区块链技术进行网络监管的方法,区块链技术进行网络监管的原因
请查看相关英文文档
❶ Is it true that blockchain supervision is to use chains to govern chains?
To use chains to govern chains", that is, to establish a "regchain" (RegChain), with the help of
Blockchain
technology will be used to supervise the blockchain industry and establish a framework for
financial supervision
from twin peaks to
dual dimensions
. Now blockchain The chain is developing more and more, and it is not only in the financial industry.
Changsha High-tech Zone
There is now a SMIC blockchain service platform project initiated by Changsha High-tech Zone, which is a blockchain + public service model and is currently collecting applications. Enterprises on the chain
❷ The digital currency community must use blockchain technology to self-supervise
The digital currency community must use blockchain technology to self-supervise
Self-policing for illegal actions on the blockchain may soon become a necessity for the cryptocurrency community.
Every day in the future, cryptocurrency enthusiasts will likely have to spend time identifying illegal transactions and avoiding them. happened. The U.S. Treasury Department has made a decision and it cannot be changed.
A few weeks ago, the U.S. Treasury Department quietly posted a supplement to its FAQs on the website of the Office of Foreign Assets Control (OFAC), the agency responsible for overseeing the U.S. Economic Sanctions. Language in OFAC planning to include 'digital currency' addresses on its Specially Designated Nationals and Blocked Persons (SDN) list.
This is going to be a big deal.
Banks and various All types of businesses should check the SDN list to ensure they are not providing financial services to individuals, organizations, and governments designated as 'blocked' by the United States for terrorism, nuclear proliferation, theft, human rights violations, and other crimes.
Banks can legally freeze their holdings and halt their transactions if they are on OFAC's list. If this is not done, the financial penalties may be more severe. Although most everyday investors in digital currencies are only interested in a world sanctioned by legal restrictions. Understand a little bit, but operators of any form of financial business know that if you do not obey legal management, you may lose your business and property in an instant.
There has never been a specific digital currency address or The property will be listed on OFAC's list, although legal experts have known for years that sending Bitcoin or other digital currencies to anyone on any SDN list would be illegal for Americans.
However, There is a big difference between closed funds in the financial world and those that can exist in the digital currency field. Peer-to-peer digital currency transactions cannot be blocked and regulated by third parties.
So an OFAC-designated digital currency fund is more likely to will bring scrutiny to its external address, rather than the designated funds themselves.
Some experts in the digital currency industry believe that the designation of digital currency funds will usher in a new era; this depends on their relationship with SDN addresses closeDepending on the degree of association, a token is classified as clean, tainted, or of unknown age.
This may cause different price levels of coins on the same blockchain, with clean tokens being more expensive than those that are tainted or of unknown origin, and end the existence of digital currencies. There is substitutability.
The first is that we can expect that blockchain forensic tools will become increasingly valuable and more widely implemented, because digital currency transactions are designed to reduce the risk of users' transactions contaminating currencies.
It’s up to you
However, the most important part of a new era is the review of digital currency transaction addresses by financial institutions, which will be something the digital currency community itself will have to do: routinely block blocks Illegal transactions on the chain.
This is something the digital currency community doesn’t want to hear.
Digital currency experts often point to 'censorship resistance' as the most valuable feature of the technology, which allows anyone to store and send funds without any restrictions on government rights. In theory, this is a very powerful boost for freedom and democracy.
In practice, this technical capability is not extensible under the laws of most financial crime-related jurisdictions. While evading the actions of a corrupt government is a worthy goal, the digital currency community should be aware that remaining passive is ethically unacceptable, yet there is growing evidence of criminals and terrorists taking advantage of community freedoms.
In recent years, anti-money laundering (AML) compliance experts have focused on the conduct of the blockchain industry, encouraging digital currency businesses to go beyond the 'know your customer' (KYC) due diligence required by traditional financial institutions, and through Altering data on the blockchain to perform Know Your Transaction (KYT) analysis.
There are a number of startups that specialize in this kind of blockchain forensic work, working with other law enforcement agencies and corporate clients of large banks to conduct digital currency transactions. The companies' analytics tools are effective in fighting crime, but many voices in the blockchain community have criticized the tools -- saying they anonymize financial transactions on the blockchain. --To destroy privacy. However, much of the information from blockchain forensics is not publicly available. Typically, a corporate or government client is required to access this data.
However, OFAC’s listing of digital currency addresses increases the risk of KYT analysis.
This will be important for everyone involved in digital currency transactions, allowing them to verify the ‘legitimacy’ of the addresses they touch.
Although it is likely that the number of designated addresses will start from the smallest (OFAC will not designate addresses lightly), even a small chance of violating sanctions will bring about a reduced risk of compliance, affecting the token buyers of the civilian community. .
