区块链sds目前价格,区块链src平台
请查看相关英文文档
❶ Analysis of the development prospects of the security industry in 2020
In recent years, the security industry has been booming, and new entrants have continued to pour in, and they are all people with strong capital. Therefore, the scale of my country's security market is expanding. Next, I have compiled an analysis of the development prospects of the security industry in 2020 for everyone. Welcome to read!
The security industry will usher in five major development opportunities in 2020
In the past 2019, for many security It has been a year of declining harvests for enterprises. Externally, we have been affected by the Sino-US trade war, the game between major powers, and the damage to security. This is not optimistic for every enterprise involved in international affairs; internally, we have welcomed the challenges of companies like Alibaba. The addition of new rivals and partners like Tencent and Tencent has made technological changes more rapid and made people more nervous.
Alibaba’s investment in Qianfang Technology has undoubtedly become another “top player” in the security industry
In this year, we have seen that the former security manufacturers are in deep trouble due to financial problems. Stuck in the quagmire, we have also seen many security companies being annexed or acquired. But we are still the world's number one security country. We are even at the top among the top 50 security companies in the world. As the environment gradually stabilizes, we are facing new opportunities and challenges in 2020.
Today, Bangnijun will sort out five opportunities that will be beneficial to the security industry in 2020 based on what happened in the past year.
1. Pan-security continues to deepen, and the potential market for intelligent security is huge
From "no AI, no security" in 18 years to focusing on implementation in 19 years, we found that not only artificial intelligence When entering the security industry, security companies are also using their unique fields to radiate into other markets.
Smart transportation, smart access control, smart elderly care, public security big data...the construction of these scenarios has become the "new blue ocean" that security companies are competing to bet on. Taking smart transportation as an example, the Ministry of Transportation alone plans to invest 2.7 trillion yuan in building smart transportation. Not to mention the various manufacturers that enter at low profits in order to seize the market.
The advantages of algorithmic computing power provide a strong boost to the "pan-security" trend
With the continuous improvement of algorithmic computing power, the non-civilian part of intelligent security will show its performance in 2020 Huge construction boom. But there is no free lunch in the world, and various pain points during the construction process require more scenario-based solutions. And most needs are not something that one or two companies can perfectly bear.
Just as Hikvision claims to be a solution provider for the Internet of Things, what the industry will need in the future will not be competitiveness in a single field, but the resource integration capabilities of the entire industry. Who can integrate resources to form a Whoever has a powerful solution can take the lead in the pan-security market.
If in the past everyone competed for turnover, profit, and who is the leader in the industry, then in the era of pan-security, what companies have to compete for is the ability to integrate resources.The competition is not about who earns more in a single field, but whether they can lead everyone to make money together. This is the "good cat" that can catch mice as Deng Gong said.
2. The time has come for the artificial intelligence industry to face a reshuffle in the security industry and to recruit new generals
In the past, we all said that with the development of artificial intelligence, how many people in the industry would be left without a living? But now How many people engaged in the artificial intelligence industry are not in danger?
It is true that the artificial intelligence industry is still one of the industries with the highest employee salaries and benefits, but the current obvious reality is that it cannot be quickly put into application of artificial intelligence companies will quickly wither.
The theme of the AI industry in 2020: reshuffle
According to statistics obtained by the Beijing Economic and Information Commission, 70% of the country’s artificial intelligence companies cannot obtain venture capital, and Getting venture capital doesn't mean you're exempt from death. Someone even made a list in this regard. The dead AI companies on it are all "stars of hope" that have received tens or even hundreds of millions of yuan in financing. They are all dead, who can escape? The latest data also shows that in 2019 alone, 92,000 AI companies died. In this environment, in 2020? Which artificial intelligence company can resist the urge to cash out and launch?
This is the fact. In this pragmatic capital world, few people have the patience to wait for you to put it into practice. The painted cakes are becoming reality step by step, and capital is more willing to pursue fast food, those meal packages that can be implemented and monetized.
In this environment, the artificial intelligence industry may become a "gold rush" for various industries in 2020, and the security industry is no exception. Whoever can better empower the industry with technology will continue to survive. For the security industry, artificial intelligence has helped the industry complete a technological leap in recent years, and technologies with promising market prospects such as face recognition, low-light cameras, smart bayonet and even pan-security products are obviously inseparable from these artificial intelligence. enterprise.
