Multi-chain architecture information sharing system based on block chain technology

文档序号:1925135 发布日期:2021-12-03 浏览:40次 中文

阅读说明:本技术 一种基于区块链技术的多链架构信息共享系统 (Multi-chain architecture information sharing system based on block chain technology ) 是由 曹源 汪大明 邓罡 来飞 付宗波 周忠宝 曹宇 陈磊 曹恒 曲波 谢超良 唐奕 于 2021-11-08 设计创作,主要内容包括:本发明涉及一种基于区块链技术的多链架构信息共享系统,所述共享系统包括:存储单元、运算单元、验证单元以及匹配单元;所述共享系统中维护至少一条以上信息链以及一条以上共享链;所述提供方连接到所述信息链,利用信息链提供源信息通过同态加密后的加密信息,并利用加密信息作进一步加工后,获得加密信息结果,信息需求方通过共享链获取同态加密信息结果并进行同态解密从而在不接触源信息的前提下有效利用源信息的数据。本发明结合利用区块链以及同态加密特性,保证了源信息不被泄露,同时也不会从信息源头被随意删改。(The invention relates to a multi-chain architecture information sharing system based on a block chain technology, which comprises: the device comprises a storage unit, an arithmetic unit, a verification unit and a matching unit; maintaining at least one information chain and at least one sharing chain in the sharing system; the provider is connected to the information chain, the information chain is used for providing the encrypted information of the source information after homomorphic encryption, the encrypted information is further processed to obtain an encrypted information result, and the information demand party obtains the homomorphic encrypted information result through the sharing chain and performs homomorphic decryption, so that the data of the source information are effectively utilized on the premise of not contacting the source information. The invention combines and utilizes the block chain and homomorphic encryption characteristics, ensures that the source information is not leaked, and simultaneously can not be deleted and modified randomly from the information source.)

1. A system for sharing information of a multi-chain architecture based on a block chain technique, the system comprising: a storage unit for storing information used by the information provider for sharing; an operation unit for performing extraction and processing operations on the shared information and outputting operated result information; a verification unit for verifying validity of the source information, the result information, and the encryption information; the matching unit is used for recording the shared information and matching the shared information with the information requirement; maintaining at least one information chain and at least one sharing chain in the sharing system; the provider is connected to the information chain, and the receiver is connected to the sharing chain; the information chain and the sharing chain are established and maintained in a union chain form; each node is allowed to connect to the information chain and the sharing chain after being authenticated and acquiring the on-chain identity;

the method for sharing information by the information sharing system comprises the following steps:

s1: the information provider stores original information I to be shared in the storage unit;

s2: the storage unit divides the original information I into pieces to obtain a sub information set containing a plurality of pieces of sub information(ii) a The storage unit is used for a plurality of pieces of sub informationEach of the sub-information directories is generated and homomorphic encrypted to obtain a sub-information directory set including a plurality of sub-information directoriesAnd an encrypted sub-information set including a plurality of pieces of encrypted sub-information

S3: the storage unit writes the sub information directory set S into a block of an information chain; after the writing of the sub information directory set S is finished, the provider performs full-chain broadcasting on the information chain to the sub information directory set S and the corresponding block height;

the method for acquiring the shared information of the information sharing system comprises the following steps:

r1: the information demander submits the requirement to the matching unit; the matching unit searches the sub information directory in the information chain according to the requirement and selects the required information data from the sub information directory;

r2: the matching unit carries out full-chain broadcast demand information on the information chain, wherein the full-chain broadcast demand information comprises the identity information and demand content of the demand party and one or more pieces of sub information which need to be acquired(ii) a The storage unit is used for storing the sub informationLoading the encrypted sub-informationAnd encrypting the sub informationSending the information to the arithmetic unit through a channel in the information chain, and broadcasting a delivery result to the information chain;

r3: the arithmetic unit is used for encrypting at least one piece of sub information according to the requirementAfter the operation processing is carried out, the operation result is submitted to the verification unit;

r4: the verification unit verifies the operation result according to the requirement; after the verification is passed, the verification unit writes the operation result into the information chain and broadcasts a request to the full chain to verify and release the operation result of the provider;

r5: the provider broadcasts the passing of the operation result on the information chain; the verification unit writes operation results into blocks of the shared chain; the demander reads the block information of the sharing chain so as to obtain an encryption operation result of the required data;

r6: the requiring party carries out inverse operation homomorphic decryption on the encryption operation result through a homomorphic encryption function, so that final required information is obtained;

the system according to claim 1, wherein the storage unit comprises at least one database for storing information; the storage unit fragments the information, including sorting and condition screening the information database according to the main key.

