e. Hash1-8) of Mei Keer tree will change, so as to cause the mistake of simple payment verification It loses.
For example, as shown in Figure 1, transaction 2 includes sensitive content, if directly transaction 2 deleted from block chain, when When needing to carry out simple payment verification for any transaction in transaction 1, transaction 3~8, due to lacking transaction 2, it can only be based on handing over Easy 1,3~8 building Mei Keer tree of transaction, in this way, being stored in the root Hash of Mei Keer tree and the block head of target block of building Root Hash be it is inconsistent, will lead to the failure of simple payment verification, obtain the mistake knot of transaction 1,3~8 all non-cochains of transaction By.
For this purpose, the present invention can realize under the premise of not constituting interference to the simple payment verification in block catenary system The concealment traded to some in block chain.Core of the invention technological means is transaction (the sensitivity friendship that will need to be concealed in block chain Easily) it is substituted for the concealment data of the transaction Hash comprising the transaction.In this way, can both stop disclosing in the plaintext of the transaction Hold, and does not affect the even running of the simple payment verification system based on block chain.
In order to make those skilled in the art more fully understand the technical solution in this specification embodiment, below in conjunction with this Attached drawing in specification embodiment is described in detail the technical solution in this specification embodiment, it is clear that described Embodiment is only a part of the embodiment of this specification, instead of all the embodiments.The embodiment of base in this manual, Those of ordinary skill in the art's every other embodiment obtained, all should belong to the range of protection.
Below in conjunction with attached drawing, the technical solution that each embodiment of this specification provides is described in detail.
Embodiment one
Fig. 2 is the method hidden of transaction for a kind of pair of write-in block chain that this specification embodiment provides, process show It is intended to, comprising the following steps:
S200: hide instruction is received.
Scene applied by the present invention is that the data based on block chain deposit card scene.In this scenario, by including multiple nodes Block chain network block chain type is carried out to data distribution deposit card, alternatively, by centralization equipment to data progress block chain type Card is deposited in centralization.
Under block chain scene, the executing subject of this method can be each block chain node;Under class block chain scene, this The executing subject of method can be centralization equipment.
In the present specification, hide instruction is identified comprising target transaction, and the target transaction mark is usually comprising sensitivity The transaction ID of the sensitive transactions of content.Certainly, method shown in FIG. 1 can also carry out the non-sensitive transaction of write-in block chain hidden It hides, therefore, the target transaction mark theoretically can be the transaction ID of any transaction.
It should be noted that the transaction ID of transaction is traded for unique identification.Specifically, the transaction ID of transaction can be with It is the transaction Hash for obtain after Hash operation to transaction, is also possible to the unique number for transaction allocation.
In step s 200, hide instruction can be some user sending.The user, which can be, uploads sensitive content User is also possible to the main body (such as law court, victim) for having the right to require concealment sensitive content.
Under block chain scene, each block chain node receives hide instruction, specifically may is that each block chain node receives envelope Concealment transaction equipped with hide instruction.Each block chain node executes hide instruction in a manner of executing the concealment transaction, to hidden After transaction of hideing is finished, each block chain node can carry out concealment transaction also write-in block chain to deposit card.
S202: according to the hide instruction, concealmentization data are determined.
In the present specification, concealmentization data include at least the transaction Hash that target transaction identifies corresponding transaction.
S204: the transaction for corresponding to target transaction mark in block chain is substituted for the concealmentization data.
In the present specification, the transaction that target transaction mark is corresponded in block chain is substituted for the concealmentization number According to specifically may is that
First determine block chain described in target transaction identify corresponding exchange block (referred to as target block), then Target transaction described in target block is identified into the transaction that corresponding transaction storage location is stored and is changed to the concealmentization number According to.
Block chain is actually the storage organization connected by multiple blocks according to blocking chronological order.For each For block, there are multiple transaction storage locations in the block.So-called transaction storage location refers in block for store transaction Memory space or storage address.Assuming that 100 transaction are written in block chain, then, also there are 100 transaction in block chain simultaneously Storage location is respectively used to store this 100 transaction.
In the present specification, it can be identified according to the target transaction, be traversed in block chain, to search for the target The corresponding transaction of transaction ID, that is, navigate to the target transaction identify corresponding exchange transaction storage location. Then, the target transaction is deleted from the transaction storage location navigated to and identify corresponding transaction, and deposit to the transaction navigated to Storage space sets deposit concealmentization data.
It is further, lower due to positioning in block chain trading efficiency in a manner of traversal according to target transaction mark, Therefore, in the present specification, the transaction separately can be recorded except block chain for any transaction of write-in block chain in advance Transaction ID and Kuai Lianzhonggai exchange transaction storage location between corresponding relationship.
Wherein, for any transaction of write-in block chain, Kuai Lianzhonggai exchange transaction storage location, the usually friendship The offset of the height (i.e. the cis-position number of block in block chain) and the transaction of block where easily within a block.For example, beating It is 5 that the block for being surrounded by transaction A, which is written to and after the 4th block, that is, is packed with the height of the block of transaction A in block chain, and And the offset of A within a block of trading is 120, then the corresponding transaction storage location of the A that trades can be (5,120).
In the present specification, under the scene of class block chain, the hide instruction can also be packaged by centralization equipment Concealment transaction write-in block chain.
In addition, the concealment transaction of write-in block chain is not only packaged with hide instruction under the scene of block chain or class block chain, Also it is packaged with the data Hash of the concealmentization data.
By method described in Fig. 2, the concealment to the sensitive content in write-in block chain may be implemented.Also, due to quick The concealment mode of sense content is that the sensitive transactions comprising sensitive content are substituted for the concealment of the transaction Hash comprising sensitive transactions Therefore normal SPV can't be had an impact by changing data.
In addition, the concealmentization data are in addition to including other than the target transaction identifies the transaction Hash of corresponding transaction, It can also include more information.
Specifically, Fig. 3 is the process schematic for the construction concealmentization data that this specification embodiment provides.Each node exists When constructing concealmentization data, the available target transaction identifies the transaction Hash of corresponding transaction;Label before will be preset Character is spliced to the stem of the transaction Hash;According to the data that the preceding tab character and the transaction Hash are spliced into, really The fixed concealmentization data.
The effect of above-mentioned preceding tab character is, when carrying out reading data for some transaction storage location, if should The transaction of transaction storage location has had been replaced with concealmentization data, then, read the preceding mark in the concealmentization data It when remembering character, is equivalent to clear: " clear content for the not instead of transaction that the transaction storage location is stored, Hash of trading ".
Since transaction Hash is usually the character string of regular length, and hence it is also possible to further be handed in concealmentization data Increase remark information after easy Hash.In this way, after having read the transaction Hash in the concealmentization data, the concealmentization Remaining part is remark information in data.
It should be noted that the remark information specifically can be to realize that specific transactions need added information.Example Such as, the remark information can be " hidden ", show that the corresponding transaction of the target transaction mark has been concealed.Work as user When inquiring the corresponding transaction of target transaction mark, it is sightless that the remark information, which can prompt customer transaction,.
Further, Fig. 4 is another process schematic for the construction concealmentization data that this specification embodiment provides.In structure When making concealmentization data, the available target transaction identifies the transaction Hash of corresponding transaction;By preset preceding marker word Symbol be spliced to it is described transaction Hash stem, will it is preset after tab character be spliced to it is described transaction Hash tail portion, also, will Remark information is spliced to the tail portion of the rear tab character;Then, by the preceding tab character, the transaction Hash, it is described after The data that tab character and the remark information are spliced into are determined as the concealmentization data.
The effect of above-mentioned rear tab character is, when including that remark information is (or mentioned hereafter non-quick in concealmentization data Feel content) when, it does not need to carry out reading data according to the fixed-length value of transaction Hash, but uses rear tab character that will hide The transaction Hash changed in data is separated with remark information (non-sensitive content), to distinguish.
It should be noted that above-mentioned preceding tab character can be specified according to actual needs with rear tab character.Example Such as, the preceding tab character can be " 0E ", and the rear tab character can be " 0F ".
Embodiment two
In the present specification, can not also include preceding tab character described in embodiment one in the concealmentization data with And rear tab character, but use other means to some transaction storage location on store be transaction or concealmentization data into Line flag.
Specifically, content field is founded in the transaction storage location for each transaction storage location in block chain in advance And identification field, content field is for store transaction or the concealment data generated based on the transaction, and identification field is for depositing Store up first identifier symbol or second identifier symbol, to be in the content field transaction or concealmentization data be identified.