Under the premise of this two-way demand, opportunities have clearly arrived. In 2018, my country's AI+ security market size has reached 13.5 billion yuan, and the turnover obtained by AI for some leading security companies has exceeded 8%. Today, two years later, a new round of competition for the artificial intelligence industry in the security industry will also begin. Whoever can better serve their own products with technology and implement it better will seize the opportunity.
3. The commercial use of 5G technology brings many possibilities
Just as 4G technology makes real-time transmission of surveillance images, cloud technology and other technologies possible. The nationwide commercial use of 5G technology also brings new possibilities to the security industry.
5G at the forefront
From a technical perspective, the transmission efficiency provided by 5G can provide more possibilities for security equipment. Ultra-high-definition cameras, more intelligent module installations, real-time cloud storage and other functions all require the support of 5G technology.
Just like from 3G toJust like the real-time video transmission brought to us by 4G requires an evolutionary process, the implementation of 5G technology is still widely considered to be too early and too costly in the general environment. But new things will always replace old things. It will be too late to consider the necessity of developing 5G when 5G is truly mature and applied.
With the continuous development of the Internet of Things, the 5G environment provides conditions for security to realize the interconnection of all things. The Internet of Vehicles, Internet of Things, smart cities, and drone network construction are all inseparable from the application of 5G technology. Today's 5G field is in the layout and technology discovery stage just like the artificial intelligence field in the first two years, but everyone also knows the importance of 5G technology. As the first year of large-scale deployment and mature application of 5G technology, 2020 is bound to show powerful possibilities.
How much security can grow on this basis is worth looking forward to.
4. Data Security and Data Storage
With the advent of the smart security and 5G era, the capacity of video data has experienced a blowout development. Still facing huge challenges in reading and writing speed.
The requirements of smart security for hard drives mainly focus on three aspects: efficiency, capacity, and power consumption. This has put forward new requirements for traditional hard drive manufacturers. Seagate and Western Digital both launched 14TB or more this year. High-efficiency security storage hard drives, but in the face of the increasing storage demand in the security industry, traditional hard drive manufacturers are still facing severe challenges.
Customized, large-capacity, high-performance traditional hard drive manufacturers continue to deepen their focus on security
In addition, with the development of 5G technology, cloud storage technology has become increasingly popular among security manufacturers. Storage method, although cloud storage currently has shortcomings such as high cost, limited data storage time, and unstable transmission efficiency, this centralized storage method is more convenient for platform-based management and control centers. This is also a major trend in the current security development. With the development of data transmission technology, cloud storage has broad development prospects in the security industry in the future.
Today, artificial intelligence and cloud technology are developing too fast, and information security measures have not been followed up in time, which has led to frequent data breaches since the second half of last year. These incidents endanger users' privacy and data security all the time. When data security cannot be guaranteed, how can you let users choose your device?
Alipay’s facial recognition has also been cracked, and data security research and development is urgent
In fact, data security is Problems do not arise in a day or two. The current data security problems faced by security are reflected in several major aspects: information islands, top-level design, algorithm application defects, and lack of policy systems and technical standards. In this environment, enterprises are like "data chimneys". Technology, R&D, service scope, and development platforms all show non-uniform characteristics, and the non-uniformity in these aspects further leads to the occurrence of vulnerabilities. Frequent occurrences, thereby endangering usersData Security.
In addition, malicious programs, various types of phishing and fraud are emerging in an endless stream. User privacy and data trafficking have even formed a complete industry chain. These have brought huge hidden dangers to the security industry.
In order to solve these hidden dangers, the related data security market emerged as the times require. In the new year as smart security continues to accelerate, it is believed that the scale of the data security market will also further expand.
5. Strong policy support
As the Sino-US trade war continues to expand, Hikvision and Dahua have been included on the list of trading entities. Now even ordinary people know that China What security can do makes the United States extremely fearful. Where there is oppression, there is resistance. In 2020, China is expected to introduce a large basket of favorable policies or standards for the security industry. Here is a brief summary of this. The specific situation is as follows:
In terms of video surveillance, There are "Regulations on the Management of Network Audio and Video Information Services", "Specifications for Collection of Video Image Information in Key Public Security Areas" and "Safety Requirements for Light Radiation of Active Lighting Components of Video Surveillance Systems". At the same time, export-oriented companies need to pay additional attention to California's CCPA Data Act, which will impose many restrictions on export-oriented security companies.
