区块链不同组织如何交互的,不同的区块链
。关于区块链不同组织如何交互的问题,有三个关键词:区块链联盟,去中心化应用,智能合约。下面我们将对它们分别进行介绍。
区块链联盟是一种新型的组织结构,它是由多个组织联合组成的,旨在推动区块链技术的发展和应用。它的结构比传统的企业结构更加灵活,能够更好地满足不同组织之间的交互需求。每个组织都有自己的目标,但是它们之间也有共同的目标,比如实现共同的技术标准,推动区块链技术的发展,改善社会经济状况等。
去中心化应用是指基于区块链技术的应用,它可以实现去中心化的数据存储和交易,实现不同组织之间的交互。去中心化应用可以使用户拥有更多的权利,比如自主管理自己的数据,实现安全的数据交换等。此外,去中心化应用还可以改善企业之间的信任关系,提升企业之间的合作效率。
智能合约是指基于区块链技术的智能合约,它可以实现不同组织之间的自动化交易。智能合约可以使用户拥有更多的权利,比如实现自动化的支付,自动执行交易规则,实现安全的数据交换等。此外,智能合约还可以改善企业之间的信任关系,提升企业之间的合作效率。
以上是关于区块链不同组织如何交互的三个关键词:区块链联盟、去中心化应用和智能合约的介绍,它们都是为了改善不同组织之间的交互,提升企业之间的信任关系,推动区块链技术的发展和应用。
请查看相关英文文档
1. What is the cross-chain technology of blockchain?
Blockchain is a type of distributed ledger technology. Each blockchain is equivalent to an independent Ledgers, usually value cannot be transferred between different ledgers. With the development of technology and market, there are more and more types of cryptocurrencies, and at the same time, a large number of different blockchains have emerged. Collaboration between different chains has become a new need for users in terms of operation and value circulation, so the "cross-chain technology" of blockchain emerged as the times require.
The so-called "cross-chain" means that assets originally stored on a specific blockchain can be converted into assets on another chain, thereby realizing the circulation of value. It can also be understood as an exchange behavior between different asset holders. This process does not actually change the total value on each blockchain. Just like the currency transactions provided by the trading platform, different types of digital currencies can be exchanged, but this behavior of the trading platform does not occur on the blockchain.
Technically, blockchain is a distributed ledger, but from a commercial perspective, it is essentially a value network. The isolation between different blockchains not only results in the inability of digital assets to be included in the blockchain The circulation between chains also limits its value to a narrow range, which limits its own development space to a certain extent.
Therefore, more and more people are paying attention to cross-chain technology. In September 2017, Litecoin founder Li Qiwei stated on Twitter that Litecoin and Bitcoin had achieved atomic-level cross-chain exchange; in November, the Lightning Network Laboratory completed the first Lightning Network transaction from Bitcoin to Litecoin. Cross-chain transactions.
2. Sharing community design: Blockchain connects people
The Internet has changed the world, and blockchain has reconstructed the world. Blockchain is a revolution to the Internet. and subversion.
"Blockchain" links people with each other, builds shared communities, links people with organizations, links organizations with organizations, and links organizations and value transactions in global sharing communities.
In the blockchain era, organizational boundaries are actually very dynamic and flexible. People can collaborate dynamically based on projects, smart contracts, and tokens, and can be linked within and outside different organizations at any time.
Global Sharing Community Entrance
Sharing life academies around the world are the front entrance for people to enter sharing communities around the world. They are a platform for recognizing the values of shared communities, learning community life, It is the starting point for the gathering of 18.48 "sharing meta-communities". Everyone must complete the training of the Sharing Life Academy before they can join the global sharing community membership network. The sharing community membership network is the import and export of the sharing community and is determined in the global sharing community system. member blockchain identity, and manage member exit from the shared community system.
Share community living status
Sharing life members have three states of life and production in the global sharing community system. Live and work outside the community, activities, shopping, collaborative services and leisure are within the community; work outside the community, live within the community; live and work within the community.
Types of shared community life and production:
City side
Shared living room: 1-10 "shared meta-communities".
Community vegetable gardens: 1-10 "shared meta-communities".
Settlement: 1 "shared meta-community".
Communities: 10-100 "shared meta-communities".
Complex: 30-100 "shared meta-communities".
Regional platform: 100-300 "shared meta-communities".
Rural side
Shared farms: 10-100 "shared meta-communities".
Camp: 1-3 "shared meta-communities".
Complex: 30-100 "shared meta-communities".
Town: 100-1000 "shared meta-communities".
Global shared community system:
Public welfare system + community system + industrial system = global shared life system.
1. Public welfare system usage scenarios
Sharing meeting:
International Sharing Meeting, referred to as: Sharing Meeting. Sharing Club Vision: A global leader in sharing communities. The mission of the Sharing Club: to develop the Sharing Club and serve the sharing community. The purpose of the sharing club is to share a better life.
The Sharing Club is a voluntary public service organization that does not involve politics, religion, or race, recruits social members who are interested in developing a sharing community, and promotes sustainable lifestyles around the world.
Public welfare foundations:
Sharing community public welfare foundations established in accordance with relevant laws and regulations use property donated by natural persons, legal persons or other organizations to engage in sharing A non-profit legal person established in accordance with the provisions of these regulations for the purpose of community public welfare. It is a public welfare organization that accepts feedback from the shared life industry, accepts donations from sharers, accepts social donations, and promotes the development of shared lifestyles.
Charitable trust:
Charitable trust is a new type of charity registered and set up in accordance with the "Charity Law of the People's Republic of China". It is an innovation that combines finance and charity. Lift. In the charitable trust structure, charity and finance work hand in hand. On the one hand, it provides more sufficient resources for charitable organizations and entrepreneurs to participate in philanthropy.On the other hand, by integrating the flexible, efficient and professional asset management capabilities of the trust system, all parties will jointly play an active role in promoting the development of charity.
Social Impact Investment Fund:
Impact investment, also known as "social impact investment" in China, refers to capital investment that pursues both justice and benefit to create economic and social development. Institutions or projects with comprehensive environmental benefits, their product forms include investments, bonds, loans, trusts, etc.
Shared life time bank:
Generates value from people’s idle time, wisdom, skills, and manpower. It is a collaborative life mechanism for shared life. All shared life communities are Shared life time bank membership.
Sharing Community Association:
Sharing community is the space where shared life members live, and Sharing Community Association is an organization of sharing communities around the world.
Shared Living Industry Association:
It is an industry organization that operates on the demand side, supply side and intermediate platform in the global shared living industry chain. The Shared Living Industry Association is between the government and enterprises and provides services, consultation, communication, supervision, fairness, self-discipline and coordination. It is the bridge and link between the government and enterprises.
