区块链转账脚本怎么写,区块链转账脚本是什么
请查看相关英文文档
❶ What are the core blockchain technologies of blockchain technology?
What is the hottest topic on the Internet right now? You don’t need to tell me what the editor is saying, that is Blockchain technology, but many friends have only heard of this technology and do not have much in-depth understanding of it. So what are the blockchain technologies? Below we will bring you an introduction to the core technology of blockchain for your reference.
What are the core elements of blockchain technology?
Blockchain technology can be a public ledger (visible by anyone) or a permissioned network (visible only by those authorized), which solves supply chain challenges , because it is an immutable record that is shared among network participants and updated in real time.
Blockchain technology----data layer: designing the data structure of the ledger
Core technology 1. Block + chain:
Technically speaking, block is a data structure that records transactions. Reflects the flow of funds for a transaction. The blocks of transactions that have been reached in the system are connected together to form a main chain, and all nodes participating in the calculation record the main chain or part of the main chain.
Each block consists of a block header and a block body. The block body is only responsible for recording all transaction information in the previous period, mainly including the number of transactions and transaction details; the block header encapsulates the current version number, previous A block address, timestamp (recording the time when the block was generated, accurate to seconds), random number (recording the value of decrypting the answer to the math question related to the block), target hash value of the current block, and Merkle number Root value and other information. From a structural point of view, most functions of the blockchain are implemented by the block header.
Core technology 2. Hash function:
The hash function can convert data of any length into a set of fixed-length codes through the Hash algorithm. The principle is based on a cryptographic one-way hash function. This kind of function is easy to verify, but difficult to crack. Usually, the industry uses y=hash(x) to represent it. This hash function implements operations on x to calculate a hash value y.
Commonly used hash algorithms include MD5, SHA-1, SHA-256, SHA-384 and SHA-512, etc. Taking the SHA256 algorithm as an example, inputting any string of data into SHA256 will result in a 256-bit Hash value (hash value). Its characteristics: the same data input will get the same result. As long as the input data changes slightly (for example, a 1 becomes a 0), a completely different result will be obtained, and the result cannot be predicted in advance. Forward calculation (calculating the corresponding Hash value from the data) is very easy. Reverse calculation (cracking) is extremely difficult and is considered impossible under current technological conditions.
Core technology 3. Merkle tree:
Merkle tree is a hash binary tree, which can be used to quickly verify the integrity of large-scale data. In the blockchain network, the Merkle tree is used to summarize all transaction information in a block and finally generateA unified hash value of all transaction information in this block. Any change in transaction information in the block will cause the Merkle tree to change.
Core technology 4. Asymmetric encryption algorithm:
Asymmetric encryption algorithm is a key secret method that requires two keys: public key and private key. The public key and the private key are a pair. If the public key is used to encrypt the data, only the corresponding private key can be used to decrypt it, thereby obtaining the corresponding data value; if the private key is used to sign the data, then only the corresponding public key can be used to sign the data. In order to verify the signature, the sender of the verification information is the holder of the private key.
Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm, while symmetric encryption uses the same key in the encryption and decryption processes.
Blockchain technology----network layer: realize the decentralization of accounting nodes
Core technology 5. P2P network:
P2P network (peer-to-peer network), also known as point-to-point technology, is no Central server, Internet system that relies on user groups to exchange information. Unlike a centralized network system with a central server, each client in a peer-to-peer network acts as both a node and a server. Domestic Xunlei software uses P2P technology. The P2P network has the characteristics of decentralization and robustness.
Blockchain technology----Consensus layer: allocate the task load of accounting nodes
Core technology 6. Consensus mechanism:
Consensus mechanism is how to reach consensus among all accounting nodes to identify The validity of a record is both a means of identification and a means of preventing tampering. There are currently four main types of consensus mechanisms: PoW, PoS, DPoS and distributed consensus algorithms.
