为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

牡丹航空区块链的利益计算公式

发布时间:2023-12-05-21:35:00 来源:网络 区块链知识 区块   牡丹   计算公式

牡丹航空区块链的利益计算公式

随着科技的发展,区块链技术也逐渐成为行业中的一种新兴技术。牡丹航空也不例外,它在区块链领域开发出了一套利益计算公式,以提高其服务水平和客户体验。

牡丹航空的利益计算公式是基于区块链技术开发的,它可以帮助航空公司更好地管理客户关系,提高客户满意度,改善客户服务水平。牡丹航空的利益计算公式在收集和分析客户反馈信息,以及客户消费行为数据方面发挥着重要作用。

牡丹航空的利益计算公式可以帮助航空公司更好地识别客户需求,从而更有针对性地提供服务。它可以帮助航空公司更好地分析客户行为,从而更精准地推出折扣和促销活动,以提高客户满意度。

此外,牡丹航空的利益计算公式还可以帮助航空公司更好地处理客户投诉,提高客户服务水平。它可以帮助航空公司更有效地管理客户关系,从而更好地满足客户的需求,提高客户满意度。

总之,牡丹航空的利益计算公式是一种基于区块链技术的创新解决方案,它可以帮助航空公司更好地管理客户关系,提高客户满意度,改善客户服务水平。它的出现将为航空公司带来更多的机遇和挑战,从而实现更高的客户满意度和更高的服务水平。


请查看相关英文文档

㈠Which blockchain game is the most profitable?

Better blockchain games include: Link Pocket, Gold Nugget Chain, Lianxing, Mining Chain, etc.

NO.1: LinkToken
The blockchain software officially produced by Xunlei has a large platform and a large number of users. From the birth of LinkToken in 2017, LinkToken has been used as an incentive tool in the shared computing ecosystem. On the one hand, it serves as a proof of work for shared computing resources to reward users and exchange for goods related to shared computing resources in closed scenarios or service; on the other hand, as proof of consumption of shared computing resources, merchants give it back to users in closed scenarios. Specifically, merchants use LinkToken to obtain idle computing resources contributed by users, and users use LinkToken to redeem shared computing-related products and services, such as video website membership privilege services, network acceleration services, cloud storage services, shared content services, Game content services, etc.
NO.2: Gold Nugget Chain
Blockchain technology + Xianxia Intelligent Retail Terminal shared entrepreneurial platform provides open, fair, transparent and non-tamperable entrepreneurial opportunities for sharing partners. Gold Nugget Chain GBT follows the route of China's local innovation. All blockchain development technologies and applications are completed through the cooperation of domestic technical teams. In the current development of global blockchain dominated by the West, it retains the power of Eastern wisdom and sunshine.
Gold Nugget Chain GBT will adhere more to research based on global blockchain development technology and application. On the basis of obtaining the business scope of industrial and commercial registration for blockchain development technology and application, the company will join hands with the World Digital Central Bank The cooperation has been recognized by consular sovereign countries including 165 countries, laying a solid foundation for the development of GBT international blockchain.
NO.3: Lianxing
A professional trading platform for global digital investors, real offline company registration. Founded in 2016, Lianxing is a digital asset trading platform independently operated and developed by Bilin Network Technology Co., Ltd. The main purpose of creating Lianxing is to become a platform where everyone can trade digital assets.
With the purpose of providing professional asset management solutions for circulating high-quality digital assets issued on the blockchain such as Bitcoin and Ethereum, it relies on its own strong strength and jointly develops special trading indicators with a number of companies.
NO.4: Mining Chain
The software of Mining Chain Network focuses on the blockchain industry and builds a media service platform for Mining Chain Flash News and Mining Chain Index through big data. Shanghai Dilian Technology Co., Ltd. was established on December 14, 2017. The WT system of Dilian.com can bring the most direct benefits to users. Based on the completion of daily tasks, users can obtain corresponding mining power values, and these values ​​​​are gathered into the mining power pool generated by users every day, and are finally calculated according to a fixed and unchangeable formula to obtain the final WT accumulation to in the user account.
The core section of the Mining Chain Network - the Mining Chain Index, uses 45 dimensions of data to provide a complete analysis of a currency. It has its own big data algorithm that integrates and analyzes data from thousands of currencies and hundreds of exchanges toChain mining index, mining index, manipulated index, short investment index, etc. provide users with the most valuable comprehensive index analysis.
NO.5: ChainDD
A professional blockchain platform under Titanium Media Group, big data analyzes comprehensive market information. ChainDD, owned by Titanium Media Group, is the most authoritative and professional blockchain information and data rating platform. It provides a full range of blockchain content and data services from industry headlines, in-depth insights, lightning news, real-time market conditions, in-depth project dismantling and other dimensions, allowing you to understand the real blockchain world in one stop.
ChainDD has upgraded from a blockchain media information product to a blockchain financial data and information product dominated by market conditions and blockchain application databases. A new version of the ChainDD App Android version has been launched.
NO.6: Coin World
Digital currency investment world is committed to making investment decisions simpler. Beijing Bishijie Network Technology Co., Ltd. was established on August 28, 2017. Bishijie provides real-time price information of digital currencies such as Bitcoin and blockchain, allowing users to quickly obtain the market price information of Bitcoin and blockchain.
In addition to leading industry information, it also has a social + personalized currency circle and real-time market quotations with intelligent tracking. It has become the product with the largest number of users in China and South Korea. The English version of Coin World has landed in the European and American markets, and products for markets such as Southeast Asia are also in preparation.
NO.7: Babbitt
One of the earliest Bitcoin platforms in China, promoting the development and innovation of blockchain in China. Founded in 2011, Babbitt is the earliest blockchain information community portal in China, providing information, communication, investment and financing services to blockchain entrepreneurs and investors. Openness is our breadth, neutrality is our attitude, and sensitivity is our depth. We welcome all discussions and debates on blockchain technology. Currently, more than 200 blockchain opinion leaders and researchers are stationed on the platform.
The platform gathers blockchain technology and application trendsetters. It has now developed into an ecosystem platform that integrates information content, offline activities, training, incubators, investment and blockchain technology implementation. The entire network covers more than 1 million users in mainland China, South Korea, Japan, the United States, Hong Kong and other countries and regions.
NO.8: Kuailian Planet
Covers diverse participants in the blockchain world, creates a node-based content system, and builds a more complete blockchain ecosystem based on the distribution structure. Keda Group Co., Ltd., a subsidiary of Kuailian Planet, gathers the top industry leaders to provide the fastest and most professional blockchain information, market trends, and project evaluation blockchain portal content platforms. By providing professional and valuable Information services, building a node-based value ecosystem around industry leaders. At the same time, through the complete blockchain encryption storage technology reward system, value contributor reward system and various blockchain technology reward systems, Kuailian Planet will build a complete data value ecology. Diverse user data and content data truly release the fair value of data assets on the platform.
NO.9: NetEase Planet
The blockchain-based ecosystem launched by NetEase FinanceA value sharing platform that manages user digital assets through blockchain encrypted storage technology. NetEase Planet helps you manage digital assets through blockchain encrypted storage technology, making your data truly yours. Each of us is producing useful behaviors all the time. Credit data, attention, and Internet traces are all important personal data assets, including social interaction, entertainment, shopping, travel, etc., and these assets have not been used in the past. Be valued by individuals.
Now Planet Base builds your identity as a planet resident, helps you discover your own value, and enables the value of personal information to be reflected fairly and equitably. The purpose of Planet Base: Let value contributors participate in value sharing.
NO.10: Huobi
Shareholders of many world-renowned companies such as Apple and Alibaba invest to provide trading and investment services in digital products. Since the establishment of Huobi Global in 2013, the cumulative transaction volume of the Huobi platform has exceeded US$1 trillion, and it once became the world's largest digital asset trading platform, accounting for 50% of the world's digital asset trading share. It has successively acquired ZhenFund and Sequoia Capital. invest. Currently, Huobi Group has invested in more than 10 upstream and downstream companies, and has completed the establishment of compliance service teams in Singapore, the United States, Japan, South Korea, Hong Kong, Thailand, Australia and other countries and regions, serving more than 130 countries around the world. It provides safe and trustworthy digital asset trading and asset management services to millions of users.