International Shared Living Home Cities Cooperation Organization:
International Shared Living Home Development Plan under the International Shared Living Home Cities Cooperation Organization.
In The core city of regional international cooperation has established an "International Shared Living Industry Cooperation Platform" and displayed the "International Shared Living Demonstration Park" on the platform. Using the platform as a demonstration and support, it will develop in two directions, domestic regional cities and foreign regional cities. .
2. Living system usage scenarios
Sharing community membership network:
Accept applications from students who have completed training at the Sharing Life Academy. After certification , accept to join the global shared life system, manage membership dues payment and membership activities, manage shared community member meetings around the world, credit rating and management, members whose credit value is lower than their credit value, or withdraw on their own, or return to the Shared Life Academy to re-study.< br />
Community Owners Committee:
It is composed of owner representatives in the property management area. It represents the interests of the owners, reflects the owners’ wishes and requirements to all parties in society, and supervises the property management company. A non-governmental organization that manages and operates, with independent legal personality.
Community Affairs Committee:
Residents of shared communities can participate in the management of this community after reaching a certain length of stay.
Community membership meeting:
Important events in this communityDecisions on items shall be decided by the general meeting of resident members of the community.
Community life cooperatives:
The production and consumption of agricultural products, daily necessities, furniture, home appliances, clothing, etc. for members of the sharing community are all completed through cooperative organizations. The cooperative board can be elected, and the surplus generated by the cooperative is distributed according to the contributions of the "owners", truly eliminating the middleman and realizing benefit sharing.
Community production cooperatives:
Sharing community colleges, hair salons, supermarkets, restaurants, cafes, teahouses, hotels, properties, fitness, medical clinics, transportation, and entertainment.
3. Industrial system usage scenarios
Shared Life University:
Shared Life University consists of the Graduate School, Business School, Management School, Creative College, It consists of twelve colleges including Teachers College, Parenting College, Marriage and Love College, Youth College, Life College, Elderly College, Philanthropy College, and Blockchain College, which are the core of the shared life regional platform.
Shared living area platform:
The public welfare section, shared community section and shared living industry section form a shared living area platform. The platform establishes research and teaching with the shared living university as the core. , fully segmented model operation area, and platform ecosystem cluster area supporting the industry chain.
The platform is responsible for organizing the construction and operation of shared communities in international and domestic cities within a region.
Vertical segmented industry platforms:
Childcare, marriage, lifestyle, creativity, and elderly care segmented industry chain platforms form an industry intermediate operation system.
Shared life industry chain:
Human settlements, agriculture, landscape, food, supplies, health and entertainment, cultural creativity, leisure, residence, banking, and insurance form a supply-side industrial system .
4. Global Shared Community Regional Platform
In regional core cities around the world, we will build "shared living city regional platforms". In the initial stage, about 10 will be established in China, and more will be added later. to 31. Around 10 will be initially established around the world, reaching around 200 in the mid-term, and 1,000 in the later stages.
1. China
Nanning-ASEAN Shared Living Home Urban Regional Platform;
Kunming-Melan Five Countries Shared Living Home Urban Regional Platform;
Qingdao-Northeast Asia Shared Living Home City Regional Platform;
Tibet-South Asia Shared Living Home Urban Regional Platform;
Hainan-Pacific Island Countries Sharing Life Home City Regional Platform;
GuangzhouFuzhou - Urban regional platform for shared living homes in Southern Africa;
Fuzhou - Urban regional platform for shared living homes in North Africa;
Beijing - Urban regional platform for shared living homes in North America;
>
Shenzhen - EU Shared Living Home City Regional Platform;
Chongqing - Central and Eastern Europe Shared Living Home Urban Regional Platform;
Tianjin - Nordic Shared Living Home Urban Region Platform;
Chengdu-Western Europe Shared Living Home Urban Regional Platform;
Yinchuan-Middle East Shared Living Home Urban Regional Platform;
Urumqi-Central Asia Urban regional platform for shared living homes;
Hangzhou-urban regional platform for shared living homes in Caribbean island countries;
Shanghai-urban regional platform for shared living homes in BRICS countries;
Nanjing-South America shared living home urban regional platform;
Xiamen-Cross Strait shared living home urban regional platform;
Yangzhou-World Canal City Shared Living Home Regional platform;
2. Global
195 countries and regions in the world have established 1-multiple shared living home urban regional development platforms.
3. How to use blockchain and other technologies to create a multi-in-one, complementary and interactive communication system
In the Internet era, international communication entities, Communication mechanisms and communication methods have undergone major changes, and network technology, new media communication methods and communication channels have emerged in endlessly. We should make full use of 5G, big data, cloud computing, Internet of Things, blockchain, artificial intelligence, AR/VR, streaming media, ultra-high definition and other technologies to create a multi-in-one, complementary and interactive communication system, and launch holographic, visual and Immersive and interactive communication products enrich international communication forms and styles. In addition, overseas social media platforms should also be used flexibly to continuously enhance the competitiveness and influence of my country's international communication.
4. The significance of blockchain technology and the principles of blockchain technology
To fully understand the principles of blockchain, we must systematically understand it from its birth and development, so as to Distinguish the principles of blockchain more clearly from multiple angles. Blockchain technology refers to a technical solution that collectively maintains a reliable database in a decentralized manner. This technical solution mainly associates blocks through cryptographic methods. Each data block contains all data information of the system within a certain period of time, and a digital signature is generated to verify the validity of the information and link to the next data block. form oneMain chain (Chain).
A block is a record in the blockchain that contains and confirms pending transactions.
Mining refers to the formation of new blocks through calculation. It is a process in which supporters of transactions use their own computer hardware to perform mathematical calculations for the network to confirm transactions and improve security. Take Bitcoin as an example: Transaction supporters (miners) run Bitcoin software on their computers and continuously calculate complex cryptographic problems provided by the software to ensure that transactions proceed. As a reward for their services, miners receive fees included in the transactions they confirm, as well as newly created Bitcoins.
Peer-to-Peer Network refers to a system that allows a single node to interact directly with other nodes, thereby enabling the entire system to operate like an organized collective. Take Bitcoin for example: the network is built in such a way that every user broadcasts the transactions of other users. And importantly, no bank or other financial institution is required as a third party.
Hash is a classic technology in cryptography, which converts input of any length into a fixed-length output composed of letters and numbers through a hashing algorithm.
Digital Signature is a mathematical mechanism that allows people to prove ownership.
Private Key is a confidential data block that proves you have the right to spend electronic money from a specific wallet. It is implemented through a digital signature.
Double spending refers to users trying to illegally pay electronic money to two different payees at the same time, which is one of the biggest risks of electronic money.
?
