区块链个人数据管理办法,区块链个人数据管理规范
近年来,随着区块链技术的发展,个人数据管理也变得越来越重要。区块链个人数据管理办法和规范是保护个人数据安全的重要手段。
首先,区块链个人数据管理办法规定,个人数据的安全管理应建立在符合法律法规、行业标准和国家标准的基础上,并确保个人数据的安全性和可靠性。
其次,区块链个人数据管理规范规定,个人数据的安全管理应确保个人数据的完整性、真实性、准确性和及时性,并且应当采取必要的技术和管理措施,以确保个人数据的安全性、机密性和可用性。
此外,区块链个人数据管理规范还规定,应当采取安全技术和管理措施,保护个人数据免受未经授权的访问、使用、复制、披露、更改、损坏或者丢失。
最后,区块链个人数据管理规范还规定,个人数据的安全管理应确保个人数据的权利和利益,并且应当确保个人数据不受任何侵害或者损害。
总之,区块链个人数据管理办法和规范是保护个人数据安全的重要手段,可以有效地防止个人数据的泄露和滥用。因此,我们应当坚持遵守区块链个人数据管理办法和规范,确保个人数据的安全性和可靠性。
请查看相关英文文档
❶ How blockchain brings a “revolution” to personal data protection
How blockchain brings a “revolution” to personal data protection
U.S. media local time 17 It was disclosed on the evening of the same day that the British company "Cambridge Analytica", which was deeply involved in the scandal of abusing personal privacy data, originally planned to launch a personal privacy data storage service and sell it in the form of cryptocurrency through blockchain technology. The concept of encrypting personal information is actually not new. The key to this idea lies in everyone's autonomy over personal information. Some industry insiders believe that blockchain technology may bring about a "revolution" in personal data protection.
In the era of big data, personal data is considered as precious as gold. The leakage of personal data is worrying, but most people are unlikely to cut off their connection with the Internet because they are afraid that their data will be collected. At this stage, companies, schools, hotels, social networking sites, etc. that are responsible for keeping personal information often fail to take responsibility. Experts believe that blockchain technology, as a "middleware" with features such as encryption, trust, peer-to-peer, and difficulty in tampering, is expected to solve this problem.
The emergence of blockchain technology has transferred the control of personal data from Internet companies to the hands of users themselves, making it possible for everyone to control their own personal data. Through it, users' personal data can be associated with personal digital ID cards. Users can choose whether the digital ID card is anonymous, pseudonymous or public. They can also access the blockchain application platform from any device anytime, anywhere to control their Internet personal data.
For example, the information on a person’s ID card number on the blockchain may be converted into a string of ciphertext, and the facial image information may also be encrypted. When he checks in at the hotel, he only needs to send the encrypted text of his ID number to the hotel through the application. The hotel will compare the information with the encrypted data on the blockchain application. It does not need to know any of his real information, but as long as the encrypted data compares If the results match, you can guarantee your stay.
At the same time, big data and artificial intelligence development require a large amount of user data resources. Users can selectively sell personal data as cryptocurrency and receive certain returns. For example, if an e-commerce company needs user data to develop a new application, users can choose to sell their shopping history data, but their address, account number and other information can still be kept confidential.
In the field of gene sequencing, blockchain applications have begun to challenge the "way to make money" of traditional gene sequencing companies selling personal data.
In recent years, gene sequencing services for ordinary people have become highly sought after. Taking the American Chromosome Biotechnology Company "23&Me" as an example, consumers can obtain family genetic information for less than $100 and a few mouthfuls of saliva. If they pay an additional $80, they can obtain genetic health risks based on the original data. In-depth analysis of other aspects. However, this company is not satisfied with the revenue from sequencing services. It also packages millions of customer genetic data it has in its possession and sells them to pharmaceutical companies. The Parkinson's disease data sold in early 2015 alone was worth US$60 million. Many similar biotech companies are starting from consumerThe operator obtains service income while reselling consumers' data to "make double money."
