A method and device for concealing transactions written into a block chain
A transaction and block chain technology, applied in the information field, can solve problems such as hazards and achieve the effect of ensuring normal operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] figure 2 It is a schematic flow diagram of a method for concealing transactions written into the block chain provided by the embodiment of this specification, including the following steps:
[0057] S200: Receive a hidden instruction.
[0058] The scenario that the present invention is applied to is a blockchain-based data storage scenario. In this scenario, a blockchain network including multiple nodes performs block-chain distributed certificate storage for data, or a centralized device performs block-chain centralized certificate storage for data.
[0059] In the blockchain scenario, the execution subject of this method can be each blockchain node; in the quasi-blockchain scenario, the execution subject of this method can be a centralized device.
[0060] In this specification, the concealment instruction includes a target transaction identifier, and the target transaction identifier is generally a transaction identifier of a sensitive transaction containing sensi...
Embodiment 2
[0085] In this specification, the concealed data may not include the pre-mark characters and post-mark characters described in Embodiment 1, but use other means to determine whether a certain transaction storage location stores transaction or concealed data. to mark.
[0086] Specifically, for each transaction storage location in the block chain, a content field and an identification field are created in the transaction storage location in advance, the content field is used to store the transaction or the concealed data generated based on the transaction, and the identification field is used to store the first An identifier or a second identifier identifies whether the content field is transactional or obfuscated data.
[0087] Wherein, when the content field includes a transaction, the identification field includes a first identifier, and when the content field includes concealed data generated based on the transaction, the identification field includes a second identifier. ...
Embodiment 3
[0100] Based on the first and second embodiments, the composition of the concealed data can also be optimized.
[0101] Figure 7 It is a schematic flowchart of another method for concealing transactions written into the blockchain provided by the embodiment of this specification, including the following steps:
[0102] S700: Receive a hidden instruction.
[0103] In this specification, the concealment instruction may specifically include a target transaction identifier and concealment conditions. Wherein, the concealment condition is used to determine the sensitive content in the transaction corresponding to the target transaction identifier.
[0104] Further, the concealment condition may be sensitive location information, which is used to characterize the location of the sensitive content in the transaction corresponding to the target transaction identifier. For example, the sensitive location information may be byte range information (1, 6), indicating that the contents...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