The origin of blockchain: an underlying technology that supports the operation of Bitcoin
The concept of blockchain was first proposed by Proposed by Satoshi Nakamoto in his paper "Bitcoin: A Peer-to-Peer Electronic Cash System" published in the Bitcoin Forum. In the paper, blockchain technology is the basic technology for constructing Bitcoin data structure and encrypted transmission of transaction information. This technology realizes Bitcoin mining and transactions. Satoshi Nakamoto believes: First, the model of using third-party organizations to process information has an inherent weakness of lack of trust between points. In order to be wary of their customers, merchants will ask customers for completely unnecessary information, but they still cannot Avoid certain fraudulent behaviors; secondly, the existence of intermediaries increases transaction costs and limits the minimum feasible transaction size; thirdly, digital signature itself can solve the electronic currency identity problem. If third-party support is needed to prevent double consumption, the system will lose value. Based on the above three existing problems,Satoshi Nakamoto created Bitcoin based on blockchain technology.
On January 3, 2009, Satoshi Nakamoto created the first block in the Bitcoin world, the "Genesis Block" and mined the first batch of 50 Bitcoins.
On May 21, 2010, a Florida programmer used 10,000 Bitcoins to purchase a $25 pizza coupon. With this transaction, the first fair exchange rate for Bitcoin was born.
In July 2010, the first Bitcoin platform was established, new users increased dramatically, and prices soared.
In February 2011, the price of Bitcoin reached $1 for the first time, and since then exchange trading platforms with British Pound, Brazilian Real, and Polish Zloty were opened.
In 2012, Ripple was released as a digital currency that uses blockchain to transfer foreign exchange between countries.
In 2013, Bitcoin skyrocketed. The U.S. Department of the Treasury issued regulations on the personal management of virtual currencies, clarifying the definition of virtual currencies for the first time.
In 2014, the mining machine industry chain represented by China became increasingly mature. In the same year, the U.S. IT community recognized the cross-era innovative significance of blockchain in the digital field.
In 2015, the US Nasdaq Stock Exchange launched Linq, a digital ledger technology based on blockchain, to record transactions and issuance of stocks.
The principles of blockchain can be understood clearly from each application case. The application of blockchain principles is becoming more and more popular. Recently, Citigroup, Mitsubishi UFJ Financial Group of Japan, Switzerland Large global financial institutions such as Union Bank and Deutsche Bank will also apply "blockchain" technology to create a fast, convenient and low-cost transaction operating system. In addition to the financial field, blockchain technology has also begun to be used in fields such as the protection of intellectual property rights, lawyer notarization, and online games that require transparent disclosure and permanent records of information.
5. What is data blockchain (BlockChain) and how to explain it easier for people to understand
If you want to understand the application of blockchain, you can refer to many books and opinions, such as "Illustrations" Blockchain", "Blockchain: Reshaping the Economy and the World", "New Economic Blueprint and Introduction", as well as articles from Binance Community, including a detailed understanding of the Binance Community platform, which is extremely powerful.
1. What is blockchain
Blockchain, as the name suggests, is composed of blocks and chains. It is a distributed data storage , point-to-point transmission, consensus mechanism, encryption algorithm and other new application models of computer technology. It is a chained data structure that combines data blocks in chronological order and is cryptographically guaranteed to be an untamperable, unforgeable, safe and trustworthy distributed ledger.
In 2008, Satoshi Nakamoto published the paper "Bitcoin: A Peer-to-Peer"Electronic Cash System" proposed the concept of blockchain and encrypted digital currency for the first time. Starting from Bitcoin, blockchain has become the underlying technology of various digital currencies.
2. The working principle of blockchain:
1. Basic concepts include: (1) Transaction: one operation will change the ledger status once, such as adding an Record; (2) Block (Block): records transactions and status data that occurred within a specified time, which is a consensus and preservation of the current ledger status; (3) Chain (Chain): blocks are connected in chronological order It is a log record of the entire state changes. After understanding the working concept of the blockchain, it is not difficult to understand its working principle. Suppose there is a distributed data record book. This record book only allows additions, deletions and changes are not allowed. Its structure is composed of "blocks" A linear chain formed in series (this is also the origin of the name "blockchain"). To add new data, it must be placed in a new block. The maintenance node can propose a new block, but it must go through a certain process. Consensus mechanism to reach agreement on the final selected block.
2. Take Bitcoin as an example to see how the blockchain works.
Bitcoin blocks are divided into two parts: block header and block body.
3. Core advantages and characteristics of blockchain
1. Verification, accounting, storage, maintenance and decentralization of blockchain data Transmission and other processes are based on a distributed system structure. There is no centralized hardware or management organization. The rights and obligations of any node are equal. The data blocks in the system are jointly maintained by nodes with maintenance functions in the entire system. 2. The open and transparent system is open. In addition to the private information of the transaction parties being encrypted, the blockchain data is open to everyone. Anyone can query the blockchain data and develop related applications through the public interface. Therefore, the entire System information is highly transparent. 3. Security Blockchain adopts consensus-based specifications and protocols (such as a set of open and transparent algorithms) to enable all nodes in the entire system to exchange data freely and securely in a trustless environment, thereby increasing trust in "people" Changed to trust in the machine, any human intervention will not work. 4. Information cannot be tampered with. Once the information is verified and added to the blockchain, it will be stored permanently. Unless more than 51% of the nodes in the system (almost impossible) can be controlled at the same time, modifications to the database on a single node will be Invalid, so the data stability and reliability of the blockchain are extremely high. 5. Anonymity Since the exchanges between nodes follow a fixed algorithm, the data interaction does not require trust (the program rules in the blockchain will judge whether the activity is valid by itself), so the counterparty does not need to reveal its identity to the other party. Generating trust is very helpful for the accumulation of credit.
4. Classification of blockchains
Currently, the most mainstream classification of blockchains is to divide blockchains into public chains (Public Blockchain), Private Blockchain and Consortium Blockchain.
1. Public chain: Anyone can participate in the use and maintenance, and can obtain effective confirmation of the blockchain. The public chain is the earliest blockchain and the most widely used blockchain at present. , typically such as the Bitcoin blockchain, the information is completely public.
If a permission mechanism is introduced, it will include private chain and alliance chain. 2. Private chain: A company or individual only uses blockchain technology and has exclusive write permission to the blockchain, and the information is not made public. At present, conservative giants (traditional finance) all want to experiment with private blockchains, and the application products of private blockchains are still being explored. 3. Alliance chain: It is a blockchain between the public chain and the virtual chain, jointly controlled by multiple organizations. The use of this chain is managed with authority and can be subject to the manager or according to the manager’s wishes. Be open to others. In addition, according to the different usage scenarios and purposes of blockchain, it is divided into currency chains for the purpose of digital currency, property rights chains for the purpose of recording property rights, crowdfunding chains for the purpose of crowdfunding, etc.