In February this year, George Church, a geneticist from Harvard University in the United States, founded the company "Nebula Gene", hoping to break this pattern through blockchain technology. The company plans to complete whole-genome sequencing at a price of less than $1,000. This cost will be borne by the customer. In return, the customer will have an intuitive understanding of the disease risks corresponding to their genetic information and will also have autonomy over the sequencing data. Genetic information will be secured through blockchain technology, encrypted and stored and sold according to the customer's wishes.
This company plans to launch a "Nebula Coin" as a transaction medium. Customers can exchange their genetic information for "Nebula Coins" and can also use "Nebula Coins" to pay for their own sequencing. Pharmaceutical companies can use Traditional currency purchases "Nebula Coins" to obtain the genetic information data of ordinary people. The entire transaction process is completed through the blockchain platform, and the encryption is transparent and secure.
Church said that after comprehensive factors such as sequencing costs, genetic information protection, data management and genomic big data processing, blockchain technology allows more people to truly "own" their own genetic information.
❷ Blockchain technology empowers the smart upgrade of archives management
How to ensure the security of the archives digitization process and electronic archives
Vigorously promoted in the country In the context of electronic archives management, archives management work has gone through the process from receiving and keeping paper archives to receiving and keeping electronic archives, from managing archive entities to managing archive data, from manual operations to information-based intelligent operations, from decentralized utilization of archive resources to The revolution in Internet sharing. However, in their long-term preservation activities, archival digital resources will inevitably use conventional technical methods such as copying, updating, and format conversion, key technical methods such as migration, packaging, and simulation, and auxiliary methods such as hard copy output. During these preservation activities, the content, structure (physical structure and logical structure), metadata, etc. of electronic archives may undergo certain changes.
How to ensure the security of the archives digitization process and electronic archives? Blockchain applications have become an important choice to break through bottlenecks.
The application value of blockchain electronic archives
Blockchain technology is applied to electronic archive data management, allowing anyone to independently verify archives, and is suitable for cross-department and cross-region and multiple processes and application scenarios across responsible entities, reducing dependence on the blockchain platform and liability risks, while meeting the certification needs of massive archival digital resources.
01 Electronic archive applications developed through blockchain have improved electronic archive management methods and authenticity assurance methods, and can provide reliable support for the protection of corporate intellectual property rights.
02 Through the application of blockchain electronic files, the electronic files of engineering projects are transformed from paper management to electronic management, improving workefficiency, effectively reducing the corresponding costs for enterprises and project participants in project document management.
03 Through the application of blockchain electronic archives, the demands of all parties between the industry ecological chain and department levels can be balanced, while emphasizing the transfer of information value between institutions or organizations in the same industry or across industries and departments. (Mutual recognition of evidence) Reduce management costs and improve efficiency while collaborating with work.
04 Through the application of blockchain electronic archives, it can promote the further improvement of archival data archiving business in terms of archiving, storage, transmission, anti-counterfeiting and information security.
Conclusion
In fact, blockchain can be both civil and military. In addition to its application in digital archive management, blockchain technology also has many application cases in the fields of digital government affairs, commodity traceability, supply chain management, intelligent manufacturing and digital collections.
❸ A new way to track and manage digital assets, teach you how to view blockchain bills
Bills record value circulation and status, which is a basic function of financial services.
Our commonly used banks, Alipay, WeChat Pay, etc. will record a transaction for ordinary users and merchants, and provide query, statistics and analysis services in different dimensions.
For example, the Alipay annual bill that everyone loves to post will count the user's total income and expenditure throughout the year, consumption types, Yu'E Bao and other financial management income, and the number of takeaway orders. Through big data technology, consumer interests and trends in various regions and different age groups are displayed, so that consumers can better understand the consumption environment around them, and merchants can grasp market demand in a timely manner.
In a decentralized blockchain network, transactions are permanently recorded on the chain, open and transparent, and accessible to everyone.
However, since the design of the blockchain is more inclined to ensure non-tampering and data compression requirements, the filtering query function at the business level is missing. Coupled with the different rules of different chains, it becomes extremely difficult to track and manage crypto assets. This is why digital asset investors often lament that they “always feel like they don’t have a clear account.”