2. The system of claim 2, wherein the sub-information directory is used to indicate content features and content ranges of the sub-information represented by the sub-information directory.

3. The system of claim 3, wherein the homomorphic encryption algorithm comprises a partially homomorphic encryption algorithm and a fully homomorphic encryption algorithm; the selection of the homomorphic encryption algorithm is based on the specific operational requirements of the information requirements.

4. The system of claim 4, wherein all nodes in the chain are verified to obtain a pair of keys based on asymmetric cryptography; the key pair includes a public key Pkey and a private key Skey.

5. The system of claim 5, wherein the arithmetic unit, the verification unit and the matching unit are disposed and run on nodes of the information chain and the shared chain; and the nodes running the operation unit, the verification unit and the matching unit obtain authentication identities in the information chain and the sharing chain.

6. The system of claim 6, wherein the information chain comprises at least one provider organization; the provider organization is organized and divided by member service providers of the information chain according to the information data categories provided by the providers; the information chain comprises an administrator organization, and the administrator organization comprises more than one node used for operating the verification unit, the operation unit and the matching unit.

7. The system according to claim 7, wherein the matching unit is connected to the plurality of information chains and the plurality of sharing chains via nodes, and is configured to match requirements of the plurality of chains.

Technical Field

The present invention relates to the field of information sharing. And more particularly, to a multi-chain architecture information sharing system based on a block chain technique.

Background

With the rapid development of current software and hardware technologies, mass data are generated every day in the field of electronic information, wherein a large number of enterprises and organizations have a batch of data sets with high added values through processing, sorting, deepening calculation and the like of the mass data, and the data sets become data assets. Whereas the entity of the second aspect is expected to acquire this data at less time or monetary cost to realize value in other areas. For example, a large e-commerce retail establishment may have a data set containing sales data for the past decade, including sales habits of millions of buyers and sales strategies for a large number of merchants. These data have great application potential for, for example, live sales, or short video platforms, but there are still many technical difficulties in the current technical background, including: 1. the capacity of data is very large, a large number of texts, pictures, audios and videos and the like of various types are included, the transmission time is long, and the cost of the spent time and the storage space is high; 2. after the data is delivered, the data provider can not control the subsequent applied condition of the data, and the data receiver can arbitrarily delete, copy or forward and share the data with a third party again; 3. for small individuals, the small individuals cannot participate in the sharing project with larger data volume, and the large companies are easy to monopolize data resources, even if the unit cost which the small individuals are willing to pay is relatively high; 4. data assets are difficult to redeem or merge for value, such as two small data owner individuals who wish to exchange and merge value through their respective data, generate a data set with higher value and further sell the new data set. Therefore, a technical means for solving the above problems is required.

Referring to the related published technical solutions, the technical division with publication number US2021320805a1 proposes to use an asymmetric encryption technology, so that personal information can be stored in a storage server by placing source data, and then an encryption module combines a public key of a source data owner and a private key of a data requester, thereby enhancing security of data sharing; the technical scheme of the publication number US 2021306133A 1 proposes to use a plug-in of a browser to encrypt and send data in a mail, so as to protect the security of related data in the mail after sending and sharing; the technical solution of publication number WO2021164588 a1 proposes to generate a mark number for a data provider, divide the data provided by the data provider into multiple bit sharing positions, and generate multiple pairs of address mapping pairs of shared data according to the mark number of the provider, thereby implementing sharing of the data. Although the above methods all provide certain protection measures for data information security, the security and the sharing cost are in a poor balance.

Disclosure of Invention

The data processing method and the data processing system aim to arrange the data provider and the demander on a plurality of alliance chains, and calculate the homomorphic encrypted data through a third party operation and verification node according to the data requirement of the demander in a homomorphic encryption mode, so that the data processing result is obtained on the premise of not exposing the original data, and the benefit of the data provider is effectively protected.

