为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

区块链网络问题冗余分析,区块链网络问题冗余怎么解决

发布时间:2023-12-06-04:30:00 来源:网络 区块链知识 区块   冗余   网络

区块链网络问题冗余分析,区块链网络问题冗余怎么解决


请查看相关英文文档

㈠ What is blockchain technology? What are the core components of blockchain technology?

From a technical perspective and an architectural perspective, I will tell you about it in popular language. , my understanding of blockchain.

What exactly is blockchain? Block chain, in a word, blockchain is a storage system, and the storage system is more detailed. Block chain is a distributed storage system without an administrator, and each node owns all data.

What do common storage systems look like?

First, let’s take a look at how to ensure high availability?

Ordinary storage systems usually use "redundancy" to solve high availability problems. As shown in the figure above, if the data can be copied into several copies and redundantly spread to multiple places, high availability can be ensured. If the data in one place is down, there will still be data in another place. For example, the master-slave cluster of MySQL has this principle, and the RAID of the disk also has this principle.

Two points that need to be emphasized here are: data redundancy often causes consistency problems

1. For example, in the master-slave cluster of MySQL, there will actually be a delay in reading and writing. Sometimes, it actually means that there is inconsistency between reading and writing for a short period of time. This is a side effect of data redundancy.

2. The second point is that data redundancy often reduces writing efficiency, because data synchronization also consumes resources. If you look at single-point writing, if two slave libraries are added, the writing efficiency will actually be affected. Ordinary storage systems use redundancy to ensure high data availability.

Then the second question is, can an ordinary storage system perform multiple writes?

The answer is yes, for example, take this picture as an example:

In fact, MySQL can do a master-slave synchronization of dual masters, a master-slave synchronization of dual masters, and two nodes. , and can be written at the same time. If you want to build a multi-machine room and multi-active data center, in fact, multi-machine room and multi-active data center also requires data synchronization. What should be emphasized here is that multi-point writing often leads to consistency issues of write-write conflicts. Taking MySQl as an example, assuming that the attribute of a table is an auto-increment ID, then the data in the database is now 1234, then one of the nodes When writing, a piece of data is inserted, it may become 5. Then these 5 pieces of data are synchronized to another master node. Before the synchronization is completed, if another writing node also inserts a piece of data, it will also generate A piece of data with an auto-incrementing ID of 5 is obtained. Then, after it is generated, it is synchronized to another node, and then when the synchronized data arrives, it will conflict with the two local 5s, and the synchronization will fail, which will cause write consistency conflicts. This problem will occur if there are multiple writes.

How to ensure consistency when writing multiple points?

The Reform "Swan Master Class" will give you more technical work

㈡ The problem of witch attacks in the blockchain

What is a witch attack?

Explanation 1: Large-scale p2p systems face the threat of problematic and hostile nodes. In order to cope with this threat, many systems adopt redundancy. However, if a malicious entity impersonates multiple identities, it can take control of a large portion of the Orange Void Core system, undermining the system's redundancy strategy. We define this attack that imitates multiple identities as a Sybil Attack.

Explanation 2: Witch attack occurs in P2P network. Because nodes join and exit at any time and other reasons, in order to maintain the stability of the network, the same data usually needs to be backed up to multiple distributed nodes. This is Data redundancy mechanism. Sybil attack is an effective means of attacking data redundancy mechanism. Yu Feng If there is a malicious node in the network, then the same malicious node can have multiple identities, just like the heroine in the movie can split into 16 identities, then the malicious node can be divided even more. In this way, data that originally needs to be backed up to multiple nodes is deceitfully backed up to the same malicious node (the malicious node disguises itself as multiple identities). This is a witch attack.

In short, it is a clone fraud

How to solve this attack?

1. Work Even if you have thousands of different parts, you can only work with your sincerity. Distraction is illusory and has no power, POW proves it.

