为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 比特币基础> 正文

区块链系统结构图怎么画,区块链系统结构图片

发布时间:2023-12-17-06:07:00 来源:网络 比特币基础 结构图   区块   系统

区块链系统结构图怎么画,区块链系统结构图片


请查看相关英文文档

❶ What structures does a blockchain consist of?

A blockchain is a chain storage structure formed by interconnecting blocks. Blocks are the data in the chain storage structure. elements, the first block of which is called the genesis block.

General blocks include block header and block body. The block header contains the identification information of each block, such as version number, hash value, timestamp, block height and other information; the block body mainly contains specific transaction data.

❷ What are the blockchain technology frameworks?

The current mainstream blockchain architecture contains six levels: network layer, data layer, consensus layer, incentive layer, contract layer and application layer. The positions of the data layer and the network layer are reversed in the figure, and their main uses will be detailed in the next section.
Network layer: The essence of the blockchain network is a P2P (Peer-to-peer) network. The resources and services in the network are scattered on all nodes. The transmission of information and the implementation of services are directly between the nodes. It can be carried out in a short period of time without the intervention of intermediate links and servers. Each node both receives and generates information. The nodes synchronize information by maintaining a common blockchain. When a node creates a new block, it notifies other nodes in the form of broadcast, and other nodes receive the information. The block is then verified and a new block is created based on the block, thereby achieving the role of the entire network jointly maintaining an underlying ledger. Therefore, the network layer will involve the design of P2P network, propagation mechanism, verification mechanism, etc. Obviously, these designs can affect the confirmation speed of block information. The network layer can be used as a research direction in the scalable solution of blockchain technology;
Data layer: The underlying data of the blockchain is a block + linked list data structure, which includes data blocks, chain structures, timestamps, hash functions, Merkle trees, asymmetric encryption and other designs. Among them, data blocks and chain structures can be used as improvement directions for data layer research in the scalable solution of blockchain technology.
Consensus layer: It is the basis for highly dispersed nodes to achieve rapid consensus on the validity of block data. The main consensus mechanisms include POW (Proof Of Work) and POS (Proof of Stake). Mechanism), DPOS (Delegated Proof of Stake Delegated Proof of Stake Mechanism) and PBFT (Practical Byzantine Fault Tolerance), etc., which have always been the highlight of the scalable solutions of blockchain technology.
Incentive layer: It is what everyone often calls a mining mechanism. It is used to design a certain economic incentive model and encourage nodes to participate in the security verification of the blockchain, including the design of issuance mechanisms and distribution mechanisms, etc. This level of improvement does not seem to be directly related to blockchain scalability.
Contract layer: mainly refers to various script generationcode, algorithm mechanism and smart contract, etc. Strictly speaking, this layer is missing in the first generation of blockchains, so they can only conduct transactions and cannot be used in other fields or perform other logical processing. The emergence of the contract layer makes it possible to use blockchains in other fields. has become a reality. This part of Ethereum includes two parts: EVM (Ethereum Virtual Machine) and smart contracts. Improvements at this level seem to provide potential new directions for blockchain scalability, but there seems to be no direct connection in structure
Application layer: It is the display layer of the blockchain, including various application scenarios and cases. . For example, Ethereum uses truffle and web3-js. The application layer of the blockchain can be the mobile terminal, the web terminal, or it can be integrated into the existing server, and the current business server is regarded as the application layer. Improvements at this level seem to provide potential new directions for blockchain scalability, but there does not seem to be a direct connection in structure.
The Xueshuo Innovation Blockchain Technology Workstation under Lianqiao Education Online is the only approved "Blockchain Technology Professional" pilot of the "Smart Learning Workshop 2020- Xueshuo Innovation Workstation" launched by the School Planning and Construction Development Center of the Ministry of Education of China. workstation. The professional base is based on providing students with diversified growth paths, promoting the reform of the training model integrating professional degree research, production, and research, and building an applied and compound talent training system.

❸ The hierarchical structure of the blockchain (what is Layer0/1/2 of the blockchain)

The hierarchical structure is the basis for the data processing and operation of the blockchain.

In order to find a scalability solution for the blockchain, the blockchain referred to in the academic research field (usually in papers) is divided into three layers: Layer0, Layer1 and Layer2.

Generally, the blockchain system is mainly divided into six layers: application layer, incentive layer, consensus layer, network layer and data layer, which are mainly reflected in the early Bitcoin system. With the emergence of smart contracts, a contract layer was added between the application layer and the incentive layer, mainly reflected in the Ethereum system.

The content of each layer is shown in the figure above, but the technologies used in different specific systems may be different. For example, the consensus layer mainly completes the consensus between nodes, except for the workload proof. Mechanism (Proof of Work) also includes Proof of Stake and Byzantine Fault Tolerance (BFT).

