为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

万向区块链肖风的女儿,万向区块链官网

发布时间:2023-12-06-06:35:00 来源:网络 区块链知识 万向   区块

万向区块链肖风的女儿,万向区块链官网


请查看相关英文文档

『一』 "The Real Business Opportunities of the Blockchain" pdf download and read the full text online, please ask for Baidu network disk cloud resources

"The Real Business Opportunities of the Blockchain" network disk Download the latest full set of pdf:
Link: https://pan..com/s/1HSMqwIO2xSgHQ_aGBo3dkw

?pwd=1obk Extraction code: 1obk
Introduction: Global technology trend giant Gartner leads the way A work of the times, a business treasure hunt map that makes blockchain truly come to fruition, the blockchain version of "Big Data Era", Bai Shuo from Shanghai Stock Exchange, Xiao Feng from Wanxiang Blockchain, Duan Yongchao from Wei Cao Zhiku, and Yu from Huobi University Strongly recommended by Jianing and Chen Yongwei, director of the research department of "Comparison".

『二』How to use smart contracts in prisons

The era of digital prisons has gradually moved towards the era of smart prisons. Smart prisons are the basis for the informatization construction of prisons. The highest form. In view of the problems such as data centralization and lack of security in smart prisons, this article analyzes the advantages and feasibility of applying blockchain technology to smart prisons, uses smart contract technology, and proposes a smart prison management system based on private chains. The design ensures the sharing, confidentiality and non-tamperability of system information. It aims to provide reference for the "blockchain+" prison management innovation model.

In December 2016, "blockchain" was included in the "Notice of the State Council on Issuing the National Informatization Plan for the 13th Five-Year Plan" for the first time. The prison system should keep up with the pace and actively develop a new development The road called blockchain technology was first proposed in the paper published by Satoshi Nakamoto in 2008. Later, it successively experienced the blockchain 1.0 with the block chain data structure as the unit, and the creation of a shared technology platform. Blockchain 2.0, Blockchain 3.0 with the Internet of Value as its core.

Nowadays, blockchain technology is gradually developing, which has attracted great attention at home and abroad. The following describes the development of blockchain technology in recent years from the following three aspects.

Foreign institutional regulatory aspects:

On June 4, 2015, the New York Department of Financial Services (NYDFS) released BitLincense, a regulatory framework for digital cryptocurrency companies. In October 2015, the Obama administration and private companies formed a "Blockchain Alliance" partnership with the purpose of regulating and preventing the use of digital cryptocurrency for illegal purposes.

On January 19, 2016, the British government announced "Distributed Ledger Technology: Beyond Blockchain"; in February 2016, the European Commission (EC) announced the European Anti-Money Laundering and Counter-Terrorist Finance Regulatory planning.

On May 25, 2017, the U.S. Defense Advanced Research Projects Agency requested the Indian Technology and Manufacturing Corporation (ITAMCO) to develop a platform using the blockchain protocol.

Educational and scientific research development level:

In September 2015, Xiao Feng, Ethereum founder Vitalik Buterin and BitShares co-founder Shen Bo jointly established the "Blockchain Laboratory" to promote blockchain Technology education;

In 2016, the University of California, Berkeley, launched an undergraduate education program on blockchain;

In March 2018, it was jointly launched by a number of scholars from the University of Oxford The first university based on blockchain technology, "Wulf University", was established.

Enterprise application research level:

Many domestic and foreign companies have been committed to the design and application promotion of blockchain architecture. As mentioned in the literature, New York State Power Company TransActiveGrid established a microgrid network; The Linux Foundation proposed the Hyperledger project in 2015; On May 31, 2016, Tencent’s cooperation alliance on blockchain in financial applications (Shenzhen) was established ; The People's Bank of China established the Digital Currency Research Institute in 2017.

Although blockchain technology has made great progress, it still needs to be further strengthened in terms of feasibility, security and supervision. It is expected that it will take 5 to 10 years to reach maturity. . With the gradual improvement of blockchain technology, based on the concept that theory must guide practice, otherwise it is just a virtual concept, blockchain technology has been widely used.

There are many successful cases of blockchain being applied to medicine. For example, Guardtime, the world’s largest blockchain company, uses joint negotiations between various nodes of the blockchain to improve the security protection of data in smart medical care. , achieving safe storage of 1 million pieces of data, and there are few cases of applying blockchain technology to prison informatization.

For smart prisons, security is the basic condition for all business operations, and information security and data security are core elements. This article analyzes the problems existing in the current prison informatization construction process, explores how to reduce trust procedures, provide safe and reliable data storage, improve work processing efficiency and other issues based on blockchain technology, and lays the foundation for the application of blockchain in prison systems. The necessary knowledge reserves are returned.

