北京点点链科技有限公司,北京点点智联科技有限公司
请查看相关英文文档
❶ Is ggm Global Gold Mine a pyramid scheme?
As of November 30, 2018, ggm Global Gold Mine has not been recognized as a pyramid scheme. ggm Global Gold Mine is a project of Beijing Huixin Fund Management Co., Ltd.
On May 26, under the guidance of the Chinese Academy of Social Sciences, the Qiushuishan Hotel in Shenzhen, Guangdong successfully held the "2018 Blockchain and Digital Economy Security Strategy Summit". This meeting was organized by the China National Conditions Research Association , National Conditions and Strength Magazine, China International Financial Strategy Research Center, Shenzhen Municipal People's Government, hosted by Guofu Fund Management Co., Ltd., Guofu Digital Asset Trading Center Co., Ltd. (preparation);
Guofu Financial Information Services Co., Ltd. (Preparation), Guofu Group Economic Security Work Management Committee, Taishanghuang Health Industry Group Co., Ltd., Shenzhen Qianhai Zhongxiang Century Technology Co., Ltd., Leou (Shenzhen) Cultural Tourism Development Co., Ltd., Zhongchi Global Hui Hong Kong Listed Company, Guofu Fund Management Co., Ltd., Jinjia Enterprise Management Co., Ltd., and Huixin Fund (GGM) co-organized.
Guofu Holdings Group Co., Ltd. (referred to as Guofu Group) is a comprehensive large-scale enterprise group established through the mixed ownership reform of Guofu Fund Management Co., Ltd. by a special central enterprise.
Based on the responsibility and mission of serving national economic security, it is committed to providing the society with a standardized and controllable comprehensive development platform of "resource-based entities + financial technology innovation + shared economic services". In accordance with the market-oriented, enterprise socialized operation model, we will promote the standardized, safe, healthy and orderly scientific development of the sharing economy in the new era.
At the summit, Dr. Hu Zhengyuan, director of the China Innovative National Strategy Promotion Committee, chief expert of the national think tank, and chief consultant of the Guangdong-Hong Kong-Macao Greater Bay Area, and Dr. Xie Wenze, a digital economy research expert at the Chinese Academy of Social Sciences;
Mr. Qin Jin, a research expert on China’s smart urban and rural economy and leader of the organizing committee of the Guofu Digital Asset Trading Center, Professor Deng Chongyun, a director of Renmin University of China and a senior gold industry expert, and Chief Lawyer Zhang Yu, an expert on China’s digital economy law, discussed the above topics. Did an in-depth discussion.
At the summit, the Guofu Economic Security Work Governance Committee, the Sharing Economy Research Institute, and the Digital Economy Security Research Group were established to standardize, safely, healthily, and orderly develop the blockchain digital economy. Security and supervision appeared as themes for the first time, and the era of market regulation in the blockchain industry has arrived. Comrade Li Jun was also appointed as the director of the Guofu Economic Security Governance Committee.
Huixin Fund GGM Global Gold Mine Project was also officially launched at the summit. It is the first to combine blockchain technology with the actual production department to achieve high transparency and fair distribution of profits. .
❷ What blockchain technology application and development platforms are currently available in China
The so-called blockchain technology, referred to as BT (Blockchain technology), Also known as distributed ledger technologyTechnology is an Internet database technology that is characterized by decentralization, openness and transparency, allowing everyone to participate in database records.
❸ Which company is the "World Cup Blockchain" mentioned in the "Dialogue" column of CCTV 2 on the evening of June 3? It is the star James Rodriguez entering the blockchain or something else
The company that J Luo cooperates with is called SelfSell, the world's number one personal assetization platform. The founder is Yuan Li. Judging from the name, he is probably a Chinese.
SelfSell has released James Rodríguez’s token. James Rodríguez’s cryptocurrency is called JR10 Token. JR is the abbreviation of his initials and 10 is his jersey number. This cryptocurrency will be launched on June 12 this year. For sale to the public.