An inadvertent transaction with a banned address or an address that has been banned by a banned address will be visible on the public blockchain ledger,This person's digital currency funds may also be tainted.
The only way to help daily users of digital currencies get out of SDN-affected blockchain platforms is to have real-time AML/KYT to gain insight into the flow of funds from various fund addresses. Judging from the current situation, blockchain analysis is only in silos and is only provided to financial companies and legal departments, so this method is simply impossible to implement.
Centralized AML
We need an open source platform where illegal activity is flagged and defamatory information is censored. We call it centralized AML on the blockchain.
I understand the need. As a researcher at a nonprofit national security think tank, I investigate incidents of digital currencies and illicit financing, such as Bitcoin terrorist financing in the Middle East. Our team used the free and public Blockchain Discovery website to analyze donations from these campaigns.
These tools are not as powerful as mechanisms like governments and banks that can use expensive specialized machine learning and algorithmic tools. Even through rigorous manual tracking and analysis of blockchain activity, I saw addresses that flagged transactions with terrorist funds, and there was no effective way to share my findings on the platform with everyday cryptocurrency users. They can see my 'flags', assess their accuracy as much as possible and keep their addresses uncontaminated.
The industry can help solve the problem
Two years ago, I suggested that cryptocurrency experts should set up their own gatekeeper groups to look for malicious activity on the blockchain, akin to 'white hats' How hackers flag viruses is the same as other cyber threats. The Treasury Department’s plans make it the most important thing now for the digital currency community to establish advocacy for self-regulation.
In addition to aggregating OFAC’s blacklist, a public crowdsourced blockchain AML tool can address an illegal financial threat that directly affects digital currency users: digital currency heists. This would allow victims of extortion or exchange hacks to voluntarily list their extorted or stolen tokens.
While this will not transfer funds back to their legitimate owners, it will make it more difficult to move or steal coins and have long-term consequences for digital currency theft.
Of course, for an AML platform that can self-monitor, there must be a way to review the list, so that inaccurate and illegal information will not be sent out. Otherwise, such a tool could be misused to mistakenly tamper with addresses and then financially persecute innocent people. But implementing AML on a blockchain platform is a more technical way to solve the problem, rather than finding reasons to refuse to find a better way.
The first blockchain protocol, Bitcoin's breakthrough, was designed to decentralize ways to incentivize strangers to complete and affirm the authenticity of global public financial records.
Of course, digital currency tokens areWith the investment of attention, time, and money into a new product and service base, those developing the technology should be able to devise ways to encourage keeping the blockchain clean and untainted.
❸ What technical features of blockchain increase the difficulty of supervision
Characteristics of blockchain:
1. Decentralization. Blockchain technology does not rely on additional third-party management agencies or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes self-verification, transmission and management of information through distributed accounting and storage. Decentralization is the most prominent and essential feature of blockchain.
2. Openness. The foundation of blockchain technology is open source. In addition to the private information of the transaction parties being encrypted, the data of the blockchain is open to everyone. Anyone can query the blockchain data and develop related applications through the public interface. Therefore, the entire System information is highly transparent.
3. Independence. Based on consensus specifications and protocols (similar to various mathematical algorithms such as the hash algorithm used by Bitcoin), the entire blockchain system does not rely on other third parties. All nodes can automatically and securely verify and exchange data within the system without the need for any human intervention.
4. Security. As long as you cannot control 51% of all data nodes, you cannot manipulate and modify network data at will. This makes the blockchain itself relatively safe and avoids subjective and artificial data changes.
Blockchain
Blockchain (BlockChain) technology is a method that uses a decentralized consensus mechanism to maintain a complete, distributed The technology of a formal, non-tamperable ledger database allows participants in the blockchain to implement a unified ledger system without establishing a trust relationship. The block is a public ledger and is maintained at multiple points; the chain is stamped with timestamps (Timestamps) and cannot be forged.
There is a database behind all current systems, which is a big ledger. Then who will keep this ledger becomes very important. Now it’s whoever owns the system who keeps the accounts. Each bank’s account books are kept by each bank, and Alipay’s account books are kept by Alibaba. But now in the blockchain system, everyone in the system has the opportunity to participate in accounting.Reference for the above content: Network - Blockchain
❹ How does the blockchain ensure the security of data in the network?
Blockchain ensures the network Methods to ensure data security:
In blockchain technology, digital encryption technology is the key. Generally, the asymmetric encryption algorithm is used, that is, the password for encryption and the password for unlocking are different. the same. To put it simply, we have an exclusive private key. As long as we protect our private key and give the public key to the other party, the other party will use the public key to encrypt the file to generate ciphertext, and then pass the ciphertext to you, and we will use the private key. Decrypting the plain text can ensure that the transmission content is not seen by others. In this way, the encrypted data transmission is completed!