Analysis of the current situation of smart prisons

1.1 Concept of smart prisons

Smart prisons use the Internet, cloud computing, and big data to integrate the internal systems of prisons environment, people flow, and information flow, use smart communication and smart control to realize digital collection of information, network transmission of information, and intelligent management of information, build a data linkage mechanism, and use data mining for prison data to form prison big data. Conduct analysis and build a smart prison.

1.2 Problem analysis of smart prisons

So far, prisons across the country have basically deployed smart alarm systems, prison wall perimeters, and comprehensive access controlsystems, etc., the level of prison informatization construction has been significantly improved, but there is still a gap between it and the ideal state, mainly in the following aspects:

The level of information sharing is low

Data barriers The problem seriously hinders the development of prison informatization: there are many types of criminal information, strong complementarity, and complex relationships. The degree of data integration within the prison is low, and there is a lack of information sharing mechanism, making it difficult to form a synergistic effect. There is cross-entry of information within the system, resulting in redundant storage and a waste of police resources.

It is difficult to ensure the accuracy of information

Most of the existing database construction is the construction of basic data, such as the criminal information system, which must ensure the accuracy of the information and can As a judicial basis, the current problem of biased identity information and inaccurate prison performance data due to human errors or errors has seriously damaged the image of law enforcement.

The information security mechanism is not perfect

The information security structure is immature, the details are not clearly described, there is a lack of security standards in specific management, and there is a lack of practical experience in application, which cannot guarantee the complete storage of information. and secure transmission, information loss, leakage, tampering and other phenomena are possible.

Vulnerabilities in security equipment are inevitable

The ratio of security equipment determines the security of the prison to a large extent. Today’s access control systems have added one door after another, and isolation Network walls have been built one after another, but after all, they are the defense line of "things" and there are still many technical problems that need to be solved. For example, positioning technology based on video roll call, barcode scanning, etc. sometimes leads to inaccurate roll call;

High-investment video surveillance is mainly used for evidence collection after the fact. It cannot make full use of big data to analyze criminals’ call records, behavioral habits, contact circles, family background, etc., to carry out necessary surveillance warnings and intelligent image analysis to avoid escape or Possibility of suicide.

Advantages of blockchain technology

Blockchain uses data encryption technology to store data blocks in the form of a chain storage structure. Each block includes a block header and The block body, the block header stores the hash value of the previous block, acts like a pointer, and the block body stores verified and legal records and timestamps.

Blockchain uses P2P and consensus mechanisms to establish trust in distributed storage nodes;

Uses smart contracts to realize automatic execution of transactions and is accurate and free from external interference. Run;

Use "scripts" to automatically operate data and implement programmable databases.

Blockchain may become a protocol to create trust, similar to the HTTP protocol and TCP/IP protocol, using computer programming languages ​​to develop decentralized products.

Data storage: Blockchain is a decentralized storage structure. Multiple nodes form an end-to-end network. EachThe status of the nodes is equal, and the failure of individual nodes will not affect the entire system, which can solve the problem of poor sharing within the prison system;

If the data of a certain block is changed in the blockchain , it is necessary to change all the data behind this block, so it is difficult to implement. The mechanism of the blockchain itself makes it unchangeable, even internal staff cannot change it, ensuring that the data in the prison system cannot be changed once it is uploaded to the chain;

The more nodes connected to the blockchain, the higher the security. When 6 blocks are connected after the block, the information is almost impossible to be tampered with. This is called a stable state circle. Realize reliable storage of data in smart prisons.

Data traceability: The chain storage structure using timestamp and encryption technology ensures that every transaction can be traced. Implement data forensic operations in smart prisons. Blockchain nodes use mutual verification to ensure accuracy. If there is any doubt about a transaction, backtracking transaction records can be used to accurately determine the authenticity. For example, the product information of the prison production workshop is stored on the chain. The product information includes accessory traceability information and accessory product inspection certificates, so that the quality compliance of the product can be checked.

Data transactions: All data transmission is based on public key addresses, rather than specific personal identities. Transactions in the blockchain are completed anonymously, but there is no way to know the truth. Identity and anonymity features provide security protection for whistleblowers; blockchain is a network that creates trust. Nodes operate according to rules to achieve trust in the entire system. Data records and rules in the blockchain are transparent and can be used by anyone. A public interface can be used to query the data, and it cannot be changed manually. All data in the prison system can be uploaded to the blockchain and the data can be transmitted in real time.

