区块链技术将广泛应用于什么,区块链技术将改变旅游业的
旅游业的发展需要技术的支持,近几年来,区块链技术的出现,使旅游业发展进入新的阶段,它将在旅游业的拓展中发挥重要作用。下面我们就探讨一下区块链技术在旅游业的拓展中的三个关键词:安全、信任和数据共享。
安全区块链技术是一种分布式数据库技术,它可以把数据存储在不同的节点上,从而保证数据的安全性,并且每次数据的更新都要经过多方确认,这样就可以防止数据被篡改,使得旅游业的数据安全性得到了极大的提高。同时,区块链技术也可以用于支付安全,可以让游客放心的进行支付,消除游客的担忧。
信任区块链技术可以记录每一个交易的信息,这些信息是不可篡改的,只有经过多方确认才能更改,这样就可以让游客放心的使用旅游业的服务,旅游企业也可以放心的提供服务,并且可以利用区块链技术记录游客的行为,从而更好的服务游客。
数据共享区块链技术可以实现数据共享,旅游企业可以利用区块链技术实现数据的共享,从而更好的服务游客。通过区块链技术,游客可以获取更多的信息,旅游企业也可以更好的服务游客,从而提高游客的满意度。同时,旅游企业也可以利用区块链技术实现数据共享,共享旅游资源,提高旅游业效率。
总之,区块链技术在旅游业的拓展中将发挥重要的作用,它可以提高旅游业的安全性,提升游客的信任,实现数据共享,提高旅游业效率。未来,区块链技术将在旅游业的拓展中发挥更多的作用,为游客提供更好的服务。
请查看相关英文文档
Ⅰ What technology will solve the problem of reliable transmission of trust and value on the Internet in the future labor environment
Blockchain technology will solve the problem of reliable transmission of trust and value on the Internet in the future labor environment problem.
Internet:
The Internet (English: internet), also known as the Internet or transliterated Internet, Internet, is the connection between networks. A huge network connected in series. These networks are connected by a set of universal protocols to form a logically single huge international network. This method of connecting computer networks to each other can be called "network interconnection". On this basis, a global Internet network covering the whole world is developed called "Internet", which is "interconnected network".
The Internet is not the same as the World Wide Web. The World Wide Web is just a global system based on hypertext links and is one of the services that the Internet can provide. When talking about the Internet alone, it usually refers to the Internet or a network connected to it. Sometimes it is simply called the Internet or the Network (theNet), which can be used for communication, social networking, and online trade.
II What is blockchain?
Let’s talk about some basic concepts first.
The network said that blockchain is a new usage model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanisms, and encryption algorithms. It is essentially a decentralized database, and as the underlying technology of Bitcoin, it is a series of data blocks generated by cryptography.
We try to translate "what is blockchain" into "human language".
The definition refers to the "decentralized database" nature of blockchain3354. This is very different from the traditional "centralized database" in storage, update and operation.
A centralized database can be thought of as having this shape:
For example, if I want to use Alipay to pay a Taobao seller, all data requests from when I make money to when he receives the money will be centrally processed by Alipay. The advantage of this data structure is that as long as Alipay is responsible for the efficient and safe operation of the system, others can unconditionally believe it without worrying; the disadvantage is that if there is a problem with Alipay, such as being hacked, the server being burned, a traitor appearing, and the company running away (Of course, the possibility of the above is extremely low), the balance details and other information in our Alipay will be confused.
Then some people think that this kind of low-probability event can use any technical means to avoid individual risks, and not only hand over the data to a centralized organization. For example, everyone can store and process data.
The database structure may look like this:
This picture is a schematic structural diagram of a "distributed database". Each point is a server, they all have equal rights to record and calculate data, and information is spread point-to-point. At first glance, it seems that it can indeed resist the risk caused by the crash of a certain node, but it is also very confusing and inefficient intuitively. Who will handle my information, and who has the final say on the outcome?
At this time, the "consensus mechanism" in the definition of blockchain comes into play. The consensus mechanism mainly “stipulates” thatThe following things: when a data request is received, who will handle it (what qualifications are required); who will verify the results (to see if he has handled it well); how to prevent processors and inspectors from colluding with each other, etc.