PoW (Proof of Work, proof of work): PoW mechanism, which is like Bitcoin’s mining mechanism, miners package existing transactions that have not been recorded by the network into a block, and then continue to traverse and try to find a random number , so that the hash value of the new block plus the random number meets certain difficulty conditions. Finding a random number that meets the conditions is equivalent to determining the latest block of the blockchain, and is also equivalent to obtaining the current round of accounting rights of the blockchain. Miners broadcast blocks that meet the mining difficulty conditions in the Yuanfu network. After verifying that the block meets the mining difficulty conditions and that the transaction data in the block meets the protocol specifications, other nodes in the entire network will each Blocks are linked to their own version of the blockchain, thereby forming a network-wide consensus on the current network state.
PoS (ProofofStake, Proof of Stake): PoS mechanism requires nodes to provide proof of a certain number of tokens to obtain a distributed consensus mechanism for competing for blockchain accounting rights. If you rely solely on the token balance to determine the bookkeeper, you will inevitably make the rich win, which will lead to the centralization of bookkeeping rights and reduce the fairness of the consensus. Therefore, different PoS mechanisms use different methods to increase the amount of money based on the proof of equity. The randomness of accounting rights avoids centralization. For example, PeercoinCoin) PoS mechanism, the Bitcoin with the longest chain age has a greater chance of obtaining accounting rights. NXT and Blackcoin use a formula to predict the next accounting node. The more tokens you own, the greater the probability of being selected as an accounting node. In the future, Ethereum will also switch from the current PoW mechanism to a PoS mechanism. Judging from the information currently available, Ethereum's PoS mechanism will use nodes to place bets on the next block. The winner of the bet will receive an additional Ethereum currency award. Those who do not win will be deducted Ether coins to reach consensus on the next block.
DPoS (DelegatedProof-Of-Stake, share authorization certificate): DPoS is easy to understand and is similar to the modern corporate board of directors system. The DPoS mechanism adopted by BitShares is that shareholders vote to select a certain number of witnesses. Each witness has two seconds of authority to generate blocks in order. If the witness cannot generate a block within the given time slice, The block generation authority is given to the witness corresponding to the next time slice. Shareholders can replace these witnesses at any time by voting. This design of DPoS makes the generation of blocks faster and more energy-saving.
Distributed Consistency Algorithm: Distributed Consistency Algorithm is based on traditional distributed consistency technology. Among them are Byzantine fault-tolerant algorithms that solve the Byzantine Generals problem, such as PBFT (Byzantine fault-tolerant algorithm). In addition, distributed consensus algorithms (Pasox, Raft) that solve non-Byzantine problems are not explained in this article. This type of algorithm is currently a commonly used consensus mechanism in alliance chain and private chain scenarios.
Taken together, POW is suitable for public chains. If you build a private chain, it is more suitable to use POS because there is no trust problem in verification nodes; and because there are untrustworthy local nodes in the alliance chain, it is more suitable to use DPOS.
Blockchain technology----Incentive layer: Develop a "salary system" for accounting nodes
Core technology 7. Issuance mechanism and incentive mechanism:
Take Bitcoin as an example. Bitcoins are initially rewarded by the system to miners who create new blocks, and this reward is halved approximately every four years. At the beginning, miners were rewarded with 50 Bitcoins for each new block recorded, and this reward is halved approximately every four years. By analogy, by around AD 2140, newly created blocks will no longer receive rewards from the system. By then, the total number of Bitcoins will be approximately 21 million. This is the total number of Bitcoins, so it will not increase indefinitely.
Another source of incentives is transaction fees. When there are no system rewards for newly created blocks, the miners' income will change from system rewards to transaction fees. For example, when you transfer, you can specify 1% of it as a handling fee to be paid to the miner who records the block. If the output value of a transaction is less than the input value, the difference is the transaction fee, which will be added to the incentive for that block. As long as a given amount of electronic currency has entered circulation, the incentive mechanism can gradually be converted to rely entirely on transaction fees, so there is no need to issue new currency.