Wherein, when the content field includes transaction, the identification field includes first identifier symbol, when the content word When section includes the concealment data generated based on the transaction, the identification field includes second identifier symbol.
Fig. 5 is that the process for another method hidden to the transaction of write-in block chain that this specification embodiment provides is shown It is intended to, includes the following steps:
S500: receiving and identify hide instruction comprising target transaction, and determines that storing the target transaction identifies corresponding friendship Easy transaction storage location, as target transaction storage location.
In the present specification, for each transaction storage location in block chain, which is stored with content word Section and identification field, if the content field includes transaction, the identification field is accorded with comprising first identifier.
S502: according to the hide instruction, concealmentization data are determined.
S504: the transaction in the content field of the target transaction storage location is substituted for the concealmentization data.
S506: the first identifier symbol in the identification field of the target transaction storage location is substituted for second identifier symbol.
For example, the first identifier symbol can occupy " FF " of two bytes, the second identifier symbol can be occupancy two " 00 " of a byte.
The beneficial effect of embodiment two is analyzed herein.In example 1, using in the concealmentization data Transaction Hash before splice before tab character mode, come to some transaction storage location on store be transaction or concealment Change data and differentiation is marked.
But in practice, in order to avoid the transaction Hash in concealmentization data generates " Hash collision " with preceding tab character (i.e. node or centralization equipment execute trade concealment logic when, cannot be distinguished from transaction storage location read character be before Tab character is still traded the character in Hash), it will usually setting preceding tab character to theoretically will not be with transaction Hash weight Multiple spcial character, such spcial character is generally very long (occupying many bytes), reads data to from transaction storage location Node or centralization equipment belt carry out very big burden.
For this purpose, if tab character is spliced with transaction Hash before not using by the way of in embodiment two, and It is that two independent fields, i.e. content field and identification field are marked off in transaction storage location, content field is for storing The concealment data that are substituted for after transaction or transaction are concealed, identification field storage for identify in content field be transaction or The identifier of concealmentization data.In this way, it is only necessary to shorter identifier be written in identification field, so that it may realize to some friendship What is stored in easy storage location is transaction or the label differentiation of concealmentization data.
Fig. 6 is the schematic diagram of the content field that this specification embodiment provides and identification field.As shown in Figure 6, it is assumed that mesh The content field storage of transaction storage location 1 in mark block is transaction, and the content field storage of transaction storage location 2 is Concealmentization data, it is possible to be identified according to identification field.
Embodiment three
Based on embodiment one and embodiment two, the composition of concealmentization data can also be optimized.
Fig. 7 is the process for the method that another transaction to write-in block chain that this specification embodiment provides is hidden Schematic diagram, comprising the following steps:
S700: hide instruction is received.
In the present specification, the hide instruction can specifically include target transaction mark and concealment condition.Wherein, described Concealment condition is for determining that the target transaction identifies the sensitive content in corresponding transaction.
Further, the concealment condition can be sensitive position information, hand over for characterizing sensitive content in the target Easily identify location in corresponding transaction.For example, the sensitive position information can be bytes range information (1,6), table The content for showing that target transaction identifies the 1st byte to the 6th byte in corresponding transaction is sensitive content.
S702: the transaction Hash that the target transaction identifies corresponding transaction is obtained, and includes according to the hide instruction Concealment condition, identified in corresponding transaction from the target transaction and extract non-sensitive content.
The non-sensitive content is that the target transaction identifies content in corresponding transaction in addition to sensitive content.
S704: according to the transaction Hash and the non-sensitive content, concealmentization data are determined.
In step S704, the concealmentization data can only include the transaction Hash and the non-sensitive content.By It is usually regular length in transaction Hash, is generally not in the obscuring of Hash and the non-sensitive content of trading therefore.
Furthermore, it is possible in conjunction with the embodiments one, there are following several situations:
It 1, can also include preceding tab character in the concealmentization data.
It 2, can also include preceding tab character, rear tab character in the concealmentization data.
Wherein, rear tab character can be used for separating the transaction Hash with the non-sensitive content.
3, can also include in the concealmentization data preceding tab character, tab character after tab character, second after first, Remark information.
Wherein, tab character can be used for separating the transaction Hash with the non-sensitive content after first, and Tab character can be used for separating the non-sensitive content and the remark information after two.
S706: the transaction for corresponding to target transaction mark in block chain is substituted for the concealmentization data.
In this way, institute can be retained under the premise of the concealment target transaction identifies the sensitive content in corresponding transaction It states target transaction and identifies non-sensitive content in corresponding transaction, as shown in Figure 8.
Example IV
Based on embodiment three, the generation method of the concealmentization data can also be advanced optimized.
Fig. 9 is the process signal for the method that the transaction for a kind of pair of write-in block chain that this specification embodiment provides is hidden Figure, includes the following steps:
S900: hide instruction is received.
S902: the transaction Hash that the target transaction identifies corresponding transaction is obtained, and includes according to the hide instruction Concealment condition, identified in corresponding transaction from the target transaction and extract non-sensitive content.
S904: model is adjusted based on preset form of presentation, adjusts the form of presentation of the non-sensitive content, and according to institute Transaction Hash and the non-sensitive content adjusted are stated, determines concealmentization data.
S906: the transaction for corresponding to target transaction mark in block chain is substituted for the concealmentization data.
Wherein, the form of presentation adjustment model specifically can be preset form of presentation adjustment rule, for example, the table The mode of stating adjusts rule and may is that if there are Chinese characters in non-sensitive content, which is substituted for phonetic.For another example, described Form of presentation adjustment rule may is that if there are capitalization English letters in non-sensitive content, by least one capitalization English Letter is substituted for small English alphabet.
The form of presentation adjustment model is specifically also possible to the model of mind previously according to machine learning algorithm training.
In short, the effect of the form of presentation adjustment model is, the non-sensitive content form of presentation is adjusted, So that the covering scope for the information that the non-sensitive content of the information conveyed of non-sensitive content adjusted before adjustment is conveyed It is interior.
Preferably, the information that the non-sensitive content before non-sensitive content adjusted is conveyed information and adjustment is conveyed Can be consistent, i.e. after the form of presentation of non-sensitive content is adjusted, the information conveyed is not lost.
Occur to prevent such case, the form of presentation of the non-sensitive content in write-in concealmentization data is adjusted It is whole, so that it may so that anyway attempting, all can not to crack out the sensitive content being concealed according to non-sensitive content adjusted.
Embodiment five
Based on the above embodiments one~tetra-, Authority Verification mechanism can be introduced.
Figure 10 is that the process for the method that the transaction for a kind of pair of write-in block chain that this specification embodiment provides is hidden is shown It is intended to, includes the following steps:
S1000: hide instruction is received;
S1002: obtaining the signature of the hide instruction, and judges whether the signature obtained meets specified requirements, if so, Step S804 is executed, if it is not, thening follow the steps S806.
S1004: according to the hide instruction, determining includes the transaction Hash that the target transaction identifies corresponding transaction Concealmentization data, and, the transaction that target transaction mark is corresponded in block chain is substituted for the concealmentization data.
S1006: refuse the hide instruction.
In practical applications, it can require the hide instruction that must have the signature for meeting specified requirements.Each block chain Node or centralization equipment can just execute the hide instruction when the signature for determining hide instruction meets specified requirements.
Specifically, the specified requirements can include but is not limited to following three kinds of situations:
If it is that the transaction of block chain, the signature of the hide instruction is written that 1, the target transaction, which identifies corresponding transaction, For the signature of block chain node.At this point, the quantity that the specified requirements is the signature obtained is greater than specified quantity.
For example, there are 10 nodes in block chain network, 5 can be set by the specified quantity, then the hide instruction It must obtain just effective more than the approval of 5 nodes.
If it is that the transaction of class block chain is written that 2, the target transaction, which identifies corresponding transaction, the specified requirements is to obtain The signature taken includes the signature of at least two permission sides.
Specifically, permission side may include the number of law court, the controlling party of centralization equipment, centralization equipment in practice Targeted business side etc. is serviced according to card is deposited.
3, weight is distributed for the signature of each permission side in advance.If corresponding trade of the target transaction mark is write-in class The transaction of block chain, then the specified requirements is that the sum of corresponding weight of each signature obtained is greater than specified weight.
For example, can for law court distribution 100 weight, centered on change equipment controlling party distribution 50 weight, be business The weight of side's distribution 40.Meanwhile 60 are set by specified weight.