Some people may like to be questioned when a "rule" is made. In order to form a stronger consensus, in addition to making the rules more reasonable, they must also be more attractive so that people are interested and motivated to participate in data processing. This involves the incentive mechanism of the public chain. We will start again later when we discuss the classification of blockchain and the role of digital currencies.
When we hand over a transaction to a distributed network, there is also a "psychological threshold": there are so many nodes that can process information, and I don't know any of them (unlike Alipay, if it hurts me, I can go and file a lawsuit against it). They all have my data, why should I trust them?
At this time, encryption algorithm (the last descriptive word in the definition of blockchain) comes on stage.
In the blockchain network, the data requests we send will be encrypted according to cryptographic principles into a string of characters that the recipient cannot understand at all. Behind this encryption method is the support of a hash algorithm.
Hash algorithms can quickly convert any type of data into hash values. This change is one-way irreversible, deterministic, random, and anti-collision. Because of these characteristics, the person handling my data request could record the information for me, but they had no idea who I was or what I was doing.
So far, the working principle of the decentralized network has been introduced. But we seem to have overlooked one detail. The previous diagram is a net. Where are the pulleys and chains? Why do we call it blockchain?
To understand this matter, we need to clarify a few knowledge points first:
The previous picture is actually a "macro" database perspective, showing the basic rules and processes of the blockchain system for processing information. . And specifically at the "micro" data log level, we will find that the ledger is packaged, compressed, stored in blocks, and strung together in chronological order to form a "chain structure", like this:
Figure Each ring in can be regarded as a building block, and many links are linked together to form a blockchain. Blocks store data, unlike ordinary data storage: on a blockchain, the data in a later block contains the data in the previous block.
In order to academically explain the fields of each part of the data in the block, we tried to use a book metaphor to describe what a blockchain data structure is.
Usually, when we read a book, we read the first page, then the second and third pages. The spine is a physical existence that fixes the order of each page. Even if the book is scattered, the order of each numbered page can be determined.
Inside the blockchain, each block is labeled with a page number, the second page contains the first page's content, the third page's content contains the first and second page's content. The tenth page contains the previous Nine pages of content.
It is such a nested chain that can be traced back to the original data.
This brings up an important attribute of blockchain: traceability.
When in the blockchainWhen the data needs to be updated, that is, when new blocks are generated in sequence, the "consensus algorithm" comes into play again. This algorithm stipulates that a new block can only be formed if it is recognized by more than 51% of the nodes in the entire network. To put it bluntly, it is a matter of voting, and it can be elected if more than half of the people agree. This makes the data on the blockchain difficult to tamper with. If I were to force a change, there would be too many people to bribe and the cost would be too high to be worth it.
This is what people often call the "non-tamperable" feature of blockchain.
Another reason why blockchain gives people a sense of trust is because of "smart contracts."
Smart contracts are commitment agreements defined and automatically executed by computer programs. It is a set of transaction rules executed by code, similar to the current automatic repayment function of credit cards. If you turn on this function, you don’t have to worry about anything. The bank will automatically deduct the money you owe when it is due.
When your friend borrows money from you but doesn't remember to pay it back, or makes excuses not to pay it back, smart contracts can prevent breach of contract. Once the terms in the contract are triggered, such as when it is time to pay back the money, or there is a limit in his account, the code will automatically execute, and the money he owes you will be automatically transferred back whether he wants it or not.
Let’s briefly summarize. Blockchain technology is mainly decentralized, difficult to tamper with, and traceable, which represents more security and trustlessness. But it also brings new problems: redundancy and inefficiency, which requires many nodes to agree with the rules and actively participate.
This concludes the "drying" section. Next, let’s talk about unofficial history and the official history of blockchain.
A new technology is often used to serve a certain task.
Or goals. So where was blockchain first used, and who came up with it first?
Let’s go back to 2008.
On September 21, Wall Street investment banks collapsed one after another, and the Federal Reserve announced that it would convert the only two remaining investment banks (Goldman Sachs Group and Morgan Stanley) into commercial banks; it hoped to survive the financial crisis by absorbing savings. On October 3, the Bush administration signed a $700 billion financial rescue package.
Twenty-eight days later, on November 1, 2008, a new post appeared in a cryptography mailing group: "I am developing a new electronic currency system that is completely peer-to-peer and does not require a third party. Three-party trust institution." The text of the post is a paper titled "Bitcoin: A Peer-to-Peer Electronic Cash System", signed by Satoshi Nakamoto.