Blockchain Technology----ContractLayer: Giving the ledger programmable features
Core technology 8. Smart contract:
Smart contract is a set of scenario-responsive programmed rules and logic, which is a decentralized and programmable system deployed on the blockchain. Implemented by letter sharing script code. Normally, after the smart contract is signed by all parties, it is attached to the blockchain data in the form of program code, and is recorded in a specific block of the blockchain after being propagated through the P2P network and verified by nodes. Smart contracts encapsulate a number of predefined states and transition rules, scenarios that trigger contract execution, response actions under specific scenarios, etc. The blockchain can monitor the status of smart contracts in real time, and activate and execute the contract by checking external data sources and confirming that specific trigger conditions are met.
The above is what blockchain technologies the editor has brought to you? All content of the introduction to the core technology of blockchain.
❷ How to solve the problem of blockchain usage security
It needs to be mentioned here that the basic system structure of blockchain is as follows
①Network routing ②Cryptographical algorithm ③Script system ③Consensus mechanism
As for blockchain security issues, the script system is mainly completed by the script system. In blockchain technology, it is a relatively abstract concept and an extremely important function. In the blockchain, the reason why a valuable network can be formed relies on the script system, which is driven like an engine. The blockchain continuously sends and receives data. The so-called script refers to a set of rules to confirm certain aspects of the system. The program and rules of the system are fixed. For example, in the Bitcoin system, only Bitcoin can be sent and received. Sending and receiving are done through the Bitcoin script program. The system allows users to program rules by themselves. After that, they can It can be deployed into the blockchain ledger, so that the functions of the entire blockchain system can be expanded. For example, Ethereum realizes the functions of smart contracts through this set of customized script systems, so specific scenario applications or Let’s talk about real life cases, such as order logistics information and supply chain information.
❸ What does blockchain mean and what are the characteristics of blockchain?
Regarding the technology of blockchain, I believe many friends have already paid attention to it. Blockchain It can be said to be a hot topic right now, with news media reporting heavily on it claiming it will create the future. So what does blockchain mean? What are the characteristics of blockchain? Today we will introduce the blockchain to you in detail, and hope that you will have a deep understanding after reading it.
What does blockchain mean?
Blockchain is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithms. The so-called consensus mechanism is a mathematical algorithm that establishes trust and obtains rights and interests between different nodes in the blockchain system.
Blockchain is also an important concept of Bitcoin. The "2014-2016 Global Bitcoin Development Research Report" released by the Internet Finance Laboratory of Tsinghua University PBC School of Finance and Sina Technology mentioned that blockchain is Bitcoin's Underlying technology and infrastructurestructure.
Blockchain is essentially a decentralized database and serves as the underlying technology of Bitcoin. The blockchain is a series of data blocks generated using cryptographic methods. Each data block contains information about a Bitcoin network transaction and is used to verify the validity of its information (anti-counterfeiting) and generate the next block.
In a narrow sense, blockchain is a chain data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be non-tamperable and non-forgeable. Ledger.
Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses A new distributed infrastructure and computing paradigm that uses smart contracts composed of automated script code to program and manipulate data.
What are the characteristics of blockchain?
Through the summary and analysis of the blockchain, it is concluded that the characteristics of the blockchain have the following four main points: Open Yingpai
1. The first is the disintermediation of trust, which has been repeatedly emphasized and praised. What Weihe said yesterday is not decentralization but disintermediation, which coincides with each other.
2. The second feature is its stability, reliability, and sustainability. Because it is a distributed network architecture, no central node can be hit or attacked, so in the overall technical layout It has stronger stability, reliability and sustainability.
3. Third, its strong security and consensus mechanism do not require the entry of a third party, but are achieved through a technology, a previously scheduled technology to complete the entire transaction.
4. The fourth is the openness, transparency and non-tamperability of transactions. Many practitioners in the industry have shared these characteristics with you, so these are the four characteristics of the blockchain.
Because of these characteristics, blockchain can receive huge attention from many financial institutions and many industries in the future or now.