Is the combination of blockchain and privacy computing an inevitable trend?

Is the combination of blockchain and privacy computing an inevitable trend?

Our current thinking framework on this issue is: if it is not combined with privacy computing technology, will the application of blockchain technology be limited and unable to develop forward; if it is not combined with blockchain technology, privacy will Are computing technologies limited and unable to move forward? If both are necessary for each other, then the trend of their combination is inevitable.

The following is our thinking on this issue:

1. Is the application of privacy computing technology a rigid need for blockchain technology?

Blockchain technology has huge Advantages, but without privacy computing technology, the application of blockchain technology will be greatly limited, because the privacy protection problem of data on the chain cannot be solved, which makes a large number of scenarios involving sensitive data reluctant to apply blockchain technology, such as finance and medical fields.

(1) Limitations of blockchain technology

First, the data on the chain is open and transparent, and the compliance processing and privacy protection capabilities of data are insufficient. Blockchain serves as a distributed ledger. Although the openness and transparency of the system and data are conducive to evidence storage and tamper-proofing, there is also the risk that the data can be easily copied and personal privacy leaked. The blockchain requires different nodes on the public chain to verify and maintain transactions and transaction status to form a consensus, so each participant can have a complete data backup and all transaction data is open and transparent. If you know a participant's account, it is easy toIt is easy to obtain each of their transaction records, and thus infer their social identity, property status, etc. Taking the consumption scenario as an example, there are barriers to competition between platforms, and users also want to retain consumer privacy. Therefore, the blockchain lacks the ability to protect user flow, logistics information, marketing information and other data related to corporate and personal privacy, which often results in data The owner is unwilling to let the data enter circulation. Transactions in the on-chain system are no longer controlled by the central ledger. Users use a unique private key to conduct transactions. The transaction process is encrypted and the data before encryption is difficult to restore. Only using the private key as a transaction voucher makes transactions within the blockchain Become more anonymous and uncontrollable. On a distributed ledger system, all transfers are made in the form of addresses. Once financial crimes such as fraud or money laundering occur, even if the address can be publicly queried, it is extremely difficult to track the funds, and the private key is difficult to prove as a transaction voucher. Because of the identity of the user, many companies and individuals conduct illegal transactions such as money laundering through the blockchain, which is not conducive to the compliance processing and legal sharing of data.