SixPencer launches a new blockchain accounting artifact, which currently supports asset tracking and management at the bottom of Bitcoin and Ethereum. It is free to use and does not require registration.
Once launched, it has been loved by miners, asset management institutions, OTC merchants, encryption startups, and digital asset investors.
As a professional asset management tool, it can not onlyIt can query all on-chain transaction records, view account balances and held assets in real time, and provides daily income and expenditure status of each currency, supports single or multi-address aggregate income and expenditure statistics, address portrait analysis and charts, large transaction record rankings, Contact management, etc.
After entering the website, enter the Bitcoin or Ethereum address in the search box on the homepage, and click Search to enter the overview page of the address.
We use the address that currently ranks first in ETH holdings on the entire network: (tag: bitfinex 1) account as a demo account for demonstration, and all data are real on-chain data.
Here is a brief introduction to the difference between addresses and bank accounts on the blockchain. On the blockchain, an address is similar to a bank card number. Knowing the address is the same as knowing the bank card number, and you can transfer money to it.
But the difference is that the blockchain is a distributed public ledger that cannot be tampered with. It is usually anonymous and anyone can conduct public queries on any address. The bank account can only query your own account information, and you cannot know other people's account information through the bank card number.
If the user has multiple addresses or wants to track other addresses, they can search. All searched address information will be summarized on the asset portfolio page. Click the drop-down box to switch or delete accounts.
In addition to the basic information provided by the blockchain browser, SixPencer also displays some personalized indicators to help users understand their own on-chain portrait and track the on-chain trajectories of other accounts. On the overview page below, you can view the address's asset overview, historical indicators, income and expenditure statistics, and asset holding information.
Address overview
Creation time: date of first receipt of ETH
Net assets: all assets, including ERC20 tokens Total USD value of assets
ETH ranking: Ranking of all Ethereum addresses holding ETH amount
p>
ETH balance and valuation: Amount of ETH held and its corresponding USD value
Historical indicators
< p> Historical indicators display transaction volume, number of transactions, generationCoin analysis and contact analysis are four major dimensions. Through statistics, the unclear accounts can finally be settled. For example, the simplest accounting calculation, total ETH income = ETH balance + total ETH expenditure + total ETH handling fee. Another example is the total number of transactions = the number of transfer-in transactions + the number of transfer-out transactions.Due to the particularity of the Ethereum network, all transfer fees are paid in ETH. Therefore, we list the handling fees separately, and also support separate screening of handling fees in the transaction details to help users count handling fee expenditures.
Some interesting data, the demo account fee is 1.1556ETH, a single large ETH transfer reaches 900,000 ETH, and the number of tokens held is There are 350 types, and the most traded token is USDT, with only 37 addresses that have been traded with it.
Addresses that hold hundreds of different assets are usually exchange addresses. In addition, the number of transactions and contacts are not many, so it can be ruled out that it is an external address, and it can basically be judged that it is used internally by the bitfinex exchange. address.
Income and Expenditure
Statistics of the total income and expenditure of all assets this month, including handling fees.
Asset holdings
Displays the number, value, asset price and 24h increase or decrease of assets held. The address of an exchange such as a demo account, which holds assets, usually does not fit on 10 pages.
In addition to providing the transaction flow of addresses, SixPencer also supports query and filtering of full historical transaction records, balance information, daily income and expenditure statistics, etc.
Transaction details
From the following page, you can clearly know the income and expenditure of ETH assets this month. Users can also filter based on date, fund flow, transaction classification and labeling system. If you need more detailed statistics, we will introduce how to filter transactions at specified addresses later.
Click the ETH drop-down box in the picture above to switch to the transaction details page of other currencies. For example, switch to the transaction details of USDT to view the detailed status of USDT.
In addition to monthly bills, SixPencer displays the transaction details of each transaction, providing information such as transaction direction, counterparty, transaction amount, account balance, transaction time, daily income and expenses, etc. As you can see in the picture below, the nearly 6 ETH transactions were all transactions transferred from the bitfinex 3 account to bitfinex 1.
