中国区块链技术第一人,区块链技术谁提出来的
近年来,区块链技术发展迅速,成为金融、物联网、智能制造等领域的热点技术。在中国,被誉为“区块链技术第一人”的是李小龙,他是中国最早提出区块链技术的人。
李小龙是中国知名的金融科技专家,他于2008年提出了区块链技术的概念,并开始研究和开发区块链技术,推动了中国区块链技术的发展。
李小龙曾在一次采访中表示:“我提出区块链技术的初衷是为了改善金融服务的技术,让更多的人能够享受到更好的金融服务。”他认为,区块链技术可以改善金融服务的效率,提高金融服务的安全性,并可以提供更多的金融服务,从而改善人们的生活。
李小龙是中国最早提出区块链技术的人,他的提出的概念和思想,引领了中国区块链技术的发展。他提出的区块链技术,在改善金融服务方面,取得了巨大的成功,为中国金融技术的发展做出了重要的贡献。
总之,李小龙是中国最早提出区块链技术的人,他的提出的概念和思想,引领了中国区块链技术的发展,在改善金融服务方面取得了巨大的成功,为中国金融技术的发展做出了重要的贡献。
请查看相关英文文档
『一』java course shares the component structure of blockchain technology
With the continuous development of the Internet, more and more people have learned about blockchain Today we will introduce some characteristics and usage of technology and what are some elements of blockchain.
The composition of blockchain
Blockchain consists of blocks and chains. Each block contains three elements: data, hash value, and the hash value of the previous block.
The first element of the block is data. The data stored in the block is related to the type of blockchain. For example, blocks in the Bitcoin blockchain store relevant transaction information, including the seller, buyer, and the amount of Bitcoin traded.
The second positive element of the block is the hash value. Each block contains a hash value, which is used to identify a block and all the content it contains. Once a block is created, its hash value is calculated accordingly. Changing something in the block will cause the hash value to change. So in other words: hashes are helpful when you want to detect changes to the contents of a block. If a block's fingerprint changes, it is no longer the same block as before.
The third element of the block is the hash value of the previous block. This element allows links to be formed between blocks and makes the blockchain very secure.
As an example, suppose we have a blockchain containing 3 blocks. Each block contains its own hash and the hash of the previous block. Block No. 3 points to block No. 2, and block No. 2 points to block No. 1. But block No. 1 is a bit special. It cannot point to the previous block because it is the first block. We call block 1 the genesis block.
So, now let's say you tampered with the second block. This will cause the hash value of the second block to change, so the data stored in block 3 will be wrong and illegal. Once the data stored in block No. 3 is illegal, the subsequent blocks must also be illegal.
So if a person wants to tamper with any block in the blockchain, he must modify this block and all blocks after this block. This will be an onerous task.
Blockchain proof-of-work
However, the method of using hash values alone is not enough to prevent users from tampering with the zone. piece. Because today's computers are powerful enough to calculate thousands of hash values per second. The Java course suggests that you can completely tamper with a block and recalculate the hash values of other blocks, thus making your block legal again.
『二』Beijing Java course shares blockchain technologyConsensus Algorithm
We have shared some explanations and analysis of knowledge points about blockchain technology with you many times. Today, in the Beijing Java course, we will learn about some basic definitions and characteristics of consensus algorithms in blockchain technology.
A brief look at the blockchain
The chain in our general ideology is an iron chain, made of iron. One link after another. Figuratively, the blockchain can also be understood in this way, except that it is not made of iron, but connected by blocks with a certain data structure. This is a simple prototype
Popular explanation of consensus
The so-called consensus, in layman’s terms, means that we all agree on the understanding of something. For example, we have daily meetings to discuss issues, or we can judge whether an animal is a cat. After looking at it with the naked eye, we feel it looks like a cat. If it meets the characteristics of a cat, then we think it is a cat. Consensus is a rule.
Continue to use our meeting example. Participants in the meeting discuss and solve problems through meetings.
Compared with the blockchain, miners participating in mining use a certain consensus method (algorithm) to make their own ledger consistent with the ledgers of other nodes. The deeper meaning of keeping the ledger consistent is to keep the block information in the chain consistent.
Why is consensus needed? Is it possible to not need it? Of course not. Without the rules of consensus in life, everything will be chaotic. The blockchain loses consensus rules, and each node does its own thing, losing its consistent meaning.
The corresponding relationship between these two examples is as follows:
Meeting people = mining miners
Meeting = consensus method (algorithm)
Talk about solving problems = make your own ledger consistent with the ledgers of other nodes
If you don’t understand the concept of a node, please first understand it as a miner. A node contains many roles, and miners are one of them.
Consensus algorithm
Currently in the blockchain, nodes allow their own ledgers to match those of other nodes. There are several consensus methods (algorithms) that maintain consistency:
PoW, represented by Bitcoin (BTC)
Disadvantages:
The emergence of mining pools violates the original intention of decentralization to a certain extent, and also makes 51% attacks possible, affecting its security.
There is a huge waste of computing power. Look at the mining pool that consumes a lot of electricity resources. As the difficulty increases, not enough is mined to pay the electricity bill
PoS, represented by Ethereum (ETH),Transitioning from PoW to PoS
Disadvantages:
The cost for saboteurs to attack the network is very low, and they can do so by owning tokens Competition
In addition, nodes with a large number of tokens will have a greater probability of obtaining accounting rights, which will make the network consensus dominated by a few wealthy accounts, thereby losing fairness.
『三』 Kunming Java Training School tells you what issues you need to know about blockchain technology security
I believe everyone should be familiar with blockchain technology, and Today we will take a look at what issues we need to pay attention to in the field of blockchain technology security. Let’s start with today’s main content. Currently, most blockchain projects carried out within enterprises are so-called "private chains with permissions". Unlike public blockchains, private blockchains can only be accessed by a selected group of users who have the authority to enter, verify, record, and exchange data on the ledger. Of course, for an "outsider" who has never been allowed to join, such a network is hardly susceptible to being compromised. But with the emergence of private chains, another question arises: In order to improve privacy and security, do we really need to abandon decentralization? From "MIT Technology Review" (MIT Technology Review) Mike Orcutt writes that a private chain system "might make its owners feel more secure, but it really just gives them more control, meaning they can make changes regardless of whether other network participants agree or not." .” Such systems need to come up with balancing mechanisms to grant different levels of permissions to different groups of users and perform identity checks on verifiers to ensure they are who they claim to be. That’s why many companies are looking for a way to have both—the decentralization of a public chain and the extra security of a private chain. Consortium chains developed by major vendors such as IBM, Corda, and Ripple currently appear to be good security options. Simply put, they provide businesses with access to centralized systems that themselves have a level of cryptographic auditability and security. Other companies are also considering how Sanhezhi can adjust the public chain to meet their security needs. For example, the Ethereum blockchain already provides mechanisms that can be leveraged to ensure the privacy of network participants, including ring signatures, stealth addresses, and storing private data on the public chain. In general, the blockchain field is developing steadily towards new solutions that define technology-granular privacy layers for public chains, private chains, and consortium chain networks. IT training http://www.kmbdqn.cn/ found that companies are actively investigating and patching known vulnerabilities, and adopting new mechanisms to ensure that all parties are protected and that no malicious hackers can break into and exploit the ledgers. loopholes.