Second, insufficient data processing capabilities restrict the further implementation and commercial expansion of the technology. On-chain computing is limited by the performance of network consensus, making it difficult for on-chain transactions to be real-time and efficient. Blockchain The computing power of smart contracts needs to be expanded. Taking Bitcoin, the largest encrypted payment system, as an example, it can only process about 3 to 7 transactions per second5, and the validity of the current transactions is affected by network transmission. It often takes about 10 minutes of accounting cycle to process. Nodes on the network collectively know the contents of the transaction. In addition, if there are two or more nodes on the chain competing for accounting rights at the same time, you will need to wait for the next accounting cycle to confirm the accuracy of the transaction. Ultimately, the chain with the longest block and the most accounting content will complete the confirmation. .

The fully decentralized system has insufficient compatibility with most existing systems in reality, and lacks systems and functions for on-chain and off-chain collaboration and multi-business development, which restricts the further implementation of blockchain technology. In the process of blockchain technology implementation, first of all, each industry itself has a mature system, and the completely decentralized form of blockchain may not be suitable for all fields and industries; secondly, the platform design and actual operating costs of blockchain Huge, its low efficiency and delayed transaction flaws are very obvious. Whether it can make up for the loss of the replacement of the original system requires a certain amount of actuarial calculation and comparison; in addition, using blockchain to store data requires sorting out the original data format. When it comes to sensitive data in the fields of government affairs and justice, it is even more necessary to establish a trusted channel linking online and offline data to prevent data entry errors, which brings high human and material costs.

(2) The help of privacy computing technology to blockchain technology

Privacy computing technology ensures that data is generated, perceived, released, and disseminated to storage, processing, use, and destruction. Privacy in the life cycle process makes up for the privacy protection capabilities of blockchain technology and realizes the "availability" of data."invisible". By introducing privacy computing technology, the user's income and expenditure information, address information and other personal data are presented in the form of cipher text. During the data sharing process on the platform, it can not only prevent data leakage, but also protect the user's personal information. The security of privacy is conducive to further breaking the data island effect and promoting multi-party data collaboration on a larger scale. Privacy computing technology can form a technical combination with blockchain technology to improve data processing capabilities and expand the scope of application. Privacy computing technology can Standardized processing of data can improve the efficiency of data processing and data sharing, and improve the data processing capabilities of the blockchain. In addition, the technology combination of privacy computing technology + blockchain technology can be applied to sensitive data that lacks a centralized system. Share areas of cooperation with strong demand and expand the application scenarios of blockchain technology.

Is the application of blockchain technology a rigid need for privacy computing technology?

(1) What is privacy computing technology? Limitations

First, data sharing lacks security inspection, which restricts the credibility of data circulation

The entire process of data sharing involves collection, transmission, storage, analysis, release, and accounting Privacy computing mainly solves the problem of "available and invisible" data in the whole process, but it is difficult to ensure that the data source is trustworthy and the calculation process is trustworthy.

From the perspective of trustworthy data source , In the data collection process, the data content itself may be incomplete, and there may be errors in data entry; in the data transmission process, the data transmission may be attacked by other clients, resulting in data leakage during the transmission process; In the data storage process, the person who stores the data may tamper with the data or copy the data and sell it to the black market. These will not be recorded by privacy computing technology. If the identity of the data sharing parties cannot be guaranteed to be "credibly verified", It may lead to data privacy that is “unworthy of its name.” From the perspective of trustworthiness of the calculation process, during the data analysis and release process, the data sharing party may privately tamper with the data’s running results and release content, and may affect the final data processing results. Forgery. Therefore, once the information is verified and added to the privacy computing environment, it is difficult to find whether the data has been tampered with or leaked, and it is difficult to prevent data fraud at different points in time. When it comes to finance, government affairs, In key fields such as medical care and charity, if the data is incorrect, it will be difficult to pursue a series of legal issues.

Second, the overall business level is uneven, which restricts the expansion of the technology platform

< p> Currently, the technical implementation paths of privacy computing are mainly divided into three types: multi-party secure computing, federated learning, and TEE trusted execution environment. The three technical paths have their own application flaws and problems. Due to the mastery of technology by different companies in the industry Limited capabilities and R&D capabilities result in a limited practical application scope of the technology platform and insufficient scalability.