The above is what the editor brings to you. What does blockchain mean? What are the characteristics of blockchain? of the entire content.
❹ Popular explanation of blockchain technology
A popular explanation of blockchain technology is as follows:
To put it simply: blockchain is the use of a package of existing networks Technology, a new generation of network system, this network system has a new structure, a new mechanism, and unprecedented new value. Five major technologies or innovations are specifically used: encryption technology, P2P network technology, distributed storage technology, consensus mechanism, and smart contracts.
Essentially: it is a shared database, and the data or information stored in it is "unforgeable", "full-process traces", "traceable", "open and transparent" and "collectively maintained" ” and other characteristics. Based on these characteristics, blockchain technology has laid a solid foundation of "trust" and created a reliable "cooperation" mechanism, which has broad application prospects.
2. Openness.
Except for tradingIn addition to the private information of all parties being encrypted, the blockchain data is open to everyone and provides a flexible script code system. The entire system information is highly transparent, and within the rules specified by the system, nodes cannot deceive each other.
3. Autonomy.
Consensus technology, smart contracts.
❺ A brief discussion of blockchain: How to use blockchain for transfer transactions
In life, we all have our own bank accounts, and transfers are made between bank accounts. Similarly, digital currency transfer is the process of transferring Bitcoins from one Bitcoin address to another Bitcoin address. Then if you want to transfer money to others, you need to enter your Bitcoin address, recipient address, transfer amount and handling fee amount on the Bitcoin trading platform, Bitcoin wallet or Bitcoin client. After the payment is confirmed, the transaction information will be broadcast throughout the Bitcoin network. Every 10 minutes, miners will package the unaccounted transactions in the Bitcoin network into a block. This completes a confirmation. At this time, Bitcoin It has been transferred to the recipient's account. Generally, it needs to be confirmed 6 times to ensure that the transaction record cannot be tampered with by anyone before the transfer can be truly completed.
We talked about the transfer fee above, but how much is the fee for one transfer?
The Bitcoin transfer fee is a fee paid by traders to miners. It is used to encourage miners to compete for accounting and provide sufficient computing power for Bitcoin to ensure the security of the Bitcoin network. Some Sometimes we also call this fee the mining fee. When a user initiates a transfer on the Bitcoin network, a handling fee is unavoidable. Generally, it is 0.001-0.0015 Bitcoins. Due to the limited capacity of transaction records that can be accommodated in blocks, miners will give priority to packaging transaction records with high handling fees. , so a little more handling fee can be credited faster.
This article is compiled and published by Huixinyun. I will continue to update the "Brief Talk about Blockchain" series. This series will introduce some basic knowledge of blockchain and digital currency, so stay tuned!
(Huixin Cloud - IT collaborative industry ecological chain platform. The platform has product managers who study blockchain technology applications and mature product solutions for blockchain technology applications. Looking forward to visiting!)< /p>
❻ What is script mining
The core principle of Bitcoin is "blockchain". Each block corresponds to a bill, linking all blocks. It is the blockchain, and any transaction information and transfer records are recorded in the blockchain. It is important to note that the blockchain exists throughout the Internet, so any Bitcoin holder has no fear of losing their Bitcoin.
Every other point in time, the Bitcoin system will generate a random code on the system node. All computers on the Internet can look for this code. Whoever finds this code will generate a block and then get a bit. Coin, this process is what people often call mining.
thanBitcoin mining.
It is a computer used to earn Bitcoins. This type of computer generally has a professional mining chip and usually works by burning the graphics card, which consumes a lot of power. Users use a personal computer to download software and then run a specific algorithm. After communicating with a remote server, they can get corresponding Bitcoins. This is one of the ways to obtain Bitcoins.
According to the latest foreign media reports, as digital currencies show a rising trend, in order to obtain more digital currencies. It is becoming increasingly popular for hackers to invade websites, implant mining scripts and then use users' CPUs to mine digital currencies. According to relevant statistics, 2,496 websites running outdated software have been hacked by hackers to implant malicious code and use visitors' CPU mining. Illegal implantation of malicious mining scripts has become a common way for illegal production.