At the same time,There are also digital signatures that provide us with an extra layer of protection to prove that the document has not been tampered with during the process of sending it to the other party. It can be seen that the encryption technology of blockchain can effectively solve the security problems in the process of data circulation and sharing, which can be said to have great potential. Luanhe
❺ What role does blockchain application play in network security?
Blockchain technology can help us improve the security of protection mechanisms such as encryption and authentication, which is very important for the Internet of Things. This is definitely good news for the security and DDoS defense community!
Blockchain has the potential to become an important solution for the security community, as well as for finance, energy and manufacturing. For now, verifying Bitcoin transactions is one of its primary uses, but the technology could also be extended to applications such as smart grid systems and content delivery networks.
How to apply blockchain to network security?
Whether it is protecting data integrity or using digital identification technology to protect IoT devices from DDoS attacks, blockchain Chain technology can play a key role, at least now it has shown this ability.
IoT security and DDoS defense community
A certain blockchain startup claims that their decentralized “accounting” system can help users resist DDoS attacks with traffic exceeding 100Gbps. Interestingly, the company said that this decentralized system allows users to rent out their own additional bandwidth and "submit" bandwidth access rights to blockchain distributed nodes, which websites can take advantage of when they suffer DDoS attacks. Rent bandwidth to mitigate DDoS attacks.
Improving confidentiality and data integrity
Although the original design of blockchain did not take into account specific access control, some blockchain technology implementations have now solved the problem of data Confidentiality and access control issues. In this era where any data may be tampered with, this is obviously a serious problem, but complete data encryption ensures that the data will not be accessed or tampered with by others through man-in-the-middle attacks and other forms during transmission.
The entire IoT industry requires data integrity assurance. For example, IBM allows users to manage IoT data in a private blockchain network in its Watson IoT platform, and this blockchain network has been integrated into their Big Blue cloud service. In addition, Ericsson's blockchain data integrity service provides comprehensive auditing, compliance and trustworthy data services to allow developers to leverage the Predix PaaS platform for technical implementation.
One of the best applications is transforming our public sector and creating citizen-centric infrastructure. This will enable citizens to have their own identity and every transaction can be verified. We can use smart contracts and signed assertions to formulate elements of public services, such as benefits and benefits.
Internet of Things & Smart Devices
NowThe attention of the entire IT community has begun to shift to the Internet of Things & smart devices, and security is definitely one of the primary considerations. Although the Internet of Things can improve our work and productivity, it also means that we need to face more security risks. Many companies are therefore looking to apply blockchain to secure IoT and Industrial IoT (IIoT) devices because blockchain technology can enhance identity verification, improve data traceability and liquidity, and assist in record management.
Blockchain technology can help track hacking attacks, according to Kaspersky Lab anti-virus expert Alexey Malanov, who added:
“Network intruders often remove Permission logs to hide traces of unauthorized access to devices. But if the logs are distributed across multiple devices (for example, through blockchain technology), the risk can be reduced as much as possible."
Digital Economic Development Fund Chairman German Klimenko said: "Currently, the Department of Defense is vigorously promoting IT development and research efforts, which is a good thing for the industry."
NATO and the Pentagon are also Research “defensive” applications of blockchain. This technology is actively used to protect systems from cyberattacks. NATO will use blockchain to protect financial information, supply and logistics chains, while the Pentagon is developing a hack-proof data transmission system.
In general, blockchain technology is not omnipotent, at least not yet. Whether it is from the perspective of technical integrity or system implementation, current blockchain technology cannot ensure 100% device security. Note: The above content comes from the Internet.
❻ How to use new technologies such as blockchain to explore new models for digital protection of intellectual property rights
Using new technologies such as blockchain to explore new models for digital protection of intellectual property rights and achieve greater efficiency , safer and more convenient intellectual property management and maintenance. The following are some possible directions for exploration:
Application of blockchain technology in intellectual property registration and transactions: Use blockchain technology to establish a distributed ledger to ensure the uniqueness and non-tamperability of intellectual property; At the same time, transaction information such as intellectual property transfer and licensing is recorded on the blockchain to improve transaction transparency and market efficiency.
The application of blockchain technology in the authorization management of intellectual property rights: using smart contract technology to realize automated authorization and revenue distribution, reducing the cost and time in the authorization process; at the same time, with the help of The reliable identity verification mechanism of blockchain technology strengthens the supervision and management of users of intellectual property rights.
Application of artificial intelligence technology in monitoring intellectual property infringement: Use artificial intelligence technology to conduct extensive monitoring of networks, markets and other environments, quickly discover and deal with infringements of intellectual property rights, and improve supervision efficiency and accuracy.
