区块链与信息闭环的关系,区块链与信息闭环的区别
区块链与信息闭环的关系是极其密切的,而且它们之间也有着本质的区别。本文将介绍三个相关关键词:区块链、信息闭环和去中心化。
区块链是一种分布式数据存储技术,它将数据存储在一个可信任的、可验证的、可共享的网络中。它的主要特点是去中心化、不可篡改、可验证性、可追溯性和可信任性。区块链的核心技术是密码学,它可以确保数据的安全性和完整性。它的应用可以涵盖金融、法律、医疗、电子商务等各个领域,可以有效地解决信息不安全、数据污染、信息不透明等问题。
信息闭环是一种全生命周期数据管理模式,它将数据从源头到终端实现安全、可靠的管理。它的特点是可追溯性、可审计性、可验证性、可重复性、可可靠性等。它的应用可以涵盖政府、医疗、金融、电子商务等各个领域,可以有效解决数据安全、数据污染、信息不透明等问题。
去中心化是一种分布式网络结构,它将网络中的数据和功能分布到各个节点上,而不是集中到一个中心位置。它的主要特点是安全性、可靠性、可信任性、可追溯性和可验证性。它的应用可以涵盖金融、法律、医疗、电子商务等各个领域,可以有效地解决信息不安全、数据污染、信息不透明等问题。
从以上三个关键词可以看出,区块链、信息闭环和去中心化之间的关系非常密切,它们都可以有效解决信息不安全、数据污染、信息不透明等问题。同时,它们之间也有着本质的区别,比如,区块链的核心技术是密码学,而信息闭环是一种全生命周期数据管理模式,而去中心化是一种分布式网络结构。
总之,区块链、信息闭环和去中心化之间的关系非常密切,它们都可以有效地解决信息不安全、数据污染、信息不透明等问题,但同时也有着本质的区别。因此,在实际应用中,我们应该根据实际情况,结合这三种技术的优势,来更好地解决信息安全、数据污染等问题。
请查看相关英文文档
1. Why is the integration of blockchain and privacy computing an inevitable trend?
From a larger perspective, to build a comprehensive privacy protection and governance system, not only Integrating multiple technologies such as blockchain, artificial intelligence, big data, and privacy computing also requires the combination of laws, regulations, regulatory governance, and many other strategies.
In the digital society, everyone has a stronger demand for data production factors. Whether it is user services or business marketing, a large amount of data needs to be used, especially in the distributed collaboration business model. Everyone hopes that data can flow smoothly and the value of the data can be reasonably reflected. But contrary to this, data silos still exist and the extensive use of data still needs to be solved.
At the same time, legal compliance has become the general trend. Whether domestic or international, laws and regulations related to personal information protection and data security have been promulgated one after another, which have put forward more stringent requirements for personal information protection and data security. This means that the security of data must be ensured and the privacy rights of individuals must be respected; in the entire life cycle of data, comprehensive specifications must be implemented to achieve compliant circulation.
Being user-centered, exchanging data under the premise of security and privacy, and providing high-quality and compliant services are the trends in the construction of a digital society, which require more improvements in technology, business models, and governance systems. Innovation. Initiatives such as introducing private computing into distributed systems and developing compliant data exchanges all reflect this innovative spirit.
In the field of privacy computing, blockchain, federated learning and secure multi-party computing have become three key core technologies, and these three technologies have different focuses on each other and have many overlaps and connections.
Among them, from the perspective of blockchain, we can see that on the one hand, the data on the blockchain needs to be protected by privacy algorithms; on the other hand, the blockchain can also become a privacy computing The base and hub in collaboration: Use blockchain technology to record and trace data sets, algorithm models, and calculation processes in multi-party collaboration, evaluate and reach consensus on the final results, and continuously optimize collaboration efficiency.
