为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

创世区块链科技有限公司,创世区块链是什么

发布时间:2023-12-06-00:51:00 来源:网络 区块链知识 区块   mesh   创世

创世区块链科技有限公司,创世区块链是什么

近年来,随着科技的发展,区块链技术已经成为了一种极具有潜力的技术,在金融、信息安全、医疗、政府等领域都有着广泛的应用。而创世区块链科技有限公司(以下简称“创世区块链”)正是一家以区块链技术为核心,专注于区块链技术应用及创新的科技公司。

首先,创世区块链以区块链技术为核心,致力于推动区块链技术的发展和普及。其致力于建立一个安全、可信、高效、稳定的区块链应用生态系统,以满足用户的不同需求。其致力于提供以太坊应用开发、智能合约开发、DApp开发、区块链技术咨询、区块链技术解决方案等服务,以满足不同行业的实际需求。

其次,创世区块链致力于推动区块链技术的创新及应用。其以最先进的技术为基础,不断探索区块链技术的新应用,并不断完善技术体系,以满足用户的不同需求。其已经开发出多款区块链应用,如分布式身份认证系统、分布式数据库系统、分布式计算系统等,为不同行业的实际应用提供了技术支持。

此外,创世区块链还致力于构建一个安全、可信、高效、稳定的区块链应用生态系统。其以安全性、可信性、高效性、稳定性为核心,以满足用户的不同需求,不断推动区块链技术的发展和普及。

总之,创世区块链科技有限公司是一家以区块链技术为核心,致力于推动区块链技术的发展和普及的科技公司。其致力于提供以太坊应用开发、智能合约开发、DApp开发、区块链技术咨询、区块链技术解决方案等服务,以满足不同行业的实际需求,并致力于构建一个安全、可信、高效、稳定的区块链应用生态系统。创世区块链将继续努力,致力于推动区块链技术的发展和普及,为用户提供更为优质的服务。


请查看相关英文文档

① 2 geeks, 6 patents, 4 scopes and 10 specific scenarios, understand the origin and prospects of INE technology in one article

About Wireless Mesh Network (WMN) technology


Wireless Mesh network is developed from wireless Ad-hoc network.

Ad-hoc network is a multi-hop, centerless, self-organizing wireless network, also known as Multi-hop Network. The entire network has no fixed infrastructure. Each Nodes are mobile and can dynamically maintain contact with other nodes.

In order to achieve the goal of ubiquitous communication in wireless communications, it is necessary to develop a wireless multi-hop network technology that is fully suitable for civilian communications based on the technical foundation of Ad-hoc, Wireless Mesh Network Technology (WMN) ) appears.

Wireless Mesh network technology was initially widely used in the military. As a mesh topology, WMN has the characteristics of being independent of infrastructure, highly dynamic, multi-hop, automatic networking, autonomous configuration and repair. , there is no single point of failure, and if any node in the network stops working, it will not affect the operation of the entire network. The entire network has tenacious vitality and is known as the "unbreakable network."


Eight technology patents in the Mesh field


Distributed as a combination of blockchain and the Internet As a powerful enterprise in Mesh network, INE Intelligent Ecosystem not only has the most suitable token economic model for implementation, but also owns: six software copyrights and two mesh technology hardware patents in the field of Mesh mesh network; in Mesh network mobility networking It has leading advantages in the industry at home and abroad in terms of performance and key core protocol algorithms (Protocol).


The patent names of the above Mesh network software and hardware are:

Self-sufficient NexFi wireless ad hoc network protocol software [abbreviation: NexFi ad hoc network] V1.0

Self-sufficient NexFi key synchronization software [abbreviation: NexFi key] V1.0

Portable hotspot router for mobile ad hoc access

1 A configuration-free intelligent wireless self-organizing connector

A wireless Ad Hoc network congestion control mechanism based on virtual transmission protocol

An intelligent self-organizing network connection device for digital signage

The main inventors are Pei Songwen, Zhu Junfeng, and Chen Yubin, and all patents belong to Shanghai Ziqi Network Technology Co., Ltd.

Shanghai Ziqi Network Technology Co., Ltd. is affiliated to Dr. Zhu Junfeng, the chief architect of INE's intelligent ecological technology. Dr. Zhu is also the general leader of INE's Shanghai Mesh technology team.


The first meeting between Yu Rui and Dr. Zhu

The spark of two technical geeks

Raymond Xiong Xiong / Project sponsor, CEO & CTO

Master of Computer Science, California State University

Former senior consultant of Sky IT Support in Los Angeles

Engaged in data acquisition and processing systems in the United States He has worked in development and algorithm research for more than ten years, participated in the research and development of early blockchain technology, and has authoritative views on the implementation and application scenarios of blockchain technology.