The paper explains the design of this peer-to-peer electronic cash system with a more rigorous logic. It first discusses the problem that financial institutions are subject to "trust based" (based on credit), and then explains step by step how to achieve "no third-party agency" , and cleverly solved the technical problems left by the predecessors.
Two months later, Satoshi Nakamoto released the first version of the open source Bitcoin client and mined 50 Bitcoins for the first time. The block that generated the first batch of Bitcoins is called the Genesis block., the genesis block was compiled into block 0 and was not uploaded to the chain. It took Satoshi Nakamoto 6 days to mine this block. This also sparked discussion in the bitcointalk forum. Bitcoin "believers" thought of the Bible, "God created the heavens and the earth in six days, and then rested on the seventh day."
Although concepts such as decentralized, token, and economy did not appear in the paper, Satoshi Nakamoto explained in detail the role of blocks and chains in the network. working principle. So, there is Block Chain.
This paper later became the "Bible" of the "Bit Cult", technology became the cornerstone of faith, and developer documentation became the "Code of Hammurabi".
After that, Bitcoin realized the first real-life payment by exchanging pizza, WikiLeaks, whose account was blocked by the US government, miraculously survived by relying on Bitcoin, Satoshi Nakamoto's "decentralization" and retirement, and the appearance of the real and the fake A series of legends such as and refutation of rumors, combined with the expectations, imagination and speculation of later generations, became "Bible stories".
There are also people who are not satisfied with the world described in the "Old Testament" and start new sects, write the doctrines into white papers, and tell the story of their faith in the ten years after Bitcoin. Just like the writing of the 66 books of the Bible spanned 1,500 years, and after 2,000 years of interpretation, Christianity has divided into 33,000 branches.
CoinMarketCap shows that there are more than 4,900 types of digital currencies, and the overall digital currency market size is nearly 140 million yuan. Bitcoin still leads the entire digital currency market with a market share of 66%, and the recent price has been hovering around US$7,200 per coin.
So many currencies have different functions and are divided into different categories: digital currencies represented by Bitcoin are positioned as "digital gold" and have certain value storage and hedging characteristics; Ethereum The digital currency represented by USDT and Libra has become the "operational fuel" in its network system; the stable currency represented by USDT and Libra has good payment properties due to its low volatility; the digital currency issued by the central bank represented by DCEP will definitely To a certain extent, it replaces M0, allowing commercial institutions and ordinary people to receive and pay without delay when they are out of cash and disconnected from the Internet.
It can be seen that after 10 years of development of blockchain technology, the first and largest application is digital currency.
Digital currency has also become an attractive reward for participants to maintain the public chain.
So besides digital currency, where else can blockchain technology be used?
Let us recall what the essence of blockchain is—a decentralized database, and its corresponding characteristics: traceability, publicity, anonymity, and tamper-proofing. In theory, you can try to use blockchain to transform traditional scenarios that use centralized databases to see if they are suitable.
Next, let’s talk about several industries and scenarios where blockchain has been successfully implemented:
Blockchain can prove the existence of a file or digital content at a specific time through hash timestamps.Forensic authentication, identity certification, property rights protection, anti-counterfeiting traceability, etc. provide perfect solutions
In the field of anti-counterfeiting traceability, blockchain technology can be widely used in food, medicine, agricultural products, alcohol, luxury goods, etc. through supply chain tracking. field.
Give two examples.
Blockchain can allow government data to be run, greatly streamlining service processes
The distributed technology of blockchain can allow government departments to be centralized on one chain, and all service processes are delivered to smart contracts, and the workers only need to be in one department Through identity authentication and electronic signature, smart contracts can be automatically processed and transferred, and all subsequent approvals and signatures can be completed in sequence.
Blockchain invoices are the earliest use of blockchain technology in China. The tax department launched the "Tax Chain" platform for blockchain electronic invoices. The tax department, the issuer, and the payee join the "Tax Chain" network through unique digital identities, truly realizing "instant invoicing for transactions" and "immediate reimbursement of invoices" - in seconds Level invoicing and minute-level reimbursement accounting greatly reduce tax collection and management costs, and effectively solve problems such as data tampering, over-reporting of one ticket, and tax evasion.