In the past few years, when we explored application implementation in the blockchain field, we often used blockchain to build "distributed ledgers" for business scenarios. Compliant applications will perform KYC (Know Your Client) on users and merchants, and there are many questions that need to be answered through innovative solutions such as privacy computing.
For example, can identity information be disclosed to the entire consortium chain? At the time of the transaction, are the transaction amounts and relevant parties clearly disclosed? Can the assets owned by everyone be queried at will? Can people's business practices be misused without authorization?
For example, point cards in consumption scenariosIn the coupon business, merchants usually do not want to expose their business conditions too much, such as how many users open cards, recharge, and daily turnover, etc.; individual users also do not want their consumption behavior to be publicly scrutinized.
Therefore, before the privacy issue can be completely solved, the approach we usually adopt is to introduce core authorities to participate in consensus and maintain the full ledger, while other participants are layered and sharded with different permissions. role participation. However, this increases the complexity of the system to a certain extent and affects the user experience. At the same time, it brings challenges to the scale and popularization of blockchain applications.
At present, blockchain is also commonly used in the field of government affairs, such as smart city management and various people's livelihood applications, to provide everyone with a good experience of "one-stop service", which requires multiple fields and multiple regions. , Multi-department collaboration. We can see that government affairs applications have wide coverage, many roles, and data have multiple levels of sensitivity and importance.
Blockchain can serve as a base for distributed collaboration, building a hub for data circulation through data directories, data lakes, etc., while introducing privacy computing and comprehensive governance rules to define the boundaries of data and make data While "not leaving the database", capabilities such as identity authentication, hidden query, and model construction can still be achieved.
From a larger perspective, building a comprehensive privacy protection and governance system requires not only the integration of blockchain, artificial intelligence, big data, privacy computing and other technologies, but also the integration of legal Regulations, regulatory governance and many other strategies.
Blockchain privacy protection has rich scenarios, numerous roles, diverse processes, and three-dimensional data. We can use the "double loop" mechanism for further analysis.
First of all, we start from the user side, respect the user's right to know and control the data, and leave important data to the user for management.
For example, among the "four elements" of identity verification, the user's identity credentials and contact information usually come from authoritative agencies such as governments and operators. When users have contact with a certain business scenario, they do not need Provide all plaintext information, and only need to selectively disclose some verifiable credentials to replace the plaintext.
Based on the distributed verification mechanism, multi-scenario verification can be realized to prove one's legal identity. At this time, even if the business provider does not obtain more plaintext data, it cannot refuse service. This fundamentally reduces or even eliminates the risk of leakage of users’ key privacy.
Secondly, on the business side, technologies such as federated learning and secure multi-party computing can still be used to process business data that has been authorized by users and collected in compliance with regulations.
Under the premise of the user’s informed consent, collaborative computing with partners is realized on the B-side, the data does not leave the database, and the privacy is not leaked.Exposed, but to achieve matters of important value to business operations such as risk control, marketing, advertising, etc. Ultimately, the business results are improved, which not only brings benefits to the business side, but also provides users with better services or returns on equity. Its entire value system is closed-loop, compliant and sustainable.
For example, in the Internet of Things and blockchain, on the collection side, it is necessary to assign identities and identifiers to devices, and at the same time, the algorithm must be able to de-identify and prevent leakage; on the user side, it must not only provide personalized Services must also prevent unnecessary profiling. While verifying user identities and qualifications, they must not track user behavior for no reason. Ultimately, when providing high-quality services and securely storing user data, they must respect The user's wishes, including the requirement to log out.
Such a "dual cycle system" may not only technically require iterative reconstruction of devices, APPs, and backend services, but may also produce many innovations in its business model, operational governance concepts, etc. . The entire chain will be very long, and a lot of work needs to be done, covering a vast industrial chain such as chips, hardware, networks, software, and cloud platforms.
At present, there is no single technology that can “conquer the world” and meet the requirements of “full link” and “dual circulation”. Then we might as well break down the scenario a little more, list it more comprehensively, combine some technologies and solutions, and first solve the pain points in a certain scenario.