Data layer, networkThe layer and consensus layer form the underlying foundation of the blockchain level and are also the three essential elements of the blockchain. Without any one of them, it cannot be called a true blockchain technology.

The comparison of the blockchain hierarchical structure corresponding to the OSI system 7-layer model and the TCP/IP 4-layer model is shown in the figure below.

If we focus on the four layers of TCP/IP, especially the "application layer" above, we will see that it is possible that blockchain can transform the application layer that was originally focused only on information transmission. , separate out a new layer dedicated to value transfer. Therefore, we can think that the four layers of TCP/IP are split into five layers, and the blockchain is regarded as one layer of TCP/IP: the value layer.

It is generally believed that Bitcoin, Ethereum, and EOS are representatives of blockchain 1.0, 2.0, and 3.0. It is also interesting to look at their layers:

From Bitcoin currency to Ethereum, adding a contract layer. From Ethereum to EOS, due to the adoption of DPOS, the incentive layer is actually merged into the consensus layer. EOS adds two layers: ① Tool layer to make it easier to develop applications; ② Ecological layer, its own positioning is an open source software, so others can use its open source software to establish industry chains and domain chains.

Xu Zhong and Zou Chuanwei wrote a central bank working paper, discussing blockchain from an economics perspective and trying to provide a Token paradigm. Among them, they actually gave a layered model, this time it is internal and external layering: the inner layer is consensus, which is divided into: Token, smart contract, consensus algorithm; at the boundary of consensus and blockchain, is the blockchain Other information within; outside the boundaries of the blockchain, is the Internet and the physical world.

In order to improve performance, some systems actually layer their distributed networks. That is, not all nodes are equal.
For example, the following is the layering of EOS.

In order to make blockchain useful, some people are discussing it from other perspectives. Zhu Feng of ENChain.Asia proposed the "Seven-layer Self-Organizing Business Model" in the BAO white paper. This model was quoted in the "Model and Practice of Token Economy" (0.2) report as the "Seven-layer Self-Organizing Business Model" Model".

However, it should be noted that the "incentive layer" here is similar to the incentive layer we usually call blockchain, but it is different. When we discussed the incentive layer before, we often discussed it from the perspective of the native tokens of the public chain, while the incentive layer here is discussed at the pass level.

In a report "Construction and Analysis of the Four-Layer Application Model of Blockchain" in December 2018, Huobi Research Institute gave a four-layer application model, which is very interesting: < br />
References:
1. Ten years of blockchain: various layers
http://www.360doc.com/content/18/1211/10/ 53358875_800866301.shtml
2. How much do you know about the six hierarchical structures of blockchain? - Zhihu
https://zhuanlan.hu.com/p/98126049
3. Introduction to the six hierarchical structures of blockchain - Blockchain - Electronic Enthusiast Network
http ://www.elecfans.com/blockchain/1138839.html

❹ [One of the top ten blockchain government cases] Ant Blockchain-Hangzhou Internet Court Judicial Chain Case

According to Hangzhou Daily, on September 18, 2018, the Hangzhou Internet Court announced that the judicial blockchain was officially launched online, becoming the first court in the country to apply blockchain technology to resolve disputes. The judicial blockchain makes the entire process of electronic data generation, storage, dissemination, and use trustworthy.
The complainant can submit electronic evidence such as the contract, rights protection process, service process details, etc. online through the online complaint portal, which will be submitted to the notary office, judicial appraisal center, CA/RA agency, court,Nodes on the chain such as Ant Financial will jointly witness and endorse, providing one-stop service for the prosecutor. The judicial chain has greatly reduced the cost of offline evidence storage and collection, and improved the efficiency of the judgment process, thus enabling many cases that were previously unworthy of prosecution due to the high cost of rights protection to be able to achieve better rights protection through the blockchain; Judicial The chain solves the problem of low judicial service efficiency, realizes the integration and sharing of judicial data, and breaks down data silos; the judicial chain promotes the construction of a social credit system, reduces judicial costs, uses technology as an engine, promotes innovative development, and leads the transformation, upgrading and reduction of judicial services.

Citing the analysis of the "Blockchain Judicial Evidence Application White Paper" from the Trusted Blockchain Promotion Plan, with the rapid advancement of informatization, a large amount of evidence in litigation is presented in the form of electronic data. The specific manifestations of electronic evidence in judicial practice are becoming increasingly diverse, and the frequency of use and data volume of electronic data storage have increased significantly. Different types of electronic evidence are formed in different ways, but they generally have the characteristics of being easy to perish, easily tampered with, and highly dependent on technology. Compared with traditional physical evidence, it is more difficult to determine the authenticity, legality, and relevance of electronic evidence in judicial review. .