In terms of public safety, the "Measures for the Safety Management of Road Transport of Dangerous Goods", "Measures for the Management of Special Public Security Services of Liaoning Province", "Anti-theft Safes (Boxes)" and General Technical Requirements for Vault Doors, as well as the Ministry of Emergency Management issued The 19 safety production industry standards will be officially implemented in 2020.
In terms of industry, "Industrial Structural Adjustment Guidance Catalog (2019 Edition)" and "Technical Requirements for Home Security Intelligent Management Systems".
Finally, there are supporting policies. In this regard, there are "Action Outline for Promoting the Development of Comprehensive Transportation Big Data (2021-2025)", "Opinions on Promoting the Development of "Internet + Social Services"", and other policies that are worthy of We pay attention. A series of new support policies are bound to emerge for 5G commercial use and smart security. Maintaining close attention will also bring certain development opportunities to security companies.
Conclusion:
Where there is demand, a market will be born. Smart security is now like a rocket taking off at high speed. The faster the rocket, the less the outer protective layer will be lost. The more serious it is, and the various gaps created are the birthplace of the future market. Whether it is new transmission technology, storage technology or even data security, these are all products born with the development of intelligent security.
The market for new things is always full of vitality. In the second decade of the 21st century, whoever can grasp the new direction of the development of these industries will be able to better take the initiative.
Understand the general trend of the security industry in 2020 through the eleven major trends
Looking back on the development of the security market this year, on the one hand, under the influence of government policies at all levels, AI, IOT, Emerging technologies such as 5G and blockchain continue toIntegrated with the security industry, a huge market growth space has emerged, and emerging products and solutions of enterprises are constantly emerging.
On the other hand, as the traditional security market becomes increasingly blurred and expanded driven by technology, more and more companies are crossing over into the security industry and applying the massive data in the security industry to wider areas, thus Continuously expand the industrial ecosystem.
However, in addition to the updates and iterations of product solutions, problems such as network security, data islands, and scenario-based operation and maintenance also plague the development of the industry market, requiring enterprises to continuously improve in the implementation of the industry. Improve.
In 2020, how to seize industry development opportunities and achieve better development and commercialization of emerging technologies will become the key for many security companies to occupy a place in the fierce market competition.
In order to let everyone better understand the development trend of the security industry in 2019, CPS China Security Network has sorted out the new development trends of the security industry in 2019 for your review.
5G+ video surveillance has started to be put into practice
In 2019, driven by the promulgation of 5G pilot cities and 5G commercial licenses by the country, 5G technology with large bandwidth, low latency, and large connections has The integration between various industries has become a hot topic of social concern, and the security industry is no exception.
At the 2019 CPSE Security Expo, Huawei, ZTE, Infineon and other companies all presented 5G+ security products. In early December, Huawei teamed up with Yuncong Technology and Shanghai Unicom to implement 5G+4K+AI video surveillance for the first time in China at Zhangjiang Artificial Intelligence Island in Shanghai.
Comment: According to Gartner predictions, outdoor video surveillance is expected to become the largest market for 5G IoT solutions in the world by 2022, which has also attracted countless video surveillance and IoT companies to invest in the commercialization of 5G. middle. However, at this stage, unfavorable factors such as insufficient base station construction and high implementation costs will continue to affect implementation development.
Video surveillance welcomes the blue ocean of ultra-high-definition video applications
In March 2019, the Ministry of Industry and Information Technology, the State Administration of Radio and Television, and China Central Radio and Television jointly issued the "Ultra-HD Video "Industrial Development Action Plan (2019-2022)", video surveillance ushered in the blue ocean of ultra-high-definition video applications.
The "Action Plan" states that it will clearly follow the overall technical route of "4K first, taking 8K into consideration" to vigorously promote the development of the ultra-high-definition video industry and applications in related fields.