In fact, when we communicate with many industrial application developers, they prefer to focus on specific and urgent problems and get targeted and implementable solutions, such as hiding the amount when transferring money. , scores will not be disclosed when ranking, identity will not be revealed when voting, videos will not be leaked during the KYC process, etc.
Problems in specific scenarios can often be addressed in a targeted manner based on a certain algorithm or a combination of algorithms in privacy computing. We can work hard every day to solve scenario-based problems one after another, make up for things that may have been missed before, introduce new technologies and new ideas to foreseeable rigid needs, and implement them innovatively. In this way, the data security fence will be gradually raised bit by bit, and eventually the Great Wall of data security will be built.
In distributed collaboration, many scenarios are cross-institutional and cross-network. Whether it is blockchain or privacy computing, there will be requirements to interoperate with other partners and other platforms. We see that the relevant working groups of the Academy of Information and Communications Technology are discussing a number of interconnection specifications. The core framework is to achieve "node interoperability", "resource interoperability" and "algorithm interoperability".
Node interoperability requires basic elements such as networks and protocols to be interoperable. Resource interoperability emphasizes the release and storage, addressing and use of resources, and governance and auditing (including deletion of data, offline services, etc.). At this level, everyone implements a relatively consistent view and provides a common interface.The interoperability of algorithms is very detailed and scenario-based. Each algorithm has its own characteristics. Its cryptographic foundation, operation rules, and collaboration processes will be different. In turn, the resource management qualifications and the topology of the node network will also be different. Ask for more.
On the basis of interoperability, there are also requirements such as "self-consistency", "security", and "correctness", and with the development of the field, the "scalability" of continuously adding more functions is also very important. important. In the past, everyone may have worked hard to accumulate technology and experience. In the future, when implementing it, they need to pay more attention to interfaces and specifications, open their minds, communicate and build together, and seek consensus and win-win results through open source and open methods.
To summarize, here are some thoughts on the development of privacy computing:
Third, achieve standardization and popularization to promote the large-scale implementation of new technologies and new concepts. For example, relevant industry standards and evaluation systems are of great benefit to help practitioners clarify their development paths and meet industry requirements.
After so many years of blockchain development, apart from the technology itself, the most difficult thing is actually “how to explain clearly what a blockchain is”. It is hoped that in terms of popular science promotion, the emerging privacy computing will have more new ideas and achieve better results.
Looking back at the craze of blockchain and privacy computing, we see that industry and society are calling for data security and privacy protection, and the industry has already produced many available research results and has received certain recognition. Looking into the foreseeable future, we will be more open and pragmatic, focus on users and scenarios, and explore standardized, large-scale, and sustainable application paths.
2. What are the advantages of blockchain traceability compared with other traditional traceability models?
Traditional traceability systems generally use a centralized ledger model, which is dispersed by various market participants. Recording and saving in isolation is an information island model. In the centralized ledger model, who maintains the ledger as the center becomes the key to the problem. Whether it is the source company or the channel provider, since they themselves are all stakeholders in the circulation chain, when the ledger information is not beneficial to themselves, At any time, you may choose to tamper with the ledger or falsely claim that the ledger information is lost due to technical reasons.
Under the information island model, each market participant maintains a ledger by himself. This ledger is commonly known as a ledger, and after being digitized, it was named the purchase, sale and inventory system. Whether it is a physical ledger or an electronic purchase, sale and inventory system, the owner can tamper with it or make it up at will. Blockchain's real-time reconciliation capabilities in registration and settlement scenarios, and its immutability and timestamp capabilities in data storage scenarios provide powerful tools for traceability, anti-counterfeiting, supply chain finance, and supply chain management scenarios.