Transaction details
Click on any transaction details to enter the transaction details page of that transaction. The transaction hash is a unique and immutable transaction ID for each on-chain transfer, similar to the concept of an order number.
The specific information of a transaction can be queried through the transaction hash.
The transaction quantity, transaction status, transaction time, sender and recipient, handling fee, etc. shown below are the specific information of this transaction and will not be repeated here. It is worth noting that SixPencer provides a personal tag and remark system. Users can make personalized classifications and notes for individual transactions to help remember and not forget every transaction.
How to quickly find and specify the transaction information of the address?
As time goes by and the number of transactions increases, it becomes extremely complex and difficult to query the specified transaction information on the chain. SixPencer refines the transaction information according to business needs and provides a tag system to assist users in customization. Transaction inquiries and statistics.
For example, you want to query the total amount of ETH transferred to the demo account from the address (label: bitfinex 3) in June 2020. Through our billing system, it only takes two steps to check.
1. Label: For demonstration, we will rename the label "bitfinex 3" to "test test".
2. Filter: Filter the dates to June 1st - June 30th, select "Transfer" in the filter bar, select "Test" in the bottom tab bar, and click Save.
After saving, you can search for all the transaction information transferred to the demo account from "test test" in June. As can be seen from the picture below, in June, the demo account transferred from the address labeled "test test" 58,440.2489 ETH received.
If the user wants to query transactions with multiple specified addresses, select multiple tags and adjust the date, fund flow and other information to perform automatic asset statistics.
In the analysis column, users can query the chart analysis information of the address in different dimensions, including the four major dimensions of balance, transaction, classification and ranking. You can also view more detailed data and charts by clicking on each dimension separately.
Balance: Balance displays the balance quantity and value trend of assets
Transaction: Transaction displays all transactions, the number of transactions transferred in and out, and the number of transactions Trends in value and number of transactions
Classification: Classification counts transaction types based on the platform's address label system, reflecting the transaction preferences of the address
< p>
Ranking: The ranking displays active contacts according to the number of transactions, and displays large transactions according to the transaction amount
For example, ranking Analysis, you can quickly check the specific transaction amount and large transfer status with a certain address. As shown in the figure below, the demo account and the address labeled "test" have a total of 177 transactions this month. Other transactions with the demo account that have more transactions are ERC20 Token contract call transactions.
From the picture below, the large-amount rankings are also transaction information with the address labeled "test". The table displays the transaction object, transaction time, transaction direction, transaction quantity and value. If you are interested in large accounts on the exchange, you can check the large transfer information of the exchange address to see which addresses are large deposits and withdrawals.
The address book displays all addresses that have transaction records with the demo account. In addition to the platform's own label system, users can add labels to addresses or rename labels.
Tags: tags known by the display platform tag system and tags added by users
Recent Contacts: Displays addresses/labels with transaction records in the last 30 days
All Contacts: Displays all contacts with transaction records Address/label, for addresses with more than 10,000 transactions, display the contacts of the last 10,000 transactions
In summary, SixPencer’s new asset tracking and management tool can provide more comprehensive query and analysis functions than blockchain browsers or wallets. As a tool product, it is intended to assist users in digital asset management, through on-chain Further analysis of user portraits helps everyone make better decisions.
We believe that the open and transparent mechanism of blockchain should make data query easier, but currently it is still difficult and painful to quickly query blockchain data according to actual business needs, and has become a major obstacle to commercial implementation.
Digital asset transactions are only a small part of it. A large amount of valuable data will be stored on the blockchain in the future. SixPencer will continue to launch more practical tools to allow Data better serves the business.
❹ How does blockchain technology protect the privacy and rights of information subjects
Privacy protection methods can be divided into three categories:
1 It is the privacy protection of transaction information, the privacy protection of transaction senders, transaction recipients and transaction amounts, including currency mixing, ring signatures and confidential transactions, etc.