Poverty alleviation is another practical application of blockchain technology. Utilize the characteristics of openness, transparency, traceability, and non-tampering of blockchain technology to achieve transparent use, precise investment, and efficient management of poverty alleviation funds.
Give two examples as well.
The eID network identity operation agency guided by the Third Research Institute of the Ministry of Public Security is jointly developing a "digital identity chain" with Gongyilian, which will be issued to Chinese citizens based on the citizen's identity number as the root and cryptographic algorithm. Since it was put into operation, the eID digital identity system has served the full life cycle management of 100 million eIDs, effectively alleviating the problems of personal identity information being fraudulently used, abused and privacy leaked.
Odaily Planet Daily compiled 5 identity chain projects registered with the Cyberspace Administration of China
Blockchain technology naturally has financial attributes
In terms of payment and settlement, under the blockchain distributed ledger system, there are many markets Participants jointly maintain and synchronize a "general ledger" in real time. In just a few minutes, they can complete payment, clearing, and settlement tasks that currently take two or three days to complete, reducing the complexity and cost of cross-bank and cross-border transactions. At the same time, the underlying encryption technology of the blockchain ensures that participants cannot tamper with the ledger, ensuring that transaction records are transparent and safe. Regulators can easily track transactions on the chain and quickly locate high-risk capital flows.
In terms of securities issuance transactions, the traditional stock issuance process is long, costly and complicated. Blockchain technology can weaken the role of underwriting institutions and help all parties establish a fast and accurate information exchange and sharing channel. The issuer can handle the issuance on its own through smart contracts. , regulatory authorities conduct unified review and verification, and investors can also bypass intermediaries for direct operations.
In terms of digital bills and supply chain finance, blockchain technology can effectively solve the financing difficulties of small and medium-sized enterprises. It is difficult for current supply chain finance to benefit small and medium-sized enterprises in the upper reaches of the industrial chain, because they often do not have direct trade relations with core enterprises, and it is difficult for financial institutions to evaluate their credit qualifications. Based on blockchain technology, we can establish a consortium chain network covering core enterprises, upstream and downstream suppliers, financial institutions, etc., core enterprises issue accounts receivable vouchers to their suppliers. The bills can be transferred between suppliers after being digitized on the chain. Each level of supplier can use the digital bill certificate to realize the corresponding amount. Financing.
Give me an example.
The China Enterprise Cloud Chain, jointly launched by ICBC, Postal Savings Bank of China, 11 central enterprises, etc., has covered 48,000 companies since its establishment in 2017, with the amount of rights confirmed on the chain reaching 100 billion yuan, and factoring financing of 57 billion yuan. , cumulative transactions reached 300 billion yuan. After receiving the loan application, financial institutions can verify the authenticity of the contract on the chain and whether the contract has been verified multiple times (multiple loans); the smart contract automatically clears and settles, reducing costs and increasing efficiency; at the same time, the accounts payable of core enterprises can have The corresponding vouchers will be split by the first-level suppliers and handed over to the second- and third-level suppliers in the chain to help them with financing; core enterprises can also use this to understand whether the entire chain is operating normally and avoid emergencies. Redemption pressure.
Blockchain technology will greatly optimize the existing use of big data and play a huge role in data circulation and sharing
The aforementioned areas are areas that we are relatively familiar with. As more new technologies develop, blockchain may be able to be combined with them and play a role in unexpected cross-fields and new scenarios that are currently unforeseen.
In the future, the Internet, artificial intelligence, and the Internet of Things will generate massive amounts of data. The existing centralized data storage (computing model) will face huge challenges. Edge storage (computing) based on blockchain technology is expected to become a future solution. Furthermore, the non-tampering and traceability mechanism of blockchain ensures the authenticity and high quality of data, which becomes the basis for the use of all data such as big data, deep learning, and artificial intelligence.
Finally, blockchain can realize multi-party collaborative data calculations while protecting data privacy, and is expected to solve the problems of "data monopoly" and "data islands" and realize the value of data circulation.