Hongqiao Hi-Tech’s blockchain industry-specific application design uses the integrity and correlation of trusted transaction data to form a closed-loop self-certification capability for data on the chain. used forVerify the authenticity of digital documents and transaction records, and track the provenance of products and merchandise throughout the supply chain. This data proving product authenticity and origin is generally used by businesses and financial institutions in the assessment and processing of credit and loans.
3. What is blockchain? Blockchain explanation
1. Blockchain is a term in the field of information technology. In essence, it is a shared database, and the data or information stored in it has the characteristics of "unforgeable", "full traces left", "traceable", "open and transparent" and "collectively maintained". Based on these characteristics, blockchain technology has laid a solid foundation of "trust" and created a reliable "cooperation" mechanism, which has broad application prospects.
2. In recent years, the world's attitude towards Bitcoin has been ups and downs, but blockchain technology, one of the underlying technologies of Bitcoin, has received increasing attention. In the formation process of Bitcoin, blocks are storage units one by one, recording all communication information of each block node within a certain period of time. Each block is linked through random hashing (also called a hash algorithm). The latter block contains the hash value of the previous block. As the exchange of information expands, one block follows another, The result is called a blockchain.
4. What is blockchain
Blockchain is a term in the field of information technology. In essence, it is a shared database, and the data or information stored in it has the characteristics of "unforgeable", "full traces left", "traceable", "open and transparent" and "collectively maintained".
Based on these characteristics, blockchain technology has laid a solid foundation of "trust", created a reliable "cooperation" mechanism, and has broad application prospects.
From a technological perspective, blockchain involves many scientific and technical issues such as mathematics, cryptography, Internet and computer programming. From an application perspective, simply put, blockchain is a distributed shared ledger and database.
Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Blockchain is an important concept of Bitcoin. It is essentially a decentralized database.
At the same time, as the underlying technology of Bitcoin, it is a series of data blocks generated using cryptographic methods. Each data block contains a batch of Bitcoin network transaction information, which is used to verify its Validity of information (anti-counterfeiting) and generation of the next block.
In fact, the word blockchain does not appear in the original English version of the Bitcoin white paper [4], but chain of blocks is used. In the earliest Chinese translation of the Bitcoin white paper [9], chain of blocks was translated into blockchain.
5. The role of blockchain in the field of Internet of Things
To reduce operating costs, blockchain technology focuses on point-to-point direct connection.This method allows data to be passed through instead of going through the central processing unit. To reduce security risks, the core problem of IoT security lies in the lack of original mutual trust mechanism between devices. Efficient and intelligent network operation mechanism. Since the blockchain has decentralization and consensus mechanism, on the Internet of Things, cross-system data transmission will be transferred from the upper layer to the underlying blockchain.
The combination of blockchain technology and the Internet of Things can eliminate the audit and certification links between nodes, directly build a communication bridge for multiple parties, and improve network operation efficiency. At the same time, the decentralized consensus mechanism based on blockchain can also ensure the security and privacy of the Internet of Things and facilitate the transmission of real information. In view of this, blockchain and the Internet of Things will truly come together and play the strongest voice of the Internet of Everything.
Hongqiao Hi-Tech’s blockchain industry-specific application design uses the integrity and correlation of trusted transaction data to form a closed-loop self-certification capability for data on the chain. Used to verify the authenticity of digital documents and transaction records, and to track the origin of products and merchandise throughout the supply chain. This data proving product authenticity and origin is generally used by businesses and financial institutions in the assessment and processing of credit and loans.
6. Blockchain technology combined with BIM lightweight can improve the quality and efficiency of the entire construction process
The informatization of the construction industry is an important part of the development strategy of the construction industry. The inevitable requirements for transforming development methods, improving quality and efficiency, and saving energy and reducing emissions are of great significance to the green development of the construction industry and improving the quality of people's lives.