The SelfSell token is SSC and can now be traded on Okex and Lbank
More information can be found online, thank you
❹ How to calculate the results of the Zhilian Blockchain Financial Application Practice Platform p>
1. Proof of Work (PoW)
Bitcoin proposed by Satoshi Nakamoto in 2009 is the earliest application of blockchain technology. It uses PoW as the consensus algorithm. Its core idea is Nodes compete for hash power to obtain accounting rights and Bitcoin rewards. In PoW, different nodes compete to calculate the solution to a mathematical problem based on specific information. This mathematical problem is difficult to solve, but it is easy to verify the results. The node that solves the mathematical problem first can create the next block and obtain a certain amount. coin rewards. Satoshi Nakamoto used the HashCash[4] mechanism to design this mathematical problem in Bitcoin. This section will take the PoW algorithm used by Bitcoin as an example. The consensus steps of PoW are as follows:
The node collects the transactions to be confirmed on the entire network after the previous block was generated, and records the eligible transactions into the transaction memory pool. , then update and calculate the value of the Merkle root of the transaction in the memory pool, and write it into the block header;
In the block header, fill in the block version number and previous block as shown in Table 1.1 The hash value, timestamp, current target hash value and random number and other information;
Table 1.1 Block header information
The random number nonce takes a value between 0 and 232, and the block header Hash calculation is performed on the local information. When the hash value is less than or equal to the target value, the block is packaged and broadcast, and accounting is completed after verification by other nodes;
If a hash that meets the requirements cannot be calculated within a certain period of time value, repeat step 2. If other nodes complete the calculation during the calculation, start again from step 1.
The average time it takes for Bitcoin to generate a block is 10 minutes. If you want to maintain this speed, you need to adjust the target value (difficulty) based on the current computing power of the entire network [5]. Difficulty is a description of the difficulty of calculating a block that meets the requirements. When calculating blocks of the same height, the difficulty of all nodes is the same, which also ensures that miningMine fairness. The relationship between difficulty and target value is:
Difficulty value = maximum target value/current target value (1.1)
The maximum target value and the current target value are both 256 bits in length, and the maximum target value is a difficulty of 1 The target value at that time is 2224. Assume that the current difficulty is, the computing power is, the current target value is, and the average calculation time to find a new block is, then
According to the design of Bitcoin, the system will adjust once every 2016 blocks are generated (about 2 weeks) Current target value. The node calculates the adjusted difficulty value according to formula (1.4) based on the actual production time of the first 2016 blocks. If the actual production time is less than 2 weeks, increase the difficulty value; if the actual time production is greater than 2 weeks, decrease the difficulty value. value. According to the longest chain principle, without the need for nodes to synchronize difficulty information, all nodes will get the same difficulty value after a certain period of time.
In a blockchain using PoW, due to network delays and other reasons, when two blocks of the same height are generated close to each other, a fork may occur. That is, different miners have calculated blocks that meet the requirements of a certain height and have been confirmed by nodes close to them. The nodes in the entire network will continue to mine based on the block received first based on the time when the block was received. . In this case, whichever block's subsequent blocks appear first will become longer, and this block will be included in the main chain. Nodes mining on the non-main chain will switch to the main chain to continue mining. .
The PoW consensus algorithm uses computing power as the basis for competition for accounting rights and workload as a guarantee of security. All miners follow the longest chain principle. The newly generated block contains the hash value of the previous block. All existing blocks form a chain. The length of the chain is proportional to the workload. All nodes trust the longest blockchain. If an organization acquires enough computing power, it can launch an attack on the Bitcoin network. When an attacker has enough computing power, he can calculate the latest block first and thus master the longest chain. At this time, most of the blocks on the Bitcoin main chain are generated by it. He can deliberately refuse to confirm certain transactions and carry out double-spend attacks. This will affect the credibility of the Bitcoin network, but this behavior will also causing losses to the attacker. By solving the one-dimensional random walk problem, the relationship between the probability of successful attack by malicious nodes and the computing power can be obtained:
Figure 1.1 The attacker’s computing power and the probability of successful attack
2. Proof of Stake (PoS)
As more and more people participate in Bitcoin mining, many problems of PoW gradually emerge. For example, as the competition for computing power rapidly intensifies, the energy consumed to obtain tokens increases significantly, and the accounting rights gradually increase. "Mining pools" that gather a large amount of computing power are concentrated [6-9]. To this end, researchers are trying to use new mechanisms to replace proof of work. The concept of PoS was mentioned in the earliest Bitcoin project, but was not used due to reasons such as robustness. The earliest application of PoS is PPCoin. PoS proposes the concept of currency age. Coin age is the relationship between the tokens held and the currency held.There is accumulation of time products, and the calculation is as shown in formula (1.4). Utilizing currency age competition to replace computing power competition enables blockchain proof to no longer rely solely on workload, effectively solving the resource waste problem of PoW.