Embodiment six
Based on the method in embodiment one~five, a kind of corresponding Mei Keer of building block of this specification embodiment offer The method of tree, as shown in figure 11, comprising:
S1100: for each transaction storage location in target block, data are read from the transaction storage location.
S1102: if it is determined that the data read from the transaction storage location include transaction, then included by the data to reading Transaction carries out Hash calculation, obtains the corresponding transaction Hash of the transaction storage location.
S1104: if it is determined that the data read from the transaction storage location include concealmentization data, then from the data institute of reading Including concealment data in extract transaction Hash, as the corresponding transaction Hash of the transaction storage location.
S1106: based on the corresponding transaction Hash of storage location of respectively trading in the target block, the target is constructed The corresponding Mei Keer tree of block.
Embodiment seven
It, can also be further by institute after target transaction to be identified to corresponding transaction and is hidden based on embodiment six State target transaction identify corresponding exchange the label of block be determined as specified label.
In the present specification, at least partly block in block chain can have label, exist extremely for marking in the block A few transaction being concealed.
Specifically, can arranging specified label, there are the transaction that at least one is concealed for characterizing in block.Will be right The transaction of the mark of target transaction described in Ying Yu is substituted for after the concealmentization data, it can be determined that the target transaction mark pair The exchange answered the label of block (target block) whether have label, if just referred to without label for target block distribution Calibration label.If there is label, further determine whether to specify label.If it is specified label, illustrate in the target block Other than the target transaction identifies corresponding transaction, there is also the sensitive transactions that other have been concealed, then do not need pair The label of target block is changed;If not specified label, illustrating target block does not include concealmentization data, then need by The tag modification of target block is specified label.
In this way, it is exactly 0 that the label of the block in block chain, which is not 1,.If the specified label is 1, when block includes hidden When hideing data, label is 1, and when block does not include concealmentization data, label is 0.If the specified label is 0, Then when block includes concealmentization data, label is 0, and when block does not include concealmentization data, label is 1.
By the target transaction identify corresponding exchange the label of block be determined as the effect of specified label and be, Mitigate the computation burden of block chain node or centralization equipment.If specifically, not to the block comprising concealmentization data into Rower note, then, method as shown in figure 11, when need for target block building Mei Keer tree when, block chain node or in Whether heart equipment does not include concealmentization data in hard objectives block, then, would have to successively be directed to the target area Each transaction storage location in block, judge to store in the transaction storage location is transaction or concealmentization data, to adopt The corresponding transaction Hash of the transaction storage location is obtained with different strategies.When there are many block for needing to construct Mei Keer tree, and When the sensitive transactions being concealed are seldom, if being carried out method as shown in figure 11 for each block, it can waste very much Computing resource.
And in embodiment seven, it can be before starting to construct the corresponding Mei Keer tree of either block, first according to the area The label of block judges whether the block includes concealmentization data, in this way, can be when there is no the sensitivities being concealed in target block When transaction, using the corresponding Merkel tree of default behavior building target block (rather than using mode shown in Figure 11), save Computing resource.
Figure 12 is that the process for the method that the transaction for a kind of pair of write-in block chain that this specification embodiment provides is hidden is shown It is intended to, includes the following steps:
S1200: hide instruction is received.
S1202: according to the hide instruction, concealmentization data are determined.
S1204: the transaction for corresponding to target transaction mark in block chain is substituted for the concealmentization data.
S1206: by the target transaction identify corresponding exchange the label of block be determined as specified label.
Figure 13 is that the process of the method for the corresponding Mei Keer tree of another building block that this specification embodiment provides is shown It is intended to, includes the following steps:
S1300: for the target block in block chain, the label of the target block is obtained.
S1302: it if the label of the target block refers to calibration label, is deposited for each transaction in the target block Storage space is set, and reads data from the transaction storage location.
S1304: if it is determined that the data read from the transaction storage location include transaction, then included by the data to reading Transaction carries out Hash calculation, obtains the corresponding transaction Hash of the transaction storage location.
S1306: if it is determined that the data read from the transaction storage location include concealmentization data, then from the data institute of reading Including concealment data in extract transaction Hash, as the corresponding transaction Hash of the transaction storage location.
S1308: based on the corresponding transaction Hash of storage location of respectively trading in the target block, the target is constructed The corresponding Mei Keer tree of block.
Further, for each transaction storage location in the target block, if what the transaction storage location was read Data do not include the preceding tab character, it is determined that the data read from the transaction storage location include transaction;If from the transaction The data that storage location is read include the preceding tab character, it is determined that the data read from the transaction storage location include concealment Change data.
Alternatively, if including that first identifier accords with from the identification field in the data that the transaction storage location is read, it is determined that from The data that the transaction storage location is read include transaction;If including from the identification field in the data that the transaction storage location is read Second identifier symbol, it is determined that the data read from the transaction storage location include concealmentization data.
The mode that transaction Hash is extracted in embodiment seven, in concealmentization data included by the data from reading specifically may be used To be, the data in concealmentization data included by the data by reading after the preceding tab character are determined as transaction and breathe out It wishes and extracts;Or, being located at the designated length after the preceding tab character in concealmentization data included by data by reading Data be determined as trading and Hash and extract.
Wherein, the designated length is the regular length of transaction Hash.
In embodiment seven, the preceding tab character can also be located in concealment data included by the data by reading Data between the rear tab character are determined as transaction Hash and extract.
In embodiment seven, if the label of the target block does not refer to calibration label, using described in default behavior building The corresponding Mei Keer tree of target block.
In embodiment seven, it is possible to further which a binary string is pre-created, it is assumed that block chain includes N number of block, The so described at least N number of binary digit of binary string, the value of i-th of binary digit of binary string are the in block chain The label of i block, i ∈ [1, N].
In this way, obtaining the tagged manner of the target block can be, the serial number M of the target block is determined;From described The value of m-th binary digit, the label as the target block are read in binary string.
Figure 14 is a kind of flow diagram for simple payment verification method that this specification embodiment provides, including walks as follows It is rapid:
S1400: checking request is received;The checking request is identified comprising target transaction;
S1402: according to the checking request, determine that the target transaction identifies corresponding transaction in the block chain of itself The block at place, and the corresponding Mei Keer tree of the block is constructed based on method shown in Figure 11 or Figure 13;
S1404: the Mei Keer tree based on building identifies the corresponding simple payment of transaction progress for the target transaction and tests Card.
Figure 15 is that the structure for the device that the transaction for a kind of pair of write-in block chain that this specification embodiment provides is hidden is shown It is intended to, for each transaction storage location in block chain, which is stored with content field and identification field, if The content field includes transaction, then the identification field is accorded with comprising first identifier, and described device includes:
Receiving module 1501 receives and identifies hide instruction comprising target transaction, and determines and store the target transaction mark The transaction storage location of corresponding transaction, as target transaction storage location;
Determining module 1502 determines concealmentization data according to the hide instruction;The concealmentization data include the mesh Mark the transaction Hash of the corresponding transaction of transaction ID;
Transaction in the content field of the target transaction storage location is substituted for the concealmentization by processing module 1503 Data, and, the first identifier symbol in the identification field of the target transaction storage location is substituted for second identifier symbol.
The hide instruction further includes concealment condition, for determining that the target transaction identifies the sensitivity in corresponding transaction Content;
The determining module 1502 obtains the transaction Hash that the target transaction identifies corresponding transaction, and according to described The concealment condition that hide instruction includes identifies in corresponding transaction from the target transaction and extracts non-sensitive content;According to described Transaction Hash and the non-sensitive content determine concealmentization data.
The concealment condition is sensitive position information, identifies corresponding friendship in the target transaction for characterizing sensitive content The location of in easily.
The determining module 1502, will it is preset after tab character be spliced to it is described transaction Hash tail portion;It will be described non- Sensitive content is spliced to the tail portion of the rear tab character;By the transaction Hash, it is described after tab character with it is described non-sensitive The data that content is spliced into are determined as concealmentization data.
The determining module 1502 adjusts model based on preset form of presentation, adjusts the statement of the non-sensitive content Mode;According to the transaction Hash and the non-sensitive content adjusted, concealmentization data are determined.