On July 3, 2020, the Ministry of Housing and Urban-Rural Development, in accelerating the upgrading of construction industrialization, requested to accelerate the coordinated development of new generation information technology and construction industrialization technology , increase the integration and innovative application of new technologies such as Building Information Modeling (BIM), the Internet, the Internet of Things, big data, cloud computing, mobile communications, artificial intelligence, and blockchain throughout the entire construction process.
In recent years, BIM models have become increasingly widely used in the construction industry, but collaboration still exists in practical applications. Problems include low credibility, low information transmission efficiency, low data storage security, and inability to interoperate engineering quantity data.
Blockchain technology has the characteristics of distributed storage, anti-tampering, decentralization, etc., and can achieve close collaboration between various units and solve cross-border problems. Dilemmas of organizational collaboration.
In the engineering and construction industry, the effective combination of blockchain technology and BIM technology can make the entire process management and settlement more intuitive and efficient.
Transparent construction provides project managers/supervisors with blockchain-based technologyA transparent and trustworthy engineering command system based on the technology of "work certification + real-life supervision + BIM" improves management efficiency and meets regulatory requirements.
Transparent construction is based on the decentralized and distributed ledger characteristics of blockchain technology. Units are integrated into the system, information silos are broken down, and trusted collaboration is established.
Transparent construction associates construction process information with BIM models in real time. BIM engineers can continuously improve the model during transparent construction, work collaboratively, and transparently share engineering construction information with all parties in the project in real time.
Transparent construction forms a virtuous closed loop through fully transparent process collaboration and efficient BIM collaboration. "Blockchain + BIM" makes the construction process highly visible, provides supervision services for project management, and improves efficiency in engineering construction.
During the project construction process, the BIM model can be regarded as a contractual element between the parties involved in the project. , that is, the construction of the actual building needs to be consistent with the BIM design model.
The construction process deviates from the BIM model:
The construction party or supervision unit can require the construction party to stop construction and make rectifications according to the original design of the BIM model and repair.
There are conflicts or errors in the BIM model:
The construction party can propose changes and confirm them by re-improving the BIM model.
Each participating unit can record the progress of the construction site, quality and safety issues, process inspections and various inspections in real time through the mobile terminal, and associate it with In the module corresponding to the BIM model.
Transparent construction of "blockchain + BIM" makes progress updates transparent and the growth of the building visible. Let all participating parties have a clear understanding of the project progress and improve the quality of management.
During the project construction process, each participating party will generate a variety of independent data and collaborative data. Transparent Construction integrates and analyzes these data from multiple dimensions such as "progress, quality, safety, cost, environmental protection, and low carbon" to provide project management/supervisors with an information model + real-life process tracking engineering command system to facilitate project management. Command and Control.
Project command screen
In addition, Transparent Construction collects and statistically analyzes credible data during the construction process to form digital value and data assets to help participating companies enjoy inclusive financial services.
The builder/supervisor can trace specific issues through the BIM model and compare the actual construction situation with the BIM model. Model comparison and quick verification.
The system will provide early warnings for conflict problems, speed up the efficiency of problem rectification, and improve the overall project construction efficiency.
Transparent construction integrates advanced technologies such as on-site monitoring, VR, and drone aerial photography to enhance collaboration among all parties. Efficiency, visual management of on-site quality and safety.
The person in charge of each participating unit passed the transparent construction The system's lightweight BIM function enables in-depth process collaboration, allowing every data transaction to be confirmed on the chain.
Transparent construction provides the person in charge with a visualized BIM model. Data such as phased project quantities and material cutting tracking can be viewed in the system, and the project can be set up. Key milestones in the construction process, assisting owners to efficiently manage project node budgets.
Anchor
Set
By setting milestones Associated with the BIM model, a series of "smart contracts" are formed. Scenario certificates, safety quality records, project documents, image progress and other process data published in the system can all become the basis for transparent settlement of project quantities.
7. How to use blockchain in new retail
First, use Blockchain technology connects the supply chains of different commodity circulation participants with the blockchain storage system. These include origins, manufacturers, distributors, retailers, brands and consumers. Make each participant's information viewable in the blockchain system.