The holding time is the time since a certain currency was last traded on the network. The longer the currency held by each node, the more rights it has in the network. At the same time, the holder of the currency will also Obtain a certain amount of income based on the age of the currency. In the design of Peercoin, it is not completely separated from the proof of work. Obtaining the accounting rights of the PoS mechanism also requires simple hash calculation:
where proofhash is composed of weight factor, unconsumed output value and current time The fuzzy and hash values obtained also limit the computing power of each node. It can be seen that the currency age is inversely proportional to the difficulty of calculation. In PoS, the security of the blockchain increases as the value of the blockchain increases. Attacks on the blockchain require attackers to accumulate a large amount of currency age, which means they need to hold a large amount of digital currency for a long enough time. This also greatly increases the difficulty of the attack. Compared with PoW, blockchain systems using PoS may face Long Range Attack and Nothing at Stake.
In addition to Peercoin, many coins also use PoS, but they have different methods for allocating accounting rights. For example, Nxt and BlackCion combine the rights owned by nodes and use random algorithms to allocate accounting rights. Ethereum is also gradually adopting PoS instead of PoW.
3. Delegated Proof of Stake (DPoS)
At the beginning of the design of Bitcoin, it was hoped that all mining participants would use CPUs for calculations, and the computing power would match the nodes, so that each node would have enough opportunities to participate. Blockchain decision-making. With the development of technology, a large number of mining machines using GPU, FPGA, ASIC and other technologies have emerged. The computing power is concentrated in the hands of participants with a large number of mining machines, while the opportunities for ordinary miners to participate are greatly reduced.
In a blockchain using DPoS, each node can vote to select representatives based on the share rights it owns. The n nodes in the entire network that participate in the election and receive the most votes gain accounting rights in a predetermined order. Produce blocks in sequence and receive certain rewards for doing so. Representative nodes that succeed in the election need to pay a certain amount of deposit and must ensure online time. If the node that should generate blocks at a certain moment fails to perform its duties, he will be disqualified as a representative, and the system will continue to vote to elect a new representative. to replace him.
All nodes in DPoS can independently choose the objects to vote. The elected representatives are accounted for in order. Compared with PoW and PoS, computing resources are saved. Moreover, there are only a limited number of consensus nodes, and the efficiency is also improved. promote. Moreover, each participating node has the right to vote. When there are enough nodes in the network, the security and decentralization of DPoS are also guaranteed.
4. Practical Byzantine Fault Tolerance Algorithm (PBFT)
In the PBFT algorithm, all nodes run under the same configuration and have one master node, and other nodes serve as backup nodes. The primary node is responsible for sorting client requests and sending them to the backup node in order. There is the concept of View, and in each view, all nodes process messages normally. But when the backup node detects an exception on the primary node, it will trigger the View Change mechanism to replace the next numbered node as the primary node and enter a new view. The main process in PBFT from the client sending a request to receiving the reply is shown in Figure 4.1 [10] [11]. Information is exchanged between servers three times. The whole process includes the following five stages:
Figure 4.1 PBFT execution process
At present, Byzantine fault-tolerant algorithms represented by PBFT are used by many blockchain projects. In the alliance chain, the PBFT algorithm was first adopted by the Hyper ledger Fabric project. Hyperledger Fabric uses the PBFT consensus algorithm in version 0.6. The authorization and endorsement functions are integrated into the consensus nodes. All nodes are consensus nodes. This design results in an overly heavy burden on the nodes, which has a great impact on TPS and scalability. Impact. Versions after 1.0 have separated the functions of the nodes. The nodes are divided into three endorsement nodes (Endorser), ordering nodes (Orderer) and block nodes (Committer). The functions of the nodes have been separated, which has improved the efficiency to a certain extent. Consensus efficiency.
The Tendermint[12] algorithm used by the Cosmos project combines the PBFT and PoS algorithms, and selects some consensus nodes for BFT consensus through token mortgage. It weakens the asynchronous assumption and incorporates locks on the basis of PBFT. The concept of consensus nodes in a partially synchronized network can reach consensus through two-phase communication. The system can tolerate 1/3 of failed nodes without causing forks. On the basis of Tendermint, Hotstuff [13] integrates the block chain structure of the blockchain with each stage of BFT. In each stage, the signature confirmation of the previous block and the construction of the new block are carried out simultaneously, making the algorithm realize Even simpler, Hotstuff also uses threshold signatures [14] to reduce the message complexity of the algorithm.