The determining module 1502, obtains the signature of the hide instruction, and it is specified to judge whether the signature obtained meets Condition;If so, determining concealmentization data according to the hide instruction;If it is not, then refusing the hide instruction.
If it is that the transaction of block chain is written that the target transaction, which identifies corresponding transaction, the signature of the hide instruction is The signature of block chain node, also, the specified requirements is the quantity of the signature obtained greater than specified quantity.
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is to obtain Signature include at least two permission sides signature.
The signature of each permission side is assigned weight;
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is to obtain The sum of the corresponding weight of each signature be greater than specified weight.
Described device further include:
Transaction writing module 1504 will be packaged with the concealment transaction write-in block chain of the hide instruction.
The transaction writing module 1504 will be packaged with the data Hash of the hide instruction and the concealmentization data Concealment transaction write-in block chain.
Described device further include:
Label determining module 1505, by the target transaction identify corresponding exchange the label of block be determined as referring to Calibration label.
For the either block in block chain, if the block does not include concealmentization data, the label of the block is not described Specified label.
If block chain includes N number of block, the value of i-th of binary digit of the binary string being pre-created is the in block chain The label of i block, i ∈ [1, N].
Figure 16 is that this illustrates that the structure for the device that the transaction for a kind of pair of write-in block chain that Soviet Union's embodiment provides is hidden is shown It is intended to, comprising:
Receiving module 1601 receives hide instruction;The hide instruction includes that target transaction identifies and hide condition, described Concealment condition is for determining that the target transaction identifies the sensitive content in corresponding transaction;
Extraction module 1602 is obtained, obtains the transaction Hash that the target transaction identifies corresponding transaction, and according to described The concealment condition that hide instruction includes identifies in corresponding transaction from the target transaction and extracts non-sensitive content;
Determining module 1603 determines concealmentization data according to the transaction Hash and the non-sensitive content;
The transaction for corresponding to target transaction mark in block chain is substituted for the concealmentization number by processing module 1604 According to.
For each transaction storage location in block chain, which is stored with content field and identifier word Section, the content field include transaction or the concealment data based on the transaction generation;
Wherein, when the content field includes transaction, the identification field includes first identifier symbol, when the content word When section includes the concealment data generated based on the transaction, the identification field includes second identifier symbol.
The concealment condition is sensitive position information, identifies corresponding friendship in the target transaction for characterizing sensitive content The location of in easily.
The determining module 1603, will it is preset after tab character be spliced to it is described transaction Hash tail portion;It will be described non- Sensitive content is spliced to the tail portion of the rear tab character;By the transaction Hash, it is described after tab character with it is described non-sensitive The data that content is spliced into are determined as concealmentization data.
The determining module 1603 adjusts model based on preset form of presentation, adjusts the statement of the non-sensitive content Mode;According to the transaction Hash and the non-sensitive content adjusted, concealmentization data are determined.
The determining module 1603, obtains the signature of the hide instruction, and it is specified to judge whether the signature obtained meets Condition;If so, determining concealmentization data according to the hide instruction;If it is not, then refusing the hide instruction.
If it is that the transaction of block chain is written that the target transaction, which identifies corresponding transaction, the signature of the hide instruction is The signature of block chain node, also, the specified requirements is the quantity of the signature obtained greater than specified quantity.
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is to obtain Signature include at least two permission sides signature.
The signature of each permission side is assigned weight;
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is to obtain The sum of the corresponding weight of each signature be greater than specified weight.
Described device further include:
Label determining module 1605, by the target transaction identify corresponding exchange the label of block be determined as referring to Calibration label.
For the either block in block chain, if the block does not include concealmentization data, the label of the block is not described Specified label.
If block chain includes N number of block, the value of i-th of binary digit of the binary string being pre-created is the in block chain The label of i block, i ∈ [1, N].
Described device further include:
Transaction writing module 1606 will be packaged with the concealment transaction write-in block chain of the hide instruction.
The transaction writing module 1606 will be packaged with the data Hash of the hide instruction and the concealmentization data Concealment transaction write-in block chain.
Figure 17 is that this illustrates that the structure for the device that the transaction for a kind of pair of write-in block chain that Soviet Union's embodiment provides is hidden is shown It is intended to, comprising:
Receiving module 1701 receives hide instruction;The hide instruction includes that target transaction identifies and hide condition, described Concealment condition is for determining that the target transaction identifies the sensitive content in corresponding transaction;
Extraction module 1702 is obtained, obtains the transaction Hash that the target transaction identifies corresponding transaction, and according to described The concealment condition that hide instruction includes identifies in corresponding transaction from the target transaction and extracts non-sensitive content;
Determining module 1703 is adjusted, model is adjusted based on preset form of presentation, adjusts the statement of the non-sensitive content Mode, and according to the transaction Hash and the non-sensitive content adjusted, determine concealmentization data;
The transaction for corresponding to target transaction mark in block chain is substituted for the concealmentization number by processing module 1704 According to.
For each transaction storage location in block chain, which is stored with content field and identifier word Section, the content field include transaction or the concealment data based on the transaction generation;
Wherein, when the content field includes transaction, the identification field includes first identifier symbol, when the content word When section includes the concealment data generated based on the transaction, the identification field includes second identifier symbol.
The concealment condition is sensitive position information, identifies corresponding friendship in the target transaction for characterizing sensitive content The location of in easily.
The adjustment determining module 1703, will it is preset after tab character be spliced to it is described transaction Hash tail portion;It will adjust The non-sensitive content after whole is spliced to the tail portion of the rear tab character;By the transaction Hash, the rear tab character The data being spliced into the non-sensitive content adjusted are determined as concealmentization data.
The adjustment determining module 1703, obtains the signature of the hide instruction, and judges whether the signature obtained meets Specified requirements;If so, determining concealmentization data according to the hide instruction;If it is not, then refusing the hide instruction.
If it is that the transaction of block chain is written that the target transaction, which identifies corresponding transaction, the signature of the hide instruction is The signature of block chain node, also, the specified requirements is the quantity of the signature obtained greater than specified quantity.
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is to obtain Signature include at least two permission sides signature.
The signature of each permission side is assigned weight;
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is to obtain The sum of the corresponding weight of each signature be greater than specified weight.
Described device further include:
Label determining module 1705, by the target transaction identify corresponding exchange the label of block be determined as referring to Calibration label.
For the either block in block chain, if the block does not include concealmentization data, the label of the block is not described Specified label.
If block chain includes N number of block, the value of i-th of binary digit of the binary string being pre-created is the in block chain The label of i block, i ∈ [1, N].
Described device further include:
Transaction writing module 1706 will be packaged with the concealment transaction write-in block chain of the hide instruction.
The transaction writing module 1706 will be packaged with the data Hash of the hide instruction and the concealmentization data Concealment transaction write-in block chain.
Figure 18 is that this illustrates that the structure for the device that the transaction for a kind of pair of write-in block chain that Soviet Union's embodiment provides is hidden is shown It is intended to, comprising:
Receiving module 1801 receives hide instruction;The hide instruction is identified comprising target transaction;
Judgment module 1802 is obtained, the signature of the hide instruction is obtained, and it is specified to judge whether the signature obtained meets Condition;
First processing module 1803, if so, determining to include that target transaction mark corresponds to according to the hide instruction Transaction transaction Hash concealment data, and, by block chain correspond to the target transaction mark transaction be substituted for The concealmentization data;
Second processing module 1804, if it is not, then refusing the hide instruction.
If it is that the transaction of block chain is written that the target transaction, which identifies corresponding transaction, the signature of the hide instruction is The signature of block chain node, also, the specified requirements is the quantity of the signature obtained greater than specified quantity.
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is to obtain Signature include at least two permission sides signature.
The signature of each permission side is assigned weight;
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is to obtain The sum of the corresponding weight of each signature be greater than specified weight.
The first processing module 1803 obtains the transaction Hash that the target transaction identifies corresponding transaction;It will preset Preceding tab character be spliced to it is described transaction Hash stem;It is spliced into according to the preceding tab character and the transaction Hash Data determine concealmentization data.
