Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for concealing transactions written into a block chain

A transaction and block chain technology, applied in the information field, can solve problems such as hazards and achieve the effect of ensuring normal operation

Active Publication Date: 2020-08-11
ADVANCED NEW TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that sensitive content is easily written into the block chain and cause harmful consequences, the embodiment of this specification provides a method and device for concealing transactions written into the block chain. The technical solution is as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for concealing transactions written into a block chain
  • A method and device for concealing transactions written into a block chain
  • A method and device for concealing transactions written into a block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] figure 2 It is a schematic flow diagram of a method for concealing transactions written into the block chain provided by the embodiment of this specification, including the following steps:

[0057] S200: Receive a hidden instruction.

[0058] The scenario that the present invention is applied to is a blockchain-based data storage scenario. In this scenario, a blockchain network including multiple nodes performs block-chain distributed certificate storage for data, or a centralized device performs block-chain centralized certificate storage for data.

[0059] In the blockchain scenario, the execution subject of this method can be each blockchain node; in the quasi-blockchain scenario, the execution subject of this method can be a centralized device.

[0060] In this specification, the concealment instruction includes a target transaction identifier, and the target transaction identifier is generally a transaction identifier of a sensitive transaction containing sensi...

Embodiment 2

[0085] In this specification, the concealed data may not include the pre-mark characters and post-mark characters described in Embodiment 1, but use other means to determine whether a certain transaction storage location stores transaction or concealed data. to mark.

[0086] Specifically, for each transaction storage location in the block chain, a content field and an identification field are created in the transaction storage location in advance, the content field is used to store the transaction or the concealed data generated based on the transaction, and the identification field is used to store the first An identifier or a second identifier identifies whether the content field is transactional or obfuscated data.

[0087] Wherein, when the content field includes a transaction, the identification field includes a first identifier, and when the content field includes concealed data generated based on the transaction, the identification field includes a second identifier. ...

Embodiment 3

[0100] Based on the first and second embodiments, the composition of the concealed data can also be optimized.

[0101] Figure 7 It is a schematic flowchart of another method for concealing transactions written into the blockchain provided by the embodiment of this specification, including the following steps:

[0102] S700: Receive a hidden instruction.

[0103] In this specification, the concealment instruction may specifically include a target transaction identifier and concealment conditions. Wherein, the concealment condition is used to determine the sensitive content in the transaction corresponding to the target transaction identifier.

[0104] Further, the concealment condition may be sensitive location information, which is used to characterize the location of the sensitive content in the transaction corresponding to the target transaction identifier. For example, the sensitive location information may be byte range information (1, 6), indicating that the contents...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for hiding a transaction written into a block chain. If a certain transaction written to the block chain is a sensitive transaction (including sensitive content unsuitable to be published), the transaction in the block chain may be replaced with covert data that includes transaction hashing of the transaction.

Description

technical field [0001] The embodiment of this specification relates to the field of information technology, and in particular to a method and device for concealing transactions written into a block chain. Background technique [0002] The blockchain network is a decentralized, distributed data storage system involving multiple nodes. Once the data is written into the blockchain on each node, on the one hand, it means that the data is public on the entire network; on the other hand, the data written into the blockchain is difficult to be deleted and tampered with. Based on this, in the field of data storage, blockchain technology has great application prospects. [0003] In addition, in practice, centralized devices can also use blockchain-like storage (which can be regarded as centralized blockchain storage) to store data. The blocks in the blockchain and the blocks in the blockchain-like Blocks are generated on the same principle. Obviously, if you want to delete the dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/64G06Q20/38G06Q20/40G06Q40/04
CPCG06F21/6254G06F21/64G06Q20/3827G06Q20/401G06Q40/04
Inventor 杨新颖
Owner ADVANCED NEW TECH CO LTD