5. Paxos and Raft
The consensus algorithm is a set of mechanisms designed to ensure the accuracy and consistency of stored information. In traditional distributed systems, the most commonly used consensus algorithm is the Paxos-based algorithm. After the Byzantine Generals Problem [3] was raised, Lamport proposed the Paxos algorithm in 1990 to solve the system consistency problem under specific conditions. Lamport reorganized and published the Paxos paper [15] in 1998 and published it in 2001 Paxos was re-introduced [16]. Subsequently, Paxos dominated the field of consensus algorithms and was adopted by many companies, such as Tencent's Phxpaxos, Alibaba's X-Paxos, Amazon's AWS's DynamoDB, and Google's MegaStore [17]. This type of algorithm can quickly complete data synchronization in a distributed system when the number of nodes is limited and relatively trustworthy, while being able to tolerate crash faults. That is to say, in traditional distributed systems, there is no need to consider behaviors such as malicious tampering of data by participating nodes, and only need to be able to tolerate downtime errors on some nodes. However, the Paxos algorithm is too theoretical and is very difficult to understand and implement in engineering. Ongaro et al. published a paper in 2013 proposing the Raft algorithm [18]. Raft has the same effect as Paxos and is more convenient for engineering implementation.
The leader occupies an absolutely dominant position in Raft, and the absolute security of server nodes must be ensured. Once the leader is maliciously controlled, huge losses will be caused. And the transaction volume is limited by the maximum throughput of the node. Currently, many alliance chains use the Raft algorithm to improve consensus efficiency without considering Byzantine fault tolerance.
6. Consensus algorithm combined with VRF
In the existing alliance chain consensus algorithm, if the number of nodes participating in the consensus increases, the communication between nodes will also increase, and the performance of the system will also be affected. If some nodes are selected from many candidate nodes to form a consensus group for consensus and the number of consensus nodes is reduced, the performance of the system can be improved. But this will reduce security, and the higher the proportion of malicious nodes among candidate nodes, the higher the probability that the selected consensus group will not function properly. In order to select a consensus group that can operate normally from the candidate nodes and ensure the high availability of the system, on the one hand, it is necessary to design an appropriate random election algorithm to ensure the randomness of the selection and prevent malicious nodes from attacking the system. On the other hand, it is necessary to increase the proportion of honest nodes among candidate nodes and increase the probability of honest nodes being selected into the consensus group.
Currently, public chains are often based on PoS algorithms. Mortgage tokens increase the entry threshold for consensus nodes, increase the cost of malicious nodes through economic games, and then use random election algorithms among some nodes that pass the screening. Randomly select some nodes from qualified candidate nodes for consensus.
Dodis et al. proposed Verifiable Random Functions (VRF) in 1999 [19]. Verifiable random function is an application of zero-knowledge proof, that is, in the public-private key system, the person holding the private key can use the private key and a piece of known information to generate a random number according to specific rules without revealing the private key. Under the premise, the person holding the private key can prove to others the correctness of the random number generation. VRF can be constructed using RSA or elliptic curves, Dodis et al. 20In 2002, a verifiable random function construction method based on the Diffie-Hellman difficulty problem was proposed [20]. Currently, verifiable random functions have been applied in the field of key transmission and blockchain [21]. The specific process of the verifiable random function is as follows:
In the public chain, VRF has been applied in some projects. VRF is mostly combined with the PoS algorithm. All nodes that want to participate in the consensus pledge certain tokens to become candidate nodes. , and then randomly select some consensus nodes from many candidate nodes through VRF. New nodes in the Zilliqa network must first perform PoW. Existing nodes in the network verify the new node's PoW and authorize it to join the network. The consensus algorithm VBFT designed by the blockchain project Ontology combines VRF, PoS and BFT algorithms. VRF randomly selects consensus nodes among many candidate nodes and determines the order of consensus nodes, which can reduce the impact of malicious forks on the blockchain system. The impact ensures the fairness and randomness of the algorithm. Algorand[22] proposed by Turing Award winner Micali et al. combines PoS and VRF. Nodes can become candidate nodes by pledging tokens, and then select some nodes to form a consensus committee through the non-interactive VRF algorithm, and then this will Some nodes implement a consensus algorithm similar to PBFT and are responsible for rapid verification of transactions. Algorand can ensure the normal operation of the system when the nodes are honest nodes. Ouroboros[23] proposed by Kiayias et al. introduced VRF in the second version Praos[24] to replace pseudo-random numbers to select master nodes in shards. Taking the VRF algorithm used by Algorand and other algorithms as an example, the main process is as follows:
In the VRF designed and used in public chains, the probability of a node being selected as an accounting node is often positively related to the tokens it holds. The consensus node range of the public chain cannot be determined in advance. All nodes that meet the token holding conditions may become consensus nodes. The system needs to select some nodes among the nodes with random number and participation for consensus. Compared with the public chain, the number of nodes participating in the consensus of the alliance chain is limited and the nodes are known. In this case, the nodes of the alliance chain can interact through the known node list, which can effectively prevent possible problems when designing the VRF of the public chain. to the witch attack problem.