❼ Are there 7 core technologies for blockchain operation that you should know?
How many of the 7 core technologies for blockchain operation do you know?< br>1. Blockchain links
As the name suggests, blockchain is a chain composed of blocks. Each block is divided into two parts: block header and block body (including transaction data). The block header includes the hash (PrevHash) value (also called hash value) of the previous block used to implement block linking and the random number (nonce) used to calculate the mining difficulty. The hash value of the previous block is actually the hash value of the header of the previous block, and the rules for calculating random numbers determine which miner can obtain the power to record the block.
2. Consensus Mechanism
Blockchain was born with Bitcoin and is the basic technical architecture of Bitcoin. Blockchain can be understood as a decentralized accounting system based on the Internet. A decentralized digital currency system like Bitcoin requires blockchain to ensure the consistency of accounting by each honest node without a central node. Therefore, the core of blockchain technology is a consensus mechanism that reaches a consensus on the legality of transactions among individuals who have no basis for trust in each other without central control.
There are currently four main categories of blockchain consensus mechanisms: PoW, PoS, DPoS, and distributed consensus algorithms.
3. Unlocking scripts
Scripts are an important technology for automatic verification and automatic execution of contracts on the blockchain. Each output of each transaction does not strictly point to an address, but to a script. A script is like a set of rules that govern how the recipient can spend the assets locked on this output.
The legality verification of transactions also relies on scripts. Currently it relies on two types of scripts: locking scripts and unlocking scripts. The locking script is a condition added to the output transaction, implemented through a script language, and is located at the output of the transaction. The unlocking script corresponds to the locking script. Only if the conditions required by the locking script are met, the corresponding assets on this script can be spent, which is located at the input of the transaction. Many flexible items can be expressed through scripting language. The interpretation script is similar to a "virtual machine" in our programming field, which runs distributedly on everyone in the blockchain network.a node.
4. Transaction Rules
Blockchain transactions are the basic units that constitute blocks, and are also the actual effective content that the blockchain is responsible for recording. A blockchain transaction can be a transfer or other transactions such as the deployment of smart contracts.
In the case of Bitcoin, a transaction refers to a payment transfer. The trading rules are as follows:
1) The input and output of the transaction cannot be empty.
2) For each input of the transaction, if its corresponding UTXO output can be found in the current transaction pool, the transaction will be rejected. Because the current transaction pool is a transaction that has not been recorded in the blockchain, and each input of the transaction should come from a confirmed UTXO. If found in the current transaction pool, it is a double spend transaction.
3) For each input in the transaction, its corresponding output must be UTXO.
4) Each input unlocking script must work with the corresponding output locking script to verify the compliance of the transaction.
5. Transaction Priority
The priority of blockchain transactions is determined by the blockchain protocol rules. For Bitcoin, the priority of a transaction being included in a block is determined by the time it takes for the transaction to be broadcast to the network and the size of the transaction. As the time it takes for a transaction to be broadcast to the network increases and the chain age of the transaction increases, the priority of the transaction is increased and will eventually be included in the block. For Ethereum, the priority of a transaction is also related to the transaction fee that the publisher of the transaction is willing to pay. The higher the transaction fee that the publisher is willing to pay, the higher the priority of the transaction being included in the block.
6.Merkle proof
The original application of Merkle proof is the Bitcoin system (Bitcoin), which was described and created by Satoshi Nakamoto in 2009. The Bitcoin blockchain uses Merkle proofs in order to store transactions in every block. This makes the transaction unable to be tampered with and makes it easy to verify whether the transaction is included in a specific block.
7.RLP
RLP (Recursive Length Prefix, recursive length prefix encoding) is a main encoding method for object serialization in Ethereum. Its purpose is to encode any nested sequence of binary virtual data. Lu Ji