Multi-party secure computing is doneAlthough it has complex and high-standard cryptographic knowledge, its computing performance has the disadvantage of low efficiency in the actual application process. As the scale of applications expands, adopting appropriate computing solutions to ensure linear changes in computing latency and the number of participants is a major challenge currently faced by technology manufacturers. Although multi-party secure computing can ensure the privacy and security of multiple parties during data fusion calculation, other technical means still need to be matched to prevent data leakage and tampering in data access, control, transmission and other aspects.

The current applications of federated learning technology in the industry usually use third-party platforms as the basic model, and privacy calculations are performed on top of the basic model. Such a basic model itself has the hidden danger of being implanted with viruses by developers. In addition, the federated learning mechanism defaults to all participants being trusted parties and cannot prevent a certain participant from maliciously providing false data or even corrupted data, thereby causing irreversible harm to the final training model. Since federated learning requires each participating node to perform calculations, the computing power and network connection status of the nodes will limit the communication efficiency of federated learning.

The core hardware technology of TEE Trusted Execution Environment in China is currently controlled by a few foreign core suppliers such as Intel, Qualcomm, and ARM. If purchased from abroad in key areas, there will be very high security risks and applications. risk. Third, data sharing lacks an authority confirmation mechanism. Applied privacy computing that restricts data circulation uses data from multiple parties to jointly calculate and produce results. However, in the actual cooperation process, due to the different business levels and data quality of each data sharing party, It is difficult to achieve reasonable confirmation of ownership in every aspect of data processing.

According to the conventional profit distribution mechanism, data owners with high-quality data and high achievement contribution rates should obtain more profits from it. However, privacy calculations only take into account the "availability and invisibility" of the data. It is difficult for the sharing party to judge from the final result whose data has contributed the most to the results, resulting in unfair distribution of benefits. If there is a lack of reasonable achievement contribution evaluation mechanism and benefit distribution mechanism, it will be difficult to motivate data owners and other data holders to cooperate. Especially in the scenario of distrustful multi-party cooperation, the trust cost of cooperation will be further increased, making multi-party collaboration difficult to achieve and restricting the practical application of data circulation.

(2) The help of blockchain technology to privacy computing technology

Blockchain technology records all aspects of data circulation and all participants to realize the data sharing process. Clearly defined powers and responsibilities enhance the credibility of data circulation. In the data transmission process, the blockchain records the data provider and confirms the authenticity and validity of the data provider's identity, which is conducive to the confirmation of data rights and provides a reference for a fair and feasible benefit distribution mechanism; in the data storage process, the district Blockchain ensures that every modification of data is traceable and prevents malicious tampering of data. Blockchain technology can be used as the underlying platform for privacy computing technology, ensuring that encrypted dataThe true validity of the data itself improves the credibility of data circulation in the privacy computing platform and expands the application scope of privacy computing technology.

3. Conclusion

The integration of privacy computing technology and blockchain technology is an inevitable trend. For the circulation of data assets, without privacy computing, the security and privacy protection issues of the data itself cannot be solved; without blockchain, the issue of data confirmation and data network collaboration on a larger scale cannot be solved. Combining blockchain and privacy computing to build a large-scale data circulation network has become a consensus exploration direction in current practice.

What will change when the combination of blockchain and privacy computing changes?

1. Formation of a large-scale data circulation network and data element market

Currently, there are three problems in data circulation: data protection and data confirmation of data owners are difficult to achieve; different sources The cost of data integration and processing is too high and there is a lack of unified standards; the distribution mechanism of data benefits is imperfect.

As mentioned above, the combination of blockchain and privacy computing technology can solve the problem of privacy protection on the one hand, and the problem of data confirmation and multi-party collaboration on the other hand, thereby establishing a large-scale data circulation network.

On the basis of the establishment of a large-scale data circulation network, a real data factor market can be formed, and the value of data as a production factor can be fully explored.

2. Promote the development of data assetization

The so-called assets refer to those formed by past transactions or events of an enterprise, owned or controlled by the enterprise, and expected to bring consequences to the enterprise resources of economic benefit.

The capitalization of data is to allow data to find value in the market, which can create new economic benefits for enterprises.

The formation of large-scale data circulation networks and data element markets will greatly promote the discovery of data value and the development of data assetization.

From the perspective of the enterprise, the data accumulated in the enterprise's production and operation activities will become valuable assets. On the one hand, the analysis and application of these data will push companies to improve their own business; on the other hand, sharing data with external organizations can promote greater value from the data, and the company itself will gain more benefits from it. . This will in turn further promote the digital transformation of enterprises and the management of data assets. In the future, the inventory of data assets may become the company's "fourth statement" in addition to the balance sheet, cash flow statement, and income statement.

The development of data assetization will also promote the formation of a new service system around data value mining. This includes data confirmation, pricing, transactions and other aspects. Ding Botao, deputy director of the Information Institute of the Shanghai Academy of Social Sciences, divided the institutions in the future data asset service system into four categories:

FirstThe class provides intermediary services, including data brokers, and data brokers.