Data security: Blockchain can be seen as a set of protocols and blockchains that use encryption algorithms and consensus mechanisms to ensure that data is not tampered with. The longest chain is used as a proof of workload. As long as the long chain is created by honest miners, the blockchain is safe, using timestamps to identify the sequence and avoid repeated transactions.

Blockchain uses hash functions to ensure the ownership of data. Table 1 is used as an example.



Satoshi Nakamoto of the United States proposed the probability theory model of Poisson distribution. After calculating a new hash header, N headers must be appended later ( After the name, entry, lamp...), the harvest is recognized, which is difficult to achieve if the attacker does not control more than 51% of the computing power. The probability of the attacker catching up with the z-th block is shown in the following formula: P represents the probability of the honest person discovering the next node, and 0 represents the probability of the attacker discovering the next node.

The analysis shows that as z increases, the chance of catching up becomes smaller and smaller. Therefore, mathematical methods have been used to prove that the special structure of the blockchain achieves its non-tamperability.

Research on the application of blockchain technology

Blockchain is divided into public chains, consortium chain and private chain. Since the private chain mainly provides a safe, traceable, non-tamperable, and automatically executed computing platform, it can avoid attacks on data from both internal and external sources at the same time. Therefore, it is in line with a prison that carries fairness, justice, strictness, and reliability. environment.

Firstly, use the blockchain to save information and ensure that it cannot be changed.

Secondly, realize the sharing of information and build good cross-platform collaboration.

Use IPFS (Interplanetary File System) to encrypt and save data, and combine it with smart contracts to protect and share information. The blockchain system is connected to the original system using interfaces to protect the original information system. . IPFS includes block exchange, hash table, etc. When saving a file, the file fingerprint is obtained. After obtaining the file, the file is taken out and verified through the file fingerprint, and then returned.

3.1 Feasibility Analysis

In the field of smart prisons, the decentralization of blockchain can integrate different data resources into one blockchain, using blockchain Distributed storage combined with certain cloud storage technology enables the storage of smart prison information.

Use the consensus mechanism of the blockchain to achieve anonymity of information and ensure privacy protection. The consensus mechanism is to confirm transactions through voting. The consensus mechanism of the blockchain ensures that the prefixes of all honest miners' blockchains are the same, and also ensures that the information released by honest miners will be added to their own blockchains by other honest miners. The consensus mechanism has PoW (Proof) computing power. of Work), PoS (Proof of Stake) for financial resources, etc. The faster the blockchain operates, the more expensive the consensus will be.

Use the data encryption hash algorithm to solve the permission problem after sharing, ensure the non-tamperability of data, and reduce the trust risk of the system. Apply blockchain to smart prisons to save original data and prevent human intervention. Tampering, put an end to "relationship-based" tampering with basic criminal performance data, and improve the credibility of the data.

Each node of the blockchain saves a complete data backup. Even if the data of a certain node is lost, the data can be restored from other nodes. Applying blockchain technology to data collection and adding time stamps to the original data added to the blockchain to prove the authenticity of the data is a lower-cost verification process.

3.2 ​​Architecture

Make full use of the characteristics of the blockchain to design the system architecture as shown in Figure 2, to integrate the data resources of each prison into the blockchain. The Prison Administration Bureau is responsible for the supervision of the blockchain, completing the uplinking of data and the sharing of information.



3.2.1 Criminal Module

Basic personal information

will beBlockchain is used to save basic information records of prisoners, that is, each prisoner has a ledger, thus having a complete database about his or her past. The master of these data is the criminal himself, which fully reflects an important consideration in the modernization of smart prisons. The standard "humanity" avoids loopholes in criminal psychology from the perspective of human nature.

Performance data in prison

Criminals will undergo labor reform and ideological reform in prison. Performance data in prison is very important and is an important basis for reducing the prison sentence, so it must be ensured Data authenticity and non-tamperability. Based on the unique data security of the blockchain, the records on the blockchain can be fully utilized to determine whether the conditions for commutation are met. The data obtained from the prison system's video surveillance uses "blockchain + artificial intelligence" technology to analyze the behavior of prisoners to avoid escapes and suicides.

3.2.2 Police officer module

Police officer resume

Including the police officer’s birth background, education level, work experience, work performance, Year-end assessments, etc., form a multi-party consensus on police electronic files, using technical means to avoid cumbersome information integration and reduce the work of file management.

Police patrol management

Record police patrol routes and save them to accurately evaluate performance during working hours; record whether police officers can walk among criminals and understand their The idea of ​​fluctuating and building a good police-prisoner relationship is called

3.2.3 Financial data management module

Daily expenses

Real-time data on all expenses in the prison Depositing into the blockchain achieves process transparency and information accuracy, and better enables the supervision of financial funds.