Zhu Junfeng Eric Zhu Ph.D/Chief Technical Architect/Head of IntelliShare Shanghai Team

PhD in Computer Science, Fudan University

Expert Committee of Shanghai Cloud Computing Promotion Center Expert/Expert of the Open Source Committee of Shanghai Software Promotion Center/Member of the OpenStack China Community Expert Group, former Chief Engineer of Pudong Software Park. He has been engaged in technology and product research and development in the fields of communication technology and high-performance computing for more than ten years, and has published many papers in international Rank2 conferences and SCI journals.


Xiong Yurui, the founder of the INE project, returned to China to start a business after studying in the United States for 18 years. Yurui studies algorithm models in global big data. The tentacles of technical research include traditional technologies. to commercial finance, from the Internet of Things to AI, and ultimately focus on distributed networks and the blockchain token economy. Yu Rui believes that the two natural distributed forms will collide to create a scientific research project that everyone can participate in.

Driven by this concept, Yu Rui resolutely decided to return to China to start a business, and became acquainted with Dr. Zhu Junfeng, an expert in communication networks. Dr. Zhu is also an expert on the expert committee of the Shanghai Cloud Computing Promotion Center and a senior technical expert in the Mesh field. . Based on the natural distributed structure of the Mesh network, he is very optimistic about its decentralized technology and blockchain, and is excited about the INE token.He was very interested in the implementation of applications under the incentive model. As a Mesh technology supporter of INE's intelligent ecosystem, he joined the co-construction of INE and later served as the chief technical architect of INE.

Two technology geeks are determined to move the Mesh network from its current military use to large-scale civilian use, so that everyone in the future world can independently participate in the establishment and sharing of a distributed network, and gain access to The concept of income, the INE Intelligent Ecosystem (IntelliShare) that perfectly combines blockchain, came into being.


Mesh era application scenarios



When the Mesh network was born, it was used as a military communication network.

INE Mesh can be used to integrate various military service resources and assist the military in unified command and joint operations. Provide the military with temporary networking, communication command and logistics support wireless network services required for camps, exercises and wartime. Achieve unified command and coordination across different military functional units.

Using the flexible networking method of INE Mesh, the military wireless network system can have the following applications:

Full mobile networking of military vehicles

Installing wireless Mesh on military vehicles Nodes form a movable mesh ad hoc network. Used for group marches, exercises, emergencies or war needs, providing support for wireless data, wireless voice and wireless video surveillance. When vehicles move, formations change, and network topology changes, the INE Mesh structure can automatically form a network so that the network will not interrupt connections. Nodes can automatically jump to maintain the stable operation of the entire network.

Hybrid networking

Mesh network node types can be divided into two categories: fixed backbone nodes and mobile access nodes.

Fixed backbone nodes are composed of two types: one is a fixed node pre-installed at a height such as the top of a building, and the other is a mobile communication vehicle parked somewhere that acts as a fixed backbone node. Networks can be quickly built on routes that need to be passed in advance or around campsites.

Place the INE Mesh mobile access node on the vehicle and use omnidirectional antennas to perform seamless and uninterrupted voice and video transmission in a wireless network composed of fixed nodes when the vehicle is traveling at high speed.

Other wireless Mesh nodes are placed on ordinary military vehicles for mobile use. Troops can quickly build networks along pre-planned routes or around camps. When an exercise or operation begins, the established wireless Mesh backbone link can provide stable and reliable high-bandwidth wireless connections for all other mobile nodes and military terminals, allowing for uninterrupted real-time battlefield observation in the form of voice, video and data multi-services. Transmit combat information and send combat instructions.When the troops return to the camp, timely supply support can also be coordinated through the communication system.

Nowadays, driven by the digital age, the existing network system has begun to seek the supporting power of the underlying architecture to achieve global coverage of the Internet.

Under the demand of the market, Mesh network will embark on the road of commercial application, and INE, which is implemented with Mesh network, will open up distributed network applications under the trend of blockchain technology. New track.


1. Blockchain ecological network

2. Networkless communication

3. Internet of Things

4. Transportation network


It can be used in residential areas, schools, medium and large enterprises, hospitals, factories, etc.;

p>


Value 1

Regional smart management

The INE network grafts the regional Internet usage, monitoring network, security network, power network, etc. to form a smart community faster, thereby carrying out intelligent management of the people.


Value 2

Regional network security

< p> The characteristics of the INE network make the regional network difficult to be attacked by hackers, improving data security and privacy security.


Value Three

Regional Token Business Upgrade

Based on the network as the user entrance, it can not only connect internally without the Internet link provided by the operator, but also access the Internet in parallel, and customize a business operation model of exclusive Token circulation for each area, which can better support area business culture and residents.


Used for internal communications on islands, cruise ships, military, expeditions, and remote areas.


Value 1

Internal wireless communication

< p> In areas without Internet such as cruise ships and islands, the INE network is used to form an internal communication system. Connection and communication can be carried out through the INE network without the Internet.


Value 2

High communication security

In scenarios such as the military and high-confidence meetings, through the dedicated network and identity encryption established by INE's small base stations, which are physically isolated from the outside Internet, there are no security loopholes and internal leaks from remote hacker attacks.