2. The public security bureau, a reliable third party for issuing ID cards, will issue you an ID card. If you don’t have an ID card, you are a monster (identity verification is based on a reliable third party)

3. In a society of acquaintances, if you move your registered residence to a new village, you must be authenticated by most people in the village. This is the identity authentication method in traditional Chinese society. The eyes of the masses are like piercing eyes, which can reveal all kinds of demons and ghosts. (Newly added nodes need to be certified by all reliable nodes in the current network. This method uses the public key system authentication method of random key distribution verification, and needs to be certified by most nodes in the network before joining)

iii How does blockchain ensure the security of data in the network

How does blockchain ensure the security of data in the network:
In blockchain technology, digital encryption Technology is the key. Generally, an asymmetric encryption algorithm is used, that is, the password for encryption and the password for unlocking are different. To put it simply, we have an exclusive private key. As long as we protect our private key and give the public key to the other party, the other party will use the public key to encrypt the file to generate ciphertext, and then pass the ciphertext to you, and we will use the private key. Decrypting the plain text can ensure that the transmission content is not seen by others. In this way, the encrypted data transmission is completed!
At the same time, there is also a digital signature that adds an extra layer of protection for us to prove that the document has not been tampered with during the process of sending it to the other party. It can be seen that the encryption technology of blockchain can be effectiveSolving security issues in the process of data circulation and sharing can be said to have great potential. Luanhe

㈣ Okcoin Coin Bank Xu Mingxing analyzes how the blockchain trust machine operates

The name blockchain as a "trust machine" originated from "The Economist" 》an article. From a macro level, the Internet is a network that transmits information. Today we can shop through the Internet and send WeChat messages. Nowadays, many technical experts and people in the traditional financial industry around the world regard blockchain as a revolutionary technology because blockchain is a network for transmitting transactions. Therefore, a well-known VC in the United States said that blockchain is a financial technology. the underlying protocol.
Suppose there is a user A who wants to transfer money to another user B. What are the differences between the traditional financial network and the blockchain network? In today's existing financial network, for example, when transferring money from Industrial and Commercial Bank of China to China Merchants Bank, users can first access the database through ICBC's online banking or ATM machine, and the database can be transferred to the database of another bank through the clearing company of the blockchain center. , after which the user receives the money. If this transaction is done on the blockchain, first the transaction will be broadcast to a decentralized network, or a P2P network, and the transaction will be elected by bookkeepers on the network through some mathematical mechanisms. Verification is done to verify whether the transaction is genuine. It uses mathematical algorithms to ensure that the transaction cannot be forged in principle. When the bookkeeper agrees that the transaction is valid, it will form an account book and broadcast this account book to everyone on the network, which of course includes the payee.
Centralized network, this is the earliest and most primitive network. Our Internet today is like this, it is a distributed network. It has many small centers connected through a backbone network to form a distributed network. The blockchain network is actually a very inefficient network because the network has a lot of data redundancy and the transmission is not very efficient. However, as time goes by and the transmission becomes stronger, this redundancy problem is no longer a big problem. problem.
There is no powerful center in the blockchain network that can control or tamper with the data in the network. We can understand that a decentralized network is a network built on a distributed network. In many countries, such as many reports made by the Bank of England, blockchain is also translated into a distributed ledger. Blockchain originally originated from Bitcoin. Now many traditional financial companies are beginning to study and experiment with blockchain, such as RIPPLE, R3 Alliance, etc.
If we carefully analyze the role of distributed ledgers such as blockchain, we can find that it has many applications. For example, in the field of personal finance, there are many payment companies, remittance companies, etc. based on blockchain. At the political level, some have applied blockchain technology to elections, which can technically ensure that votes cannot be tampered with. There is also the field of digital currency. The Bank of England uses blockchain technology to develop another digital currency. It is different from the balance of Alipay and online banks, and of course it is notIt is an uncontrolled currency like Bitcoin. Its issuance rights are still in the hands of the central bank, but its liquidation and circulation network are built on the opened blockchain network. Its advantages are that WeChat Pay and Alipay can transfer funds to each other. For example, when I apply for a parking card, the original system naturally creates some payment barriers. The underlying digital technology can eliminate these barriers. IBM and others are making attempts in this regard.
An example is R3. R3 is a very good company in the world. They are trying to build a clearing network for credit bonds and bank bonds. Domestic clearing companies are all dedicated clearing companies. In fact, there is no such clearing center internationally. First of all, Several large banks in China conduct communication protocols, and then small banks make agreements inside, which is very complicated. Because there is no powerful center in the world that can build an international clearing system, not even the World Bank. Companies like R3 are trying to use technology to do it. In the world, countries do not trust each other, or banks have quality inspection departments of each other. Trust, but we can all trust technology, and blockchain is such a technology.
We have also done some innovative work in this field. We started with Bitcoin, the first application of blockchain. Our product is called OKCoin. This year we launched a new blockchain Financial network OKLink, OKLink products mainly do small-amount international remittances in Hong Kong.
Everyone knows that there are multi-layered capital flows in the world, and the separation of capital flows and information flows, resulting in very high costs for international remittances. There is a prediction in the world that many people work outside and remit money back. The amount is 700 billion US dollars every year. The single amount is small, and the average handling fee is 10%. For example, a Filipino maid earns 4,000 Hong Kong dollars per month in Hong Kong, but loses 800 Hong Kong dollars when she returns home.
OKCoin puts many companies in the blockchain, allowing them to liquidate efficiently and at low cost, but it will not make false accounts and has no ability to run away. At present, we have opened up more than a dozen companies around the world. country. There is no China yet. In China, only banks can legally transfer money. Blockchain has helped our company establish a credit internationally. This is not the credit of our company, nor the credit of investors, but the credit of technology, so we have some partners in Africa and Southeast Asia who are willing to Believe in the security and resonance of the network.