In judicial practice, parties generally lack the ability to produce evidence, and the electronic evidence provided to the court is of poor quality. There are a large number of problems such as improper evidence collection procedures, incomplete evidence, and poor pointing to the facts of the case, which directly affects the electronic evidence. The proportion of evidence admitted in litigation.

The traditional storage method of electronic evidence is essentially a centralized storage method, which may easily cause the storage data to be lost or be compromised. .

At the same time, electronic data relies on electronic media for storage. For storage security, multiple backups and other methods are often needed. In addition, electronic media have a long service life, which makes storage costs higher.

(2) Problems in evidence collection

Currently, when some locally generated electronic data is collected for evidence, the originals are intelligently retained in the device that generated the electronic data, and the original evidence and Devices are indivisible. Once the original evidence leaves the device, it becomes a copy and cannot become the basis for a final verdict. This results in many limitations in litigation cases.

In addition, the Internet software service provider cannot give a definite answer as to whether the so-called original is the real, original and complete data at the time when the time occurred. It is also doubtful whether the evidence obtained is the original.

(3) Problems in demonstration

Electronic data display and fixation are important aspects of data use. Since electronic data exists in the form of electronic information stored in electronic hardware, To obtain its content, you need to use responsive software to read and display it, which makes it difficult to prove. It may also increase the burden of proof on the parties due to the need for notarization, and waste social judicial resources..

(4) Issues in Evidence

In litigation, both parties will submit their own electronic data as evidence. When the parties individually control their own data, it is easy for the evidence submitted by both parties to be inconsistent or even contradictory. In the absence of other supporting evidence, it is very difficult to determine the authenticity of the evidence, and the electronic data submitted by both parties cannot be used as the basis for deciding the case. In this situation where the facts of the case cannot be determined, the judge is likely to have to rely on assigning the burden of proof to decide the case. The general principle of allocating the burden of proof is that whoever makes the claim must provide evidence. If he cannot provide evidence, he will bear the consequences of losing the case. In this case, a party that actively tamperes with its own data can benefit from this burden of proof arrangement.

(5) Problems in evidence identification

All evidence "must be verified to be true before it can be used as the basis for finalizing a case", which is the most important and universal evidence in the world. One of the principles of justice. The identification of evidence is usually a process of identifying the "three properties" of evidence, namely the authenticity, legality and relevance of the evidence. Electronic data used as evidence also needs to pass the "three characteristics" judgment. Due to the large amount of data, strong real-time nature of electronic data, high storage costs, and difficulty in identifying the originals, it is still difficult to identify the "three properties" of evidence. Electronic data often cannot support the case because it is difficult to identify, which is detrimental to the case. Both the judge and the parties caused greater pressure.

Quoting from the sharing by Li Zhiguo, head of Ant Financial’s judicial evidence deposit products, titled “Ant Blockchain’s Exploration in the Field of Judicial Evidence”, he believes that in the past 20 years, the Internet industry has The key word is connection. In the PC Internet era, terminals were connected through PC interconnection. At that time, companies that discovered this trend seized huge business opportunities such as portals and search engines. In 2013, we entered the era of mobile Internet. In this era, many smart terminals and personal devices are connected together through the mobile Internet. The number of terminal devices and online time have been greatly improved. Those who seized the opportunity at this stage created super applications such as Weibo, WeChat, and Alipay. A very important change that we are currently paying attention to is that as the changes in connections continue to expand, the quality of connections has also changed greatly. This is called the second curve. The original object of connection was information, but now it is likely to become assets.

So what is the difference between assets and information? There are three main differences.

First, assets are unique, while information can be copied infinitely. In the Internet era, the cost of information transmission can be minimized through copying. However, when the connected object is an asset, a fatal flaw arises, that is, it cannot be transmitted through copying. After the asset is given to a person, It cannot be given to anyone else.

The second point is that assets are more fragile and precious than information. Assets are money,In the process of information digitization, it is easy to put information on the Internet, but for assets, this is not feasible because there are real interests behind the assets.

The third point: Compared with assets and information, assets have very high security requirements, and many problems must be faced, including attacks by hackers, competitors, fraud, etc. These are all linked assets. issues that need resolving. This is the third difference between assets and information. If there is a dispute over assets, they need to be resolved. In reality, it can be resolved by the court, but if it is on the Internet, it is difficult to deal with it.

The three characteristics of assets mentioned above are difficult to solve through traditional Internet methods. At the same time, the development of the Internet has made people lazier and lazier. If 10 years ago, many people could accept that asset connection would take a long time, but now it is difficult for people to accept it. For example, in order to sign a contract, it takes two to three days. It takes weeks to mail, and it costs a lot to go in and out of many traditional institutions frequently in order to make a cross-border payment. And compared with the connection method 20 years ago, the current Internet connection has become much more difficult, because many people find that after information is connected, the data becomes very valuable. What to do if it is valuable? The only way is to sink the value. When it sinks, it becomes a deep well of value. The larger the scale, the deeper the value. At the same time, another problem will be formed called data island. These issues need to be considered and resolved by the judicial chain.