7. Formula algorithm combined with sharding technology
Sharding technology is a technology in databases that cuts the data in the database into multiple parts and then stores them in multiple servers. Improve the search performance of the server through distributed storage of data. In blockchain, sharding technology is a mechanism that allocates transactions to multiple consensus groups composed of node subsets for confirmation, and finally aggregates all results for confirmation. Sharding technology already has some applications in blockchain, and many blockchains have designed their own sharding solutions.
Luu et al. proposed the Elastico protocol in 2017, which was the first toSharding technology is applied in blockchain [25]. Elastico first competes to become the accounting node in the network through the PoW algorithm. These nodes are then assigned to different shard committees according to predetermined rules. Each sharding committee internally executes traditional Byzantine fault-tolerant consensus algorithms such as PBFT, and packages and generates transaction sets. After more than one node signs the transaction set, the transaction set is submitted to the consensus committee. After verifying the signatures, the consensus committee finally packages all the transaction sets into blocks and records them on the blockchain.
Elastico verifies the usability of sharding technology in blockchain. Within a certain scale, sharding technology can scale throughput nearly linearly. However, Elastico uses PoW to elect consensus nodes, which also causes the random number generation process and PoW competition for consensus nodes to take too long, resulting in high transaction delays. Moreover, the PBFT algorithm used within each shard has high communication complexity. Latency is also high when the number of nodes in a single shard is high.
Based on Elastico, Kokoris-Kogias and others proposed OmniLedger [26], which used an encrypted lottery protocol to replace PoW to select validator groups, and then classified the validators into different shards through the RandHound protocol [27]. OmniLedger. OmniLedger still uses the PBFT-based consensus algorithm as the consensus algorithm in sharding [28], and introduces the Atomix protocol to handle cross-shard transactions. The communication complexity between nodes during the consensus process is high. When the number of nodes in a shard increases and cross-shard transactions increase, system TPS will drop significantly.
Wang et al. proposed Monoxide in 2019[29]. The sharding technology was introduced into the PoW blockchain system and the Chu ko-nu mining algorithm was proposed, which solved the problem of dispersion of computing power caused by sharding, allowing each miner to work on different locations at the same time. Sharding through sharding improves the TPS of PoW without reducing security.
❺ Why does a transaction in the blockchain require 6 blocks of confirmation? Is it a rigid rule?
This is not a rigid rule and has nothing to do with the blockchain. . There is a relationship between the algorithm of this coin and the confirmation method of each coin is different, so this is not a hard and fast rule.
The number of confirmations for Bitcoin, Ritecoin, Litecoin, and Dogecoin are all different.
❻ BT40 | Blockchain Thinkers Closed Seminar (No. 6)
Time:
July 18, 2020 (Sunday) 6) 14:00-18:00 pm
GroundPoint:
Online (preliminarily decided to use Tencent Conference, the conference number and conference password will be notified separately)
Blockchain Thinkers 40 Forum (BT40)
Blockchain Professional Committee of China Mobile Communications Federation
Blockchain Working Committee of China Circulation Industry Management Political Research Association
Blockchain Professional of China Association for Trade in Services Committee
Blockchain Professional Committee of China Communications Industry Association
Computer Agriculture Application Branch of Chinese Agricultural Society
China Blockchain Ecological Alliance
China Blockchain Research Alliance
Peking University Blockchain Club
Beiyou University National University Science and Technology Park Financial Technology Research Institute
Mr. Guo Shanqi: Founder of Consenomics, founder of the Blockchain Thinkers 40 Forum (BT40), chief consensus economist of the Blockchain Working Committee of China Circulation Industry Management Political Research Association, China Mobile Communications Federation District Deputy Secretary-General of the Blockchain Professional Committee.