We also have an APP on the C-side to allocate remittance orders from around the world to these remittance companies. We are currently commercializing the blockchain operation network in the world. We process millions of dollars every month, and we do it in compliance with regulations in all countries around the world.
Summarize what blockchain technology can do. Blockchain technology is actually a technology that opens your ledger to the public. When do we need to open the ledger to the public? When others don’t believe in your platform, in the short term its application is more suitable for areas with weak credibility. But in the long run, like Nasdaq and the New York Stock Exchange,These units with their own credit will also use blockchain technology in the future, because the current cost is very high, so in the long run, such units with strong credit may use blockchain technology to reduce costs in the future. . (Reprinted from NetEase News)
Of course, the same is true for Bitcoin, Ethereum, and the decentralized content sharing platform DECENT.

㈤ Token Economic Model: The Benefits and Disadvantages of Gas Fees

Whether it is Bitcoin, Ethereum, or other public chains such as NEO and ONT, nodes are required to act as transactions For verifiers, the entire verification process includes the use of computing resources and storage resources. Gas fees are the rewards paid to nodes, and for some public chains, handling fees may even become the main source of income for miners, such as BTC. At this stage, The main income of miners comes from the rewards for obtaining block confirmation rights, but as time goes by, the coins that can be mined will become less and less, and gas fees will become the main source of income for miners.

There is always a lot of network redundancy in the blockchain network. After the status update of a node is verified, it needs to be synchronized to the entire network, and the size of the blockchain itself also has a certain limit. restrictions, so the network will try to only perform some simple tasks, such as a simple logic verification or storing a final state. Gas fees can prevent users from performing some complex operations that will overload the network and paralyze it. This It also puts forward requirements for developers of upper-layer applications. The developed Dapps need to balance the complexity on and off the chain.