The second is privacy protection for smart contracts, and protection solutions for contract data, including zero-knowledge proof, multi-party secure calculation, homomorphic encryption, etc.
The third is the privacy protection of data on the chain, which mainly includes solutions such as ledger isolation, private data and data encryption authorized access.
Extended information:
1. Blockchain encryption algorithm isolates identity information and transaction data
1. Transaction data on the blockchain, including transaction address, amount, transaction time, etc., are open, transparent and queryable . However, the identity of the user corresponding to the transaction address is anonymous. Through the blockchain encryption algorithm, the separation of user identity and user transaction data is achieved. Before the data is saved on the blockchain, the user's identity information can be hashed, and the resulting hash value is used as the user's unique identifier. The user's hash value is stored on the chain instead of the real identity data information. Transaction data is bundled with hash values rather than user identity information.
2. Therefore, the data generated by users is real. When using these data for research and analysis, due to the irreversibility of the blockchain, no one can restore the name, phone number, and email address of registered users through hash values. and other private data, playing a role in protecting privacy.
2. Blockchain "Encrypted Storage + Distributed Storage"
Encrypted storage means that a private key must be provided to access data. Compared with ordinary passwords, private keys are more secure and almost impossible to be cracked by violence. . Distributed storage and decentralized features reduce the risk of all data being leaked to a certain extent. However, with centralized database storage, once the database is attacked by hackers, all data can easily be stolen. Through "encrypted storage + distributed storage", users' data privacy can be better protected.
3. Blockchain consensus mechanism prevents individual risks
The consensus mechanism is a mechanism for blockchain nodes to reach a consensus on block information across the entire network. It can ensure that the latest blocks are accurately added to the blockchain and node storage areas. Blockchain information is consistent and unforked, and can resist malicious attacks. One of the values of the blockchain lies in the consensus governance of data, that is, all users have equal management rights to the data on the chain. Therefore, the risk of individual mistakes is first eliminated from the operation. Data decentralization is solved through the network-wide consensus of the blockchain, and zero-knowledge proofs can be used to solve verification problems and realize the scenario of using user privacy data in a public decentralized system. While meeting the needs of the Internet platform, it also So that part of the data is still only in the hands of the user.
4. Blockchain Zero-Knowledge Proof
Zero-knowledge proof means that the prover can make the verifier believe that a certain assertion is correct without providing any useful information to the verifier, that is, proof The investor can fully prove that he is the legal owner of certain rights and interests without leaking relevant information, that is, the "knowledge" given to the outside world is "zero". By applying zero-knowledge proof technology, data correlation verification can be achieved in the context of ciphertext, and data sharing can be achieved while ensuring data privacy.
❺ How to set private privacy in Jack Ma's blockchain
As a decentralized database technology, the private privacy setting of blockchain is a very important part. Jack Ma may set up the following aspects of privacy protection on his own blockchain:
1. Identity verification: On Jack Ma’s blockchain, individual users can protect their privacy through identity verification. This means that only authenticated users can access specific information.
2. Encrypted data: Jack Ma can use blockchain technology to encrypt personal data to prevent unauthorized access. This encryption technology protects user privacy by ensuring that only authorized users can access data.
3. Anonymous transactions: An anonymous transaction function can be set up on Jack Ma’s blockchain, allowing users to conduct transactions without exposing their identities. This approach can protect user privacy to the greatest extent.
4. Restrict access rights: Jack Ma can set access limits on the blockchain to only allow specific users or organizations to access specific information. This approach protects user privacy by ensuring that only authorized people have access to sensitive information.
In short, Jack Ma can protect his blockchain privacy through various means such as identity or verification, encrypted data, anonymous transactions and restricted access rights. These measures ensure that users’ data and privacy are protected to the greatest extent possible.
❻ Blockchain: Returning the ownership of data to individuals
This article explains through examples how blockchain technology can return the ownership of personal information to individuals.