The invention adopts the following technical scheme:

a system for sharing information of a multi-chain architecture based on a block chain technique, the system comprising: a storage unit for storing information used by the information provider for sharing; an operation unit for performing extraction and processing operations on the shared information and outputting operated result information; a verification unit for verifying validity of the source information, the result information, and the encryption information; the matching unit is used for recording the shared information and matching the shared information with the information requirement; maintaining at least one information chain and at least one sharing chain in the sharing system; the provider connecting to the chain of information; the receiver is connected with the sharing chain; the information chain and the sharing chain are established and maintained in a union chain form; each node is allowed to connect to the information chain and the sharing chain after being authenticated and acquiring the on-chain identity;

the method for sharing information by the information sharing system comprises the following steps:

s1: the information provider stores original information I to be shared in the storage unit;

s2: the storage unit divides the original information I into pieces to obtain a sub information set containing a plurality of pieces of sub information(ii) a The storage unit is used for a plurality of pieces of sub informationEach of the sub-information directories is generated and homomorphic encrypted to obtain a sub-information directory set including a plurality of sub-information directoriesAnd an encrypted sub-information set including a plurality of pieces of encrypted sub-information

S3: the storage unit writes the sub information directory set S into a block of an information chain; after the writing of the sub information directory set S is finished, the provider performs full-chain broadcasting on the information chain to the sub information directory set S and the corresponding block height;

the method for acquiring the shared information of the information sharing system comprises the following steps:

r1: the information demander submits the demand to the allocation unit; the matching unit searches the sub information directory in the information chain according to the requirement and selects the required information data from the sub information directory;

r2: the matching unit carries out full-chain broadcast demand information on the information chain, wherein the full-chain broadcast demand information comprises the identity information and demand content of the demand party and one or more pieces of sub information which need to be acquired(ii) a The storage unit is used for storing the sub informationLoading the encrypted sub-informationAnd encrypting the sub informationSending the information to the arithmetic unit through a channel in the information chain, and broadcasting a delivery result to the information chain;

r3: the arithmetic unit is used for encrypting at least one piece of sub information according to the requirementAfter the operation processing is carried out, the operation result is submitted to the verification unit;

r4: the verification unit verifies the operation result according to the requirement; after the verification is passed, the verification unit writes the operation result into the information chain and broadcasts a request to the full chain to verify and release the operation result of the provider;

r5: the provider broadcasts the passing of the operation result on the information chain; the verification unit writes operation results into blocks of the shared chain; the demander reads the block information of the shared chain so as to obtain the operation result of the required data;

r6: the requiring party carries out inverse operation homomorphic decryption on the encryption operation result through a homomorphic encryption function, so that final required information is obtained;

the storage unit includes storing information using at least one database; the storage unit fragments the information, including sorting and conditional screening the information database according to the main key;

the sub information directory is used for indicating the content characteristics and the content range of the represented sub information;

the homomorphic encryption algorithm comprises a partial homomorphic encryption algorithm and a full homomorphic encryption algorithm; the selection of the homomorphic encryption algorithm is based on the specific operation requirement of the information requirement;

after all the nodes on the chain are verified, a pair of key pairs based on the asymmetric encryption technology is obtained; the key pair comprises a public key Pkey and a private key Skey;

the arithmetic unit, the verification unit and the matching unit are arranged and run on nodes of the information chain and the sharing chain; operating the nodes of the operation unit, the verification unit and the matching unit to obtain authentication identities in the information chain and the sharing chain;

at least one provider organization is included on the chain of information; the provider organization is organized and divided by member service providers of the information chain according to the information data categories provided by the providers; the information chain comprises an administrator organization, and the administrator organization comprises more than one node used for operating the verification unit, the arithmetic unit and the matching unit;

the matching unit is connected to the plurality of information chains and the plurality of sharing chains through nodes and is used for matching requirements on the plurality of chains.

The beneficial effects obtained by the invention are as follows:

1. the information sharing system records the information data to be shared by adopting the block chain, and the data is subjected to consensus verification and credit endorsement by a plurality of nodes and each three-party node on the information chain, so that the system has strong traceability and consistency;

2. the information sharing system of the invention can effectively protect the security of the original data and avoid the loss of data providers caused by data leakage by carrying out homomorphic encryption on the data and then further processing the data;

3. the information sharing system effectively separates the provider and the demander of the information by isolating the information chain and the sharing chain, thereby further protecting the original information from being stolen or tampered;

4. the information sharing system can realize the range of data collection, verification and sharing without upper limit nodes theoretically by increasing the number of the multi-chains, and further improve the information sharing breadth.

Drawings

The invention will be further understood from the following description in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. Like reference numerals designate corresponding parts throughout the different views.