In response to the current blockchain development stage, in order to meet the blockchain development and use needs of general business users, many traditional cloud service providers have begun to deploy their own BaaS ("Blockchain as a Service") solutions. The combination of blockchain and cloud computing will effectively reduce enterprise blockchain deployment costs and promote the implementation of blockchain usage scenarios. In the future, blockchain technology will also play an important role in many fields such as charity, insurance, energy, logistics, and the Internet of Things.
During this trial process from traditional technology to blockchain, we found that when certain scenarios have stronger demands for traceability, tamper-proofing, and decentralization, they also have problems with the weaknesses of blockchain (such as performance). , the requirements are not high, and this field is quite suitable for combining blockchain.
At the same time, in the process of blockchain evolution, it has also developed from a highly decentralized public chain accessible to everyone to a consortium chain with different permissions and maintained by multiple centers. Balances the advantages and disadvantages of the two systems.
Typical examples of alliance chains include: FISCO BCOS jointly developed by WeBank and the Golden Alliance Open Source Working Group, Fabric, a major contribution from IBM, and Ant Alliance Chain led by Ant Blockchain, etc.wait.
These trustless systems represent more secure data authentication and storage mechanisms, where data is effectively authenticated and protected. Businesses or individuals can exchange or enter into contracts digitally, where these contracts are embedded in code and stored in transparent, shared databases where they cannot be deleted, tampered with, or revised.
It is boldly predicted that in the future, contracts, audits, tasks, and payments will all be digitized with unique and secure signatures. Digital signatures will be permanently identified, authenticated, legalized, and stored, and cannot be tampered with. There is no need for an intermediary to guarantee each of your transactions. You can conduct transactions without knowing the basic information of the other party. While improving information security, it effectively reduces transaction costs and improves transaction efficiency.
Generally speaking, there has been a lot of progress in the implementation of blockchain compared to two years ago.
Many improvements are at the bottom of the system, and users cannot directly see that blockchain is used, but they have actually benefited from it; some applications are still in pilot mode, and users have not yet been able to experience it. In the future, blockchain is expected to be used on a large scale and become one of the Internet infrastructure.
I hope that after reading this, you have a general understanding of what blockchain is and what blockchain can do.
Related Q&A: What is blockchain
Blockchain is actually equivalent to a disintermediated database, which is composed of a series of data blocks. Each of its data blocks contains information about a Bitcoin network transaction, which is used to verify the validity of the information and generate the next block.
In a narrow sense, blockchain is a chain data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be non-tamperable and non-forgeable. distributed ledger.
In a broad sense, blockchain is actually a distributed infrastructure and computing method, which is used to ensure the security of data transmission and access.
Blockchain infrastructure:
Blockchain is composed of six infrastructures: data layer, network layer, consensus layer, incentive layer, contract layer and usage layer.
Ⅲ Blockchain, as a key supporting technology for intelligent society, will support the intelligentization of production relations, right?
Blockchain, as a key supporting technology for intelligent society, will support the intelligentization of production relations. right. This technology will greatly improve social relations and widely improve the fairness and fairness of the processing efficiency of social relations. Emerging technologies such as blockchain will support human society to move into an intelligent society. Blockchain is the key to an intelligent society. One of the supporting technologies, its core value is to realize the intelligent operation of social relations.
IV What is blockchain technology
Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
Blockchain is an important concept of Bitcoin. It is essentially a decentralized database. As the underlying technology of Bitcoin, it is simply a series of methods using cryptography.Each data block contains a batch of Bitcoin network transaction information, which is used to verify the validity of the information (anti-counterfeiting) and generate the next block.
The original English version of the Bitcoin white paper does not actually appear in the word blockchain, but uses chain of blocks. In the earliest Chinese translation of the Bitcoin white paper, chain of blocks was translated into blockchain. This is the earliest time when the Chinese word "blockchain" appeared.
The Cyberspace Administration of China issued the "Blockchain Information Service Management Regulations" on January 10, 2019, which will come into effect on February 15, 2019.
In a narrow sense, blockchain is a chain data structure that combines data blocks in a sequential manner in chronological order, and is distributed cryptographically to ensure that it cannot be tampered with or forged. Account book.
Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, and uses cryptography to ensure the security of data transmission and access. , a new distributed infrastructure and computing method that uses smart contracts composed of automated script codes to program and operate data.
IV What are the blockchain technologies?
The concept of blockchain can be said to be very popular. At the Internet Finance Summit, no one said that blockchain technology is out. What is chain technology?