Professor Wang Zhongmin: PhD in Economics, professor, doctoral supervisor, national expert with outstanding contributions, enjoys special allowance from the State Council, former vice chairman of the National Council for Social Security Fund, 18th Central Commission for Discipline Inspection Member, member of the 9th National Committee of the Chinese People’s Political Consultative Conference
Professor Chen Xiaohua: Digital economist, founder of blockchain economic theory, review expert for major projects of the Industrial Internet (blockchain direction) of the Ministry of Industry and Information Technology, Director and Chief Digital Economist of the Blockchain Professional Committee of the China Mobile Communications Federation, Secretary-General of the Digital Economy Development Research Group of the China Science and Technology System Reform Research Association, Director of the Financial Technology Research Institute of the National University Science and Technology Park of Beijing University of Posts and Telecommunications, Tsinghua University Global Private Equity Member of the Think Tank of the Equity Research Institute, expert member of the Blockchain Laboratory of the School of Digital Finance of Zhejiang University, off-campus tutor of the School of Economics of the Central University of Finance and Economics, part-time professor of the School of Information Management of Jiangxi University of Finance and Economics, expert in charge of the "Financial Circle" magazine column of the National Development and Reform Commission, and Xiongan New District Expert consultant at the Construction Development Research Center.
Main representative works: "Internet Financial Risk Control", "Introduction to Financial Technology", "Artificial Intelligence Reshaping the World", "Uncovering the Secret of Blockchain", "5G New Momentum" and other books, 8 consecutive books Year was rated"Advanced Individual" in the industry education and training work of the Ministry of Industry and Information Technology, and won the title of China's Economic Leader of the Year in 2017.
Invited to be interviewed by CCTV, Phoenix TV, BTV, China Business Network and other TV programs. As a guest, I was invited to attend the World VR Industry Conference, Digital Expo, China-ASEAN Expo, China Fintech Expo, World Internet of Things Conference, China Integration Conference of Informatization and Information Technology, China Electronic Information Expo, China Higher Education Expo, etc. and gave keynote speeches.
Professor Cao Huining is a professor of finance at Cheung Kong Graduate School of Business, academic director of the MBA in Finance, and a member of the American Finance Association. He has taught at the University of California, Berkeley, and the University of North Carolina at Chapel Hill. Twice nominated for the best paper in the Journal of Finance (1998 and 2000); won the Best Paper Award in Emerging Markets by the Northern Finance Association; won the Best Paper with the Most Investment Value by the Western Finance Association Award; won the third prize for the best paper at the 2004 China Finance International Annual Conference; in 2011, won the 2011 "Spängler IQAM" Best Paper Award for Excellence from "Financial Review", one of the world's top financial academic journals; selected in 2016 The 2016 Most Cited Chinese Researchers list released by the world-famous publishing group Elsevier; serves as a member of the editorial board of Annals of Economics and Finance and the chief editor of International Financial Review and China Financial Review .
Dr. Liang Wei: Digital economy expert, co-founding partner of Blockchain Thinkers 40 Forum (BT40), director of China Telecom Group Blockchain and Digital Economy Joint Laboratory, Computer Society of China District Blockchain professional committee member, co-leader of the Telecommunications Working Group of the Trusted Blockchain Alliance, consultant to the Asian Blockchain Society, editor of blockchain-related projects of the International Telecommunications Union (ITU), with more than ten years of experience in emerging ICT (cloud computing/big Research, development and management experience in data/artificial intelligence/blockchain) fields and communication network fields. He has presided over more than 10 major national and corporate projects, published a total of 24 academic papers, authorized 12 invention patents, 1 US patent, 6 leading international standards, 3 software copyrights, and published 3 monographs.Book. "Blockchain in a Simple Way: Core Technology and Project Analysis", with a preface by a blockchain instructor from the Political Bureau of the Central Committee of the Communist Party of China, is the first blockchain monograph in the communications industry.
Tan Lin: Chief Ecological Officer of Beijing Big Data Research Institute, founder of MA Club, former CEO of Microsoft Accelerator (Beijing), and former researcher of Peking University Smart City Research Center.