The existence of Gas fees can prevent DDOS attacks to a certain extent. Without Gas fees, attackers can construct a transaction in which they issue coins to themselves, and this is unlimited and continuous. Occupying network bandwidth and computing resources leads to network paralysis; the existence of gas fees can also prevent infinite loop transactions. After Ethereum, most of the public chains that have emerged basically have Turing-complete characteristics (Turing-complete refers to everything in this system. All computable problems can be calculated, and the biggest feature of Turing completeness is that it supports loops). When loops are allowed, if there is no Gas fee, a type of attacker will initiate a transaction that contains an infinite loop. At this time, the network will fall into an infinite loop and paralyze the network. With Gas fees, attackers need to measure themselves. The gains and gas consumption of malicious attacks are usually not worth it.

The problem of Tongzhao volume brushing in Dapp transactions without Gas fees is similar to that of DDOS. It mostly appears in public chains with mortgage models. When transactions do not require Gas fees, Dapps can control large amounts of The account achieves a large number of transactions and activity.

The Gas fee model creates the need for users to purchase and hold public chain tokens. On the one hand, transactions require Gas for payment. On the one hand, if the gas fee can be distributed to token holders, it will encourage users to continue to hold public chain tokens for a long time, allowing users to maintain expectations for the long-term value growth of the token.

Taking the Ethereum network as an example, when there is a lot of congestion in the entire network, users will try to increase their Gas Price so that their transactions will be confirmed first, which will cause the Gas Price of the entire network to increase significantly. In July this year, Fcoin transaction mining was booming, and a large number of users transferred money on Fcoin. As a result, Ethereum’s gas fee skyrocketed dozens of times. This gas crisis not only had a huge impact on Ethereum itself, but also affected a lot of people. Facing congestion, developers of a batch of Dapps developed based on Ethereum had to repeatedly postpone their plans and even consider changing chains.

For developers, using the bandwidth, computing power and storage resources on the network requires continuous consumption of tokens. Compared with the mortgage model developers, the cost is higher, and the mortgage model developers’ The cost can be regarded as space renting as an investment; for users, using services on the network does not need to go through the cumbersome token purchase process, which greatly reduces the entry threshold for users. In addition, , the free service model of the Internet is deeply imprinted in the hearts of users. When the performance and user experience of the two chains are similar, the Gas-free model will be more attractive to users.

㈥ What exactly is blockchain

Let’s talk about some basic concepts first.

The network said that blockchain is a new usage model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanisms, and encryption algorithms. It is essentially a decentralized database, and as the underlying technology of Bitcoin, it is a series of data blocks generated by cryptography.

We try to translate "what is blockchain" into "human language".

The definition refers to the "decentralized database" nature of blockchain3354. This is very different from the traditional "centralized database" in storage, update and operation.

A centralized database can be thought of as having this shape:

For example, if I want to use Alipay to pay a Taobao seller, all data requests from when I make money to when he receives the money will be centrally processed by Alipay. The advantage of this data structure is that as long as Alipay is responsible for the efficient and safe operation of the system, others can unconditionally believe it without worrying; the disadvantage is that if there is a problem with Alipay, such as being hacked, the server being burned, a traitor appearing, and the company running away (Of course, the possibility of the above is extremely low), the balance details and other information in our Alipay will be confused.

Then some people think that this kind of low-probability event can use any technical means to avoid individual risks, and not only hand over the data to a centralized organization. For example, everyone can store and process data.

The database structure may look like this:

This picture is a schematic structural diagram of a "distributed database". Each peer is a server and they all have equalThe rights record and calculate the data, and the information is disseminated peer-to-peer. At first glance, it seems that it can indeed resist the risk caused by the crash of a certain node, but it is also very confusing and inefficient intuitively. Who will handle my information, and who has the final say on the outcome?

At this time, the "consensus mechanism" in the definition of blockchain comes into play. The consensus mechanism mainly "stipulates" the following things: who will process a data request (what qualifications are required); who will verify the results (to see if he has handled it well); how to prevent processors and verifiers from colluding with each other, etc.