The first processing module 1803, will it is preset after tab character be spliced to it is described transaction Hash tail portion, also, Remark information is spliced to the tail portion of the rear tab character;By the preceding tab character, the transaction Hash, the rear label The data that character and the remark information are spliced into are determined as concealmentization data.
For each transaction storage location in block chain, which is stored with content field and identifier word Section, the content field include transaction or the concealment data based on the transaction generation;
Wherein, when the content field includes transaction, the identification field includes first identifier symbol, when the content word When section includes the concealment data generated based on the transaction, the identification field includes second identifier symbol.
The hide instruction further includes concealment condition, for determining that the target transaction identifies the sensitivity in corresponding transaction Content;
The first processing module 1803, obtains the transaction Hash that the target transaction identifies corresponding transaction, and according to The concealment condition that the hide instruction includes identifies in corresponding transaction from the target transaction and extracts non-sensitive content;According to The transaction Hash and the non-sensitive content determine concealmentization data.
The concealment condition is sensitive position information, identifies corresponding friendship in the target transaction for characterizing sensitive content The location of in easily.
The first processing module 1803, will it is preset after tab character be spliced to it is described transaction Hash tail portion;By institute State the tail portion that non-sensitive content is spliced to the rear tab character;By the transaction Hash, it is described after tab character with it is described non- The data that sensitive content is spliced into are determined as concealmentization data.
The first processing module 1803 adjusts model based on preset form of presentation, adjusts the non-sensitive content Form of presentation;According to the transaction Hash and the non-sensitive content adjusted, concealmentization data are determined.
Described device further include:
Label determining module 1805, by the target transaction identify corresponding exchange the label of block be determined as referring to Calibration label.
For the either block in block chain, if the block does not include concealmentization data, the label of the block is not described Specified label.
If block chain includes N number of block, the value of i-th of binary digit of the binary string being pre-created is the in block chain The label of i block, i ∈ [1, N].
Described device further include:
Transaction writing module 1806 will be packaged with the concealment transaction write-in block chain of the hide instruction.
The transaction writing module 1806 will be packaged with the data Hash of the hide instruction and the concealmentization data Concealment transaction write-in block chain.
Figure 19 is that this illustrates that the structure for the device that the transaction for a kind of pair of write-in block chain that Soviet Union's embodiment provides is hidden is shown It is intended to, comprising:
Receiving module 1901 receives hide instruction;The hide instruction is identified comprising target transaction;
Determining module 1902 determines concealmentization data according to the hide instruction;The concealmentization data include the mesh Mark the transaction Hash of the corresponding transaction of transaction ID;
The transaction for corresponding to target transaction mark in block chain is substituted for the concealmentization number by processing module 1903 According to, and, by the target transaction identify corresponding exchange the label of block be determined as specified label.
The determining module 1902 obtains the transaction Hash that the target transaction identifies corresponding transaction;Before preset Tab character is spliced to the stem of the transaction Hash;The number being spliced into according to the preceding tab character and the transaction Hash According to determining concealmentization data.
The determining module 1902, will it is preset after tab character be spliced to the tail portion of the transaction Hash, also, will be standby Note information is spliced to the tail portion of the rear tab character;By the preceding tab character, the transaction Hash, the rear tab character And the data that the remark information is spliced into are determined as concealmentization data.
For each transaction storage location in block chain, which is stored with content field and identifier word Section, the content field include transaction or the concealment data based on the transaction generation;
Wherein, when the content field includes transaction, the identification field includes first identifier symbol, when the content word When section includes the concealment data generated based on the transaction, the identification field includes second identifier symbol.
The hide instruction further includes concealment condition, for determining that the target transaction identifies the sensitivity in corresponding transaction Content;
The determining module 1902 obtains the transaction Hash that the target transaction identifies corresponding transaction, and according to described The concealment condition that hide instruction includes identifies in corresponding transaction from the target transaction and extracts non-sensitive content;According to described Transaction Hash and the non-sensitive content determine concealmentization data.
The concealment condition is sensitive position information, identifies corresponding friendship in the target transaction for characterizing sensitive content The location of in easily.
The determining module 1902, will it is preset after tab character be spliced to it is described transaction Hash tail portion;It will be described non- Sensitive content is spliced to the tail portion of the rear tab character;By the transaction Hash, it is described after tab character with it is described non-sensitive The data that content is spliced into are determined as concealmentization data.
The determining module 1902 adjusts model based on preset form of presentation, adjusts the statement of the non-sensitive content Mode;According to the transaction Hash and the non-sensitive content adjusted, concealmentization data are determined.
The determining module 1902, obtains the signature of the hide instruction, and it is specified to judge whether the signature obtained meets Condition;If so, determining concealmentization data according to the hide instruction;If it is not, then refusing the hide instruction.
If the target transaction identifies the transaction that corresponding transaction is write-in block chain, the signature of the hide instruction is block The signature of chain node, also, the specified requirements is the quantity of the signature obtained greater than specified quantity.
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is to obtain Signature include at least two permission sides signature.
The signature of each permission side is assigned weight;
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is to obtain The sum of the corresponding weight of each signature be greater than specified weight.
For the either block in block chain, if the block does not include concealmentization data, the label of the block is not described Specified label.
If block chain includes N number of block, the value of i-th of binary digit of the binary string being pre-created is the in block chain The label of i block, i ∈ [1, N].
Described device further include:
Transaction writing module 1904 will be packaged with the concealment transaction write-in block chain of the hide instruction.
The transaction writing module 1904 will be packaged with the data Hash of the hide instruction and the concealmentization data Concealment transaction write-in block chain.
Figure 20 is a kind of structural representation of the device for the corresponding Mei Keer tree of building block that this specification embodiment provides Figure, comprising:
It obtains module 2001 and obtains the label of the target block for the target block in block chain;
Read module 2002, if the label of the target block refers to calibration label, for every in the target block A transaction storage location reads data from the transaction storage location;Wherein, it is deposited in target block described in the specified tag characterization At least one sensitive transactions was stored up, for each sensitive transactions, which has been replaced by the friendship comprising the sensitive transactions The concealment data of easy Hash;
First processing module 2003, however, it is determined that the data read from the transaction storage location include transaction, then to reading Transaction included by data carries out Hash calculation, obtains the corresponding transaction Hash of the transaction storage location;
Second processing module 2004, however, it is determined that from the transaction storage location read data include concealmentization data, then from Transaction Hash is extracted in concealment data included by the data of reading, as the corresponding transaction Hash of the transaction storage location;
Module 2005 is constructed, based on the corresponding transaction Hash of storage location of respectively trading in the target block, building The corresponding Mei Keer tree of the target block.
The operation that the sensitive transactions stored in the target block are substituted for concealmentization data is as follows:
Determine the transaction Hash of the sensitive transactions;
Preset preceding tab character is spliced to the stem of the transaction Hash;
According to the data that the preceding tab character and the transaction Hash are spliced into, concealmentization data are determined;
The sensitive transactions are substituted for determining concealment data.
According to the data that the preceding tab character and the transaction Hash are spliced into, determines concealmentization data, specifically includes:
Will it is preset after tab character be spliced to the tail portion of the transaction Hash, also, remark information is spliced to described The tail portion of tab character afterwards;
The preceding tab character, the transaction Hash, the rear tab character and the remark information are spliced into Data are determined as concealmentization data.
The first processing module 2003, if the data from transaction storage location reading do not include the preceding marker word Symbol, it is determined that the data read from the transaction storage location include transaction;
The Second processing module 2004, if the data from transaction storage location reading include the preceding tab character, Then determine that the data read from the transaction storage location include concealmentization data.
The Second processing module 2004 is located at the preceding marker word in concealment data included by the data by reading Data after symbol are determined as transaction Hash and extract;Or, being located in concealment data included by data by reading described The data of designated length after preceding tab character are determined as transaction Hash and extract.
The Second processing module 2004 is located at the preceding marker word in concealment data included by the data by reading Data between symbol and the rear tab character are determined as transaction Hash and extract.
For each transaction storage location in block chain, which is stored with content field and identifier word Section, the content field include transaction or the concealment data based on the transaction generation;
Wherein, when the content field includes transaction, the identification field includes first identifier symbol, when the content word When section includes the concealment data generated based on the transaction, the identification field includes second identifier symbol;