Now, the court is standing at a historical opportunity node and has the opportunity to become a basic component of data generation and completion of connections. Disputes will inevitably occur over assets, and after a dispute occurs, the court will conduct a full-link review. This is a unique value, the value of the last mile of the Internet. By connecting assets, breaking data islands and value wells, this is the real value completion. This model actually belongs to small and medium-sized enterprises, including For individual users, the above is the value basis of the judicial chain.

If an island of value appears and needs to be connected, there must be various connection methods. There are four main ways to connect.

The first is not to connect. , put it in a bank safe;

The second way is a bad connection, that is, through technological leadership and inequality, depriving the ownership of data assets through hacking technology, when there is no legal When connecting, bad connections must exist;

The third type is a connection that seems to be a good connection, but is actually a fragile connection. Nowadays, there are many ways to connect. When the market situation is relatively good, it is a bubble. It has a certain market when it is relatively large, but once it encounters real value, it breaks down;

The fourth type is the judicial chain, which can be summarized in 15 words, that is, the whole process record, the whole chain The road is trustworthy and witnessed by all nodes.

How can the judicial chain be technically credible and institutionally credible at a low cost?

First of all, the first problem is that assets are fragile, so when connecting assets, they must have the basic characteristics of real security. Security includes privacy protection, which is not a simple matter. The first day Alipay was born started with secured transactions, solving the problem of the authenticity of previous transactions between buyers and sellers. Later, based on Alipay, Sesame Credit was proposed, and many Everyone has Zhima Credit points, and through past credit records, big data and artificial intelligence are provided as a reference for whether the user can fulfill the contract, making real security a step further. Next comes the blockchain. The blockchain provides a very important capability, that is, the truth cannot be tampered with, which makes trust a big step forward in the level of real security. Therefore, the first problem solved by the judicial chain is to ensure that the bottom connector is real and safe when connecting assets. This real safety is not something you talk about in words, nor is it a technology in a laboratory, but a technology in a laboratory. It has been recognized by users, tested by the market and tested by large-scale business volume.

The second question is very critical. When everyone is connected through a real and secure connector, once the data assets are compromised, how to deal with disputes? The judicial blockchain has been moving in this direction in the past two years. By bringing notary offices, judicial appraisal centers, and courts to the bottom of the judicial chain, the data is authenticated accordingly, ensuring that once a dispute arises about data assets, it can be dealt with fairly and effectively. This is a very powerful system, which is the fundamental reason why the judicial chain is the real solution to the last mile problem of the Internet. So far, the judicial chain has ensured technical credibility and institutional credibility.

The third problem is that in the interconnection of assets, the cost of connection cannot be too high. Users have developed the habit of obtaining countless information with just a click of the mouse and a search button. Blockchain has been popular for many years, but so far there are less than 20 million real users, and the daily activity is very low. The first reason is that it is too difficult to use, and the second reason is that the cost of use is too high. Therefore, when connecting assets, it must be very simple, very easy to use, and low cost. Just like when Alipay first implemented real-name authentication, it could quickly complete user payments through face scanning, and at the same time, the security level was very high. Therefore, real connectors must have the characteristics of low cost and high applicability.

The judicial chain has achieved technical credibility and institutional credibility, and the cost of connection is not high, opening a new era of blockchain for asset connection.

The Hangzhou Internet Court’s judicial blockchain makes the entire process of electronic data generation, storage, dissemination, and use trustworthy. Through the overall complete structure, it can solve the generation, storage, dissemination and use of electronic data on the Internet, especially the full life cycle of the generation end.Process credibility issues.

The blockchain consists of a three-layer structure:

1). The first is the blockchain program. Users can directly record the entire process of operation behavior in the blockchain through the program. , such as online submission of electronic evidence such as electronic contracts, rights protection processes, service process details;

2), The second is the full-link capability layer of the blockchain, which mainly provides real-name authentication, electronic signature, time Stamping, data storage and trusted services throughout the blockchain process;

3), the third is the judicial alliance layer, which uses blockchain technology to integrate notary offices, CA/RA institutions, forensic identification centers and The courts are connected together in the alliance chain, and each unit becomes a node on the chain.

The electronic evidence platform launched on the judicial chain of Hangzhou Internet Court directly establishes a special data channel between evidence and trial, making the collection, fixation, transmission and use of evidence more convenient and efficient.