FIG. 1 is a schematic diagram of the information sharing principle of the present invention;

FIG. 2 is a schematic diagram of a process for calculating homomorphic encrypted message data;

FIG. 3 is a diagram illustrating a process for uplink transmission of sub-information data according to the present invention;

FIG. 4 is a schematic diagram of the organization structure of each organization on the multi-chain according to the present invention;

description of the figure numbering: 101-a provider; 102-requiring party: 103-an arithmetic unit; 104-a verification unit; 105-matching unit.

Detailed Description

To make the technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to embodiments thereof, and other systems, methods and/or features of the present embodiments will become apparent to those skilled in the art after reviewing the following detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description or be within the scope of the invention, and be protected by the accompanying claims. Additional features of the disclosed embodiments are described in, and will be apparent from, the detailed description that follows.

The first embodiment is as follows:

a system for sharing information of a multi-chain architecture based on a block chain technique, the system comprising: a storage unit for storing shared information of a provider; an operation unit for performing extraction and processing operations on the shared information and outputting operated result information; a verification unit for verifying validity of the source information, the result information, and the encryption information; the matching unit is used for recording the shared information and matching the shared information with the information requirement; maintaining at least one information chain and at least one sharing chain in the sharing system; the provider connecting to the chain of information; the receiver is connected with the sharing chain; the information chain and the sharing chain are established and maintained in a union chain form; each node is allowed to connect to the information chain and the sharing chain after being authenticated and acquiring the on-chain identity;

the method for sharing information by the information sharing system comprises the following steps:

s1: the information provider stores original information I to be shared in the storage unit;

s2: the storage unit divides the original information I into pieces to obtain a sub information set containing a plurality of pieces of sub information(ii) a The storage unit is used for a plurality of pieces of sub informationEach of the sub-information directories is generated and homomorphic encrypted to obtain a sub-information directory set including a plurality of sub-information directoriesAnd an encrypted sub-information set including a plurality of pieces of encrypted sub-information

S3: the storage unit writes the sub information directory set S into a block of an information chain; after the writing of the sub information directory set S is finished, the provider performs full-chain broadcasting on the information chain to the sub information directory set S and the corresponding block height;

the method for acquiring the shared information of the information sharing system comprises the following steps:

r1: the information demander submits the demand to the allocation unit; the matching unit searches the sub information directory in the information chain according to the requirement and selects the required information data from the sub information directory;

r2: the matching unit carries out full-chain broadcast demand information on the information chain, wherein the full-chain broadcast demand information comprises the identity information and demand content of the demand party and one or more pieces of sub information which need to be acquired(ii) a The storage unit is used for storing the sub informationLoading the encrypted sub-informationAnd encrypting the sub informationSending the information to the arithmetic unit through a channel in the information chain, and broadcasting a delivery result to the information chain;

r3: the arithmetic unit is used for encrypting at least one piece of sub information according to the requirementAfter the operation processing is carried out, the operation result is submitted to the verification unit;

r4: the verification unit verifies the operation result according to the requirement; after the verification is passed, the verification unit writes the operation result into the information chain and broadcasts a request to the full chain to verify and release the operation result of the provider;

r5: the provider broadcasts the passing of the operation result on the information chain; the verification unit writes operation results into blocks of the shared chain; the demander reads the block information of the shared chain so as to obtain the operation result of the required data;

r6: the requiring party carries out inverse operation homomorphic decryption on the encryption operation result through a homomorphic encryption function, so that final required information is obtained;

the storage unit includes storing information using at least one database; the storage unit fragments the information, including sorting and conditional screening the information database according to the main key;

the sub information directory is used for indicating the content characteristics and the content range of the represented sub information;

the homomorphic encryption algorithm comprises a partial homomorphic encryption algorithm and a full homomorphic encryption algorithm; the selection of the homomorphic encryption algorithm is based on the specific operation requirement of the information requirement;

after all the nodes on the chain are verified, a pair of key pairs based on the asymmetric encryption technology is obtained; the key pair comprises a public key Pkey and a private key Skey;

the arithmetic unit, the verification unit and the matching unit are arranged and run on nodes of the information chain and the sharing chain; operating the nodes of the operation unit, the verification unit and the matching unit to obtain authentication identities in the information chain and the sharing chain;

at least one provider organization is included on the chain of information; the provider organization is organized and divided by member service providers of the information chain according to the information data categories provided by the providers; the information chain comprises an administrator organization, and the administrator organization comprises more than one node used for operating the verification unit, the arithmetic unit and the matching unit;