It can be used in smart homes, smart communities, industrial automation, smart retail, smart medical care, environmental monitoring, etc.


Value 1

Lower cost

The INE network chip is implanted in Internet-connected items and will self-organize the network, eliminating the network traffic consumption expenses of operators for purchasing Internet of Things equipment. At the same time, compared with wired IoT, wireless does not require wiring costs.


Value 2

Node online

INE network chips can be quickly embedded into various intelligent terminal devices to meet high-quality network requirements under the Internet of Things and ensure that each "node" in the Internet of Things network is always online.


Value three

Smart monitoring system

Monitor IoT infrastructure, transmit measurement, monitoring and analysis data, handle problems in real time, update data, and maintain high interactivity between people and smart devices.


Value Four

Helping smart cities

Maintain a high degree of interaction and connectivity between people, people and things, and things and things in intelligent systems, create a smart city nervous system, bring the digital world into every device, every person, every home, every organization, and create digitalization City.


It can be used in in-vehicle networks, public transportation, car rental systems, etc.


Value 1

Public transportation network

In urban public transportation networks, INE Mesh can customize dedicated channels for local Internet of Vehicles to realize functions such as free dispatching of vehicles, traffic accident warnings, and road traffic information query.


Value 2

Private communication network

Replace the calling machine used by self-driving tours, group convoys, etc.and other functions, directly connecting cars to realize communication and positioning.

Wind farm Power pipeline Ferry reservoir

Construction site Oil exploration Forest fire prevention

Scenic cableway Smart ocean Emergency rescue

Intelligent hardware


More application scenarios...


01

Petroleum Industry

Supports petroleum in special working conditions without network In exploration and development, and field construction, Mesh technology can be used to freely organize and build networks for instant communication, data transmission, and security management.


02

Ferry Reservoir

INE The Mesh monitoring system can monitor reservoir data and form a ferry communication network to solve ship dispatching and maritime communication problems.


03

Scenic Ropeway

Pass Fixed monitoring points (INE Mesh monitoring equipment) and mobile monitoring points (drones embedded with INE Mesh chips) inspect dangerous areas.


04

Construction site

to INE Mesh chips are grafted onto sensors and monitoring systems to monitor construction sites, which will greatly improve safety warnings.


05

Ocean of Wisdom

In The Ocean Development Zone has set up an INE Mesh wiring-free network system to solve the problems of difficult offshore wiring and poor networks in edge areas.


06

Emergency Rescue

INE Mesh self-organizing modules quickly form a communication network in disaster areas, enabling instant communication, improving search and rescue efficiency, and saving lives.


07

Wind farm

Each wind power generation equipment is used as a Mesh node to transmit power data in real time, consisting of Dedicated network for wind farms.


08

Intelligent Hardware

INE Mesh chips or self-organizing network modules are connected to wireless charging equipment and mobile phones. Every smart hardware can be a mobile network operator.


09

Forest fire prevention

In Several Mesh monitoring nodes are set up throughout the forest to monitor the forest at any time and take immediate measures to reduce losses when a fire alarm is detected.


10

Electrical pipelines

Will The INE Mesh wireless network technology module is installed in the maintenance worker's AR instrument to quickly restore the city's power and shorten the maintenance cycle.

In the Internet era, the diverse demands for networks have become increasingly prominent in the digital trend, and distributed Mesh network technology has begun its implementation process. The Mesh network of INE's intelligent ecosystem combined with blockchain technology will create a different exclusive network ecology with strong team and technical support, opening a new track in a new era of distributed shared networks.

② Won the GBLS Global Blockchain Annual Technology Value Application Award, INE Wan Ruicheng was invited to attend the roundtable forum


INE is highly recognized by the industry


On January 6, 2019, GBLS Global Sleepless Blockchain Industry Leader 2018 The year-end ceremony was held grandly in Hangzhou, Zhejiang. As an outstanding project party, INE Zhilian Ecosystem won the GBLS Global Blockchain Annual Technology Value Application Award. Project co-founder Wan Ruicheng was invited to attend the roundtable forum.


Representative Wan Ruicheng (third from right), co-founder of INE, came to the stage to receive the award


INE co-founder Wan Ruicheng (first from the right) took the stage to receive the award on behalf of others


INE co-founder Wan Ruicheng (first from the left) was invited to attend the round table Forum


INE co-founder Wan Ruicheng (first from left) was invited to attend the roundtable forum


< p> INE co-founder Wan Ruicheng’s roundtable forum representative’s speech


GBLS authoritative evaluation system

< /p>


GBLS has always been known as the "King of All Meetings" in the blockchain industry. This GBLS 2018 year-end ceremony was also unprecedentedly popular, with 1,128 industry figures attending , 22,810 people participated in the exhibition, which aims to select companies and practitioners who have made outstanding contributions to the blockchain industry in the past year, give high-quality projects a stage to showcase, and promote the healthy development of the blockchain industry.