Blockchain technology can be either a public classification (anyone can see it) or a permissioned network (only permissioned people can see it), solving supply chain challenges. Because it is An immutable record, so it is shared among network participants and updated in real time.
Blockchain technology - data layer: Designing the data structure of the account book
Core technology 1. Block_ _;Chain:
Technically, a block is a data structure that records transactions, reflecting the capital flow of the transaction. The transaction blocks that have been reached in the system are connected to form the main chain, and all nodes participating in the calculation are It records the main chain or a part of the main chain.
Each block is composed of a block header and a block body. The block body is only responsible for recording all transaction information in the previous period, mainly including transaction quantity and transaction details. The block header includes The current version number, the previous block address, the timestamp (recording the time when the block was generated, accurate to the second), the random number (recording the answer value to the mathematical question related to decrypting the block), the target hash value of the current block, and the Merkle number Information such as the root value of the source mill. From a structural point of view, most functions of the blockchain are implemented by the block header.
Core technology 2. Hash function:
.
The hash function can convert data of any length from the Hash algorithm to a fixed-length code. The principle is a one-way hash function based on cryptography. This function is easy to verify, but difficult to interpret. The industry usually uses y =hash(x) method tableIndicates that this hash function realizes the hash value y of computing x.
Commonly used hash algorithms include MD5, SHA-1, SHA-256, SHA-384, SHA-512, etc. Take SHA256 Take the algorithm as an example. If you input any data into SHA256, you will get a 256-bit Hash value (hash value). Its characteristics: the same data input will get the same result. A slight change in the input data (for example, 1 becomes 0) will get a completely Different results, result measurement. The forward calculation (the Hash value corresponding to the data calculation) is very simple. The reverse calculation is extremely difficult and is considered impossible under the current scientific and technological conditions.
Core Technology 3. Merkle tree:
Merkle tree is a hash binary tree that can quickly verify the integrity of large-scale data. In the blockchain network, Merkle钪 Zhang incited the firewood boy's side ⒌ Nai Cheng returned V's burden and scull fishy Wei said the gray boy's side ⒌ sought Xi Ji Cong's plan_erkle Trees.
Core technology 4. Asymmetric encryption algorithm:
p>The asymmetric encryption algorithm is a key confidentiality method that requires a key and a key. The public key and the private key are a pair. If the public key is used to encrypt data, it can only be decrypted with the corresponding private key to obtain the corresponding data value. , if you use a private key to sign data, you can only use the corresponding public key to verify the signature. The sender of the verification information is the owner of the private key.
Since encryption and decryption use two different keys, the The algorithm is called an asymmetric encryption algorithm, while symmetric encryption uses the same key in the encryption and decryption processes.
Blockchain mitigation technology - network layer: achieving centralization of charging nodes
< p>Core technology 5, P2P network:P2P network (peer-to-peer network), also known as point-to-point technology, is an Internet system without a central server and user groups exchanging information. It is different from a central network system with a central server Different, each client of the peer-to-peer network is a node and also has the function of a server. Domestic Xunlei software uses P2P technology. The P2P network has the characteristics of centralization and reinforcement.
Blockchain technology-consensus layer: Allocating the task load of charging nodes
VI What does blockchain mean
Blockchain is a new application of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. model.
1. Blockchain is a chain data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be non-tamperable and non-forgeable. Distributed ledger.
2. Blockchain is an important concept of Bitcoin. It is essentially a disintermediated database. At the same time, as the underlying technology of Bitcoin, it is a series of related cryptographic methods. data block.
(6) Blockchain technology will expand reading:
1. The Bitcoin peer-to-peer network stores all transaction history in the "zone"Blockchain" (blockchain). The blockchain continues to extend, and once new blocks are added to the blockchain, they will not be removed again.
2. Blockchain shared value system first It has been imitated by many cryptocurrencies and has been improved in workload proof and algorithm, such as using proof of stake and SCrypt algorithm.
3. The blockchain is actually a group of decentralized user nodes. The distributed database composed of all participants is a record of all Bitcoin transaction history.
4. Blockchain technology will be applied to credit reporting, transaction security and information security in the financial industry. Area Blockchain can form point-to-point digital value transfer in finance, thereby improving the security of transmission and transactions.