The second category provides data assessment. Due to information asymmetry or information confusion in the data market, it is necessary to provide compliance assessment, data quality and data price assessment.

The third category is consulting service companies that provide price consulting, such as legal and economic consulting or listing guidance.

The fourth category provides professional technical services, including data development, data processing services, data delivery services, etc. The development of data assetization will bring about the improvement of people's cognition, the improvement of production efficiency, the reorganization of production factors, the generation of innovation, economic development and the improvement of the overall welfare of the whole society.

3. Changes to existing business formats

The combination of blockchain and privacy computing will increase the enthusiasm of enterprises and individuals to share and utilize data, and further promote the breaking of "data silos" ". Its changes to the existing business format are mainly reflected in the following aspects:

First, it will bring new data and technological changes.

First of all, this will promote the arrival of the era of data density. The core of the era of dense data is a huge change in the way data is circulated and used. Data will flow and be calculated between subjects in a dense form, significantly reducing the risk of data leakage and supporting the development of various forms of business under the premise of compliance. Previously, data was encrypted and could only be used for transmission or storage, but in the future, data can be calculated in an encrypted state. This will bring about a series of new problems and challenges, triggering chain reactions in many related technical fields.

Second, this will reshape the big data industry. As data circulation becomes more secure, previously sensitive data areas are gradually opening up. Taking government data as an example, privacy computing makes it possible to model and analyze data from multiple parties such as governments, enterprises, banks, etc., further releasing the value of data application and creating diverse application opportunities.

Third, the artificial intelligence industry will receive a new round of development. Data, algorithms and computing power are the three elements for the development of artificial intelligence. In recent years, the development of artificial intelligence has encountered a bottleneck due to a lack of available data. In the future, the development of 5G and the Internet of Things will make everything interconnected and the amount of data will increase significantly. The application of blockchain + privacy computing technology can enable artificial intelligence to use massive data to optimize models and truly move towards "intelligence". Fourth, this will bring new opportunities for the development of the blockchain industry. The combination of blockchain and privacy computing will expand the number of nodes in the alliance chain, thereby further expanding the scope of data resources that can be used collaboratively.

Second, based on technological changes, the combination of blockchain and privacy computing will bring changes to many traditional industries.

In the field of government affairs, on the one hand, it can realize interconnection and data sharing between different government departments, thereby promoting collaboration between different government departments and improving government efficiency and decision-making quality., to promote the construction of smart cities; on the other hand, it can promote the two-way opening of government data and private data. Government data is open to society and can be used by businesses or academia to release more value. Opening private data sources to the government can improve the efficiency of government decision-making and government affairs processes.

In the financial field, various fields such as payment, credit reporting, credit, and securities asset management will undergo changes as a result. Overall, it mainly affects the two aspects of financial risk control and marketing. The combination of blockchain and privacy computing technology can expand data sources, including using Internet data outside the financial system, to achieve multi-party data sharing and joint modeling, while complying with legal regulations and not leaking the original data of all parties, thereby effectively Identifying credit ratings and reducing risks such as long credit and fraud will also help with the accurate pricing of financial products such as credit and insurance. Similarly, the sharing and integration of internal and external multi-party data will also help improve the anti-money laundering screening capabilities of financial institutions.

In the medical field, in the future, in many fields such as disease treatment, drug research, and medical insurance, blockchain and privacy computing can promote the construction of medical informatization and bring about huge changes. In terms of disease treatment and drug research, the combination of blockchain and private computing can promote more medical data to be combined for analysis and research, thereby bringing new breakthroughs in the treatment of many diseases. In terms of medical insurance, the combination of blockchain and privacy computing technology can mainly allow insurance companies to apply more data, improve the design, pricing, and marketing of insurance products, and even promote insurance companies' health management of customers.

The combination of blockchain and privacy computing technology is currently mainly used in government affairs, finance, and medical fields. However, in the future, its application will not only be limited to these three fields, but will also be used in more fields. Play a role.

Third, data rights and interests will be redistributed.

This may be the most core and profound change brought about by the combination of blockchain and privacy computing technology, and is closely related to everyone’s vital interests.

First of all, this involves the redistribution of interests among different links in each industrial chain.

Take the aforementioned application in the field of advertising and marketing as an example. Previously, the distribution of benefits in advertising and marketing was mainly between advertisers and channel providers. However, in the future, the application of blockchain and privacy computing technology will enable data collaboration on a larger scale. This will require solving the problem of multi-party data collaboration among advertisers, multiple channels, and consumers, which involves multiple parties. division of powers and responsibilities and redistribution of interests.

Secondly, this also involves the redistribution of interests between enterprises and individuals.