Among them, in the field of security monitoring, the future will accelerate the research and development and mass production of ultra-high-definition surveillance cameras; promote the upgrading and transformation of security monitoring systems; support the development of face recognition, behavior recognition, and target classification based on ultra-high-definition video and other artificial intelligence algorithms; improve monitoring range, identification efficiency and accuracy; create a batch of intelligent ultra-high-definition security monitoring application pilots.
Comment: For a long time, the policy has beenA powerful booster for the development of my country's security industry. Since the issuance of the "Action Plan", the market value of listed companies in the security industry such as Ingenics, Hikvision, and Dahua Technology that are closely related to ultra-high-definition video surveillance has increased, which shows the huge impact of the plan on the industry. . New products such as ultra-high-definition cameras and ultra-high-definition displays are also emerging in the industry.
The collision of blockchain and security industry
On October 24, 2019, it was pointed out in the 18th collective learning session that the integrated application of blockchain technology in new technologies plays an important role in innovation and industrial change. Blockchain should be regarded as an important breakthrough for independent innovation of core technologies, clarify the main direction of attack, increase investment, focus on conquering a number of key core technologies, and accelerate the development of blockchain technology and industrial innovation.
This has also opened the curtain on the integration of various industries with blockchain technology. Security companies such as Doer Intelligent Control, Zhongkong Intelligence, Guangdian Express, and Infineon are also exploring and deploying in the blockchain field.
In addition to releasing solutions and exploring the combination of blockchain and smart cities with the State Key Laboratory of Surveying, Mapping and Remote Sensing Information Engineering of Wuhan University and Bitmain, Infineon will also participate in its "Hunan Smart Chinese Project" "Real-time deployment of blockchain technology during construction.
Comment: In the context of the increasingly popular construction of smart cities, especially the construction of the Guangdong-Hong Kong-Macao Greater Bay Area, the high data protection characteristics of the blockchain itself also provide a strong guarantee for smart city data transmission and storage. . At present, more and more cities are beginning to try to promote the application of blockchain technology in smart city projects.
The main theme of the second half of security - AIoT
Under the impact of the wave of intelligence, the security industry is undergoing changes at both the technical and market levels.
At the 2019 CPSE Security Expo, in addition to traditional security companies, there are companies in the fields of AI, Internet, ICT, communications and other fields that are deploying in the security field. The massive data generated through the Internet of Things is stored in the cloud or at the edge, and then analyzed and processed through deep learning to achieve structured processing of video data by front-end cameras and create an ecological closed loop.
Comment: AIoT makes the boundaries of security increasingly blurred. In the future, security may only be a business in the AIoT industry. This has also enabled in the current industry, industry leading companies, artificial intelligence companies, and cross-border companies to begin strategic cooperation with the upstream and downstream of the security industry chain such as traditional manufacturers and integrator engineering companies to jointly develop the AIoT market.
The first year of data center
With the continuous development of urban intelligence, the application of data governance in cities is also increasing. How to break data silos has become a part of urban governance. Big pain point.
Based on this, digital twins and data middle platforms that can empower huge urban scenarios according to industry needs, tap deep data value, and realize refined urban management are beginning to come into view.
At the 2019 CPSE Security Expo, companies such as Dahua Technology, Jiadu Technology, Oriental Networks, and Gosuncn Technology all brought relevant digital twins, smart twins, and data center products to the display.
These products are essentially based on the basic processes of front-end data collection, intermediate data aggregation, and back-end data application. They are continuously expanded and derived, and applied to different scenarios.
Comments: From the establishment of Xiongan New Area to the construction of the Guangdong-Hong Kong-Macao Greater Bay Area, in recent years, under the influence of artificial intelligence and the Internet of Things, the city’s intelligentization process has continued to accelerate, and the surge in data has also impacted the city’s data governance. Ability puts forward higher requirements.
Against this background, the data center emerged spontaneously, which also opened up a vast market space and attracted many security companies to conduct research and development.
3D face recognition may become a mainstream trend in the industry
Face recognition is an important technical application of artificial intelligence. In the process of artificial intelligence rapidly landing in the security industry, face recognition is playing an important role in the security industry. The industry has also set off a trend of "face brushing". From time attendance to community entrance and exit access control, to urban security management, face recognition can be seen everywhere
At the same time, security issues regarding face recognition have also remained high. With video pictures and 3D News about facial models cracking facial recognition also happen from time to time.