5. Analysis of specific application scenarios of blockchain
1. Information anti-counterfeiting
On May 28, Tencent CEO Ma Huateng spoke at the Guiyang Digital Expo The problem of Moutai anti-counterfeiting has been raised: the anti-counterfeiting method based on cloud-based comprehensive blockchain technology will be much more efficient than traditional anti-counterfeiting methods. In future anti-counterfeiting verification scenarios, users may only need to perform a simple scan with their mobile phone to obtain a large amount of complete information based on different dimensions.
Take Moutai as an example:
Distillery address, production workshop, operating employees, inspectors, factory time, transportation vehicle information and driver information,
The vintage source of raw materials for wine, raw material suppliers, storage warehouse numbers, raw material transportation vehicles and driver information,
All information can be accurately traced, permanently recorded and cannot be tampered with.
The authenticity can be easily verified based on the above information.
2. Food safety issues
As early as November last year, Walmart had cooperated with IBM to ensure food safety by using blockchain technology to track food sources. safety and increase the circulation of food to reduce costs. For large supermarkets such as Wal-Mart, when food safety problems occurred in the past, it took several days to investigate the source of the problematic food. After using this technology, only one piece of information about the product is required. It can accurately trace the source of important information such as food origin, inspectors, suppliers, logistics and transportation, and quickly detect problems within a few minutes. Currently, products tracked using blockchain include packaging products in the United States and pork in China.
3. Information Security
Blockchain technology is promoting a revolution in information security technology. Three major security threats: man-in-the-middle attack, data tampering, and DDoS
(1) Identity Protection
PKI is a common public key encryption technology used in various communication applications such as emails, messaging applications, and websites. However, since most PKI implementations rely on a centralized trusted third-party certification authority (CA) to issue, activate and store user certificates, hackers can attack PKI to fake user identities or crack encrypted information.
CertCoin is the first blockchain PKI implementation, coming from MIT, which removes the centralized certification center and uses the blockchain as a distributed ledger of domain names and public keys.
Pomcor Company: Blockchain PKI implementation path: retain the certification center and use the blockchain to store hash values of issued and activated certificates. Users can verify the authenticity of certificates through decentralized and transparent sources, while also improving network access performance through local authentication of keys and signatures based on blockchain copies.
(2) Data integrity protection
GuardTime has developed a keyless signature architecture (KSI) based on blockchain technology to replace key-based data authentication technology. KSI stores hashes of the original data and files on the blockchain, runs hashing algorithms to verify other copies, and compares the results with the data stored on the blockchain. Any tampering with the data will be quickly detected because the original hash table is stored on millions of nodes.
(3) Protection of critical infrastructure
The "Achilles' heel" of the Internet, DDoS has entered the TB era, and DDoS is still the easiest way for hackers to defeat large targets at low cost. As a weapon, DNS services are the primary target for hackers to carry out large-scale damage, but blockchain technology is expected to fundamentally solve it.
The distributed storage of blockchain makes hacker attacks lose focus. Nebulis is developing a distributed DNS system using the Ethereum blockchain and the InterPlanetary Internet File System (IPFS, a distributed alternative to HTTP product) to register and resolve domain names. The biggest weakness of DNS is caching. Caching makes DDoS attacks possible and is also the bane of centralized governments censoring social networks and manipulating DNS registrations. A highly transparent, distributed DNS system can effectively prevent any entity, including the government, from manipulating records.
IV. Financial Industry
(1) Digital Currency: Improving the convenience of currency issuance and use
For example, foreign Bitcoin and Ethereum, our country currently There are Nuo Compao and so on.
From the use of physical transactions, to physical currency and credit currency, to the rise of the Bitcoin network, more people are aware of the distributed ledger blockchain technology behind it, and gradually outside of digital currency applied in many scenarios.
(2) Cross-border payment and settlement: realize point-to-point transactions and reduce intermediate costs
Transfer and payment. At present, the most mature application of blockchain technology is payment and transfer. Blockchain technology can avoid complicated systems, save the process of inter-bank reconciliation and review, and speed up settlement; using virtual currency canThe intervention of a clearing house is required to reduce transaction costs. The clearing procedures of each country are different. It takes 2 or 3 days for a single remittance to arrive, which is inefficient and accounts for a large proportion of funds in transit. No longer going through a third party, point-to-point payment is formed through blockchain technology. Eliminating the need for third-party institutions, you can make payments throughout the day, receive money in real time, quickly withdraw cash, and reduce hidden costs, helping to avoid financial risks. It is timely and convenient.
(3) Bills and supply chain financial business: reduce human intervention, reduce costs and operational risks
Point-to-point value transfer, physical bills or central system for control and verification; intermediary will be eliminated and human intervention reduced. Improved efficiency, smoother financing channels, lower risks, and benefits for all parties.
(4) Securities issuance and trading: realize quasi-real-time asset transfer and accelerate transaction clearing speed
The application of blockchain technology can make the securities trading process simpler, more transparent and faster , Reduce IT systems with repetitive functions and improve the efficiency of market operations. For stocks, blockchain can eliminate paper and pen or spreadsheet records, reduce human errors in transactions, and improve the transparency and traceability of trading platforms. Citi and Nasdaq collaborate to advance blockchain applications.
(5) Customer credit reporting and anti-fraud: reduce legal compliance costs and prevent financial crimes
Customer information and transaction records recorded in the blockchain help banks identify Abnormal transactions and effectively prevent fraud. The technical characteristics of blockchain can change the existing credit reporting system. When banks perform "know your customer" (KYC), the data of customers with bad records will be stored in the blockchain.
Equity crowdfunding: Equity crowdfunding based on blockchain technology can achieve decentralized trust and investors’ returns are guaranteed.
5. Supply chain management
Distributed ledger system, participants track the ownership of assets throughout the process, and can be used to track auto parts when moving between countries and factories.
Toyota is developing blockchain technology solutions for its core parts supply chain operations. Using a large amount of data helps Toyota more efficiently ensure the accuracy of recorded data and can also help manage the supply chain. At the same time, the blockchain supply chain can control warranty, repair goods-related costs and specifications through smart contracts, and transactions throughout the product life cycle are irrevocable.
The shipping industry’s first public solution, deployed by Maritime Transport International (MTI), uses blockchain supply chain technology to share Verified Gross Mass (VGM) information for shipping containers. Information about container VGM is important to ensure ships are properly stowed and to prevent accidents at sea and in ports. VGM data is stored on the blockchain supply chain, providing a permanent record for port officials, shipping companies, shippers and cargo owners. This replaces cumbersome logs, spreadsheets, data brokers and private databases.