the matching unit is connected to the plurality of information chains and the plurality of sharing chains through nodes and is used for matching requirements on the multi-chain;

as a principle of establishing a federation chain network, each node connected to a chain needs to be registered at a trusted member service provider, otherwise, the node cannot be accessed and participate in all operations on the federation chain; at least one channel is included in the federation chain; the members in the channel and the members outside the channel are mutually isolated, only the members in the same channel can exchange information, and data exchange records among the members in different channels on the chain cannot be inquired mutually; it is worth mentioning that the same node can be added into different channels; therefore, for the nodes running the verification unit, the operation unit and the matching unit, more than one information chain or shared chain can be added, and the information requirement and sharing on multiple chains can be processed simultaneously;

the following roles are included throughout the federation chain network: nodes (at least including the provider, the demander and various nodes in the administrator organization), a certificate authority CA; the other member service provider is a trusted authority, but is not in the role of the alliance chain, but provides trusted identity authentication for the nodes in the alliance chain; in a federation chain, a default MSP implementation uses an x.509 certificate (using the most extensive certificate structure standard, including contents such as certificate information/signature algorithm/digital signature) as an identity, and adopts a Public Key Infrastructure (PKI) as a hierarchical model. PKI is an identity provider and provides an identity list for a user accessing a blockchain network, and the identity of the user can be selected only within the range of the identity list; the MSP is an identity provider, and provides a list for recording members who pass identity authentication;

the recording system in the federation chain includes two components: world state (database) and transaction log (history); the world state records the shared sub-information directory set S and shared records, demand records and the like of information; the transaction log (history record) records all operations of the provider and the demander in the information sharing process on each chain so as to ensure that the operation records of the provider and the demander can be traced back and traced;

further, the provider of information may be the storage node by a local computer system; or, a non-local remote database operation system is used as the storage node in a cloud storage mode; or the provider is used as one member of the distributed system, a distributed database is established in the distributed system, and an available program interface of the distributed database is opened to be connected with the information chain for providing access to the database; the information security relationship between the provider and the storage system used as the storage node is evaluated by the provider for risk, and the embodiment is not specified here;

further, after obtaining the information provided by the provider, the storage node establishes a database, analyzes a primary key of the data and information data stored under the primary key; the database operating environment optionally comprises an Oracle database system, a DB2 database system, an SQL/Access database system and a MySQL database system; the database system carries out structured arrangement on the information data of the provider and prepares for information fragmentation;

as shown in fig. 2, the Encryption mode of Homomorphic Encryption (HE) refers to an Encryption algorithm that satisfies Homomorphic operation property of a ciphertext, that is, after data is Homomorphic encrypted, a ciphertext is specifically calculated, and a plaintext obtained after a corresponding Homomorphic decryption is performed on a ciphertext calculation result is equivalent to directly performing the same calculation on plaintext data; at present, homomorphic encryption algorithms which are relatively wide in the field of encryption comprise a BGV encryption scheme, a BFV encryption scheme, a GSW encryption scheme, a CKKS encryption scheme and the like; the related homomorphic encryption algorithm comprises addition homomorphic and multiplication homomorphic, and most of data statistics can be satisfied by addition and multiplication for most commercial data, so that the homomorphic encryption method is suitable for the information sharing system;

in the above manner, the present embodiment is suitable for sharing information with a provider having a large amount of source data information, such as various market research institutions, e-commerce platforms, and the like; the requirement of the demand side for the information is a statistical result of certain type of information data, such as the sales amount and the amount of a certain product in 2020, or the population characteristics of a certain community, and the cause data can be obtained through cloud computing without the need of source information data.

Example two:

in order to ensure that the provider can trace the change of adding, deleting and modifying information after providing the sharing of the information, the embodiment should be understood as at least including all the features of any one of the foregoing embodiments, and further improved on the basis of the features:

each chain node comprises a provider and a plurality of nodes, wherein each chain node comprises a pair of unique asymmetric encryption-based keys of the provider, and each pair comprises a public key Pkey and a private key Skey; the private key Skey is kept by the node; the public key Pkey is broadcasted to the whole chain and can be acquired by all nodes on the chain;

as shown in FIG. 3, further, the storage node obtains the encrypted sub-information setThen, carrying out Hash () operation on each piece of encrypted sub-information so as to obtain a plurality of sub-information digests with fixed length related to the encrypted sub-informationAnd its sub-information digest set H, i.e.