The first processing module 2003, if including first from the identification field in the data that the transaction storage location is read Identifier, it is determined that the data read from the transaction storage location include transaction;
The Second processing module 2004, if including second from the identification field in the data that the transaction storage location is read Identifier, it is determined that the data read from the transaction storage location include concealmentization data.
The building module 2005 is constructed if the label of the target block does not refer to calibration label using default behavior The corresponding Mei Keer tree of the target block.
If block chain includes N number of block, the value of i-th of binary digit of the binary string being pre-created is the in block chain The label of i block, i ∈ [1, N];
The acquisition module 2001, determines the serial number M of the target block;M-th is read from the binary string The value of binary digit, the label as the target block.
Figure 21 is a kind of structural schematic diagram for simple payment verification device that this specification embodiment provides, comprising:
Receiving module 2101 receives checking request;The checking request is identified comprising target transaction;
Module 2102 is constructed, according to the checking request, the target transaction mark pair is determined in the block chain of itself The exchange answered block, and the corresponding Mei Keer tree of the block is constructed based on method shown in Figure 11 or Figure 13;
Authentication module 2103, the Mei Keer tree based on building identify corresponding transaction for the target transaction and carry out letter Single payment verification.
A kind of centralization storage scheme based on class block chain is as follows:
S1 receives data record to be stored, and determines the cryptographic Hash of each data record.
The data record of to be stored can be the various consumer records of client personal user, is also possible to answer herein Instruction with server based on user, business result, intermediate state and the operation note etc. generated when executing service logic Deng.Specific business scenario may include consumer record, audit log, supply chain, government regulation record, medical records etc. Deng.
S2 determines each data record in block to be written when reaching preset blocking condition, generates comprising block The n-th block of cryptographic Hash and data record.
The preset blocking condition includes: that data record quantity to be stored reaches amount threshold, for example, often receiving When 1000 datas record, a new block is generated, 1,000 datas are recorded in write-in block;Alternatively, apart from last blocking The time interval at moment reaches time threshold, for example, generating a new block every 5 minutes, will receive in this 5 minutes Data record write-in block in.
N herein refers to the serial number of block, in other words, in this specification embodiment, block be in the form of block chain, Sequence based on Chunky Time successively arranges, and has very strong temporal aspect.Wherein, the block height of block is based on the elder generation of Chunky Time Sequence monotonic increase afterwards.Block height can be serial number, and the block height of n-th block is N at this time;Block height can also give birth in other ways At.
As N=1, i.e., block at this time is original block.The cryptographic Hash and block height of original block are based on predetermined manner It is given.For example, not including data record in original block, cryptographic Hash is then any given cryptographic Hash, the high blknum=0 of block; In another example the generation trigger condition of original block is consistent with the trigger condition of other blocks, but the cryptographic Hash of original block by Hash is taken to determine all the elements in original block.
As N > 1, since content and the cryptographic Hash of previous block are it has been determined that then at this point it is possible to (i.e. based on previous block The N-1 block) cryptographic Hash generate current block (n-th block) cryptographic Hash, for example, a kind of feasible mode is, really The cryptographic Hash for determining the data record that each will be written in n-th block generates a Merck according to putting in order in block You set, and the cryptographic Hash of the root cryptographic Hash of Merkel tree and previous block is stitched together, and use hash algorithm again, and generation is worked as Preceding piece of cryptographic Hash.In another example can also be spliced according to the sequence of data record in block and Hash is taken to obtain overall data The cryptographic Hash of record, splices the cryptographic Hash of previous block and the cryptographic Hash of overall data record, and to the obtained word string of splicing into Row Hash operation generates the cryptographic Hash of block.
By the generating mode of block above-mentioned, each block determines that the cryptographic Hash of block is by block by cryptographic Hash In the content of data record, the cryptographic Hash of sequence and previous block determines.User can be at any time based on the cryptographic Hash of block Initiate verifying, for content any in block (including the modification for data record content or sequence in block) modification all The cryptographic Hash when cryptographic Hash and block that will cause the block being calculated in verifying generate is inconsistent, and verifying is caused to be lost It loses, thus can not distort under realizing centralization.
By generating the block including a certain number of data records, and cryptographic Hash when block generates is recorded, from And realize the storage for carrying out centralization to data record in a manner of block chain.Under this data storage method, each block Cryptographic Hash dependent on previous block cryptographic Hash and the data record for itself being included content.User can be based on above-mentioned Storage form inquires the data record of oneself at any time, and can be according to the cryptographic Hash to specified block or specified number Cryptographic Hash verifying is carried out according to record, ensure that the integrality of user data, improves user experience.
This specification embodiment also provides a kind of computer equipment, includes at least memory, processor and is stored in On reservoir and the computer program that can run on a processor, wherein processor realized when executing described program Fig. 2,5,7,9~ The function of method shown in 14.
Figure 22 shows one kind provided by this specification embodiment and more specifically calculates device hardware structural schematic diagram, The equipment may include: processor 2210, memory 2220, input/output interface 2230, communication interface 2240 and bus 2250.Wherein processor 2210, memory 2220, input/output interface 2230 and communication interface 2240 are real by bus 2250 The now communication connection inside equipment each other.
Processor 2210 can use general CPU (Central Processing Unit, central processing unit), micro- place Reason device, application specific integrated circuit (Application Specific Integrated Circuit, ASIC) or one Or the modes such as multiple integrated circuits are realized, for executing relative program, to realize technical side provided by this specification embodiment Case.
Memory 2220 can use ROM (Read Only Memory, read-only memory), RAM (Random Access Memory, random access memory), static storage device, the forms such as dynamic memory realize.Memory 2220 can store Operating system and other applications are realizing technical solution provided by this specification embodiment by software or firmware When, relevant program code is stored in memory 2220, and execution is called by processor 2210.
Input/output interface 2230 is for connecting input/output module, to realize information input and output.Input and output/ Module can be used as component Configuration (not shown) in a device, can also be external in equipment to provide corresponding function.Wherein Input equipment may include keyboard, mouse, touch screen, microphone, various kinds of sensors etc., output equipment may include display, Loudspeaker, vibrator, indicator light etc..
Communication interface 2240 is used for connection communication module (not shown), to realize the communication of this equipment and other equipment Interaction.Wherein communication module can be realized by wired mode (such as USB, cable etc.) and be communicated, can also be wirelessly (such as mobile network, WIFI, bluetooth etc.) realizes communication.
Bus 2250 include an access, equipment various components (such as processor 2210, memory 2220, input/it is defeated Outgoing interface 2230 and communication interface 2240) between transmit information.
It should be noted that although above equipment illustrates only processor 2210, memory 2220, input/output interface 2230, communication interface 2240 and bus 2250, but in the specific implementation process, which can also include realizing normal fortune Other assemblies necessary to row.In addition, it will be appreciated by those skilled in the art that, it can also be only comprising real in above equipment Component necessary to existing this specification example scheme, without including all components shown in figure.
This specification embodiment also provides a kind of computer readable storage medium, is stored thereon with computer program, the journey The function of method shown in Fig. 2,5,7,9~14 is realized when sequence is executed by processor.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
As seen through the above description of the embodiments, those skilled in the art can be understood that this specification Embodiment can be realized by means of software and necessary general hardware platform.Based on this understanding, this specification is implemented Substantially the part that contributes to existing technology can be embodied in the form of software products the technical solution of example in other words, The computer software product can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are to make It is each to obtain computer equipment (can be personal computer, server or the network equipment etc.) execution this specification embodiment Method described in certain parts of a embodiment or embodiment.
System, method, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can To be personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play In device, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment The combination of any several equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for method and For apparatus embodiments, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to method The part of embodiment illustrates.Embodiment of the method described above is only schematical, wherein described be used as separation unit The module that part illustrates may or may not be physically separated, can be when implementing this specification example scheme The function of each module is realized in the same or multiple software and or hardware.It can also select according to the actual needs therein Some or all of the modules achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are not making the creative labor In the case where, it can it understands and implements.
The above is only the specific embodiment of this specification embodiment, it is noted that for the general of the art For logical technical staff, under the premise of not departing from this specification embodiment principle, several improvements and modifications can also be made, this A little improvements and modifications also should be regarded as the protection scope of this specification embodiment.