In the past, when going to the Internet Court for litigation, evidence was submitted electronically and then uploaded to the "Hangzhou Internet Court Litigation Platform" (www.netcourt.gov.cn). For example, notarized documents are usually uploaded by scanning. The electronic evidence platform launched today first has a long "tentacle", and it can achieve seamless connection with other electronic data, such as notary offices. Then the notarized documents can be uploaded to the electronic evidence platform with one click and used directly as litigation evidence. For another example, when involving transaction disputes on e-commerce platforms such as Taobao and JD.com, mutual financial platforms, and wealth management platforms, third-party data service providers (such as operator platforms, electronic contracting platforms, and certificate depository institution platforms) can also directly transmit electronic data. The electronic evidence platform effectively solves the difficulties faced by parties in collecting electronic data evidence on their own and greatly saves the economic and energy costs of producing and cross-examining evidence in court trials.

The "electronic" evidence that was originally just scanned or typed has truly transformed into "electronic evidence". Through the third-party storage platform, "electronic data" is easily lost and tampered with. The magic spell forms a unique “data ID card” that cannot be tampered with, and is synchronized and backed up to the electronic evidence platform in real time. After entering the litigation process, the "data ID card" that has been saved on the electronic evidence platform will be automatically compared with the original electronic data to determine whether the electronic evidence has been tampered with later, thus ensuring the authenticity of the electronic evidence.

These electronic data have coded ID cards, which become the "elements" of each case. The platform classifies these elements and then matches them to each case. In this way, the system automatically matches The key element is to import electronic evidence into each case to form a system that automatically files cases without a judge. We can imagine that we will soon be able to achieve tens or hundreds of seconds per minute.case speed.

Finally, when these evidences become electronic data and are stored on the platform, in addition to the Hangzhou Internet Court, which can carry out judicial use on the platform during the trial of the case, other relevant institutions (such as other people with permission) Courts, judicial appraisal agencies, notary agencies, filing agencies) can all retrieve relevant evidence from the platform in accordance with procedures, and the co-construction and sharing of resource data will also be achieved.

Taking the data storage platform of the Shanghai Pudong Notary Office, which has opened up the Hangzhou Mutual Judicial Chain, as an example, we will introduce the complete closed-loop process from the data protection platform to judicial litigation.

1. Register the business platform and perform real-name authentication

Enterprise A, a design company, opens the Shanghai Pudong Notary Office data storage platform page and completes real-name identity authentication after registration.

2. Original data storage

When Design Company A completes the design of a work and archives the original work data, it initiates a remote storage call through its own business system Interface, call the RESTful API of the notary office's data storage platform to complete the storage of the design work file HASH and related elements. The deposit certificate will also be sent to the Judicial Blockchain, Pudong Notary Chain and China Time Service Center simultaneously. After all are successful, a certificate of deposit with the corresponding LOGO will be obtained. The HASH fingerprint data of the work files that are completely consistent on each chain and platform shows the validity and non-tamperability of this certificate.

5. Log in to Hanghu Court to submit a complaint and verify the legality of the evidence

The judicial chain is a specific application case of Ant Blockchain BaaS. Ant Blockchain BaaS (Blockchain as a Service) is an open "blockchain as a service" platform based on the Ant Financial Alliance blockchain technology and Alibaba Cloud. It outputs blockchain as a cloud service, supports numerous business scenarios and on-chain data traffic, and is the foundation of industry blockchain solutions. Ant Blockchain BaaS is committed to building an open and collaborative platform to provide convenient services to enterprises and individuals around the world.

The above picture is the product map of Ant Blockchain, in which the technical architecture of BaaS is mainly divided into three layers:

1. The bottom layer is BaaS Core

The BaaS Core layer is based on a cloud resource management platform that provides flexible support for hosts and containers, enabling convenient cross-platform operation and deployment. For trusted hardware, Alibaba Cloud's Shenlong server provides corresponding hardware services and can provide a trusted execution environment with high reliability and high privacy protection. In addition to the certificate deposit platform and smart contract platform, cross-chain services in the isomorphic chainBased on this, heterogeneous chain cross-chain services will be launched soon. In the current market, a single chain or a single chain has its own limitations. In the future, cross-chain technology will become a very important part of establishing trust infrastructure and a mutual trust ecosystem. At present, the BaaS platform has achieved internal interconnection through cross-chain services. It can also access trusted data sources on the external Internet through smart contracts and cross-chain services. In addition, BaaS Core has corresponding functions and support for other basic capabilities, such as alliance management, security and privacy, certificate key management, etc. While providing the self-developed Ant blockchain system, the BaaS platform also supports open source systems to better meet the diverse needs of customers, including enterprise Ethereum Quorum and Hyperledger Fabric.

2. The upper layer is BaaS Plus

The BaaS Plus layer encapsulates and services the underlying services and capabilities, and opens them into standardized interfaces to provide partners with access and use. This can greatly reduce customers' investment in basic resources and significantly shorten the time it takes to access services. So far, the platform has launched services such as trusted certificate deposit, universal traceability, real person certification, and enterprise certification, and will gradually launch more services in the future.