Ⅶ What are the core blockchain technologies of blockchain technology?
< br>What is the hottest Internet topic at the moment? You don’t need to tell me that it is blockchain technology. However, many friends have only heard of this technology and do not have too much in-depth understanding of it. So blockchain What are the technologies? Below we will bring you an introduction to the core technology of blockchain for your reference.
What are the core technologies of blockchain?
Blockchain technology can be a public ledger (visible by anyone), or a permissioned network (visible only by those authorized), which solves supply chain challenges as it is an immutable record among network participants shared and updated in real time.
Blockchain technology----data layer: designing the data structure of the ledger
Core technology 1. Block + chain:
Technically speaking, a block is a A data structure that records transactions, reflecting the capital flow of a transaction. The blocks of transactions that have been reached in the system are connected together to form a main chain, and all nodes participating in the calculation record the main chain or part of the main chain.
Each block consists of a block header and a block body. The block body is only responsible for recording all transaction information in the previous period, mainly including the number of transactions and transaction details; the block header encapsulates the current version number, previous A block address, timestamp (recording the time when the block was generated, accurate to the second), random number (recording the value of decrypting the answer to the math question related to the block), the target hash value of the current block, and the Merkle number Root value and other information. From a structural point of view, most functions of the blockchain are implemented by the block header.
Core technology 2. Hash function:
The hash function can convert data of any length through the Hash algorithm It is a set of fixed-length codes. The principle is based on a cryptographic one-way hash function. This function is easy to verify, but difficult to crack. Usually the industry uses y=hash(x) to represent it. , this hash function implements operations on For example, anyInputting string data into SHA256 will result in a 256-bit Hash value (hash value). Its characteristics: the same data input will get the same result. As long as the input data changes slightly (for example, a 1 becomes a 0), a completely different result will be obtained, and the result cannot be predicted in advance. Forward calculation (calculating the corresponding Hash value from the data) is very easy. Reverse calculation (cracking) is extremely difficult and is considered impossible under current technological conditions.
Core technology 3. Merkle tree:
Merkle tree is a hash binary tree, which can be used to quickly verify the integrity of large-scale data. In the blockchain network, the Merkle tree is used to summarize all transaction information in a block, and ultimately generates a unified hash value of all transaction information in the block. Any change in transaction information in the block will cause Merkle tree changes.
Core technology 4. Asymmetric encryption algorithm:
Asymmetric encryption algorithm is a key secret method that requires two keys: public key and private key. The public key and the private key are a pair. If the public key is used to encrypt data, only the corresponding private key can be used to decrypt it, thereby obtaining the corresponding data value; if the private key is used to sign the data, then only the corresponding public key can be used to sign the data. In order to verify the signature, the sender of the verification information is the holder of the private key.
Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm, while symmetric encryption uses the same key in the encryption and decryption processes.
Blockchain technology----network layer: realize the decentralization of accounting nodes
Core technology 5. P2P network:
P2P network (peer-to-peer network), also known as point-to-point technology, is no Central server, Internet system that relies on user groups to exchange information. Unlike a centralized network system with a central server, each client in a peer-to-peer network acts as both a node and a server. Domestic Xunlei software uses P2P technology. The P2P network has the characteristics of decentralization and robustness.
Blockchain technology----Consensus layer: allocate the task load of accounting nodes
Core technology 6. Consensus mechanism:
Consensus mechanism is how to reach consensus among all accounting nodes to identify The validity of a record is both a means of identification and a means of preventing tampering. There are currently four main types of consensus mechanisms: PoW, PoS, DPoS and distributed consensus algorithms.
PoW (Proof of Work, proof of work): PoW mechanism, which is like Bitcoin’s mining mechanism, miners package existing transactions that have not been recorded by the network into a block, and then continue to traverse and try to find a random number , so that the hash value of the new block plus the random number meets certain difficulty conditions. Finding a random number that meets the conditions is equivalent to determining the latest block of the blockchain, and is also equivalent to obtaining the current round of accounting rights of the blockchain. The miners broadcast the blocks that meet the mining difficulty conditions in the Yuanfu network, and the rest of the networkAfter verifying that the block meets the mining difficulty conditions and that the transaction data in the block meets the protocol specifications, the nodes will each link the block to their own version of the blockchain, thereby forming an understanding of the current network status in the entire network. consensus.