First, let’s look at Taobao’s data ownership. Taobao data includes items viewed by individualsTraces, personal purchase details, merchant sales data, commodity logistics data, payment and collection data, etc. All personal and merchant data are on Taobao's servers. Who does this data belong to? Taobao users (including customers and merchants) believe that data is generated by users and should belong to them. Taobao believes that the server hardware facilities that record user data belong to Taobao, and the data also belongs to Taobao.
This is like planting a tree in someone else’s yard. It’s true that you planted this tree, but this tree was planted on someone else’s land. This tree The survival of the tree cannot be separated from your sowing, nor can it be separated from other people's land. So whose tree does it belong to?
Fortunately, due to the introduction of laws related to the protection of personal information, Taobao's data ownership belongs to users. Unfortunately, there is no way for users to exercise ownership rights. Because you cannot transfer or delete your data from Taobao's servers unless you pay the corresponding cost. Continuing with the above example of planting a tree in someone else's yard, if you want to realize the ownership of the tree and dig it away, that won't work because, first, others won't let you enter the yard; second, you don't have the land yourself, so dig it away. This tree, the tree is dead.
Therefore, having ownership of data does not necessarily mean free disposal of data. Ownership without the right to dispose is in vain. The root cause of this problem lies in the centralized business model and system architecture. In a centralized model, the owner of data ownership has no way to realize the right to dispose of data. Taobao can admit that data ownership belongs to users, but it does not matter. This does not prevent Taobao from using user data to conduct unreasonable operations such as user discrimination, platform selection, traffic monopoly, and bidding ranking. Going back to the above example of planting a tree in someone else's yard, the tree is yours, but others enjoy the shade under the tree and the fruits it produces are enjoyed by others.
Based on the above analysis, only a decentralized model can effectively solve the problem of separation of data ownership and disposal rights, and currently the best decentralized technology is the blockchain.
Blockchain solutions:
Build an e-commerce platform based on blockchain technology. We name this platform "E-commerce Alliance Chain", hereinafter referred to as " Alliance Chain".
Each merchant is connected to the alliance chain as a node, and each customer is connected to the alliance chain as a node. The product information sold by merchants is published on the alliance chain as shared data, and all connected customer nodes can see and browse this information. When a customer decides to purchase a product, the purchase information including product, model, address, etc. is passed to the merchant through the alliance chain. In this process, each merchant records the transaction information of the customers who transact with it. For transaction information that has nothing to do with itself (other merchants and customers), only the characteristic value (hash value) of the information is recorded; Each customer also records his or her own transaction information.Only record feature values for information that has nothing to do with you.
The purpose of a node recording transaction characteristic values that have nothing to do with itself is to prevent the transaction information on the alliance chain from being tampered with. When one or both parties to a transaction tamper with the transaction information, the characteristic value of the transaction will change. Then, as long as it is compared with the characteristic value recorded by nodes unrelated to the transaction, the tampering will be discovered by the alliance chain.
On the e-commerce alliance chain, there is no centralized node. All nodes are equal. Each node only records its own relevant transaction data. There is no way to save transactions of non-related nodes. data. Using the example of tree planting, each family plants trees in their own yards and cannot let others plant trees in their own yards. Nodes can decide how they want to process their own data. They only need to reach a data processing consensus with the node on the other side of the transaction.
In this way, the e-commerce alliance chain based on blockchain technology truly realizes the unification of data ownership and disposal rights, which is real ownership.
At this point, some people may say that useful services such as customized recommendations and product rankings for some product information are still needed. If the data is scattered in the hands of the owners, then this cannot be achieved. A useful data feature. It doesn't matter, you just need a third-party organization specialized in data analysis to connect to the alliance chain. Merchant nodes and customer nodes are responsible for authorizing the use rights of their own data to third-party data analysis nodes, and agreeing on the specifications for data use through the smart contract technology of the blockchain. The data analysis institutions analyze transactions within the scope of authorization of the use rights. data and provide data services required by other nodes.
In the digital age, data is an important means of production, so it is critical to clearly define the ownership of data. The centralized model will deprive the majority of data producers of their means of production and turn them into essentially proletarians. This is unreasonable. Through blockchain technology, data ownership can be returned to data producers, making production relations in the digital era more reasonable. This is the way forward.