Some people may like to be questioned when a "rule" is made. In order to form a stronger consensus, in addition to making the rules more reasonable, they must also be more attractive so that people are interested and motivated to participate in data processing. This involves the incentive mechanism of the public chain. We will start again later when we discuss the classification of blockchain and the role of digital currencies.

When we hand over a transaction to a distributed network, there is also a "psychological threshold": there are so many nodes that can process information, and I don't know any of them (unlike Alipay, if it hurts me, I can go and file a lawsuit against it). They all have my data, why should I trust them?

At this time, encryption algorithm (the last descriptive word in the definition of blockchain) comes on stage.

In the blockchain network, the data requests we send will be encrypted according to cryptographic principles into a string of characters that the recipient cannot understand at all. Behind this encryption method is the support of a hash algorithm.

Hash algorithms can quickly convert any type of data into hash values. This change is one-way irreversible, deterministic, random, and anti-collision. Because of these characteristics, the person handling my data request could record the information for me, but they had no idea who I was or what I was doing.

So far, the working principle of the decentralized network has been introduced. But we seem to have overlooked one detail. The previous diagram is a net. Where are the pulleys and chains? Why do we call it blockchain?

To understand this matter, we need to clarify a few knowledge points first:

The previous picture is actually a "macro" database perspective, showing the basic rules and processes of the blockchain system for processing information. . And specifically at the "micro" data log level, we will find that the ledger is packaged, compressed, stored in blocks, and strung together in chronological order to form a "chain structure", like this:

Figure Each ring in can be regarded as a building block, and many links are linked together to form a blockchain. Blocks store data, unlike ordinary data storage: on a blockchain, the data in a later block contains the data in the previous block.

In order to academically explain the fields of each part of the data in the block, we tried to use a book metaphor to describe what a blockchain data structure is.

Usually, when we read a book, we read the first page, then the second and third pages. The spine is a physical existence that fixes the order of each page. Even if the book is scattered, the order of each numbered page can be determined.

Inside the blockchain, each block is labeled with a page number, and secondThe content of the first page contains the content of the first page, the content of the third page contains the content of the first and second pages. The tenth page contains the content of the first nine pages.

It is such a nested chain that can be traced back to the original data.

This brings up an important attribute of blockchain: traceability.

When the data in the blockchain needs to be updated, that is when new blocks are generated in sequence, the "consensus algorithm" comes into play again. This algorithm stipulates that a new block can only be formed if it is recognized by more than 51% of the nodes in the entire network. To put it bluntly, it is a matter of voting, and it can be elected if more than half of the people agree. This makes the data on the blockchain difficult to tamper with. If I were to force a change, there would be too many people to bribe and the cost would be too high to be worth it.

This is what people often call the "non-tamperable" feature of blockchain.

Another reason why blockchain gives people a sense of trust is because of "smart contracts."

Smart contracts are commitment agreements defined and automatically executed by computer programs. It is a set of transaction rules executed by code, similar to the current automatic repayment function of credit cards. If you turn on this function, you don’t have to worry about anything. The bank will automatically deduct the money you owe when it is due.

When your friend borrows money from you but doesn't remember to pay it back, or makes excuses not to pay it back, smart contracts can prevent breach of contract. Once the terms in the contract are triggered, such as when it is time to repay the money, or there is a limit in his account, the code will automatically execute, and the money he owes you will be automatically transferred back whether he wants it or not.

Let’s briefly summarize. Blockchain technology is mainly decentralized, difficult to tamper with, and traceable, which represents more security and trustlessness. But it also brings new problems: redundancy and inefficiency, which requires many nodes to agree with the rules and actively participate.

This concludes the "drying" section. Next, let’s talk about unofficial history and the official history of blockchain.

A new technology is often used to serve a certain task.

Or goals. So where was blockchain first used, and who came up with it first?

Let's go back to 2008.