3. The top layer is the BaaS Marketplace and solutions

Ant’s many partners can provide their capabilities in the marketplace. At the same time, practical applications implemented in different scenarios will precipitate a set of standard application solution templates, making it easier for customers to learn from the platform capabilities of other similar scenarios in their own applications. The Pudong Notary Office data storage platform can become a member of the BaaS Marketplace.

1. Account system

All transaction operations on Ant Blockchain are carried out around the account system, so before sending and executing transactions, you need to ensure that you have created a corresponding transaction in Ant Blockchain account, and then you can use the created account to submit transactions, and you can also complete modifications to the relevant account configuration based on the account structure.

The specific account data structure model fields and descriptions are as follows:

Among them, the account contains three types of keys:

Ant Blockchain adopts the account It is implemented in a decoupled manner from the key, which to a certain extent prevents security risks such as data loss on the chain caused by key loss. The main account operations supported by Ant Blockchain include:

2. Privacy protection

Ant Blockchain supports the privacy protection capabilities of sensitive account information data by introducing some features of cryptography. , by extending the relevant command functions at the smart contract level to realize the encrypted storage and addition and subtraction operations of the amount in the smart contract. Only individuals who obtain a valid key can decrypt the intelligenceFor sensitive data in the contract, view the original amount information.

At present, the cryptographic features introduced by Ant Blockchain include zero-knowledge proof, that is, by introducing zero-knowledge proof, the legality of the transfer amount can be proved under the condition of encrypted ciphertext.

3. Cross-chain services

Ant Blockchain cross-chain service is an on-chain data service provided for smart contracts. This service deploys cross-chain services in the customer's blockchain environment. Contract/chain code, and provides an API interface for user contracts/chain codes to call and use. The cross-link service currently provides two types of services: ledger data access and contract message push, and their corresponding API interfaces. The ledger data access service can help user smart contracts obtain data on other blockchain ledgers, including but not limited to block headers, complete blocks, transactions, etc. The contract message push service can help communicate messages between smart contracts on different blockchains that have deployed cross-chain data services, satisfying scenarios such as cross-chain business association processing.

On May 22, 2019, Shanghai No. 1 Intermediate People's Court, Hangzhou Internet Court, Hefei Intermediate People's Court, Suzhou Intermediate People's Court, and Wuhu, Anhui Province jointly signed a letter of intent for cooperation, and will use the Hangzhou Internet Relying on the court's judicial blockchain platform, the four places are interconnected to jointly build the Yangtze River Delta judicial chain, create a judicial-level trust mechanism with "full process records, full link credibility, and full node witness" to jointly promote judicial integration in the Yangtze River Delta region develop. It was introduced at the meeting that the judicial blockchain operating mechanism of the Hangzhou Internet Court has become increasingly mature, and has collected 390 million pieces of electronic data. The dismissal rate of relevant cases has reached more than 96%. played an important role.
The technology provider of the judicial chain of Hangzhou Internet Court is Ant Financial Blockchain, which has the world's leading core patented technology, 20,000 TPS high-performance certificate storage capabilities, extremely high privacy security protection capabilities, and top-level security Prevention and control capabilities protect the judicial chain. Its Ant Blockchain trusted certificate storage platform supports third parties to access the judicial chain.

For example, in terms of specific aspects, the judicial chain has greatly improved the effect of users' rights protection. For example, in China, copyright protection is very backward. For example, only 5% of the pictures are genuine, and the rest are pirated. However, from the filing of the case to the trial, the first instance takes 8 months, and the compensation received is only 500. -600 yuan, but the time cost and economic cost far exceed the compensation amount. However, the emergence of the judicial chain can reduce the cost of rights protection by one to two orders of magnitude. Secondly, the judicial chain can enhance the trust of the brand. On the one hand, it allows enterprises to stand together with the judicial chain and the brands and platforms recognized by the government. On the other hand, it allows enterprises to clearly and transparently tell their business models through trust connection. users, giving users a very strong sense of trust. Entrepreneurs, in particular, can have huge traffic in the early stages. Finally, the judicial chain solves the problem of the last mile of the Internet.This results in a significant reduction in user costs. Therefore, using the judicial chain model really upgrades the traditional business model into a trust business model.

Contributor Wang Denghui introduced:
Copyright chain/notarization chain project CTO of Hangzhou Xiabi Youshen Technology Company,
Shanghai partner of HiBlock technology community,
Focusing on "blockchain +" industrial implementation and implementation plan, hoping to preach blockchain together with industry practitioners.