Logistics Integrity System Wagonbang Wagonbang launched a blockchain-based financial solution for logistics enterprises, aiming to provide enterprises with reliable financial services. Not only canHelping drivers solve the problem of loan difficulties can also change the lack of integrity in the industry and help build a logistics integrity system. Help build the identity chain of logistics companies and create a trusted data ecosystem for logistics companies. Using a transparent, supervisory, and traceable algorithm model, we screen reliable companies that need financial support and provide them with financial services. On the other hand, at the technical level, various law enforcement departments are linked to jointly punish dishonest companies.
6. Government management
(1) Election
Based on the characteristics of blockchain technology and considering the shortcomings of current election technology, we will build an open source , Blockchain applications for elections, voting and lottery, we call it ElectionChain. We hope to optimize election and voting technology to make voting more open and transparent, reduce human manipulation, and allow voters to verify their election results.
Including identity authentication, multi-chain system, flash investment protocol, consensus algorithm EDPOS, privacy protection, voting mechanism design, decentralized ELC rental market, storage solutions, smart contracts, etc.
(2) Government services
Aiming to realize an e-government digital ecosystem based on blockchain technology and provide citizens with government services and an automated mechanism for the business of various government departments, it must be All areas of national government affairs are combined to form a common information space, including government agencies, economic data, financial transactions and social fields. This ecosystem should also include registries and corresponding software for building smart contract-based applications and platforms for government agencies, businesses and public users.
6. How does HNB realize cross-chain interaction?
HNB has three ways of cross-chain interaction.
The first is called the notary mechanism: used to support cross-chain transactions between two native digital assets within HNB. The notary mechanism adopts a decentralized mechanism for processing. The notary separately identifies the cross-chain transaction request for one of the assets and submits the corresponding processing for the other digital asset. Cross-chain transactions between assets go through the notary mechanism, with the HNB community acting as a notary, which can effectively manage the exchange transactions between the two assets. At the same time, this method can support a large number of cross-chain transaction throughput.
The second type is called side chain/relay: the cross-chain interaction between HGS (the digital asset token of the HNB economy) and the side chain. Cross-chain interaction requests occur between the HGS chain and the side chain, and transactions are forwarded to the other party through the relay gateway in the form of events to achieve transaction consistency in cross-chain transactions between the two chains. The HNB underlying platform will provide a relay gateway module, which is mainly used to connect the HNB side chain with the HGS chain.
The third type is called extensible third-party protocol: a protocol used for asset transactions between HNB digital assets and other third-party blockchains. The future blockchain architecture will be a chain network structure composed of multiple blockchains, and cross-chain interaction is an inevitable trend. Therefore, HNBThe bottom layer of the blockchain will reserve third-party cross-chain protocol interfaces for future expansion when connecting with the bottom layers of other blockchains. With these three types of cross-chain interactions, HNB will definitely serve the real economy more extensively in the future.
7. One article to understand the Internet blockchain
One article to understand the Internet blockchain
One article to understand the Internet blockchain, you need to understand the blockchain , we have to study the brief history of blockchain technology development starting from the birth of the Internet, discover the motivations for the emergence of blockchain, and infer the future of blockchain. Let’s understand the Internet blockchain in one article.
Understand the Internet blockchain in one article 1The originator of blockchain is mahjong, and the earliest blockchain was invented by the Chinese! The blockchain is just like Mahjong, except that Mahjong has fewer blocks. Mahjong only has 136 blocks. The rules of Mahjong vary from place to place and can be regarded as a hard fork of Bitcoin.
As the oldest blockchain project, Mahjong has a team of four miners. The first one to dig out the 13 correct hash values will get the accounting rights and rewards. It adopts the method of being willing to admit defeat and not cheating. Thousands of consensus mechanisms!
Mahjong is decentralized, everyone can be the banker, and it is completely peer-to-peer.
Mining pool = commission from the boss of the chess and card room.
It cannot be tampered with, because convincing the other three people requires too much computing power and physical strength.
A typical value Internet. The value in my pocket didn't last eight rounds before it went into their pockets.
The Chinese are basically good at playing mahjong. In terms of blockchain, they produce 70% to 80% of the world’s mining machines and have the most computing power in the world, accounting for about 77% of the computing power.
Mahjong is actually the earliest blockchain project:
1. A group of four miners. The miner who first collides with the correct hash value of 13 numbers can obtain the accounting rights. and get rewarded.
2. It cannot be tampered with. Because convincing the other three people requires too much computing power and physical strength.
3. Typical value Internet. The valuable digital currency www.gendan5.com/digitalcurrency/btc.html in my pocket ran into their pockets after eight rounds.
4. Decentralization, everyone can be a banker, it is completely peer-to-peer.
5. UTXO, unspent transaction expenses.
There is another blockchain method of credit, assuming that everyone has no cash
Let’s take a closer look. When everyone reaches a consensus, we see There is no intermediary or third party to judge C’s win, and the rewards given to C do not need to be transferred to C through a third party. They are all direct peer-to-peer transactions. This process is decentralized, and players (miners) record their own records. After checking the results of the first game, C Dahu drew thirteen units., Yi beat Jia Dongfeng, and a complete block was generated after the record was completed, but remember, this is only the first game. In the entire blockchain, this is just a node. The 8 games mentioned at the beginning Once completed, there are 8 nodes (blocks), and the 8 blocks are connected together to form a complete ledger, which is the blockchain. Because everyone has one of this ledger, it is a distributed ledger. The purpose is to prevent someone from tampering with the record. At the end of the game, it is clear who wins and who loses.
Four men (A, B, C, and D) got together to play mahjong for money. None of them brought any cash, so they asked a beautiful woman (centralized) to keep a book and record who won how much money in each round. , Who lost how much? At the end of the day, everyone uses Alipay or WeChat to pay and settle the ledger. However, if this beauty made a mistake in accounting or was bribed by one of the four people in advance to make a mistake on purpose, there is no guarantee that the outcome of this game will be fair, just, and reasonable. ,dont you agree? then what should we do? If you "play mahjong", you can use "blockchain" as the game rules and adapt it as follows:
Four men (A, B, C and D) got together to play mahjong for money. No one brought any cash. B said Let the beauty she brought keep accounts. A said that none of us knew this beauty, so the four of them, A, B, C, and D, agreed that everyone would keep accounts at the same time (decentralized) on their mobile phones (blockchain nodes) for each game. ), after finally playing mahjong and paying with electronic money directly on the mobile phone, everyone checked the accounting results. The accounting results should have been the same.
Assume that the original result is the account recorded on A’s mobile phone: B owes A 10 yuan. However, the record on B's mobile phone shows that there is no debt, but the other two people (C and D) have the same accounting as A, so the settlement is still based on the majority rule. In addition, everyone has a bad impression of B's integrity. Next The first time I play mahjong, I won’t take B to play with me.