Application of big data technology in intellectual property value assessment: By collecting and analyzing a large amount of intellectual property-related data, we can clearly understand the intellectual property rights.Conduct comprehensive assessments and predictions to help enterprises make scientific decisions and optimize intellectual property management.
It should be noted that the application of new technologies in the digital protection of intellectual property involves complex information systems and standards, and requires the collaborative cooperation of high-level talents and resources in multiple fields. , to achieve the coordinated development of the entire intellectual property protection ecosystem.
❼ What are the main models used in blockchain credit supervision?
The main models used in blockchain credit supervision are:
1. The use of blockchain technology Connect existing credit databases to each other to realize credit data transactions between various institutions.
2. It is to build a distributed database based on blockchain technology as the underlying framework and establish a new credit information ecosystem.
❽ The upgrade of blockchain technology enables blockchain applications to be regulated
The upgrade of blockchain technology enables blockchain applications to be regulated
Internet In the modern era, computers have proposed many trusted computing methods very early on, that is, any blockchain technology node adopts a trusted computing module. Therefore, trusted computing can make it easier to upgrade and iterate technology in distributed networks.
In terms of the real-name system of blockchain technology, there is a blockchain technology laboratory in the United States, and they have proposed many technical solutions for real-name systems. For example, the current blockchain technology is point-to-point. In many countries, such as South Korea, each person has an electronic certificate, and real-name electronic certificates must be used for signatures during transactions. Of course, there are simpler solutions. We can store the IP address of the entire device as part of the transaction on the blockchain application.
In this way, the entire blockchain technology transaction can realize the real-name system of the technology. So this is an optional real-name system. We can build a real-name blockchain application network or an anonymous blockchain application network.
Super Key is also a major advancement in the current development of blockchain technology. Because it is a distributed network, how do we supervise it and how do we control it? In cryptography, we call it the so-called multi-signature.
We (yunbaokeji) design a different blockchain application network. If it is a blockchain application network used by a bank, we can design a super key. The keys of all nodes must be together with the super key to generate a wallet.
Then this super key must be in the hands of regulators or certain institutions, who can have limited control over blockchain applications. For example, currently the data on blockchain applications cannot be deleted, so the super key actually allows powerful organizations to modify the distributed network.
So what kind of technology is blockchain:
(1) Distributed decentralization,
(2) No need to trust the system,
(3) Unable to Tampering and cryptographic security. These words separate meWe all know them, but what do they mean together?
1. Distributed decentralization. This is talked about all over the Internet. Needless to say, in short, there is no longer a need for a central server. Everyone’s data is obtained from this server. Instead, The data is placed on N devices connected to the Internet, and everyone can download and store it.
2. No need to trust the system. Do you trust banks? Because the bank is recognized and established by the state, the blockchain implements a trust method that does not require a third party. N devices on the Internet are used to store data, and everyone can verify the data. As long as more than half of the people think you are right, you are right. No one person or organization can modify more than half of the content on the Internet. If you don't believe in others, you should always believe in your own verification results. If you don't believe in yourself, then congratulations, you are a great philosopher.
3. Non-tampering and encryption security
Blockchain uses a series of technologies, such as SHA256 and RIPEMD160 and other cryptographic algorithms to ensure non-tampering and encryption security. For example, 0101100011101110 represents a Characters, the algorithm requires shifting 4 bits to the left, supplementing with 0, throwing away the 4 bits on the left, and adding 4 0s to the right to get the result. How to deduce the original value based on the result? Of course this is just a simple example.
❾ Those technical characteristics of blockchain make supervision more difficult
Many organizations have very sensitive documents, assets or contracts that need to be protected. When data, files or documents are stored, a hash is created for each file. Hashing is like a fingerprint through an algorithm, converting data into a fixed-length output that is unique to each transaction.
In addition to cryptocurrencies, this technology can also reduce transaction costs, reduce the risk of transactions with third parties, and reduce processing times by providing a transparent system for proving one's best interest in other areas. As technology approaches mass acceptance in different sectors, everyone is starting to realize its potential.
Blockchain Notes
Blockchain is not controlled by any person or entity, and the data is completely replicated on multiple computers. Without a single entry point for attackers, data security is more secure.
Data cannot be tampered with. Once it enters the blockchain, no information can be changed, and even the administrator cannot modify this information.
No third parties and accessible. Blockchain is decentralized and helps peer-to-peer transactions, whether it is trading or exchanging funds, without waiting for approval from three parties. Moreover, all nodes in the network can easily access the information. The biggest feature of blockchain is decentralization. Decentralization means that all operations are deployed on distributed ledgers and are no longer deployed on the servers of centralized institutions.