Against this background, more secure 3D face recognition has begun to achieve research and development in many fields such as smart locks, access control, and video surveillance. At the 2019 CPSE Security Expo, Dahua Lecheng released the industry’s first AI face recognition video lock equipped with 3D structured light.
Comments: Face recognition can be said to be the most representative application of artificial intelligence in security. A large number of popular face scanning scenarios have gradually exposed the disadvantages of 2D face recognition. Although live body, infrared and other technologies are currently installed on face recognition products on the market, more secure 3D face recognition display is the direction of industry application.
State-owned assets invest in security companies
On March 2, 2019, Hanbang Hi-Tech announced that it planned to transfer 8.5 million shares of the company held by Wang Liqun, the company’s controlling shareholder and actual controller, to Beijing Qinglv Zhongbing Asset Management Co., Ltd. After the transfer is completed, Beijing Youth Travel Service Zhongbing will become the company's major shareholder holding more than 5% of the shares.
On July 14, 2019, Jieshun Technology announced that the company’s controlling shareholders and actual controllers Tang Jian and Liu Cuiying had entered into an agreement with Shenzhen Special Economic Zone Jianfa Smart Transportation Investment Partnership (Co., Ltd.) on July 12, 2019. Partnership) signed the "Share Transfer Agreement". After the transfer is completed, Tejianfa Intelligent Transportation will become the second largest shareholder of Jieshun Technology.
On September 3, 2019, Oriental Netpower received the anti-monopoly review approval document transferred from Sichuan Investment Information Industry. According to the relevant agreement previously signed, the company’s controlling shareholder is now changed to Sichuan Investment Information Industry, and the company The actual controller was changed from Liu Guang to Sichuan Provincial State-owned Assets Supervision and Administration Commission.
November 2019On March 18, Infineon's controlling shareholder JHL and its actual controller Liu Zhaohuai signed a "Share Transfer Agreement" with Shenzhen Investment Holding Co., Ltd. JHL planned to transfer 59.9338 million shares of Infineon held by it to Shenzhen Investment Holdings Co., Ltd., accounting for 10% of Infineon's total share capital. 5%. After the implementation of the "Share Transfer Agreement" is completed, Shenzhen Investment Holdings will hold a total of 26.35% of Infineon's equity and gain control.
Comments: As a G-end and B-end market, security is mainly oriented to the G-end and B-end. The participation of state-owned capital will not only solve the financial problems of security enterprises, but also bring market and project support, so as to achieve better results. develop.
Artificial intelligence is moving towards the implementation of scene operation and maintenance
Nowadays, artificial intelligence no longer only exists in computer vision, but also in ISP, transmission, storage, operation and maintenance and other aspects of artificial intelligence. .
At the 2019 CPSE Security Expo, artificial intelligence has almost become a "standard feature" for companies to participate in the exhibition, and more and more companies are exhibiting platform products such as operation and maintenance intelligent platforms. Some companies say that a one-time transaction of selling hardware and technology is far better than buying continuous services of operation and maintenance.
Comments: In the context of the ever-expanding security boundaries, the implementation of artificial intelligence in the security field has also begun from the first half of "algorithm-computing power-data" to the second half of "plan-implementation-operation and maintenance" Move forward. In addition to providing technical products, the operation and maintenance platform that can aggregate and analyze data has also been favored by many users.
Cloud-edge integration is accelerating
At the 2017 CPSE Security Expo, Hikvision officially released the Hikvision AI Cloud concept, advocating the implementation of edge nodes, edge The "cloud-edge fusion" computing architecture composed of domains and cloud centers realizes "edge computing + cloud computing" from end to center, truly making edge perception more accurate, data aggregation more efficient, multi-layer cognition more intelligent, and hierarchical The application is more practical.
Two years have passed in the blink of an eye. At the 2019 CPSE Security Expo, Hikvision fully demonstrated the latest achievements of Hikvision AI Cloud in terms of software, hardware, solutions, and practical application cases.
CPS Zhongan.com learned that typical application projects based on the Hikvision AI Cloud material and information integration data platform have covered 24 provinces and regions and nearly 100 cities across the country, providing public security, emergency command, people's livelihood services, and urban Provides intelligent IoT solutions and big data services in operations, traffic management and other fields.