The selection criteria are comprehensively carried out from multiple dimensions such as product, community, technology, application, investment, etc., gathering 100 top expert think tanks and 1,000 blockchain industry leaders to formulate the authoritative evaluation of the GBLS Blockchain Value Index System, create the first value evaluation system "PBTI model" in the blockchain, and define the value vane of the entire blockchain ecosystem.

GBLS Global Sleepless Blockchain Industry Leaders 2018 Year-End Ceremony

GBLS Global Sleepless Blockchain Industry Leaders 2018 Year-End Ceremony Outstanding Project


Where does the application of technological value come from?


INE IntelliShare is very honored to be recorded in this GBLS year-end ceremony as an outstanding project with application value. With a weight of 30% expert review, 15% industry leader review, 15% media review, and 40% public review, INE has been highly recognized by the industry, and the application of INE technology is highly feasible and necessary.

In the comprehensive multi-faceted evaluation of GBLS, there are many awards. Why does INE win the Global Blockchain Annual Technology Value Application Award?


1. Existing network requirements


01

Military network is in urgent demand


Mesh network was applied to wireless access network in 2002 First of all, its point-to-multipoint network topology can solve problems such as network-free communication, fast mobile communication, real-time communication, and information confidentiality in military scenarios.

INE Mesh can be used to integrate various military service resources and assist the military in unified command and joint operations. Provide the military with temporary networking, communication command and logistics support wireless network services required for camps, exercises and wartime. Achieve unified command and coordination across different military functional units.


02

Private network for civilian use


The first application of wireless mesh networks was in community access networks. In Japan, Nankoku City has used Mesh networks to connect 13 elementary schools, 4 middle schools, and 18 municipal buildings. In Finland, Nokia's wireless router products can be installed on rooftops and have been favored by more than 50 operators.

At present, most domestic users are deploying Mesh networks. The application solutions involve wireless cities, intelligent transportation, manufacturing and energy, public safety, medical and health, education, residential areas and hotels, temporary networks, etc. etc., the application scenarios are extremely broad. The INE Mesh network has been tested in hotels, public security, temporary networking, manufacturing and energy. The network connection is very smooth, and monitoring is convenient and free of lags.


03

World network-free communication

Network-free communication actually covers two levels, one is internal communication in network-free areas, and the other is communication within the world There is a huge market demand for building communication systems in areas without Internet access.

According to surveys, in countries or regions with relatively backward economic development (especially the third world), 57% of the world's people (about 4 billion people) do not have access to the Internet, and are in a completely "no network" situation. "status. 50% of the population already has access to the Internet, but the remaining 50% have long and difficult access to the Internet. In these countries or regions, it is impossible to complete the construction of expensive wired network infrastructure. In contrast, the main goal of wireless Mesh networks is to achieve "last mile" broadband access and provide high-speed data coverage with lower network deployment and maintenance costs.

As of the end of December 2018, INE has signed a strategic cooperation agreement with the Philippines, which symbolizes that the third world countries represented by the Philippines will have a huge market for the INE Mesh network.


2. Potential network blue ocean


Wireless Mesh network is also called "community" "Wireless Network" has become a new, cheap and efficient network structure solution for realizing the next generation of wireless Internet.

AI, Internet of Things, AR sensors, 5G and other technologies spawned in the digital era, as well as the decentralized technology of blockchain, are calling for a more diversified network system, thereby solving the traditional network system’s impact on technology. development constraints.

Kaixiang Zhang, chief architect of WeBank, believes that distributed network is an important implementable application project in the blockchain industry. The current blockchain development is mainly concentrated in the financial industry, and there is huge space in decentralized networks.


3. Already leading the implementation of blockchain distributed network


01

Launched IPFS mining machine

INE has reached a strategic cooperation with Zhongke Huichen, a smart mining equipment hardware manufacturer. In terms of the distributed storage system mining machine IPFS, the distributed network, that is, the technological combination of Mesh, has been opened up. The first phase of 100,000 IPFS+Mesh concept mining machines has been delivered gradually since October 2018.


02

Floor-standing wireless charging

INE and Dianzan Technology - its terminal scenarios have signed contracts with 7-Eleven, Family, etc.In the first-tier convenience stores in China, wireless charging hardware embedded with Mesh network technology modules has entered the mass production period.


03

Implementing smart communities

INE has signed a strategic cooperation agreement with Shawei Community in Futian District, Shenzhen, and will use the INE Mesh network as the underlying network system to build smart communities. The community consensus has designated 40 residential buildings as pilot projects for INE Mesh equipment.


04

Unique landing scene

At the Qingdao Shanghai Cooperation Organization Summit in 2018, we solved the data security and network connection problems at the conference site, ensured the security of the surrounding monitoring network, and prevented the leakage of confidential data.

In 2018, the WPMF World Professional Muay Thai Federation provided information diversion and outfield network security monitoring services for venues in the Chinese competition area, providing real-time control at the event site to prevent emergencies when crowds of people are crowded and take timely measures.