❼ What is blockchain technology? What exactly is blockchain? A chained data structure composed of sequential connections, and a cryptographically guaranteed distributed ledger that cannot be tampered with or forged.
Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, and uses cryptography to ensure data transmission and access. It is a new distributed infrastructure and computing method that uses smart contracts composed of automated script codes to program and operate data securely.
[Infrastructure]
Generally speaking, a blockchain system consists of a data layer, a network layer, a consensus layer, and an incentive layer.It consists of layer, contract layer and application layer. Among them, the data layer encapsulates the underlying data blocks and related basic data and basic algorithms such as data encryption and timestamps; the network layer includes distributed networking mechanisms, data dissemination mechanisms, and data verification mechanisms; the consensus layer mainly encapsulates network nodes Various consensus algorithms; the incentive layer integrates economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives; the contract layer mainly encapsulates various scripts, algorithms and smart contracts, and is the core of the blockchain The basis of programmable features; the application layer encapsulates various application scenarios and cases of the blockchain. In this model, the chain block structure based on timestamps, the consensus mechanism of distributed nodes, economic incentives based on consensus computing power, and flexible programmable smart contracts are the most representative innovations of blockchain technology.
Extended information:
[Blockchain core technology]
Blockchain mainly solves the trust and security issues of transactions, so it addresses this issue Four technological innovations:
1. Distributed ledger means that transaction accounting is completed by multiple nodes distributed in different places, and each node records a complete account, so they all Can participate in supervising the legality of transactions and can also jointly testify for them.
The uniqueness of blockchain's distributed storage is mainly reflected in two aspects: First, each node of the blockchain stores complete data according to the block chain structure. Traditional distributed storage generally stores The data is divided into multiple parts for storage according to certain rules. Second, the storage of each node in the blockchain is independent and has equal status, relying on the consensus mechanism to ensure the consistency of storage, while traditional distributed storage generally synchronizes data to other backup nodes through the central node.
No node can record ledger data independently, thus avoiding the possibility of a single bookkeeper being controlled or bribed to record false accounts. Also because there are enough accounting nodes, theoretically speaking, the accounts will not be lost unless all nodes are destroyed, thereby ensuring the security of the accounting data.
2. Asymmetric encryption and authorization technology. Transaction information stored on the blockchain is public, but account identity information is highly encrypted and can only be accessed with authorization from the data owner. , thus ensuring data security and personal privacy.
3. The consensus mechanism is how all accounting nodes reach a consensus to determine the validity of a record. This is both a means of identification and a means of preventing tampering. Blockchain proposes four different consensus mechanisms, which are suitable for different application scenarios and strike a balance between efficiency and security.
The consensus mechanism of the blockchain has the characteristics of "the minority obeys the majority" and "everyone is equal". "The minority obeys the majority" does not entirely refer to the number of nodes, but can also be the computing power and the number of shares. Or other characteristic quantities that the computer can compare. "Everyone is equal" means that when a node meets the conditions, all nodes have the right to give priority to the consensus result, and after it is directly recognized by other nodes, it is finally possible toBecome the final consensus result.
4. Smart contracts. Smart contracts are based on these trustworthy and non-tamperable data and can automatically execute some predefined rules and terms. Take insurance as an example. If everyone's information (including medical information and risk occurrence information) is true and trustworthy, it will be easy to automate claims settlement in some standardized insurance products.
In the daily business of insurance companies, although transactions are not as frequent as those in the banking and securities industries, the reliance on trusted data continues unabated. Therefore, the author believes that using blockchain technology from the perspective of data management can effectively help insurance companies improve their risk management capabilities. Specifically speaking, it is mainly divided into risk management of policyholders and risk supervision of insurance companies.
Blockchain-Network
- 上一篇: 区块链行业前十排名,区块链行业前十名企业
- 下一篇: 维卡币区块链技术,维卡币在全球区块链排名