On September 21, Wall Street investment banks collapsed one after another, and the Federal Reserve announced that it would convert the only two remaining investment banks (Goldman Sachs Group and Morgan Stanley) into commercial banks; it hoped to survive the financial crisis by absorbing savings. On October 3, the Bush administration signed a $700 billion financial rescue package.

Twenty-eight days later, on November 1, 2008, a new post appeared in a cryptography mailing group: "I am developing a new electronic currency system that is completely peer-to-peer and does not require a third party. Three-party trust institution." The text of the post is a paper titled "Bitcoin: A Peer-to-Peer Electronic Cash System", signed by Satoshi Nakamoto.

The paper explains the design of this peer-to-peer electronic cash system with a more rigorous logic. It first discusses the problem that financial institutions are subject to "trust based" (based on credit), and then explains step by step how toRealize "no need for third-party agencies" and exquisitely solve the technical problems left by the predecessors.

Two months later, Satoshi Nakamoto released the first version of the open source Bitcoin client and mined 50 Bitcoins for the first time. The block that generated the first batch of Bitcoins is called the "Genesis block". The genesis block was compiled into block 0 and was not uploaded to the chain. It took Satoshi Nakamoto 6 days to mine this block. This also sparked discussion in the bitcointalk forum. Bitcoin "believers" thought of the Bible, "God created the heavens and the earth in six days, and then rested on the seventh day."

Although concepts such as decentralized, token, and economy did not appear in the paper, Satoshi Nakamoto explained in detail the role of blocks and chains in the network. working principle. So, there is Block Chain.

This paper later became the "Bible" of the "Bit Cult", technology became the cornerstone of faith, and developer documentation became the "Code of Hammurabi".

After that, Bitcoin realized the first real-life payment by exchanging pizza, WikiLeaks, whose account was blocked by the US government, miraculously survived by relying on Bitcoin, Satoshi Nakamoto's "decentralization" and retirement, and the appearance of the real and the fake A series of legends such as and refutation of rumors, combined with the expectations, imagination and speculation of later generations, became "Bible stories".

There are also people who are not satisfied with the world described in the "Old Testament" and start new sects, write the doctrines into white papers, and tell the story of their faith in the ten years after Bitcoin. Just like the writing of the 66 books of the Bible spanned 1,500 years, and after 2,000 years of interpretation, Christianity has divided into 33,000 branches.

CoinMarketCap shows that there are more than 4,900 types of digital currencies, and the overall digital currency market size is nearly 140 million yuan. Bitcoin still leads the entire digital currency market with a market share of 66%, and the recent price has been hovering around US$7,200 per coin.

So many currencies have different functions and are divided into different categories: digital currencies represented by Bitcoin are positioned as "digital gold" and have certain value storage and hedging characteristics; Ethereum The digital currency represented by Bitcoin has become the "operational fuel" in its network system; the stable currency represented by USDT and Libra has good payment properties due to its low volatility; the digital currency issued by the central bank represented by DCEP will definitely To a certain extent, it replaces M0, allowing commercial institutions and ordinary people to receive and pay without delay when they are out of cash and disconnected from the Internet.

It can be seen that after 10 years of development of blockchain technology, the first and largest application is digital currency.

Digital currency has also become an attractive reward for participants to maintain the public chain.

So besides digital currency, where else can blockchain technology be used?

Let us recall what the essence of blockchain is—a decentralized database, and its corresponding characteristics: traceability, publicity, anonymity, and tamper-proofing. That makes senseTheoretically, you can try to use blockchain to transform traditional scenarios that use centralized databases to see if they are suitable.

Next, let’s talk about several industries and scenarios where blockchain has been successfully implemented:

Blockchain can prove the existence of a certain file or digital content at a specific time through hash timestamps, providing judicial authentication, Identity proof, property rights protection, anti-counterfeiting traceability, etc. provide perfect solutions

In the field of anti-counterfeiting traceability, blockchain technology can be widely used in various fields such as food and medicine, agricultural products, alcohol, and luxury goods through supply chain tracking.