One of the important rights and interests of users involved in the EU's GDPR, the US's CCPA and other bills is "portability". That is, third-party applications cannot block individuals.According to statistics, once an individual has a request to download, the APP needs to provide a convenient API to facilitate the individual to copy the data. American companies have gradually provided APIs to users. If there is a lack of functionality in this area, individual customers can file lawsuits, and the company will also face huge fines. China's "Personal Information Protection Law" also has relevant provisions. Article 45 of the "Personal Information Protection Law" stipulates that "individuals have the right to access and copy their personal information from personal information processors" and "if individuals request to access or copy their personal information, the personal information processor shall provide it in a timely manner. Individuals To request the transfer of personal information to its designated personal information processor, if it meets the conditions specified by the national cyberspace department, the personal information processor should provide a way for the transfer."

At present, the blockchain+ of Chinese companies The exploration of privacy computing is mainly focused on the To B service field, but blockchain is a global business. If such a model has emerged in the United States, China will most likely not be completely unaffected. With the improvement of consumer-level software and hardware technology capabilities, the combination of blockchain and privacy computing technology will gradually transform data services between individuals and institutions. For individual users, they will have the opportunity to gain complete control over their own private data and obtain stronger technical guarantees for the data privacy requirements involved in the data business process. Currently, the domestic industry is still discussing issues related to To C services.

Why has the application of blockchain + privacy computing not been widely popularized yet?

First, the practical application of blockchain + privacy computing mainly involves situations that require multi-party data collaboration, and the actual demand has not yet exploded.

From the perspective of the development of privacy computing technology, privacy computing is still in the early stages of implementation. It mainly solves the problem of data collaboration between two parties. There are not many scenarios involving multiple parties, so in many cases The need for blockchain + privacy computing applications has not yet been realized.

From the perspective of blockchain technology development, the application of blockchain technology in many fields is not currently strictly needed. Many problems can be solved using blockchain, but they can also be solved without blockchain technology, and the cost of applying blockchain technology to solve them is higher. Therefore, the current construction of blockchain projects is mainly driven by government departments and large enterprises. This is because the government and large enterprises consider long-term development and can make forward-looking investment construction and technology layout, but most commercial institutions need to weigh Input and output.

The combination of blockchain technology and privacy computing technology is mainly used to deal with data collaboration issues. From the perspective of data governance, most organizations are currently dealing with their own internal data governance issues. After the internal data system is sorted out, data collaboration with external parties is involved, so it still takes time.

Second, the implementation of blockchain + privacy computing is more complex, involving the creation of new business models, rights and responsibilities, andThe redistribution of benefits therefore takes longer.

Take the implementation of applications in the field of advertising and marketing as an example. Most of the current applications are only implemented on the privacy computing platform, mainly involving data collaboration between two parties, directly applying privacy computing technology, and continuing previous commercial applications. . However, if blockchain technology is introduced, the problem of multi-party data collaboration among advertisers, channels, and consumers must be solved, which may involve the division of rights and responsibilities among multiple parties, the redistribution of interests, and the development of new business models. Formation takes time to explore.

What problems still need to be solved for the large-scale popularization of applications?

Before the application of blockchain + privacy computing can be rolled out on a large scale, three conditions need to be met:

First, from the perspective of the external environment, it requires the whole society as a whole The improvement of digitalization level. For example, blockchain + privacy computing will form a highway for data circulation in the future, but there must be enough cars on the road. At present, the digitalization of the whole society is advancing rapidly. Most institutions are carrying out their own internal data governance. They need to process their own data first before they can have more needs for collaboration with external data. This will take time. .

Second, from the perspective of technological development, investment is still needed to mature the technology. The application of blockchain + privacy computing technology actually sacrifices the efficiency of data circulation and improves security. However, the efficiency of data circulation is also very important. In the future, a certain balance needs to be formed between efficiency and security. Security It must be guaranteed and sufficient efficiency must be met, which involves the research and development of many technologies, the formulation of industry standards, the development and improvement of technology productization, and the further reduction of technology costs, which will take time.

Third, the improvement of relevant laws and regulations and the formation of data transaction business models are also needed. However, compared with the first two conditions, this condition is relatively less important at present. Because as demand explodes and technology improves, relevant laws, regulations, and business models will be formed. This condition is not the most critical factor limiting the application of blockchain and privacy computing technology at this stage.

What other trends are hidden in the application of blockchain + privacy computing?

1. The trend of localization

The application of blockchain + privacy computing involves network security and data security, and will become an important part of new infrastructure in the future. This is an important aspect related to cyberspace sovereignty, national security and future development interests, so localization in this field is the future trend.

In the localization of blockchain + privacy computing technology applications, the localization of software is relatively easy to achieve. The difficulty lies in the localization of hardware, and the most difficult part is the localization of chips.

The development of this part is related to the development of the information and innovation field. Xinchuang,That is the information technology application innovation industry, which is the foundation of data security and network security, and is also an important part of new infrastructure. The industries involved in Xinchuang include IT infrastructure: CPU chips, servers, storage, switches, routers, various clouds and related services; basic software: databases, operating systems, middleware; application software: OA, ERP, office software , government affairs applications, streaming version signing software; information security: border security products, terminal security products, etc.