Labor Income

Due to the particularity of labor, the traceability certification of labor products is put under supervision through the blockchain, and fingerprint records are stored throughout the manufacturing process as data storage. Certification, due to the openness of the process, sabotage by extremists is avoided and the safety of the product is ensured.

3.2.4 Information Management Module

Daily documents, work arrangements and meeting records are stored in the blockchain in a timely manner, and the real-time transmission of blockchain information is used to enable everyone to You can get the latest information in time. Set up hierarchical control of data access rights for data in the chain. The amount of information obtained at different levels is also different. Through encryption algorithms, the data can only be read by relevant personnel, thus strengthening the protection of private content and improving data security.

3.2.5 Monitoring Center Module

Monitors the prison building, production workshop, canteen and surrounding areas of the prison in real time, and alerts the police in case of emergencies. Carry out early warning judgment on the monitoring center data to nip incidents in the bud. Monitoring data is packaged and uploaded to the chain in a timely manner. Important passages in the prison record real-time records of people entering and exiting, and additional facilities are installed in restricted areas.Access control. The prison cells are cleaned once every hour. If there are not enough people, the police will be called. The working area must also be checked every half hour. Reduce police force and improve prison security through necessary monitoring measures.

3.3 Data types of blockchain in smart prisons

Blockchain in smart prisons uses a variety of data types to store different data in different ways. The blockchain API/SDK will be adapted to receive and format these data. The core data and measurement certificate will be signed and uploaded to the chain for storage. After the hash value of the file is stored in the blockchain, the user can search for the file on the client and use IPFS. Obtain the destination file from the network. Use the tamper-proof nature of the blockchain to avoid human tampering; use the timestamps and hash values ​​on the chain to track the entire process of data changes in real time, and the data anti-counterfeiting is enhanced. As shown in Figure 3.



3.4 Adopt smart contract virtual machine layering idea

Smart contract is the code of the blockchain that can be run by all nodes. According to the set Assets are managed according to rules, and through multi-party collaboration, error risks are eliminated and transparent operation returns are achieved for each user. On-chain scripts realize the programmability of blockchain and automatic execution of smart contracts. With the strengthening of the script mechanism, the integrated development of blockchain and smart contracts is realized. On-chain scripts provide an extended interface for the blockchain, and anyone can Use scripts to implement blockchain applications.

The top-level DSL engine translates DSL into the smart contract development language Solidity. Solidity is a static language. After it is compiled and sent to the network, it can be called by Ethereum to implement web applications. The middle-level Solidity After the language is checked by security analysis tools, it is converted into an EVM instruction set. EVM allows developers to use high-level languages ​​to compile smart contracts, and then use EVM to compile into bytecode and deploy it in the blockchain to realize the development of smart contracts. The bottom layer is The plug-and-play architecture can run directly on the EVM virtual machine, or it can be converted and run on the WASM virtual machine.

Use relatively strict contracts and virtual machines in advance, undergo strict review and formal proof before going online, and strengthen operational control and accountability afterwards.

3.5 Privacy Data Processing

Since the blockchain is a P2P network and uses relay forwarding for communication, it is difficult to speculate on the destination of information dissemination. Since the address created by the user is used in specific transactions to achieve anonymous operations, it has nothing to do with personal specific information, and the security of data storage is better achieved. Privacy in the blockchain is divided into transaction privacy and identity privacy. The permission hierarchical design is shown in Figure 5.



Only part of the data can be disclosed. For more sensitive data, use private key authorization to set up privacy data protection. Use encryption algorithms and smart contracts to achieve privacy protectionProtection of private data, such as criminals' and police officers' personal information modules, is stored in the blockchain together with encryption keys, and digital fingerprints are used to prevent information from being leaked. The parties can use smart contracts to change data access permissions. There are the following access permissions:

Control permissions: For the prisoner module, the prisoner has it; for the police module, the police officer has it.

Virtual permissions: You can only view the ciphertext but cannot actually access the internal data.

Conclusion

Conscientiously implement the spirit of the 19th National Congress of the Communist Party of China, actively implement the strategic plan of "powering the country with science and technology, powering the network, digital China, and smart society", adhering to the principle of "there will be no information without informatization" "No modernization" work idea, focusing on scientific, refined and intelligent efforts, creating a new atmosphere in which "prison guard brains" are extremely smart, "sensing tentacles" are everywhere, and "smart prisons" protect safety, and promote block The in-depth integration and development of advanced technologies such as blockchain, cloud computing, and big data in prison work strives to transform criminals into law-abiding citizens and maintain social security and stability.