05

Implement traditional physical factory

INE has signed a strategic cooperation agreement with Henan Nanyang Niannian Food Co., Ltd. Based on the Mesh network, it will create the integration of blockchain industry + traditional physical industry and build a blockchain distributed network factory; and based on the blockchain spirit, create a distributed business system.


06

Landing in the Third World

The IntelliShare Foundation signed a strategic cooperation agreement with the Philippine ASYA Pacific Foundation, Asian Premier Institution, and Malayan Pacific Power Holdings Corporation (MPPH). INE Mesh technology will support the IoT network and network security of the Philippine petroleum industry, the low-cost network coverage and emergency network of the Philippine communications industry, and the island network ecology of the Philippine Islands.


Landing is just the beginning


For blockchain projects, implementation is just the beginning, and the ecosystem that is constantly built based on this is the most important part.

This ecology must have technical support, perfectly integrate the blockchain’s token economic model, be feasible for implementation, and have a broad market. Adhering to this philosophy and original intention, INEEven in the bear market, Zhilian Ecology still forges ahead and gathers the consensus of all members of the community to wait for the dawn and tomorrow.


③ Does anyone know about the smartmesh project?

The SmartMesh project is a blockchain-based underlying protocol for the Internet of Things that enables intelligent Mobile phones, smart devices and other protocols can connect to each other without the Internet. SmartMesh has built-in blockchain light nodes and expands blockchain secondary architecture network protocols such as lightning and thunder to realize network-free micropayments of tokens. Based on the incentives of blockchain tokens, SmartMesh can self-organize to form a flexible, decentralized, self-healing Mesh Network, providing higher near-field speed and bandwidth than the Internet, and it is usually free. SmartMesh allows blockchain to break through the boundaries of the Internet and enter the era of IoT and IoE.

④ What are the applications of blockchain in real life

(1) Qulian

The underlying platform of Qulian blockchain is developed by Qulian Technology The domestic independent controllable blockchain underlying platform features high performance, high availability, scalability, easy operation and maintenance, strong privacy protection, hybrid storage and other features, and cooperates with the data sharing and secure computing platform BitXMesh and the blockchain open service platform FiLoop, supply chain finance platform FiloLink, certification service platform FiloInk, and smart contract security research and development platform MeshSec can better support industry applications such as enterprises, governments, and industry alliances, and promote value among multiple institutions. Efficient circulation.

(2) JD Chain

JDChain is an enterprise-level blockchain underlying framework independently developed by JD.com. Its birth marks the full launch of JD.com’s blockchain-based BaaS The construction of the "intelligent ecology" of the platform and the underlying chain of "JDChain". JD Zhizhen Chain Service Platform relies on the "one-click deployment" capability achieved through multiple optimizations to achieve leading second-level blockchain node deployment. In addition, it also has the core advantage of being open and compatible with mature applications such as multiple underlying and enterprise-level dynamic networking. The timely launch of JD Zhizhen Chain will effectively promote the large-scale implementation of enterprise-level blockchain applications in various industries and promote the construction of China and the global trust economy.

(3) Thunder Chain

ThunderChain is a blockchain application project independently developed by Xunlei’s Netcenter Technology. It has high concurrency of one million tps and second-level confirmation capabilities. . Based on the research and development of high-performance blockchain products, Xunlei has built the Xunlei Chain open platform to help enterprises or individual developers deploy smart contracts and easily implement products and services on the chain, making blockchain application development more convenient.

(4) Jingtong Chain

Jingtong Blockchain is the core underlying technology of the blockchain with independent intellectual property rights of Jingtong Technology. It is built based on blockchain technology. Effective decentralized mutual sharingThe ecological Internet trading network adopts a hierarchical design (5 layers) of the underlying platform and a multi-language smart contract system, and has implemented cross-chain functions. It has multi-level, all-round, one-stop service capabilities such as private chain, cloud chain, and alliance chain, and the layout of the industry and regional ecology has initially taken shape.

In addition to the above-mentioned blockchain products, there are also community-led LTC, Cosmos, IOTA, Nervos, NULS, MOAC, etc., and enterprise-led Ripple, Stellar, WeChat BCOS, XuperChain, Huawei, and Ping An , Wanxiang, Ant Financial, ZhongAn, Bubi, Matrix Yuan, Miyuan, Zhongxianbit, Complex Beauty, Shanghai Lianjing and many other blockchain products.

(4) Extended reading of Genesis mesh blockchain:

Blockchain is far more than just a technology, and it involves The spirit of "multi-party collaboration". In modern society, many things must rely on everyone's cooperation to achieve the effect of 1+1>2, but in cooperation, we need to try our best to avoid problems such as "information asymmetry."

Therefore, alliance members jointly keep accounts, share data, and make everything public to eliminate "information asymmetry" to protect everyone's interests and allow the business environment to develop healthily. If you do things honestly, you will get the benefits you deserve. If you cheat, it will be known to everyone and criticized by thousands of people. Technology is the foundation that helps realize this model. This is the more important "blockchain thinking".