Unless B bribes two people (C and D) in advance to deliberately cheat, but the cost of B bribes them is 100,000 yuan (10,000 times the default of 10 yuan), then in common sense, B only You can choose to give up because the cost of counterfeiting is too high.
Assume that even if B is secretly willing to pay a high price of 100,000 yuan to buy C and D to do this silly cat transaction with huge losses during the card game, the rules of the blockchain are to keep accounts based on timestamps. Yes, it turns out that B owed A 10 yuan when debiting the account at 1 p.m., that is, when C and D changed the account at 3 p.m., time is irreversible and they can only record 3 p.m., which does not comply with the rules of the game. .
In fact, in 2017 the blogger has developed a set of Mahjong coins
China’s earliest blockchain project: a group of four miners, first starting from 148 random numbers The miner who collides with the correct hash value of 14 numbers can obtain an accounting right incentive. Since distributed accounting requires the consensus of several other miners, each accounting transaction takes about ten minutes.
Understand the Internet Blockchain in One Article 21. Before the birth of Bitcoin, 5 major developments in the future of blockchainInfluential Internet Technology
In 1969, the Internet was born in the United States. Since then, the Internet has expanded from four research institutions in the United States to the entire earth. In terms of application, it has expanded from the earliest military and scientific research to all aspects of human life. In the nearly 50 years since the birth of the Internet, five technologies have been of particularly great significance to the future development of blockchain.
1. The TCP/IP protocol born in 1974: determines the position of blockchain in the Internet technology ecosystem
In 1974, the most critical step in the development of the Internet was taken by The TCP/IP protocol, the core communication technology of the Internet jointly developed by American scientists Vinton Cerf and Robert Kahn, was officially launched.
This protocol enables the transmission of information between different computers and even different types of networks. All computers connected to the network can communicate and interact as long as they comply with this protocol.
In layman's terms, Internet data can travel tens of thousands of kilometers to reach the computer users who need it. This is mainly because the Internet world has formed a unified information dissemination mechanism. That is to say, Internet devices follow a unified law-TCP/IP protocol when disseminating information.
Understanding the TCP/IP protocol is of great significance to mastering the Internet and blockchain. After the invention of TCP/IP in 1974, the entire Internet was between the underlying hardware devices, the intermediate network protocols and the network Addresses have always been relatively stable, but an endless stream of innovative applications are emerging at the top application layer, including news, e-commerce, social networks, QQ, WeChat, and blockchain technology.
In other words, in the technical ecology of the Internet, blockchain is a new technology at the top layer of the Internet - the application layer. Its emergence, operation and development have not affected the underlying infrastructure and communication protocols of the Internet. , is still one of the many software technologies that operates according to the TCP/IP protocol.
2. Cisco router technology born in 1984: an imitation of blockchain technology
In December 1984, Cisco was established in the United States. The founder was a professor from Stanford University. A couple, Leonard Posak, director of the computer center, and Sandy Lerner, director of the business school's computer center, designed a networking device called a "multiprotocol router" that was placed on the Internet's communication lines to help data Get from one end of the Internet to the other thousands of kilometers away accurately and quickly.
In the entire Internet hardware layer, tens of millions of routers are busy working, directing the transmission of Internet information. An important function of Cisco routers is that each router saves a complete Internet device address table. Once something happens Changes will be synchronized to tens of millions of other routers (theoretically), ensuring that each router can calculate the shortest and fastest path.
When you see the operation process of the router, you will feel very familiar, that is, after the blockchainThe important feature of the router is that the important feature of the blockchain has been implemented in the router in 1984. For the router, even if the node device is damaged or attacked by hackers, it will not affect the entire Internet information. Teleport.
3. The B/S (C/S) architecture that was born with the World Wide Web: the opponent of the blockchain and the target of attempted subversion
The World Wide Web is referred to as the Web and is divided into Web clients and server. All updated information is only modified on the Web server. Thousands, tens of thousands, or even tens of millions of other client computers do not retain the information and only obtain the information data when accessing the server. This structure is often called the Internet B/S architecture is a centralized architecture. This architecture is also the most important architecture of the current Internet. Internet giants such as Google, Facebook, Tencent, Alibaba, and Amazon have all adopted this architecture.
Understanding the B/S architecture will be of great significance to the subsequent understanding of blockchain technology. The B/S architecture is that data is only stored in the central server, and all other computers obtain information from the server. Blockchain technology has tens of millions of computers without a center, and all data will be synchronized to all computers. This is the core of blockchain technology.
4. Peer-to-Peer Network (P2P): Blockchain The father of the chain and its technical basis
Peer-to-peer network P2P is another Internet infrastructure corresponding to C/S (B/S). Its characteristic is that multiple computers connected to each other are connected to each other. In a peer-to-peer position, there is no distinction between master and slave. A computer can be used as a server, setting shared resources for use by other computers in the network, and as a workstation.
Napster is one of the earliest P2P systems, mainly used for music resource sharing. Napster cannot be regarded as a true peer-to-peer network system. On March 14, 2000, a message was posted on the mailing list of the underground hacker site Slashdot in the United States, saying that AOL's Nullsoft department had released Gnutella, an open source Napster clone software.
In the Gnutella distributed peer-to-peer network model, each networked computer is functionally peer, serving as both a client and a server, so Gnutella is called the first true peer-to-peer network model. Network Architecture.
In the past 20 years, some Internet technology giants such as Microsoft and IBM, as well as liberals, hackers, and even criminals who infringe intellectual property rights, have continued to promote the development of peer-to-peer networks. Of course, those on the Internet want to strengthen information sharing. The idealists also put a lot of enthusiasm into peer-to-peer networks. Blockchain is a software application based on a peer-to-peer network architecture. It is a benchmark application for peer-to-peer networks trying to break out from the silence of the past.
5. Hash algorithm: the key to generating Bitcoin and tokens (tokens)
Hash algorithm is an algorithm that converts numbers of any length into fixed-length values using a hash function. Famous hash functions such as: MD4, MD5, SHS, etc. It is a member of the family of cryptographic functions defined by the American National Institute of Standards and Technology.
This family of algorithms is crucial to the functioning of the entire world. From Internet application stores, emails, anti-virus software, to browsers, etc., all of them are using secure hashing algorithms. It can determine whether Internet users have downloaded what they want, and it can also determine whether Internet users are involved in man-in-the-middle attacks or network attacks. Victim of a phishing attack.
The process of blockchain and its application to generate new coins from Bitcoin or other virtual currencies is to use the function of the hash algorithm to perform operations to obtain numbers that meet the format requirements, and then the blockchain program gives Bitcoin rewards.