Wherein, the Hash function Hash () is a Hash function that can accept an input of unlimited length and return an output of fixed length; the input information can not be pushed back through output, and when the input information is changed, the output information can be obviously changed; currently, the commonly used hash operation functions include MD5, SHA256, and the like, and those skilled in the related encryption technology should be familiar with this aspect, and therefore, the details are not described herein;

further, after the plurality of sub-message digests are respectively encrypted by using the digital signature Sign () of the private key Skey of the provider, a plurality of signed signature sub-message digests are obtainedAnd signature sub-information digest set G:

the storage node writes the signature sub-information abstract set G and the sub-information directory set S into the blocks of the information chain at the same time;

on the other hand, the arithmetic unit obtains the encrypted sub-information by executing the step R2Then, performing, by the verification unit, a verification operation of the source data, including:

r201: for the encrypted sub-informationOperating with the same Hash function Hash (), i.e.

R202: from said information chainObtaining the signature sub-information abstract on a block

R203: digest the signed sub-message using the public key Pkey of the providerDecrypting to obtain sub information abstract

R204: if it is=Then it indicates the sub information obtained from the storage unitThe record on the current chain is conformed, and is not modified after the chain is linked;

through the verification operation, the consistency of the source data is ensured, so that the source data is consistent with the initial expectation of the demand side.

Example three:

this embodiment should be understood to include at least all of the features of any of the embodiments described above and further refinements thereto:

the data sharing system of the invention adopts the blockchain as the technical support, so that a plurality of the providing parties and a plurality of the requiring parties can be further matched and maintained to carry out information transaction;

in this embodiment, the provider may provide the information to be shared, and may also target the information I or the sub information InSetting a quotation of information; the quoted price comprises using a French currency to trade or appointing an equivalent trade in an information exchange mode; in particular, the value or the like provided by the provider and the demander can be consideredInformation of a price;

after the matching node matches the information requirement, matching the quotation of the information; the matching node includes means for confirming information on the information chain about the current matchIs offeredAnd sending the confirmed quoteReplying to the demander on a channel of the shared chain;

further, the matching node comprises an intelligent contract which is generated and used for definitely trading items of the information supply and demand parties and rights and interests of the two parties; after the generation of the intelligent contract and the broadcasting of the information chain and the sharing chain, the following endorsement operations related to the intelligent contract are executed by each party:

1. each node of the information chain and the sharing chain at least comprises each node included by the provider and the administrator organization for endorsement, and each node adopts a respective private key Skey for digital signature;

2. the demander needs to confirm and use a private key Skey to carry out digital signing and placing;

3. writing the related chain codes of the intelligent contract after backing the book into the information chain and the sharing chain, and starting the triggering condition monitoring of the intelligent contract; when a trigger condition is met, automatically executing the program section of the intelligent contract;

the provider and the demand book execute transfer operation of related rights and interests such as information data and account transfer according to the execution strategy of the intelligent contract, so that sharing and transaction of information on a chain are completed;

the sharing system adopts the transaction of the intelligent contract, and based on the specific implementation modes in the embodiments, the secure transfer of rights and interests in the shared information is realized, and the strong consistency and traceability of the shared information are ensured.

In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment. Although the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications may be made without departing from the scope of the invention. That is, the methods, systems, devices, etc. discussed above are merely examples. Various configurations may omit, substitute, or add various procedures or components as appropriate. For example, in alternative configurations, the methods may be performed in an order different than that described, and/or various components may be added, omitted, and/or combined. Moreover, features described with respect to certain configurations may be combined in various other configurations, as different aspects and elements of the configurations may be combined in a similar manner. Further, elements therein may be updated as technology evolves, i.e., many elements are examples and do not limit the scope of the disclosure or claims.

Specific details are given in the description to provide a thorough understanding of the exemplary configurations including implementations. However, configurations may be practiced without these specific details, for example, well-known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring the configurations. This description provides example configurations only, and does not limit the scope, applicability, or configuration of the claims. Rather, the foregoing description of the configurations will provide those skilled in the art with an enabling description for implementing the described techniques. Various changes may be made in the function and arrangement of elements without departing from the spirit or scope of the disclosure.

In conclusion, it is intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that these examples are illustrative only and are not intended to limit the scope of the invention. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall into the scope of the invention defined by the claims.

13页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于双二维混沌系统的轻量级分组文本加密方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!