In the field of blockchain + privacy computing, some companies are already trying to localize their products. For example, as mentioned earlier, Ant Chain has developed its own password cards, privacy computing hardware and self-developed trusted chain chips, and also launched the Moss privacy computing all-in-one machine. Startup companies such as Nebula Clustar and Rongshu Lianzhi are also conducting research and development of related localized hardware products.

2. The trend of combining software and hardware technologies and integrating more technologies

At present, in the practice of combining blockchain and privacy computing technology, software and hardware technologies have also emerged. The trend of combining hardware technology and integrating more technologies. This is mainly due to several needs:

First, it is the need to strengthen data security.

Privacy computing mainly solves the problem of data not being leaked during the calculation process. Blockchain mainly solves the problem of certificate storage. The combination of the two can only solve part of the problem of data security. From generation to calculation to death, data will involve multiple links such as collection, transmission, storage, calculation, and destruction. Its life cycle may last for decades. To truly ensure data security, a more comprehensive system is needed. A standardized solution so that each link has a corresponding technical system to ensure data security. In the data collection stage, the device trust architecture needs to be carefully designed, in the network transmission stage, security protocols need to be rationally used, and in the storage stage, both encryption and performance need to be taken into consideration. , In the data calculation stage, it is necessary to flexibly choose trusted execution environments and dense state operations. In addition, the trustworthiness and security of the computing environment are also crucial in building defense in depth. The technical map of these security assurance capabilities will involve trusted computing, software and hardware supply chain security, isolation technology, transparent encryption of network and storage, key management, trusted execution environment, etc. Each of these technical points has room for the combination of software and hardware and the integration of multiple technologies.

Second, there is the need to improve computing performance.

The performance of privacy computing is currently relatively low, and it exists at three levels: stand-alone computers, between stand-alone computers, and between computer clusters.

On a single computer, privacy computing uses cryptography technology, and the calculation process involves many encryption and decryption steps, which increases the amount of calculation geometrically. Taking the fully homomorphic algorithm as an example, the speed of ciphertext operations on general-purpose chips is 100,000 times slower than plaintext operations. This means that doing the same operation if using the fullThe homomorphic algorithm, on Intel's latest Icelake processor, has the same performance as Intel's first-generation 8086 processor, which is a direct step back for decades. This makes fully homomorphic encryption unusable in real situations. Computational power issues are also the fundamental reason why fully homomorphic algorithms have not been widely used.

Between stand-alone computers and between computer clusters, communication efficiency issues between stand-alone computers and between clusters will be involved. On the one hand, mainstream privacy computing technology, whether it is federated learning or multi-party secure computing, has communication problems. The expansion of ciphertext and transmission times will cause network transmission efficiency between single machines to become one of the bottlenecks of privacy computing. On the other hand, since most private computing scenarios span multiple parties, and multiple parties need to communicate through the public network, there is currently a huge gap in the bandwidth and latency of the public network.

Performance problems will become more and more serious as time goes by. In 2021, the implementation of privacy computing is still in a very early stage. It is mainly applied within some institutions or between two or three parties. The amount of data processed is small, and this problem is not yet obvious. However, in the future, the arrival of multi-party data exchange requirements and the rapid increase in data volume brought about by the development of 5G and the Internet of Things will ultimately lead to explosive growth in data volume, which requires a large amount of computing power.

By then, the performance of privacy computing will face huge challenges. We are now in a golden age of architecture in terms of hardware innovation. This is because the rapid development of mobile Internet has led to the rapid development of application scenarios and the rapid development of upper-level software. This has caused the hardware and even chips that support the bottom layer of the computer to need to be changed accordingly, entering a new round of innovation cycle. .

From the perspective of the long-term development of the combination of blockchain and privacy computing, the combination of software and hardware and the integration of multiple technologies can improve performance, security and computing effects for privacy computing; for blockchain In other words, it can encourage more institutions to join the alliance chain at low cost and expand the application scope of the alliance chain.

END

Editor | Lingluyuan

Source | Zero One Finance "Blockchain + Privacy Computing Frontline Practice Report (2022)"

< p>㈢ Briefly explain what blockchain is

Blockchain is a term in the field of information technology. In essence, it is a shared database, and the data or information stored in it has the characteristics of "unforgeable", "full traces left", "traceable", "open and transparent" and "collectively maintained". Based on these characteristics, blockchain technology has laid a solid foundation of "trust" and created a reliable "cooperation" mechanism, which has broad application prospects.

On January 10, 2019, the Cyberspace Administration of China issued the "Blockchain Information Service Management Regulations". October 2019On the 24th, during the 18th collective study session of the Political Bureau of the Central Committee, General Secretary Xi Jinping emphasized that “blockchain should be used as an important breakthrough for independent innovation of core technologies” and “accelerate the development of blockchain technology and industrial innovation.” "Blockchain" has entered the public eye and become the focus of society.

On December 2, 2019, the word was selected into the top ten buzzwords of 2019 by "Biwenqiezi".