⑤ What is the technical principle of INE, MESH network?

A distributed network based on the underlying ecology of the blockchain that combines blockchain and MESH network.

⑥ What are the development prospects of VR

Main listed companies in the Yuanverse industry: Currently, listed companies related to the domestic Yuanverse industry include Tencent, Internet, Zhongqingbao, Silk Road Vision, etc.

The core data of this article: Summary of policies related to China’s Metaverse industry, the number of trademark applications for China’s Metaverse, the development history of China’s Metaverse, and the layout of representative enterprises in China’s Metaverse industry

Both Facebook and Microsoft Expressing focus on the metaverse field

Since the first shares of the metaverse were listed on the New York Stock Exchange in 2021, the layout of major companies in the metaverse field has appeared in the technology circle and the public eye. In July 2021, Facebook announced its entry into the Metaverse. On October 28, 2021, Facebook founder Zuckerberg said he would change Facebook's company name to Meta and demote Facebook's eponymous service to one of the company's subsidiaries, alongside Instagram and WhatsApp, rather than the overall brand . Then in November 2021, Microsoft announced at the Ignite conference that it would launch a new Mesh
for Microsoft
Teams software. After the platform is launched, people in different geographical locations can collaborate.and shared holographic experiences, allowing you to join virtual meetings, send chats, collaborate on shared documents, and more. The representative events of the global Metaverse industry in 2021 are as follows:

The Metaverse: Gradually constructed with the development of blockchain technology

The Metaverse is gradually constructed with the maturity of blockchain technology constructed. In the blockchain 1.0 era, it is mainly embodied in the form of distributed ledgers and decentralized networks, with the goal of realizing currency decentralization and payment methods. With the emergence of Ethereum, the era of Blockchain 2.0 has arrived. Blockchain 2.0 is the technical implementation of blockchain in finance and smart contracts. Later, decentralized applications and decentralized finance emerged, promoting greater industrial reform. The emergence of the NFT industry has brought innovation to the DeFi field. At the same time, NFT, as the underlying structure of the Metaverse, will be the key to the future development of the Metaverse.

According to the "Metaverse Token", the six supporting technologies of the Metaverse are blockchain technology, interactive technology, electronic game technology, artificial intelligence technology, network and computing technology, and Internet of Things technology. Among them, blockchain technologies such as NFT, DeFi, public chain speed, smart contracts, DAO social system, decentralized exchanges, and distributed storage are the most important technologies supporting the economic system of the Metaverse.

The domestic metaverse layout history

Domestic companies that have earlier deployed the metaverse business include Tencent, NetEase, ByteDance, etc. As early as the beginning of 2020, Tencent had participated in Roblox's US$150 million Series G financing and was the exclusive agent for Roblox's product distribution in China. ByteDance invested in the Yuanverse concept company "Code Universe" and purchased Pico in April and June 2021 respectively. In November 2021, the network even announced that it would hold the Create
AI Developer Conference in the Metaverse at the end of the year.

The current situation of the Metaverse layout of domestic representative enterprises

Tencent is an early entry into the domestic enterprise, and its strategy of participating in the Metaverse is mainly realized through investment. As of 2021, Tencent has equipped a large number of platform companies through investment and other means. In terms of hardware, such as VR/AR technology and platforms (Epic’s Unreal Engine, Snap), in terms of software, it covers people playing games, shopping, learning and social needs. As a game company, miHoYo's main Metaverse applications include the establishment of Counter-Entropy Studio, and cooperation with Ruijin Hospital to study the development and clinical application of brain interface technology. Recently, MiHoYo stated that it will invest in Soul, the first Metaverse social software. ByteDance and NetEase are also investing in the metaverse field. ByteDance is mainly doing so through the acquisition of pico and Lightboat Semiconductor, while NetEase is doing so by developing sandbox games and investing in the virtual social platform IMVU. The specific layout is as follows:

Metaverse-related technologies are gradually maturing

Judging from the current development status of relevant technologies in my country, my country has been relatively late in technological development in VR, AR, MR, digital twins, etc. It is expected that in the futureFurther improvements:

In 2021, my country will continue to introduce policies to guide and support the development of metaverse-related technologies such as blockchain. In March 2021, the "14th Five-Year Plan" included "blockchain" into the national five-year plan for the first time and was clearly listed as a key industry in the digital economy. This is good news for the Yuanverse industry that relies on blockchain technology. Favorable policies that promote technological development can lay a technical foundation for the future development of the Metaverse industry.

Domestic companies are accelerating their entry into the Metaverse market

Since March 2021, domestic companies have begun to register Metaverse-related trademarks. Before July 2021, the number of Yuanverse-related trademark registrations in my country remained below 25. In August 2021, the number of applications exceeded 50 for the first time. In September 2021, with the entry of Alibaba, Zhongqingbao and other companies, the number of Yuanverse trademark applications reached a peak of 344. Application volume slowed down in October 2021 but remains at a high level. In November 2021, 22 Metaverse-related trademark applications were filed in just 8 days.