Secondly, the operators of the blockchain alliance chain are roughly divided into the following categories: alliance chain, automation, visualization, data efficiency, cross-chain bridging. Each link has a complete set of operating mechanisms, and the data chain information has Comprehensive, automated, open, efficient and rationaland linkage.
This operation and management mechanism is more scientific and rational. Especially in the food industry, taking beef as an example, through the unique traceability code of the purchased beef, consumers can clearly understand the authenticity of the purchased beef and the full traceability information, which greatly enhances trust. At the same time, big data public opinion helps companies carry out smart marketing activities such as brand cultural promotion to maximize the benefits of companies and consumers.
Finally, based on the fact that the retail industry naturally has the remarkable characteristics of fragmented transaction data, diversified transaction nodes, and complicated transaction networks, the collection, storage, and integration of information on commodity production, circulation, and delivery are the end-to-end retail supply chain. The core proposition of management.
Hongqiao Technology uses blockchain to replace the paper model in the existing cross-border trade process. Through the integrity and correlation of trusted transaction data, it forms a closed-loop self-certification capability for data on the chain. Improve the document review speed and process operation efficiency in cross-border trade. Customs can directly manage the entire process of cross-border trade, review the transaction process in real time, and quickly and accurately analyze and control risks.
8. What is the current status of the integrated development of blockchain and other new-generation information technologies?
To be effective in the real economy and other fields, blockchain needs to be integrated with other new-generation information technologies. , to achieve complementary advantages and functions. Currently, the integrated development of blockchain, industrial Internet, big data, cloud computing, artificial intelligence, etc. is still in its early stages, and the effects of integrated applications need to be further activated.
The "Guiding Opinions" proposes to apply blockchain technology to identification analysis, edge computing, collaborative manufacturing and other aspects of the Industrial Internet to cultivate new models and new business formats; build a regional-based The big data service platform of the blockchain promotes data compliance and orderly confirmation, sharing and circulation; uses cloud computing to build a blockchain application development, testing verification and operation and maintenance environment; develops new technologies such as smart contracts based on artificial intelligence, Explore the use of artificial intelligence technology to improve blockchain operating efficiency and value creation capabilities.
The Xueshuo Innovation Blockchain Technology Workstation under Lianqiao Education Online is the only approved "Smart Learning Factory 2020- Xueshuo Innovation Workstation" launched by the School Planning and Construction Development Center of the Ministry of Education of China. "Blockchain Technology Professional" pilot workstation. The professional position is based on providing students with diversified growth paths, promoting the reform of the training model integrating professional degree research, production, and research, and building an applied and compound talent training system.
9. How to promote blockchain technology to increase efficiency of data security
The advantages of blockchain in information security are based on the software blockchain technology laboratory Its own development experience and technical characteristics are summarized in the following aspects: 1. Use a highly redundant database to ensure the data integrity of information; 2. Use relevant principles of cryptography to verify data to ensure that it cannot be tampered with; 3. Use multiple methods in authority management. Private key rules control access rights.
Blockchain is decentralized and distributed. Blockchain technology is open and transparent. Currently, there is no effective method to deal with it.Manage data security. In fact, data projects have limited control over personal data. During data transfer, the project cannot control how it is used later. And through the use of cryptocurrencies, blockchain provides financial incentives for institutions that maintain the network. Blockchain provides a secure storage and management of information, including personal data.
Establish a cross-regional and cross-industry data sharing platform that can be open to the entire society, strengthen data security legislation, and gradually increase the introduction of artificial intelligence and blockchain technology to promote big data and artificial intelligence, The integration of new technologies such as blockchain improves the ability to perceive, predict, and prevent risk factors.
- 上一篇: 5g+区块链,5g和区块链结合的项目
- 下一篇: 区块链语言,区块链 开发语言