Smart prison is the basic direction for the informatization construction of the future prison system. It is a reflection of the concept of smart city and smart earth in the prison field. It strengthens the research and exploration of smart prisons and strives to guide the informatization construction of prisons. Development in a broader and deeper direction has provided considerable impetus for prison modernization.

The article discusses some problems existing in smart prisons and explores the use of blockchain technology features to achieve non-tamperability and traceability of data information, including how to store and protect data on the blockchain Privacy, explore and solve existing problems in smart prisons.

If successful cases of practical application of blockchain can be re-developed, costs can be saved and the stability of operation can be guaranteed. Next, we will actively explore practical and effective blockchain applications, persist in not forgetting the original intention and keeping the mission in mind, and actively strive to explore the development of prison informatization construction to a higher level and achieve greater results.

『三』 Is the currency Ethereum safe and reliable?

It is safe and reliable.
1. Ethereum is the second-ranked digital currency after Bitcoin. Ethereum is an extremely important mining community in China.
2. Ethereum has a special connection with China’s encryption community. Vitalik Buterin, co-founder of Ethereum, Xiao Feng of Wanxiang Blockchain Labs and Shen Bo of Fenbushi Capital co-founded two entities in October 2015. One is Fenbushi Capital, which invests in blockchain startups, and the other is Wanxiang Blockchain Lab, a non-profit organization that supports non-commercial projects.

『四』Please download the full text of "The Real Business Opportunities of the Blockchain" for free from Baidu Netdisk resources, thank you~

The latest complete collection of "The Real Business Opportunities of the Blockchain" Netdisk pdf Download:
Link: https://pan..com/s/1HSMqwIO2xSgHQ_aGBo3dkw

?pwd=1obk Extraction code: 1obk
Introduction: Global technology trend giant Gartner leads the times, a business treasure hunt map that makes blockchain truly come true, blockchain version "Big Data Era" is highly recommended by Bai Shuo of the Shanghai Stock Exchange, Xiao Feng of Wanxiang Blockchain, Duan Yongchao of Wei Cao Zhiku, Yu Jianing of Huobi University, and Chen Yongwei, director of the research department of "Comparison".

『五』What conditions are needed for large-scale commercial application of blockchain?

One of the three conditions for realizing large-scale implementation of blockchain application It is a blockchain 3.0 technology that can improve the performance of the blockchain, improve ease of use, operability, and scalability, and involves new side chains, sub-chains, cross-chains, layering, sharding, partitioning and other technologies. According to Xiao Feng’s observation, most of these technologies will mature in 2019, and the mainnet will be online. The launch of these new technologies is the prerequisite for large-scale commercial application of blockchain. Therefore, from a technical perspective, we can expect large-scale commercial applications of blockchain after 2019.
The second is that the maturity of the technology is not enough. To truly realize a large number of Dapps and a large number of commercial applications on the blockchain, one must also be prepared: that it can truly be used as a payment tool and exchange. Digital currency as medium, value measure, and value store. Xiao Feng said that everyone thinks that Bitcoin is a payment system, but the real Bitcoin cannot meet our payment needs because its currency value fluctuates too much.
As an example, he said that a shopping mall sold a bottle of water and accepted Bitcoin payment. When he got up the next morning, he found that 20% of the value was gone. So it cannot be accepted. After the Japanese Diet clarified that Bitcoin can be used as a payment instrument, some Japanese merchants announced that they accept Bitcoin payments. But it later turned out that it caused a lot of trouble for the stability of the company's balance sheet. Up or down, your balance sheet is unstable. This not only affects whether the things sold are valuable, but also affects the company's credit evaluation and the services provided by the bank to the company.
The third condition is the construction of laws and regulations and the construction of a regulatory system. The digital economy on the blockchain must be legally protected and must be compliant. Xiao Feng emphasized that in this regard, there is no possibility of decentralization.
The difference between blockchain and the Internet gives my own point of view. He believes that the core difference between the two is that the Internet is a centralized trust mechanism, while the blockchain is a decentralized trust mechanism that does not require trust in a third party.
The second core difference between the Internet and blockchain is the incentive mechanism, not digital currency or whether coins can be issued. Economics has long discussed the problem of incentive incompatibility. Under the corporate system, on the Internet, the incompatibility of incentive mechanisms has not been resolved. But on the decentralized blockchain, the blockchain achieves complete incentive compatibility. There are no shareholders, no board of directors, and no employees, and conflicts of interest between these roles will no longer occur.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 36408 文章总数
  • 3637265访问次数
  • 3078建站天数