Note: The data for November 2021 is as of November 8, 2021.

In 2021, investment incidents in my country’s Yuanverse-related fields will occur frequently. Related fields include VR, blockchain, cloud services, virtual humans, NFT, etc. In addition to professional investment institutions, the industries in which investment companies are located are mostly concentrated in the fields of electronic information and games. Representative companies include Tencent, Lilith, etc. Judging from the investment rounds, most of them are concentrated in angel rounds, indicating that most projects are still in their infancy, but the investment amount remains at a high level. The specific investment events are as follows:

There are still certain risks in the Metaverse industry in its initial stage

Since my country’s Metaverse industry is still in its infancy and is characterized by immaturity and instability, in the future Its development also needs to be promoted healthily by technological development, institutional innovation and other aspects. Some of the current risks include technical computing power risks and privacy risks, as well as addiction risks, intellectual property risks and public opinion bubble risks.

The above data refers to the "China Internet Industry Market Foresight and Investment Strategic Planning Analysis Report" by the Qianzhan Industry Research Institute.

⑦ Whether third-party audits of U.S. listed companies can be used as consultants for the company’s status?


Third-party audits are performed by qualified accountants. The so-called third party is a neutral party, and a certified public accountant has this characteristic. Because the third party is neutral, it can be fair, impartial, and open when auditing listed companies, without favoring any aspect. We can discuss matters as they are to the greatest extent possible to improve investors' recognition of the audit report.

For U.S. listed companies, effective internal control over financial accounting reporting plays a vital role in the management of the company and its affairs, and in fulfilling its responsibilities to its investors. company management,Company owners, the investing public and other interested parties rely on the financial information underwritten by the Company to make decisions. So if we need to do this and audit ourselves, we will obviously not be able to be fair, just and open enough, and we will not be able to get the report recognized by all parties. So it is most appropriate to leave these to a neutral third party.

Then the independence of the audit means that the CPA is not subject to those factors that weaken or always have reasonable estimates, which will still weaken the CPA's ability to make unbiased audit decisions. The effects of stress and other factors. This is crucial for audit work, because it involves market economy, fairness of interests, and independence. This independence should also be maintained in form and substance, which means that the CPA has no direct or indirect interest relationship with the audited unit or individual. Not be restricted, influenced or interfered by personal or external factors, and maintain an objective and selfless spirit and work attitude.

Third-party auditing is also very necessary in our country. We are not only learning from, but also using the work of third-party audits. Moreover, our country has clear legal provisions that the annual reports of listed companies must be audited by a third party. This is also done to make the audit reports of listed companies more objective, fair, just and open, without any interest or personal emotional relationships.

Certik, the world’s third largest audit institution, protects many well-known projects

According to statistics, in 2018, 937,061,65 incidents occurred in 130 fields of global blockchain. A security incident occurred, with losses exceeding US$2 billion, an increase of 538% compared to 2017. Bitcoin's underlying technology "blockchain" faces security risks from the data layer, network layer, consensus layer, incentive layer, contract layer, and application layer. Security attack methods are endless and difficult to guard against. Security attacks mainly occur at the application layer, among which smart contracts are the hardest hit area for blockchain security.

Many security incidents have also occurred, such as the MtGox incident, which had a greater impact. MtGox was the world's largest Bitcoin trading platform at the time, handling 70% of the world's Bitcoin transactions. In 2014, MtGox suffered the most serious hacker attack, and subsequently MtGox announced a trading suspension due to vulnerabilities in its security software. Two weeks later, the site suddenly shut down and MtGox filed for bankruptcy.

According to MtGox’s estimates, the company’s Bitcoin investment losses amounted to approximately US$480 million, including 750,000 units of Bitcoin from customers and 100,000 units held by the company itself, which together accounted for approximately the global Bitcoin issuance. 7%. This incident caused investor confidence to suffer, and Bitcoin plummeted by 36%.

There are many other projects that have also suffered huge losses. After careful study, it is not difficult to find: in the blockchainMost of the security incidents are due to vulnerabilities in the source code that hackers take advantage of. Smart contracts are protected by the blockchain itself, so the smart contract code can be open source and readable to the maximum extent. However, the openness of the code makes it easy for hackers to grasp the flaws of the code and further use the trigger conditions of the code flaws to change the execution results of smart contracts, causing huge economic risks in blockchain projects. Therefore, the open source nature of smart contract code requires high reliability of the code, and this reliability requires 100% accuracy.

However, it is too difficult for programmers to write a code that is completely free of loopholes. Even if all possible precautions are taken, there will always be unanticipated vulnerabilities in complex software. loopholes. Therefore, the importance of code auditing is self-evident.

Through code audit, check the security flaws in the source code, check whether the program source code has security risks or coding irregularities, and use automated tools or manual review to review the program source code one by one. Conduct inspection and analysis to discover security vulnerabilities caused by these source code defects, and provide code revision measures and suggestions.