Give two examples.

Blockchain can allow government data to be run, greatly streamlining service processes

The distributed technology of blockchain can allow government departments to be centralized on one chain, and all service processes are delivered to smart contracts, and the workers only need to be in one department Through identity authentication and electronic signature, smart contracts can be automatically processed and transferred, and all subsequent approvals and signatures can be completed in sequence.

Blockchain invoices are the earliest use of blockchain technology in China. The tax department launched the "Tax Chain" platform for blockchain electronic invoices. The tax department, the issuer, and the payee join the "Tax Chain" network through unique digital identities, truly realizing "instant invoicing for transactions" and "instant reimbursement after invoicing" - in seconds Level invoicing and minute-level reimbursement accounting greatly reduce tax collection and management costs, and effectively solve problems such as data tampering, over-reporting of one ticket, and tax evasion.

Poverty alleviation is another practical application of blockchain technology. Utilize the characteristics of openness, transparency, traceability, and non-tampering of blockchain technology to achieve transparent use, precise investment, and efficient management of poverty alleviation funds.

Give two examples as well.

The eID network identity operation agency guided by the Third Research Institute of the Ministry of Public Security is jointly developing a "digital identity chain" with Gongyilian, which will be issued to Chinese citizens based on the citizen's identity number as the root and cryptographic algorithm. Since it was put into operation, the eID digital identity system has served the full life cycle management of 100 million eIDs, effectively alleviating the problems of personal identity information being fraudulently used, abused and privacy leaked.

Odaily Planet Daily compiled 5 identity chain projects registered with the Cyberspace Administration of China

Blockchain technology naturally has financial attributes

In terms of payment and settlement, under the blockchain distributed ledger system, there are many markets Participants jointly maintain and synchronize a "general ledger" in real time. In just a few minutes, they can complete payment, clearing, and settlement tasks that currently take two or three days to complete, reducing the complexity and cost of cross-bank and cross-border transactions. At the same time, the underlying encryption technology of the blockchain ensures that participants cannot tamper with the ledger, ensuring that transaction records are transparent and safe. Regulators can easily track transactions on the chain and quickly locate high-risk capital flows.

In terms of securities issuance transactions, the traditional stock issuance process is long, costly and complicated. Blockchain technology can weaken the role of underwriting institutions and help all parties establish a fast and accurate information exchange and sharing channel. The issuer can handle the issuance on its own through smart contracts. , regulatory authorities conduct unified review and verification, and investors can also bypass intermediaries for direct operations.

In terms of digital bills and supply chain finance, the districtBlockchain technology can effectively solve the financing difficulties of small and medium-sized enterprises. It is difficult for current supply chain finance to benefit small and medium-sized enterprises in the upper reaches of the industrial chain, because they often do not have direct trade relations with core enterprises, and it is difficult for financial institutions to evaluate their credit qualifications. Based on blockchain technology, we can establish a consortium chain network covering core enterprises, upstream and downstream suppliers, financial institutions, etc. The core enterprises issue accounts receivable vouchers to their suppliers. After the bills are digitized and uploaded to the chain, they can be uploaded to the supplier Transfer between them, each level of supplier can realize the corresponding amount of financing with the digital bill certificate.

Give me an example.

The China Enterprise Cloud Chain, jointly launched by ICBC, Postal Savings Bank of China, 11 central enterprises, etc., has covered 48,000 companies since its establishment in 2017, with the amount of rights confirmed on the chain reaching 100 billion yuan, and factoring financing of 57 billion yuan. , cumulative transactions reached 300 billion yuan. After receiving the loan application, financial institutions can verify the authenticity of the contract on the chain and whether the contract has been verified multiple times (multiple loans); the smart contract automatically clears and settles, reducing costs and increasing efficiency; at the same time, the accounts payable of core enterprises can have The corresponding vouchers will be split by the first-level suppliers and handed over to the second- and third-level suppliers in the chain to help them with financing; core enterprises can also use this to understand whether the entire chain is operating normally and avoid emergencies. Redemption pressure.