Professor Xiong Yu, Chair Professor of the Business School of the University of Surrey, UK, Doctoral Supervisor, Academician of the Institute of Sustainable Leadership (CISL Fellow) of the University of Cambridge, UK, Adjunct Professor of the School of Computer Science, University of York, UK, Royal Registered engineer, member of the All-China Youth Federation, vice president of the Chongqing European and American Alumni Association, member of the Standing Committee of the Chongqing Youth Federation, concurrently serving as co-director of the Northeast UK Innovation Monitoring Agency (a British government intermediary agency that promotes innovative development in the Northeast of the UK), UK-China Entrepreneurship Development Executive Chairman of the Association, initiator of the 21st Century Sino-British Entrepreneurship Plan Competition, President of the British International Innovation Center, member of the Expert Committee of the British Parliament’s Cross-Party Blockchain Group, Co-Chairman/Chairman of the Management Committee of UKEX, a London-based blockchain financial company.
Mr. Wang Donglin, cloud computing infrastructure/blockchain infrastructure technology leader, well-known entrepreneur, China's top ten young scientists, China's top ten outstanding youths in the software industry, the first China Outstanding Engineer, OASIS International Industry Chairman of the technical committee of the standards organization UOML-X, China's outstanding private technology entrepreneur, and one of the top ten leading entrepreneurs in China's software industry. He has successively founded Shusheng Electronics (invented electronic seals), Shusheng Cloud (cloud computing technology leader), and YottaChain (storage public chain market). Ranking first in terms of market share), Ystar (a wallet that users feel comfortable using)
Di Qianfang, Director of Beijing Lianghua Cloud Network Intelligent Technology Center, Deputy Director of China Industrial Development Center, School of Economics and Management, Tsinghua University , deputy secretary-general of the Blockchain Committee of the China Mobile Communications Federation, and former economic analyst at the Information Center of the Ministry of Industry and Information Technology.
1. Professor Wang Zhongmin, former Vice Chairman of the National Council for Social Security Fund, member of the 18th Central Commission for Discipline Inspection
2. Professor Chen Xiaohua, China Mobile Communications Federation Director and Chief Digital Economist of the Blockchain Professional Committee, Secretary-General of the Digital Economy Development Research Group of the China Science and Technology System Reform Research Association, and Director of the Financial Technology Research Institute of the National University Science and Technology Park of Beijing University of Posts and Telecommunications.
3. Professor Cao Huining, Cheung Kong Graduate School of BusinessProfessor of Finance, Academic Director of Finance MBA, member of the American Finance Association, and has taught at the University of California, Berkeley, and the University of North Carolina at Chapel Hill.
4. Dr. Liang Wei, co-founding partner of Blockchain Thinkers Forum 40 (BT40), director of China Telecom Group Blockchain and Digital Economy Joint Laboratory.
5. Zhang Lu, Secretary-General of the Blockchain Committee of Chongqing Internet of Things Association, Head of China Telecom Group Blockchain and Digital Economy Joint Laboratory (Chongqing).
6. Tan Lin, chief ecological officer of Beijing Big Data Research Institute, founder of MA Club, former CEO of Microsoft Accelerator (Beijing), former researcher of Peking University Smart City Research Center
7. Mr. Wang Donglin, cloud computing infrastructure/blockchain infrastructure technology leader, well-known entrepreneur, China's top ten young scientists, China's top ten outstanding youths in the software industry, the first China Outstanding Engineer, OASIS International Industrial Standards Organization UOML-X Technology Chairman of the committee, China's outstanding private technology entrepreneur, one of the top ten leading entrepreneurs in China's software industry, has successively founded Shusheng Electronics (invented electronic seals), Shusheng Cloud (cloud computing technology leader), and YottaChain (temporarily ranks first in the storage public chain market share) , Ystar (a wallet that users can use without any sense)
8. Di Qianfang, director of Beijing Lianghua Cloud Network Intelligent Technology Center, deputy director of China Industrial Development Center, School of Economics and Management, Tsinghua University, China Mobile Communications Deputy Secretary-General of the Federation’s Blockchain Special Committee