At present, we have provided code audit services for exchanges, wallets, public chains and smart contracts to protect the blockchain industry. We cooperate with SlowMist Technology, Certik and other world-renowned auditing companies. We have high-quality Our services meet customer needs, and we welcome partners to cooperate, communicate and discuss together!

Cases that have occurred:

1. What problems can blockchain code auditing solve: making hackers inaccessible

With the growth of BTC, ETH, With the rapid development of blockchain projects such as EOS, blockchain projects have entered the era of smart contracts, but the accuracy and security of smart contracts themselves are facing huge problems.

In other words, any project may go astray when using the blockchain, and the accuracy of the code cannot be completely guaranteed. Just like everyone makes typos when typing on a computer, programmers also make typos and omissions when entering code.

The basis of blockchain: the open source nature of smart contract code requires high reliability of the code, and this reliability requires 100% accuracy.

A slight difference can make a huge difference.

In professional terms:

Codes such as Bitcoin are all public and stored on the blockchain using smart contract codes. They are subject to the same restrictions as transaction data. Encryption protection requires 51% of the computing power to modify the smart contract code. Therefore, the tamper resistance of the smart contract code is greatly improved.

Smart contracts are protected by the blockchain itself, so the smart contract code can be open source and readable to the maximum extent. Smart contracts solve the problem of making the code public and ensuring its security. However, the openness of the code makes it easy for hackers to grasp the defects of the code and further exploit the code defect trigger conditions.Software changes the execution results of smart contracts, causing huge economic risks in blockchain projects.

Just like when we transfer money in the bank, the information of each account must be correct, so that the transfer can be correct and your property can be safely protected, so: one in the blockchain code No words are wrong.

2. Serious consequences caused by blockchain code errors

The poor quality of smart contract code in the blockchain has caused many serious consequences.

At present, many exchanges and token projects have not undergone blockchain code audits before being listed on exchanges, resulting in many hacking incidents in which virtual currencies have been stolen.

1. Security vulnerabilities between the SMT project party and the US BEC token

In the early morning of April 25, 2018, the SmartMesh (SMT) project party reported that there were abnormal problems in its transactions. Preliminary investigation revealed that SMT’s Ethereum smart contract has a vulnerability. Affected by this, Huobi Pro currently suspends deposits and withdrawals for all currencies.

According to media reports, similar security vulnerabilities were found in SMT and Meitu BEC token deposits, which means that a large amount of tokens can be received through overflow attacks.

2. Abnormal transaction vulnerability of Meitu BEC

On April 22, 2018, an abnormal transaction occurred in Meitu BEC. According to analysis, the batchTransfer batch transfer function in the BEC smart contract existed Vulnerability, the attacker can pass in a large value value, causing cnt * value to exceed the maximum value of unit256, causing it to overflow and cause the amount to become 0.

3. Parity multi-signature wallet vulnerability

In July 2017, due to vulnerabilities in its smart contract code, Parity multi-signature wallet was stolen by hackers worth more than 30 million US dollars. ETH.

4. Hacker currency theft vulnerability

In June 2016, due to an error in the smart contract, hackers stole $55 million worth of ETH from the DAO.

Code security flaws force automatic code auditing of smart contracts.

3. Blockchain code audit creates a perfect contract

Blockchain smart contracts establish a set of "legal contracts" through code. It is not possible for software engineers to create a completely error-free code. It's possible that programmers always make mistakes. The Ulord blockchain project research team of Red Coast Technology and the National University of Defense Technology audited the blockchain smart contracts on the market. Their research found that:

For all programmers, writing a It is too difficult to create bug-free code. Even if all possible precautions are taken, there will always be unanticipated execution paths or possible vulnerabilities in complex software.

This is one of the most important reasons why code auditing is required.

The "legal contract" in the blockchain is subject to interpretation and arbitration, and it is difficult for programmers to create a rigorous contract. In any large contract, there may be drafting errors and clauses that require interpretation and arbitration.

At the same time, software engineers are not legal experts, and vice versa. Drafting a good contract requires a variety of skills that are not necessarily compatible with writing a computer program.

Therefore, smart contract code may have security risks to a certain extent. Traditional smart contract code audits mainly use manual labor and rely on code reviewers to read smart contract codes. Manual code audit ultimately relies on human experience, and the effect of code audit is not obvious. For the current smart contracts with a large number of ETH tokens, manual audit workload is heavy and it is difficult to complete the work efficiently.

There are few project companies engaged in code auditing business in the blockchain field. Currently, before each token is listed on the exchange, its blockchain smart contract code is determined by the exchange. Review and judgment are carried out, but sometimes the exchange is not completely effective in judging whether a contract is perfect.

Intelligent code auditing and using computers to conduct robustness testing are currently the most important methods of code auditing. There are not many domestic companies that have mastered this technical standard.

However, the importance of blockchain code auditing is self-evident. The blockchain world itself is quite safe, but due to the problem of human-written code, it is impossible to be perfect, and the effectiveness of the code must be strengthened. Identify.