Comment: From the first proposal of the "AI Cloud" strategy in 2017 to the release of a number of new software and hardware products under the strategy at the CPSE Expo in 2019, Hikvision's exploration of cloud-edge integration has gone further. further and achieve considerable project implementation results.
The concept of software-defined cameras is further expanded
On October 29, Huawei held a conference in ShenzhenShenzhen held the Huawei Intelligent Security Industry Summit with the theme of "Insight into the present and foresee the future - 5G+AI+video, accelerating the intelligent upgrading of thousands of industries." Huawei proposed to redefine the platform technology architecture for the 5G+AI era, upgrade SDC (software-defined camera) to HoloSens SDC, upgrade IVS (intelligent video cloud) to HoloSens IVS, and accelerate the 5G+AI era with a new ecosystem and new platform. Intelligent upgrade of all industries.
In addition, Huawei also launched the Huawei HoloSens Store, an intelligent video algorithm mall based on intelligent vision and perception. It uses Huawei products as the core base to carry intelligent algorithms, providing a comprehensive solution for rapid development, convenient ordering, and agile operation. Process services provide a variety of entry models and business model combinations.
Comment: Software-defined cameras have always been an important step for Huawei to enter security. In 2019, in addition to releasing new hardware products, Huawei also released an algorithm platform to improve its "software-defined camera" ecosystem. Against the backdrop of accelerated application in the artificial intelligence security industry, Huawei will bring more scenario understanding.
AI ultra-low light technology has become a new tool for controlling light pollution in the industry
For a long time, limited by factors such as nighttime ambient light sources and insufficient imaging technology, the nighttime imaging effect of surveillance cameras has been unsatisfactory. To meet the needs of video image imaging, high-intensity fill lights are widely used.
However, while the fill light increases the brightness, the dazzling light also seriously affects the personnel's vision and brings safety risks. However, the current mainstream intelligent fill-light technology is easily affected by many factors such as scene, cost, reflective materials, etc., and its application effect is limited.
To this end, relying on years of accumulation in basic ISP image modulation technology, Kodak released the AI ultra-low light series cameras at the 2019 CPSE Expo. By using self-developed deep learning image enhancement algorithms, it significantly Reduce the reliance of previous surveillance cameras on fill lights, fully restore the color and texture of objects while improving image brightness.
Comments: In daily traffic, high-intensity camera flash capture has always been a major problem that car owners "hate". Under the trend of intelligence, technologies such as super starlight and black light have begun to expand towards this pain point. I believe that Kodak's AI ultra-low light technology will also bring new understanding to the industry.
The market size of the security industry is expected to exceed 800 billion in 2020, but there are very few people with annual revenue of tens of billions
In recent years, the security industry has been booming, with BAT, Huawei, and artificial intelligence The Four Little Dragons all came to "have a chip in." New entrants are constantly coming in, and they are all well-capitalized. Therefore, the scale of my country's security market is expanding. In 2016, the security market scale exceeded 500 billion yuan, and the security market scale will reach 800 billion yuan in 2020. Why is the security industry market so big, but there are so few people with an annual income of tens of billions?Experts believe that an important reason why there are few large companies in the security industry is product homogeneity and insufficient technological innovation. At present, whether it is an established security company or a new start-up, the technological gap between the two is gradually narrowing. There is a gap between artificial intelligence algorithms and accuracy, but it is not large, and there is no "one-size-fits-all" one. In addition, the security market still has a lot of TOB business, which relies more on government orders. Large companies with strong capital have an advantage. It is difficult for new companies to go it alone and more of them need to cooperate with local integrators.
Related articles analyzing the development prospects of the security industry in 2020:
1. What is the market size of the excavator industry
2. Development advantages of the electric vehicle industry in 2020
❷ Application of blockchain in the financial field
1. Application and development of blockchain
Part The Internet, Internet start-ups and traditional financial industries have begun to try and apply it in some projects
2. Domestic financial institutions are testing the waters of blockchain
Various financial institutions are testing the waters one after another, basically All are in the conceptual experimental stage and have not yet been commercialized on a large scale.