9. Professor Xiong Yu, Chair Professor of the Business School of the University of Surrey, UK, PhD Supervisor, Academician of the Institute of Sustainability Leadership (CISL) of the University of Cambridge, UK Fellow), adjunct professor of the School of Computer Science at the University of York, UK, Royal Registered Engineer, member of the All-China Youth Federation, vice president of the Chongqing European and American Alumni Association, member of the Standing Committee of the Chongqing Youth Federation, and concurrently co-director of the Northeast Innovation Monitoring Agency in the UK (a British government intermediary agency, Promoting innovative development in the Northeast of the UK), Executive Chairman of the China Entrepreneurship Development Association in the UK, initiator of the 21st Century Sino-British Entrepreneurship Plan Competition, President of the British International Innovation Center, member of the Expert Committee of the British Parliament's Cross-Party Blockchain Group
10. Professor Xie Jinlong, executive deputy director & secretary-general of the Blockchain Professional Committee of the China Association for Trade in Services, visiting professor at the Foreign Business and Trade College of Chongqing Normal University
11. Wang Zishang: Blockchain in Hainan Province Vice President of the Association, Founding CEO of Shangfang Shares (835872), 18 years of continuous operation of Shangfang, author of "Chain Organization" and "Cloud Management", founder of TokenSky Chain Alliance, director of China Artificial Intelligence Industry Development Alliance
12. Chen Lei, blockchain thinkerMember of the Forum of 40 (BT40), founder of Bit Blue Whale, secretary-general of Peking University Blockchain Club, standing member of the Blockchain Special Committee of China Communications Industry Association, member of the Blockchain Special Committee of China Mobile Communications Association, Beijing City Distinguished expert of Big Data Research Institute, director of China Blockchain Supercomputing Industry Alliance
13. Lu Xinzhi, senior business observer, founder of Financial Technology New Knowledge Media Matrix
14. Sun Zhiguo Researcher, Institute of Agricultural Information, Chinese Academy of Agricultural Sciences
15. Lu Yan, Deputy Secretary-General of the Blockchain Professional Committee of China Mobile Communications Federation
16. Jiang Hong, China Region Executive Secretary-General of the Blockchain Research Alliance
17. Yu Xiaokun, State Grid Blockchain Laboratory, State Grid 2020 Blockchain Chief Architect
18. Zhang Liang, Chief Solution Architect of Lenovo Group
19. Tian Yong, Technical Director of Guizhou Electronic Certificate Co., Ltd.
20. Dr. Li Qianqian, China Agricultural University
21. Dr. Cao Hao, associate professor at Anhui University of Science and Technology (Ph.D. in cryptography)
22. Li Mingyang, head of digital economy channel of China Enterprise News
Mr. Guo:
tel: +86-10-82051290
cell: +86-13301289389
WeChat: CheeyeTHU
Tok : 75A7B3
Instructions about Tok:
1. User registration does not require a mobile phone number or email address, only a username and a set password. The system generates a 76-bit HASH value (consisting of 16 values from 0 to 9 and A to F) based on this user name. This HASH value is the user's ID.
2. The system has no central server and is a point-to-point encrypted communication based on blockchain technology. No one knows the content of the conversation except the people participating in the conversation.
3. Warm reminder: Remember your username and password. There is no password reset problem in TOK because there is no central server. No one knows your password except yourself, and TOK also No exception.
❼ There is a person in WeChat who does this. He posts this blockchain vulnerability every day and earns 5-6 times the principal. After making money, just give them a commission. Is it true?
Not true, money will not fall from the sky, don’t think too much, search WeChat to see if Ou Kuailian can make money, and you will know these routines.
❽ Where was the country’s first blockchain electronic invoice implemented?
On August 10, the country’s first blockchain electronic invoice was implemented in Shenzhen, and was issued by Shenzhen Guomao Revolving Restaurant The country’s first blockchain electronic invoice was issued, announcing that Shenzhen has become the first pilot city for blockchain electronic invoices in the country, which also means that tax services have officially opened the blockchain era.
Blockchain electronic invoices have the characteristics of complete traceability of the entire process and non-tampering of information. They are consistent with the invoice logic and can effectively avoid fake invoices and improve the invoice supervision process. Blockchain electronic invoices will connect every invoice stakeholder and can trace the source, authenticity, and accounting information of invoices, solving problems such as over-reporting of one ticket, false claims, and difficulty in verifying authenticity during the invoice circulation process. In addition, it also has the advantages of reducing costs, simplifying processes, and ensuring data security and privacy.
- 上一篇: 乾特20区块链商城下载
- 下一篇: 有关区块链的论文题目,有关区块链的图片