❺ How to draw a blockchain accounting node mind map

Generally speaking, the blockchain system consists of data layer, network layer, consensus layer, incentive layer, contract layer and application layer composition. Among them, the data layer encapsulates the underlying data blocks and related basic data and algorithms such as data encryption and timestamps; the network layer includes distributed networking mechanisms, data dissemination mechanisms, and data verification mechanisms; the consensus layer mainly encapsulates network nodes Various consensus algorithms; the incentive layer integrates economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives; the contract layer mainly encapsulates various scripts, algorithms and smart contracts, and is the core of the blockchain The basis of programmable features; the application layer encapsulates various application scenarios and cases of the blockchain. In this model, the chain block structure based on timestamps, the consensus mechanism of distributed nodes, economic incentives based on consensus computing power, and flexible programmable smart contracts are the most representative innovations of blockchain technology.
In a narrow sense, blockchain is a chain data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be non-tamperable and non-forgeable. Ledger. Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses automated scripts to A new distributed infrastructure and computing method that uses smart contracts composed of codes to program and operate data.
In the daily business of insurance companies, although transactions are not as frequent as those in the banking and securities industries, the reliance on trusted data continues unabated. Therefore, the author believes that using blockchain technology from the perspective of data management can effectively help insurance companies improve their risk management capabilities. Specifically speaking, it is mainly divided into risk management of policyholders and risk supervision of insurance companies.

❻ What components should the DAC chain have?

Technical level, the structure of the blockchain. There are multiple blocks on a blockchain, and each block includes a block header and a block body. The block header mainly includes the version number, the hash value of the previous block, timestamp, random number, target hash, and Merkle root; the block body contains the ledger information recorded through the Merkle tree. This mainly shows the technical architecture of the blockchain principle. Next, it mainly introduces the organizational structure and levels. When blockchain technology was first proposed, its architecture was usually divided into six layers, namely data layer, network layer, consensus layer,The incentive layer, contract layer and application layer are the early architecture diagram of blockchain technology.
Data layer: The data layer is the basic layer, whose function is to collect, record and store urban public safety big data. The block header encapsulates information such as timestamp, root hash value, version number, proof of work, etc. The block body contains public security transaction records calculated using hash algorithm, Merkle tree, asymmetric encryption and other technologies. The password of this layer Learning technologies and operating rules can ensure the security and integrity of public safety big data.
Network layer: As a working mechanism layer, the network layer allows governance entities to jointly participate in the dissemination, verification and accounting of data blocks, and maintains the update and maintenance of public safety big data.
Consensus layer: The consensus layer mainly includes various consensus algorithms, aiming to allow government departments, private units, the public and other governance entities to reach consensus and establish a trust network in the distributed system, thereby maintaining the effectiveness of public security big data. sex.
Incentive layer: The function of the incentive layer is that each consensus subject can receive corresponding incentives in the process of collectively maintaining the blockchain system, so that each subject can not only safeguard its own interests, but also ensure the validity and timing of the blockchain data. sex.

Contract layer: The contract layer needs to be designed in the national institutional environment. Its smart contract is a computer digital agreement that each subject has always followed. It can formulate contract rules based on the logic and process of governance, and conduct public activities spontaneously. Secure data recording, storage, and sharing can effectively reduce governance costs and improve governance efficiency.

Application layer: The application layer can design public chain and alliance chain networks based on the degree of decentralization and governance entities for ordinary government systems and non-governmental systems, and private chains for government confidential systems, and users can access them based on the network The entrance provides diversified services and truly realizes the co-construction and sharing of data.

Target layer: The target layer is the target task of our management.
In addition, it also includes the application layer, incentive layer, consensus layer, network layer, and data layer. They are nothing more than simplifications in the appeal architecture, and will not be introduced in detail here.

❼ What is blockchain technology? What exactly is blockchain? A chained data structure composed of sequential connections, and a cryptographically guaranteed distributed ledger that cannot be tampered with or forged.

Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, and uses cryptography to ensure data transmission and access. It is a new distributed infrastructure and computing method that uses smart contracts composed of automated script codes to program and operate data securely.

[Infrastructure]

Generally speaking, the blockchain system consists of data layer, network layer, consensus layer, incentive layer, contract layer and application layer composition. Among them, the data layer encapsulates the underlying dataBasic data and basic algorithms such as blocks and related data encryption and timestamps; the network layer includes distributed networking mechanisms, data dissemination mechanisms and data verification mechanisms; the consensus layer mainly encapsulates various consensus algorithms of network nodes; the incentive layer Integrate economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives; the contract layer mainly encapsulates various scripts, algorithms and smart contracts, which is the basis of the programmable features of the blockchain; the application layer It encapsulates various application scenarios and cases of blockchain. In this model, the chain block structure based on timestamps, the consensus mechanism of distributed nodes, economic incentives based on consensus computing power, and flexible programmable smart contracts are the most representative innovations of blockchain technology.