Blockchain technology will greatly optimize the existing use of big data and play a huge role in data circulation and sharing

The aforementioned areas are areas that we are relatively familiar with. As more new technologies develop, blockchain may be able to be combined with them and play a role in unexpected cross-fields and new scenarios that are currently unforeseen.

In the future, the Internet, artificial intelligence, and the Internet of Things will generate massive amounts of data. The existing centralized data storage (computing model) will face huge challenges. Edge storage (computing) based on blockchain technology is expected to become a future solution. Furthermore, the non-tampering and traceability mechanism of blockchain ensures the authenticity and high quality of data, which becomes the basis for the use of all data such as big data, deep learning, and artificial intelligence.

Finally, blockchain can realize multi-party collaborative data calculations while protecting data privacy, and is expected to solve the problems of "data monopoly" and "data islands" and realize the value of data circulation.

In response to the current blockchain development stage, in order to meet the blockchain development and use needs of general business users, many traditional cloud service providers have begun to deploy their own BaaS ("Blockchain as a Service") solutions. The combination of blockchain and cloud computing will effectively reduce enterprise blockchain deployment costs and promote the implementation of blockchain usage scenarios. In the future, blockchain technology will also play an important role in many fields such as charity, insurance, energy, logistics, and the Internet of Things.

During this trial process from traditional technology to blockchain, we found that when certain scenarios have stronger demands for traceability, tamper-proofing, and decentralization, they also have problems with the weaknesses of blockchain (such as performance). , the requirements are not high, and this field is quite suitable for combining blockchain.

At the same time, in the process of evolution, the blockchain has also developed from a highly decentralized public chain accessible to everyone to one with different rights.The alliance chain is limited and maintained by multiple centers, balancing the advantages and disadvantages of the two systems to a certain extent.

Typical examples of alliance chains include: FISCO BCOS jointly developed by WeBank and the Golden Alliance Open Source Working Group, Fabric, a major contribution from IBM, and Ant Alliance Chain led by Ant Blockchain, etc.

These trustless systems represent more secure data authentication and storage mechanisms, where data is effectively authenticated and protected. Businesses or individuals can exchange or enter into contracts digitally, where these contracts are embedded in code and stored in transparent, shared databases where they cannot be deleted, tampered with, or revised.

It is boldly predicted that in the future, contracts, audits, tasks, and payments will all be digitized with unique and secure signatures. Digital signatures will be permanently identified, authenticated, legalized, and stored, and cannot be tampered with. There is no need for an intermediary to guarantee each of your transactions. You can conduct transactions without knowing the basic information of the other party. While improving information security, it effectively reduces transaction costs and improves transaction efficiency.

Generally speaking, there has been a lot of progress in the implementation of blockchain compared to two years ago.

Many improvements are at the bottom of the system, and users cannot directly see that blockchain is used, but they have actually benefited from it; some applications are still in pilot mode, and users have not yet been able to experience it. In the future, blockchain is expected to be used on a large scale and become one of the Internet infrastructure.

I hope that after reading this, you have a general understanding of what blockchain is and what blockchain can do.

Related Q&A: What is blockchain

Blockchain is actually equivalent to a disintermediated database, which is composed of a series of data blocks. Each of its data blocks contains information about a Bitcoin network transaction, which is used to verify the validity of the information and generate the next block.

In a narrow sense, blockchain is a chain data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be non-tamperable and non-forgeable. distributed ledger.

In a broad sense, blockchain is actually a distributed infrastructure and computing method, which is used to ensure the security of data transmission and access.

Blockchain infrastructure:

Blockchain is composed of six infrastructures: data layer, network layer, consensus layer, incentive layer, contract layer and usage layer.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 35812 文章总数
  • 3637265访问次数
  • 3078建站天数