Mining, including Bitcoin and tokens, is actually a small mathematical game built with a hash algorithm. However, because of the fierce competition, people all over the world used powerful servers to perform calculations in order to get the rewards first. As a result, many computers on the Internet participated in this little mathematical game, which even consumed more than 40% of the electricity in some countries.
2. The birth and technical core of blockchain
The birth of blockchain should be the most unusual and mysterious invention and technology in the history of human science, because apart from blockchain, So far, there is no major invention in the history of modern science whose inventor cannot be found.
On October 31, 2008, Bitcoin founder Satoshi Nakamoto (pseudonym) published a paper on the cryptography mailing group - "Bitcoin: A Peer-to-Peer Electronic Cash System". In this paper, the author claims to have invented a new electronic currency system that is not controlled by governments or institutions. Blockchain technology is the basis for supporting the operation of Bitcoin.
The preprint address of the paper is at http://www.bitcoin.org/bitcoin.pdf. From an academic point of view, this paper is far from a qualified paper. The main body of the article is composed of 8 flow charts. It is composed of corresponding explanatory text, no nouns and terms are defined, and the format of the paper is also very irregular.
In January 2009, Satoshi Nakamoto released an application case of blockchain on the SourceForge website - the open source software of the Bitcoin system. After the release of the open source software, it is said that Satoshi Nakamoto mined approximately 1 million bits. Coin. A week later, Satoshi Nakamoto sent 10 Bitcoins to cryptography expert Hal Finney, which became the first transaction in Bitcoin history. With the booming development of Bitcoin, research on blockchain technology has also begun to show explosive growth.
It is indeed difficult to fully and clearly explain the blockchain to the public. We use Bitcoin as the object to introduce the technical characteristics of the blockchain as simply as possible but in depth.
1. Blockchain is a peer-to-peer network (P2P) software application
We mentioned in the previous article that at the beginning of the 21st century, the Internet formed two major types of application architectures, the centralized B/S architecture and the non-centered peer-to-peer (P2P) architecture, Alibaba, Sina, Amazon, etc. Many Internet giants have a centralized B/S architecture. To put it simply, data is placed on giant servers. We ordinary users access the servers of Alibaba, Sina and other websites through mobile phones and personal computers.
Since the beginning of the 21st century, there have been many software applications for freely sharing music, videos, and paper materials. Most of them use a peer-to-peer network (P2P) architecture, that is, there is no central server, everyone's personal computer They are all servers and clients, with equal status. However, this type of application has never become popular. The main reasons are large resource consumption and intellectual copyright issues. Blockchain is a software application in this field.
2. Blockchain is a peer-to-peer network (P2P) software application that synchronizes information across the entire network
Peer-to-peer networks also have many application methods. In many cases, everyone is not required to Each computer keeps the same information. Everyone only stores the information they need, and downloads it to other computers when needed.
However, in order to support Bitcoin financial transactions, the blockchain requires that every transaction that occurs must be written into historical transaction records and change information be sent to all computers with Bitcoin programs installed. Every computer with Bitcoin software installed maintains the latest and complete Bitcoin historical transaction information.
The characteristics of blockchain's network-wide synchronization and network-wide backup are often referred to as blockchain information security, and the source cannot be changed. Although it is still not absolutely safe in practice, when the number of users is very large, it does have certain security advantages in preventing information tampering.
3. Blockchain is a peer-to-peer (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network
Area The first application of the blockchain was the famous Bitcoin. When discussing Bitcoin, a term that is often mentioned is "mining". So what exactly is mining?
The metaphor is that the blockchain program gives the miners (players) 256 coins, numbered 1, 2, 3...256. Each time a Hash operation is performed, it is like tossing a coin. 256 coins are thrown at the same time. After landing, if all the coins with the first 70 numbers happen to be heads. The miner can tell the blockchain program this number, and the blockchain will reward the miner with 50 Bitcoins.
From the perspective of software programs, Bitcoin mining is a mathematical game built using the hash SHA256 function. The blockchain first stipulates a winning mode in this small game: a 256-bit hash number is given, but the last 70 bits of the hash number are all 0, and then the player (miner) continuously enters various numbers. Give the hash SHA256 function and see if you can get the number of digits using this functionThere are 70 0 numbers. If one is found, the blockchain program will award 50 Bitcoins to the player. Actual mining and rewards are more complex, but the above example expresses the core process of mining and obtaining Bitcoin.
When Bitcoin was born in 2009, each bounty was 50 Bitcoins. Ten minutes after its birth, the first batch of 50 Bitcoins was generated, and the total currency amount at this time was 50. Subsequently, Bitcoin increased at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the bounty is halved to 25. When the total amount reaches 15.75 million (new output is 5.25 million, which is 50% of 1050), the bounty is further halved to 12.5. According to the design of the Bitcoin program, the total number of Bitcoins is 21 million.
From the above introduction, Bitcoin can be seen as a guessing game based on a peer-to-peer network architecture. The Bitcoin information rewarded for each correct guess will be transmitted to all players and recorded. into each player's history database.
4. Smart contracts, tokens, ICOs and blockchain basic platforms generated by blockchain technology due to the rise of Bitcoin
From the above introduction, Bitcoin technology It is not a new technology falling from the sky, but a clever combination of various original Internet technologies, such as peer-to-peer network architecture, network-wide synchronization of routing, and network security encryption technology. It can be regarded as a combination of innovative algorithm games. .
Because Bitcoin can be exchanged for legal currency, purchased in kind, and made huge profits through appreciation, the whole world is not calm. With the attitude that if you can do it, I can do it, many people have created their own imitation Bitcoin software applications. At the same time, taking advantage of the difficulty for the government to regulate peer-to-peer networks, various altcoins exploded together with Bitcoin. There have been many incidents of fraud and absconding, which have gradually attracted the attention of governments around the world.
Blockchain basic platform: It is still quite technically difficult to create currency using the blockchain technology framework. At this time, basic technology platforms such as Ethereum, the blockchain basic platform, have emerged, making it convenient for ordinary people. Create a "Bitcoin"-like software program, each showing its magical powers, inviting people to join the game to mine coins, speculate on coins, and gain profits from it.
Pass or token: If each "Bitcoin" or "Altcoin" uses a hash algorithm to create a guessing game and generates its own "currency", this "currency" is collectively referred to as " "Certificate" or "Token".
ICO: Since Bitcoin and Ethereum have been exchanged with the legal currencies of various countries, when other new virtual currencies are issued, only Bitcoin and Ethereum are allowed to purchase the new issued coins. This process of issuing coins It’s called ICO. The emergence of ICO has amplified the transaction volume of Bitcoin and Ethereum. At the same time, many ICO projects are completely based on nihilistic projects, resulting in a large number of frequent fraud cases. This further deepens society’s negative understanding of virtual currencies generated by blockchain.