Extended information:

[Blockchain core technology]

Blockchain mainly solves the trust and security issues of transactions, so it addresses this issue Four technological innovations:

1. Distributed ledger means that transaction accounting is completed by multiple nodes distributed in different places, and each node records a complete account, so they all Can participate in supervising the legality of transactions and can also jointly testify for them.

The uniqueness of blockchain’s distributed storage is mainly reflected in two aspects: First, each node of the blockchain stores complete data according to the block chain structure. Traditional distributed storage generally stores The data is divided into multiple parts for storage according to certain rules. Second, the storage of each node in the blockchain is independent and of equal status, relying on the consensus mechanism to ensure storage consistency, while traditional distributed storage generally synchronizes data to other backup nodes through the central node.

No node can record ledger data independently, thus avoiding the possibility of a single bookkeeper being controlled or bribed to record false accounts. Also because there are enough accounting nodes, theoretically, unless all nodes are destroyed, the accounts will not be lost, thus ensuring the security of the accounting data.

2. Asymmetric encryption and authorization technology. Transaction information stored on the blockchain is public, but account identity information is highly encrypted and can only be accessed with authorization from the data owner. , thus ensuring data security and personal privacy.

3. The consensus mechanism is how all accounting nodes reach a consensus to determine the validity of a record. This is both a means of identification and a means of preventing tampering. Blockchain proposes four different consensus mechanisms, which are suitable for different application scenarios and strike a balance between efficiency and security.

The consensus mechanism of the blockchain has the characteristics of "the minority obeys the majority" and "everyone is equal". "The minority obeys the majority" does not entirely refer to the number of nodes, but can also be the computing power and the number of shares. Or other characteristic quantities that the computer can compare. "Everyone is equal" means that when a node meets the conditions, all nodes have the right to give priority to the consensus result, which will be directly recognized by other nodes and may eventually become the final consensus result.

4. Smart contracts, smartEnergy contracts are based on these trustworthy and non-tamperable data and can automatically execute some predefined rules and terms. Take insurance as an example. If everyone's information (including medical information and risk occurrence information) is true and trustworthy, it will be easy to automate claims settlement in some standardized insurance products.

In the daily business of insurance companies, although transactions are not as frequent as those in the banking and securities industries, the reliance on trusted data continues unabated. Therefore, the author believes that using blockchain technology from the perspective of data management can effectively help insurance companies improve their risk management capabilities. Specifically speaking, it is mainly divided into risk management of policyholders and risk supervision of insurance companies.

Blockchain-Network

❽ What is blockchain technology? What are the core components of blockchain technology?

From a technical perspective , from an architectural perspective, let me tell you in layman’s language some of my understanding of blockchain.

What exactly is blockchain? Block chain, in a word, blockchain is a storage system, and the storage system is more detailed. Block chain is a distributed storage system without an administrator, and each node owns all data.

What do common storage systems look like?

First, let’s take a look at how to ensure high availability?

Ordinary storage systems usually use "redundancy" to solve high availability problems. As shown in the figure above, if the data can be copied into several copies and redundantly spread to multiple places, high availability can be ensured. If the data in one place is down, there will still be data in another place. For example, the master-slave cluster of MySQL has this principle, and the RAID of the disk also has this principle.

Two points that need to be emphasized here are: data redundancy, which often causes consistency problems

1. For example, in the master-slave cluster of MySQL, there is actually a delay in reading and writing. Sometimes, it actually means that there is inconsistency between reading and writing for a short period of time. This is a side effect of data redundancy.

2. The second point is that data redundancy often reduces writing efficiency, because data synchronization also consumes resources. If you look at single-point writing, if two slave libraries are added, the writing efficiency will actually be affected. Ordinary storage systems use redundancy to ensure high data availability.

Then the second question is, can an ordinary storage system perform multiple writes?

The answer is yes, for example, take this picture as an example:

In fact, MySQL can do a dual-master master-slave synchronization, dual-master master-slave synchronization, two nodes , and can be written at the same time. If you want to build a multi-machine room and multi-active data center, in fact, multi-machine room and multi-active data center also requires data synchronization. What should be emphasized here is that multi-point writing often leads to consistency issues of write-write conflicts. Taking MySQl as an example, assuming that the attribute of a table is an auto-increment ID, then the data in the database is now 1234, thenThen one of the nodes writes and inserts a piece of data, then it may become 5, and then these 5 pieces of data are synchronized to another master node. Before the synchronization is completed, if another writing node also inserts a piece of data Data also generates a piece of data with an auto-incrementing ID of 5. Then, after it is generated, it is synchronized to another node, and then when the synchronized data arrives, it will conflict with the two local 5s, and the synchronization will fail, which will cause write consistency conflicts. This problem will occur if there are multiple writes.

How to ensure consistency when writing multiple points?

Weixin's "Swan Master Class" gives you more technical work

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 38965 文章总数
  • 3637397访问次数
  • 3089建站天数