PoS (ProofofStake, Proof of Stake): PoS mechanism requires nodes to provide proof of a certain number of tokens to obtain a distributed consensus mechanism for competing for blockchain accounting rights. If you rely solely on the token balance to determine the bookkeeper, you will inevitably make the rich win, which will lead to the centralization of bookkeeping rights and reduce the fairness of the consensus. Therefore, different PoS mechanisms use different methods to increase the amount of money based on the proof of equity. The randomness of accounting rights avoids centralization. For example, in the PeerCoin PoS mechanism, the Bitcoin with the longest chain age has a greater chance of obtaining accounting rights. NXT and Blackcoin use a formula to predict the next accounting node. The more tokens you own, the greater the probability of being selected as an accounting node. In the future, Ethereum will also switch from the current PoW mechanism to a PoS mechanism. Judging from the information currently available, Ethereum's PoS mechanism will use nodes to place bets on the next block. The winner of the bet will receive an additional Ethereum currency award. Those who do not win will be deducted Ether coins to reach consensus on the next block.
DPoS (DelegatedProof-Of-Stake, share authorization certificate): DPoS is easy to understand and is similar to the modern corporate board of directors system. The DPoS mechanism adopted by BitShares is that shareholders vote to select a certain number of witnesses. Each witness has two seconds of authority to generate blocks in order. If the witness cannot generate a block within the given time slice, The block generation authority is given to the witness corresponding to the next time slice. Shareholders can replace these witnesses at any time by voting. This design of DPoS makes the generation of blocks faster and more energy-saving.
Distributed Consistency Algorithm: Distributed Consistency Algorithm is based on traditional distributed consistency technology. Among them are Byzantine fault-tolerant algorithms that solve the Byzantine Generals problem, such as PBFT (Byzantine fault-tolerant algorithm). In addition, distributed consensus algorithms (Pasox, Raft) that solve non-Byzantine problems are not explained in this article. This type of algorithm is currently a commonly used consensus mechanism in alliance chain and private chain scenarios.
Taken together, POW is suitable for public chains. If you build a private chain, it is more suitable to use POS because there is no trust problem in verification nodes; and because there are untrustworthy local nodes in the alliance chain, it is more suitable to use DPOS.
Blockchain technology----Incentive layer: Develop a "salary system" for accounting nodes
Core technology 7. Issuance mechanism and incentive mechanism:
Take Bitcoin as an example. Bitcoins are initially rewarded by the system to miners who create new blocks, and this reward is halved approximately every four years. At the beginning, miners were rewarded with 50 Bitcoins for each new block recorded, and this reward is halved approximately every four years. By analogy, by around 2140 AD, newly created blocks will no longerThere are rewards given by the system. By then, the total number of Bitcoins will be approximately 21 million. This is the total number of Bitcoins, so it will not increase indefinitely.
Another source of incentives is transaction fees. When there are no system rewards for newly created blocks, the miners' income will change from system rewards to transaction fees. For example, when you transfer, you can specify 1% of it as a handling fee to be paid to the miner who records the block. If the output value of a transaction is less than the input value, the difference is the transaction fee, which will be added to the incentive for that block. As long as a given amount of electronic currency has entered circulation, the incentive mechanism can gradually be converted to rely entirely on transaction fees, so there is no need to issue new currency.
Blockchain technology----Contract layer: giving the ledger programmable features
Core technology 8. Smart contract:
Smart contract is a set of programmed rules and logic that respond to scenarios. Implemented by decentralized, trusted shared script code deployed on the blockchain. Normally, after the smart contract is signed by all parties, it is attached to the blockchain data in the form of program code, and is recorded in a specific block of the blockchain after being propagated through the P2P network and verified by nodes. Smart contracts encapsulate a number of predefined states and transition rules, scenarios that trigger contract execution, response actions under specific scenarios, etc. The blockchain can monitor the status of smart contracts in real time, and activate and execute the contract by checking external data sources and confirming that specific trigger conditions are met.
The above is what blockchain technologies the editor has brought to you? All content introduced to the core technology of blockchain.
- 上一篇: 中央二套对话区块链,中央二台区块链
- 下一篇: 万向区块链公司怎么样,万向区块链股份公司