Smart contract: It can be seen as a software function on the blockchain and is an auxiliary blockchainPrograms for trading various virtual currencies. The specific function is like the fund custody of Alipay on Taobao. When a user receives the goods and confirms them on Alipay, the funds are automatically paid to the buyer and the owner. The smart contract is in Bit Blockchain applications such as Coin also undertake this intermediary payment function.
3. The historical status and future prospects of blockchain technology in the Internet
1. Where does blockchain stand in Internet technology? It is a new software and architecture at the top level.
We mentioned in the previous introduction to TCP/IP that blockchain, like browsers, QQ, WeChat, online game software, mobile APPs, etc., is a software form of the top layer of the Internet - the application layer. . Its operation still relies on the TCP/IP architecture system to transmit data. But unlike most application layer software, it does not adopt the central software architecture of C/S (B/S). Instead, an unusual peer-to-peer network architecture is adopted. From this point of view, blockchain cannot subvert the Internet infrastructure.
2. Who does blockchain want to subvert? Want to subvert the B/S (C/S) structure of the World Wide Web.
It attempts to subvert the B/S, C/S structure of the World Wide Web, which was born in 1989. Said before. Since 1989, European physicist Tim Berners-Lee invented the World Wide Web and gave up applying for a patent. In the past nearly 30 years, companies including Google, Amazon, Facebook, Alibaba, Internet, Tencent and other companies have used the B/S (C/S) structure of the World Wide Web to grow into Internet giants.
In their headquarters, a powerful central server cluster was established to store massive amounts of data. Hundreds of millions of users obtained the data they needed from the giant servers. This also led to the emergence of cloud computing, and then the Internet giants Open up your unused central server resources to further absorb data from enterprises, governments, and individuals. Centralized Internet giants have an increasing influence on the world, countries, and Internet users.
The goal of blockchain is to try to reduce the influence of Internet giants by distributing data to each Internet user’s computer. It can be seen that the real opponent of blockchain and what it wants to subvert is the 1990 The B/S (C/S) structure born in 2007. But whether it can be subverted depends on its technical advantages and bottlenecks.
3. Technical flaws of blockchain: dilemmas caused by the pursuit of complete equality and freedom
The technical flaws of blockchain first come from its peer-to-peer network architecture. For example For example, Taobao currently has a B/S structure, and massive data is stored in the Taobao server cluster computer room. Hundreds of millions of consumers access the Taobao server website through their browsers to obtain the latest information and historical information.
If blockchain technology is used, hundreds of millions of people will retain a complete Taobao database on their personal computers or mobile phones. Every time a transaction occurs, it will be synchronized to hundreds of millions of other users. This is completely unachievable in reality. transmission and storageThe amount of data is too large. It is equivalent to setting up and running hundreds of millions of Taobao websites at the same time.
Therefore, blockchain cannot be applied to projects with large amounts of data, and even smaller website projects will have difficulty using blockchain. By 2018, Bitcoin had been running for nearly 10 years, and the accumulated transaction data had brought the entire system to collapse.
So the blockchain has adopted many alternative methods, such as establishing relay nodes and lightning nodes. These two concepts can also make people confused. In layman’s terms, the blockchain will ask it for The subversive object B/S structure has been studied, and a data server center has been established to become the relay node of the blockchain, which can also be accessed with a browser-like terminal. This is the lightning node of the blockchain.
This change can alleviate the technical shortcomings of the blockchain, but it does make the blockchain what it opposes, centralization. It can be seen that pure blockchain technology has major flaws due to its technical characteristics and cannot be widely used like the World Wide Web. If the technology is upgraded and some parts adopt a B/S (C/S) structure, the blockchain will become centralized. The information node no longer maintains the dream when it was born.
4. Looking at the future prospects of blockchain from the Internet brain model
We know that the Internet generally refers to the Internet that connects computer networks around the world. On this basis The development of a global Internet network covering the whole world is called the Internet, which is a network structure that is interconnected.
Since the birth of the Internet in 1969, humans have innovated in the Internet field from different directions, and there is no unified plan to build the Internet into a structure. When the wheel of time reaches 2017, with the advent of artificial intelligence, With the vigorous development of science and technology such as the Internet of Things, big data, cloud computing, robots, virtual reality, and the industrial Internet, when humans look up to see the giant systems they have created, the model and architecture of the Internet brain have become increasingly clear.
Through nearly 20 years of development, relying on the B/S and C/S structures of the World Wide Web, Tencent QQ, WeChat, Facebook, Weibo, and Twitter Amazon have developed structures similar to neuron networks. Internet devices, especially personal computers and mobile phones, map personal data and functional space on the giant's central server through the software on the device, allowing them to add friends, communicate and transfer information. Internet giants continue to optimize the software versions of hundreds of millions of terminals through software upgrades in central server clusters. In the neurological system, this is a standard central nervous system structure.
The birth of the blockchain provides another neuron model. Instead of uniformly managing neurons in the centralized services of giants, each terminal, including personal computers and personal mobile phones, becomes an independent neuron node. , retaining an independent data space and synchronizing mutual information. In the neurological system, this is a distributed neural structure with no center and multiple neural nodes.
Interestingly, these two different types of neural nodes appear in the development of the nervous system.structure. In lower organisms, blockchain-like neural structures have appeared. There are multiple ganglia with the same functions, all of which can command body activities and reactions. However, as organisms evolve, these ganglia gradually merge. When they evolve into higher In biology, the central nervous system appeared, which contains a large number of neurons that interact with each other.
4. Judgment on the future status of blockchain in the Internet
1. Understanding of Bitcoin: a guessing game based on peer-to-peer network architecture (P2P), Through clever financial and public opinion operations, it has become a "world currency" that is not subject to government supervision.
2. Understanding of blockchain: a peer-to-peer (P2P) software application that uses hashing algorithms to generate "tokens" to synchronize information across the entire network.
3. Blockchain has specific uses, such as large-scale election voting, large-scale gambling, financial transactions that circumvent government financial supervision, etc. It still has irreplaceable uses.
4. In more cases, blockchain technology will rely on the B/S and C/S structures of the Internet to achieve functional expansion, but overall it is still a supplement to the existing technology of the Internet. Most of the application scenarios currently envisaged by blockchain can be implemented using B/S and C/S structures, with higher efficiency and more mature technology.
5. Whether from the perspective of information transmission efficiency and resource consumption, or from the evolution of the nervous system, blockchain cannot become the mainstream architecture of the Internet, let alone a subversive and revolutionary leader of the future Internet.
6. Of course, Internet giants developed with B/S and C/S structures also have their problems, but these can be gradually solved through commercial and political methods in the future.
- 上一篇: 区块链删除原数据会怎么样,区块链删除原数据怎么删
- 下一篇: 一张图看懂区块链政策