3. Panoramic view of blockchain application in the financial field
4. Ghostwriting
5. Digital bills
Bills are an important financial product in the financial market. They have dual functions of payment and financing. They are of high value and bear bank credit or commercial credit. Once a bill is issued, its face amount, date and other important information cannot be changed. Bills also have circulation attributes and can be accepted, endorsed, discounted, rediscounted, collected and other transactions within a specific life cycle. Once the transaction is completed, the transaction cannot be revoked. There are two characteristics in the circulation of bills: First, the circulation of bills mainly occurs through bank acceptance bills, and the number and circulation of commercial acceptance bills are small; second, each bank independently conducts credit granting and risk control on the bill business, and a single bank's Risk control results may affect other participants in the bill market transaction chain.
The experimental production system of the digital bill trading platform uses SDC (Smart Draft Chain) blockchain technology to achieve privacy with the help of homomorphic encryption, zero-knowledge proof and other cryptographic algorithms.Protection, consensus through Practical Byzantine Fault Tolerance Protocol (PBFT), and a see-through mechanism to provide data monitoring.
The experimental production system includes four subsystems: stock exchange, bank, enterprise and monitoring: the stock exchange subsystem is responsible for managing the blockchain and monitoring the digital bill business; the bank subsystem has Digital bills have business functions such as acceptance and receipt, discount signing, rediscounting, and collection and repayment; the enterprise subsystem has business functions such as issuance, acceptance, endorsement, discounting, and prompt payment of digital bills; the monitoring subsystem monitors the status of the blockchain in real time and business happenings
6.
❸ China’s top ten MLM coins
1. Letai Fang: Letai Fang claims to be erc20 based on Ethereum Token. Static income relies on the "unilateral increase" price difference, while dynamic income relies on offline development. But more than 97% of virtual coins are held by the same person.
Blockchain network qklw officially releases the top 100 MLM coins
2. Traffic Magic Box: In essence, it is a cloud computing solution that uses the sharing economic model to play with traffic, allowing used traffic to be cached or Idle, redundant or even worthless traffic resources regain their due value. There are billions of bubbles.
3. Six Degrees Chain (SDC): It is said that if blockchain technology is used for store investment, investors will receive their tokens "Six Degrees Cloud Shell (SDC)", which can be withdrawn or exchanged for other products at any time. commodity. It promised that its tokens would "rise 3% every day" and "invest 60,000-100,000 yuan, withdraw cash every day, return the principal within a month, and earn more than 20%. In September 2018, several investors disclosed the block to the central bank Chain network qklw said that Liudu Chain (SDC) was unable to withdraw cash and lost contact with the person in charge.
4. Charity Chain LMC: Using mining as a gimmick, after initial registration as a member and real-name authentication, you can obtain a cloud mining machine. In the later reward system, you can get commissions and dividends by pulling people into a team.
5. Maple Leaf Coin CMCC: CMCC claims to be an encrypted digital currency jointly issued by the Royal Bank of Canada and the National Stock Exchange. It uses static income and A way to combine dynamic income. At present, it is difficult to withdraw cash.
6. Shared chain mall: This project claims to combine "blockchain" with shared malls through technical means. As long as consumers shop in the mall, they can Get special discounts from shopping malls.
7. Meservo (POF): MSW environmental token has been promoted since January 2018, claiming to return 3% of the investment amount every day, totaling 2.5~3 times of the investment amount. After Check, MSW token does not use any blockchain technology, nor is it logged into any exchange as mentioned in the promotion.
8. Ant Chain (Copycat Ant Financial): Ant Chain forged the US ANTC white paper under a pseudonym Public fundraising. The "genuine" Ant Chain that was impostered did not raise funds publicly. Currently, the company only launches Ant Bicycles.
9. GTB: Agricultural chain lvtecoin adopts an offline development model to attract investors, claiming that it only rises but never falls, and has the attributes of a pyramid scheme.
10. Qubu Chain (IWC): With zero investment as a gimmick, Qubu Chain IWC attracts users in the form of free rolling. The concept of airdrops attracted a large number of investors to buy candies and earn interest over the counter.
- 上一篇: 区块链打包需要耗费多少钱,区块链打包需要耗费多少流量呢
- 下一篇: 区块链属于什么学科,区块链技术属于