(3) Extended reading of the benefit calculation formula of Peony Airlines blockchain:

Blockchain financial application:

2016 Since the beginning of the year, major financial giants have also taken notice and launched blockchain innovation projects one after another to explore the possibility of applying blockchain technology in various financial scenarios. In particular, Puyin Group took the lead in pioneering the “blockchain+” standard digital currency.

The standard digital currency is an asset that has been identified, evaluated, confirmed, insured, etc. by a third-party organization and written into the blockchain through rigorous digital algorithms to form a standard correspondence between the asset and the digital currency. relationship, called a standard digital currency.

In order to realize the great leap forward development of blockchain finance, in order to promote the new development of China's economy, accelerate the circulation of global assets, and realize the dream of rejuvenation that generations of people have been striving for, Puyin Group will Puyin Blockchain Finance Guiyang Strategy Release Ceremony was held in Guizhou on the 9th;

At the meeting, the digital circulation of assets through blockchain, the blockchain financial transaction model, and the relationship between blockchain services and blockchain services will be discussed. The application of social public industries will be discussed. This conference will mark the beginning of the application of blockchain finance and the transformation and development of a new financial ecosystem.

Is Future Coin a scam? There is a virtual currency transaction that earns profits from online investment called Future Coin. It is done

Hello! Futurecoin is the second generation of decentralized virtual currency, released on November 24, 2013. Its market capitalization ranks third, behind Bitcoin and Litecoin. Any virtual currency itself will not create value. The result of speculation is that some people will make money and some people will lose money. Therefore, there is no need to waste money and waste time in such unreliable virtual currency games. Instead of hoping to make money in virtual currencies, it is better to choose something in the real economy that you are familiar with and good at. That is the real way to make money. thanks for reading!

㈤ Chairman of Peony Airlines ~ Xu Ganggu Yong is a big liar, defrauding thousands of people, even disabled people, losing all their money, and some becoming homeless

High-return investment and financial management companies are all scammers. Scammers will make the company look real. Nowadays, the editing and special effects are very advanced, and it is easy to forge documents. Everything you see may be forged.

㈥ my country’s digital economy ranks second in the world. What is the digital economy?

The core of the digital economy is computing, which uses blockchain to reorganize the industrial chain and value of economic development. chain, that is, value calculation and benefit sharing. Digitization and business digitalizationThere are essential differences between them. The nature of the digital economy. The essence of the digital economy is value calculation and profit sharing. The essence of the digital economy is computing. The calculation is not the price of the product, but the value of the person. Product prices and profits in the digital age are getting lower and lower, but the Internet has infinitely expanded the value of products and people, linked production and consumption to establish new production relations, calculated the value of people digitally, and made profits based on Rationalization of earnings. Distribution of value to people’s contributions! The essence of the digital economy is sharing and benefit sharing rather than capital monopoly. In the era of traditional economy and Internet economy, capital monopolizes the right to distribute profits. In the digital age, new production relations and productivity are decapitalized and decommercialized, allowing producers and consumers to share product profits without any middlemen making a difference.

The basic technology of the digital economy is blockchain. The Internet is the carrier of the digital economy, and blockchain technology is the foundation of the digital economy. Blockchain is not a digital currency, let alone Bitcoin Air Currency. Digital currency is just an application of blockchain technology in the financial field.

㈦ What does blockchain mining mean?

In 2009, Satoshi Nakamoto invented Bitcoin and set a limit of only 21 million Bitcoins to be added to the Bitcoin network. , by participating in the production of blocks and providing proof of work (PoW), you can obtain rewards from the Bitcoin network. This process is mining.

The concept of "mining" is taken from the existing concepts in our real economic life, such as gold mining, silver mining, etc. Because minerals are valuable, people are driven to pay labor force. dig.

Another important point of Bitcoin mining is that the miners participating in mining recognize the value of Bitcoin, and there are people in the market who are willing to spend money on the Bitcoins they mine. So, Bitcoin mining makes sense.



(7) Extended reading on the benefit calculation formula of Peony Airlines blockchain

Bitcoin’s currency characteristics

1. Decentralization

Bitcoin is the first distributed virtual currency. The entire network is composed of users. There is no central bank. Decentralization is the guarantee of Bitcoin’s security and freedom.

2. Circulation around the world

Bitcoin can be managed on any computer connected to the Internet. Anyone can mine, buy, sell or receive Bitcoin regardless of location.

3. Exclusive ownership

Manipulating Bitcoin requires a private key, which can be isolated and stored in any storage medium. No one can obtain it except the user himself.

4. Low transaction fees

Bitcoins can be remitted for free, but a transaction fee of about 1 bit cent will ultimately be charged for each transaction to ensure faster transaction execution.

5. No hidden costs

As a means of payment from A to B, Bitcoin has noCumbersome quota and procedure restrictions. You can make the payment by knowing the other party's Bitcoin address.

6. Cross-platform mining

Users can explore the computing capabilities of different hardware on many platforms.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 35082 文章总数
  • 3637265访问次数
  • 3077建站天数