Claims (33)

1. the method that the transaction of a kind of pair of write-in block chain is hidden, comprising:
Receive hide instruction;The hide instruction is identified comprising target transaction;
According to the hide instruction, concealmentization data are determined;The concealmentization data include that the target transaction mark is corresponding The transaction Hash of transaction;
The transaction for corresponding to target transaction mark in block chain is substituted for the concealmentization data, and, by the target The corresponding exchange of transaction ID the label of block be determined as specified label.
2. the method as described in claim 1 determines concealmentization data, specifically includes according to the hide instruction:
Obtain the transaction Hash that the target transaction identifies corresponding transaction;
Preset preceding tab character is spliced to the stem of the transaction Hash;
According to the data that the preceding tab character and the transaction Hash are spliced into, concealmentization data are determined.
3. method according to claim 2 is determined according to the data that the preceding tab character and the transaction Hash are spliced into Concealmentization data, specifically include:
Preset rear tab character is spliced to the tail portion of the transaction Hash, also, remark information is spliced to the rear mark Remember the tail portion of character;
The data that the preceding tab character, the transaction Hash, the rear tab character and the remark information are spliced into It is determined as concealmentization data.
4. the method as described in claim 1, for each transaction storage location in block chain, which is stored with Content field and identification field, the content field include transaction or the concealment data based on the transaction generation;
Wherein, when the content field includes transaction, the identification field includes first identifier symbol, when the content field packet When including the concealment data based on the transaction generation, the identification field includes second identifier symbol.
5. the method as described in claim 1, the hide instruction further includes concealment condition, for determining the target transaction mark Know the sensitive content in corresponding transaction;
According to the hide instruction, determines concealmentization data, specifically includes:
Obtain the transaction Hash that the target transaction identifies corresponding transaction, and the concealment item for including according to the hide instruction Part identifies in corresponding transaction from the target transaction and extracts non-sensitive content;
According to the transaction Hash and the non-sensitive content, concealmentization data are determined.
6. method as claimed in claim 5, the concealment condition is sensitive position information, for characterizing sensitive content described Target transaction identifies location in corresponding transaction.
7. method as claimed in claim 5 determines concealmentization data according to the transaction Hash and the non-sensitive content, It specifically includes:
Tab character is spliced to the tail portion of the transaction Hash after will be preset;
The non-sensitive content is spliced to the tail portion of the rear tab character;
The data that the transaction Hash, the rear tab character and the non-sensitive content are spliced into are determined as concealmentization number According to.
8. method as claimed in claim 5 determines concealmentization data according to the transaction Hash and the non-sensitive content, It specifically includes:
Model is adjusted based on preset form of presentation, adjusts the form of presentation of the non-sensitive content;
According to the transaction Hash and the non-sensitive content adjusted, concealmentization data are determined.
9. the method as described in claim 1 determines concealmentization data, specifically includes according to the hide instruction:
The signature of the hide instruction is obtained, and judges whether the signature obtained meets specified requirements;
If so, determining concealmentization data according to the hide instruction;
If it is not, then refusing the hide instruction.
10. method as claimed in claim 9, if the target transaction identifies the transaction that corresponding transaction is write-in block chain, The signature of the hide instruction is the signature of block chain node, also, the specified requirements is the quantity of the signature obtained greater than finger Fixed number amount.
11. method as claimed in claim 9, if it is that the friendship of class block chain is written that the target transaction, which identifies corresponding transaction, Easily, then it includes the signature of at least two permission sides that the specified requirements, which is the signature obtained,.
12. the signature of method as claimed in claim 9, each permission side is assigned weight;
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is each of acquisition The sum of corresponding weight of signing is greater than specified weight.
13. the method as described in claim 1, for the either block in block chain, if the block does not include concealmentization data, The label of the block is not the specified label.
14. method as claimed in claim 13, if block chain includes N number of block, i-th two of the binary string being pre-created The value of system position is the label of i-th of block in block chain, i ∈ [1, N].
15. the method as described in claim 1, the method also includes:
The concealment transaction write-in block chain of the hide instruction will be packaged with.
16. method as claimed in claim 15 will be packaged with the concealment transaction write-in block chain of the hide instruction, specific to wrap It includes:
The concealment transaction write-in block chain of the data Hash of the hide instruction and the concealmentization data will be packaged with.
17. the device that the transaction of a kind of pair of write-in block chain is hidden, comprising:
Receiving module receives hide instruction;The hide instruction is identified comprising target transaction;
Determining module determines concealmentization data according to the hide instruction;The concealmentization data include the target transaction mark Know the transaction Hash of corresponding transaction;
The transaction for corresponding to target transaction mark in block chain is substituted for the concealmentization data by processing module, and, it will The target transaction identify corresponding exchange the label of block be determined as specified label.
18. device as claimed in claim 17, the determining module obtain the friendship that the target transaction identifies corresponding transaction Easy Hash;Preset preceding tab character is spliced to the stem of the transaction Hash;According to the preceding tab character and the friendship The data that easy Hash is spliced into, determine concealmentization data.
19. preset rear tab character is spliced to the transaction and breathed out by device as claimed in claim 18, the determining module Uncommon tail portion, also, by remark information be spliced to it is described after tab character tail portion;By the preceding tab character, the transaction The data that Hash, the rear tab character and the remark information are spliced into are determined as concealmentization data.
20. device as claimed in claim 17, for each transaction storage location in block chain, transaction storage location storage There are content field and identification field, the content field includes transaction or the concealment data based on the transaction generation;
Wherein, when the content field includes transaction, the identification field includes first identifier symbol, when the content field packet When including the concealment data based on the transaction generation, the identification field includes second identifier symbol.
21. device as claimed in claim 17, the hide instruction further includes concealment condition, for determining the target transaction Identify the sensitive content in corresponding transaction;
The determining module obtains the transaction Hash that the target transaction identifies corresponding transaction, and according to the hide instruction Including concealment condition, identified in corresponding transaction from the target transaction and extract non-sensitive content;According to the transaction Hash With the non-sensitive content, concealmentization data are determined.
22. device as claimed in claim 21, the concealment condition is sensitive position information, for characterizing sensitive content in institute It states target transaction and identifies location in corresponding transaction.
23. preset rear tab character is spliced to the transaction and breathed out by device as claimed in claim 21, the determining module Uncommon tail portion;The non-sensitive content is spliced to the tail portion of the rear tab character;By the transaction Hash, the rear label The data that character and the non-sensitive content are spliced into are determined as concealmentization data.
24. device as claimed in claim 21, the determining module adjust model based on preset form of presentation, adjust institute State the form of presentation of non-sensitive content;According to the transaction Hash and the non-sensitive content adjusted, concealmentization number is determined According to.
25. device as claimed in claim 17, the determining module, obtain the signature of the hide instruction, and judge to obtain Signature whether meet specified requirements;If so, determining concealmentization data according to the hide instruction;If it is not, then described in refusal Hide instruction.
26. device as claimed in claim 25, if the target transaction identifies the transaction that corresponding transaction is write-in block chain, The signature of the hide instruction is the signature of block chain node, also, the specified requirements is the quantity of the signature obtained greater than finger Fixed number amount.
27. device as claimed in claim 25, if it is that the friendship of class block chain is written that the target transaction, which identifies corresponding transaction, Easily, then it includes the signature of at least two permission sides that the specified requirements, which is the signature obtained,.
28. the signature of device as claimed in claim 25, each permission side is assigned weight;
If it is that the transaction of class block chain is written that the target transaction, which identifies corresponding transaction, the specified requirements is each of acquisition The sum of corresponding weight of signing is greater than specified weight.
29. device as claimed in claim 17, for the either block in block chain, if the block does not include concealmentization data, Then the label of the block is not the specified label.
30. device as claimed in claim 19, if block chain includes N number of block, i-th two of the binary string being pre-created The value of system position is the label of i-th of block in block chain, i ∈ [1, N].
31. device as claimed in claim 17, described device further include:
Transaction writing module will be packaged with the concealment transaction write-in block chain of the hide instruction.
32. device as claimed in claim 31, the transaction writing module, will be packaged with the hide instruction and the concealment Change the concealment transaction write-in block chain of the data Hash of data.
33. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, wherein the processor realizes such as the described in any item methods of claim 1~16 when executing described program.
CN201910101446.6A 2019-01-31 2019-01-31 Method and device for hiding transaction written into block chain Active CN110046509B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910101446.6A CN110046509B (en) 2019-01-31 2019-01-31 Method and device for hiding transaction written into block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910101446.6A CN110046509B (en) 2019-01-31 2019-01-31 Method and device for hiding transaction written into block chain

Publications (2)

Publication Number Publication Date
CN110046509A true CN110046509A (en) 2019-07-23
CN110046509B CN110046509B (en) 2020-08-04

Family

ID=67274233

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910101446.6A Active CN110046509B (en) 2019-01-31 2019-01-31 Method and device for hiding transaction written into block chain

Country Status (1)

Country Link
CN (1) CN110046509B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210365587A1 (en) * 2020-05-20 2021-11-25 EMC IP Holding Company LLC Data masking in a microservice architecture
US11468193B2 (en) 2020-05-20 2022-10-11 EMC IP Holding Company LLC Data masking in a microservice architecture
US11475160B2 (en) 2020-05-20 2022-10-18 EMC IP Holding Company LLC Data masking in a microservice architecture
US11983148B2 (en) 2020-05-20 2024-05-14 EMC IP Holding Company LLC Data masking in a microservice architecture

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2306377A1 (en) * 2009-09-24 2011-04-06 Kezzler AS Method and system for providing secure codes for marking on items
CN107247773A (en) * 2017-06-07 2017-10-13 北京邮电大学 A kind of method that inquiry is traded in distributed data base based on block chain
CN108171494A (en) * 2017-11-23 2018-06-15 阿里巴巴集团控股有限公司 A kind of data processing method and device
CN109214817A (en) * 2018-10-08 2019-01-15 莆田市烛火信息技术有限公司 A kind of block chain common recognition device based on calculation power parasitism

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2306377A1 (en) * 2009-09-24 2011-04-06 Kezzler AS Method and system for providing secure codes for marking on items
CN107247773A (en) * 2017-06-07 2017-10-13 北京邮电大学 A kind of method that inquiry is traded in distributed data base based on block chain
CN108171494A (en) * 2017-11-23 2018-06-15 阿里巴巴集团控股有限公司 A kind of data processing method and device
CN109214817A (en) * 2018-10-08 2019-01-15 莆田市烛火信息技术有限公司 A kind of block chain common recognition device based on calculation power parasitism

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210365587A1 (en) * 2020-05-20 2021-11-25 EMC IP Holding Company LLC Data masking in a microservice architecture
US11468193B2 (en) 2020-05-20 2022-10-11 EMC IP Holding Company LLC Data masking in a microservice architecture
US11475160B2 (en) 2020-05-20 2022-10-18 EMC IP Holding Company LLC Data masking in a microservice architecture
US11580262B2 (en) 2020-05-20 2023-02-14 EMC IP Holding Company LLC Data masking in a microservice architecture
US11669638B2 (en) 2020-05-20 2023-06-06 EMC IP Holding Company LLC Data masking in a microservice architecture
US11983148B2 (en) 2020-05-20 2024-05-14 EMC IP Holding Company LLC Data masking in a microservice architecture

Also Published As

Publication number Publication date
CN110046509B (en) 2020-08-04

Similar Documents

Publication Publication Date Title
US20210160053A1 (en) Merkle tree construction methods and apparatuses and simplified payment verification methods and apparatuses
CN110046509A (en) The method and device that the transaction of a kind of pair of write-in block chain is hidden
EP3813296B1 (en) Methods and apparatuses for reading blockchain data
US20210158340A1 (en) Methods and apparatuses for concealing transaction written to blockchain
CN110009321A (en) A kind of transfer account method and system based on block chain intelligence contract
CN110046992A (en) A kind of transaction Hash acquisition methods and system based on block chain intelligence contract
CN110347744A (en) Date storage method, device and the equipment of multilayer block chain type account book
CN110008733A (en) The method and device that the transaction of a kind of pair of write-in block chain is hidden
CN110021291A (en) A kind of call method and device of speech synthesis file
CN110347678B (en) Financial data storage method, system, device and equipment
CN110059088A (en) Data attribute identification method, device and equipment in a kind of piece of chain type account book
CN110033264A (en) Construct the corresponding Mei Keer tree of block, simple payment verification method and device
CN104573132B (en) Song lookup method and device
CN110009341A (en) The method and device that the transaction of a kind of pair of write-in block chain is hidden
CN110008734A (en) The method and device that the transaction of a kind of pair of write-in block chain is hidden
CN110020548A (en) The method and device that the transaction of a kind of pair of write-in block chain is hidden
CN107133163A (en) A kind of method and apparatus for verifying description class API
CN107239712A (en) The hidden method and device of user profile based on application program
US11023475B2 (en) Testing pairings to determine whether they are publically known
CN107705070A (en) Material information input method, device, computer equipment in ERP system
CN112307011B (en) Data storage method, device and equipment
CN111695159A (en) Data processing method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right

Effective date of registration: 20240923

Address after: Guohao Times City # 20-01, 128 Meizhi Road, Singapore

Patentee after: Ant Chain Technology Co.,Ltd.

Country or region after: Singapore

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Innovative advanced technology Co.,Ltd.

Country or region before: Cayman Islands