Gbhb blockchain University
With the rapid development of Internet technology, it has brought us infinite wonderful and convenient life. At the same time, with the continuous improvement of 5g network, container cloud and high-performance storage hardware, data growth has entered an unprecedented stage of development
AR, VR, Internet of things, edge computers and other devices available everywhere generate a continuous stream of data, just like an open water pipe, the data source has been flowing out. The data generated will increase geometrically. At this time, the storage technology of blockchain will be demonstrated. A few years ago, there was an excellent IPFs project in the blockchain storage technology
{rrrrrrr}
yottachain takes the blockchain as the underlying technology and develops a powerful incentive scheme for miners. With 1GB
of space invested by miners, yottachain can generate 5-10gb of storage capacity, which proces the miracle effect that the purchasing power of digital currency obtained by resource suppliers exceeds the resources they supply
1. POW workload proof, which is familiar with mining, calculates a random number that meets the rules through and or operation, that is, obtains the bookkeeping right, sends out the data that needs to be recorded in this round, and stores it together with other nodes in the whole network after verification
advantages: complete decentralization, free access of nodes
disadvantages: bitcoin has attracted most of the computing power in the world, and other blockchain applications using POW consensus mechanism are difficult to obtain the same computing power to ensure their own security; Mining causes a lot of waste of resources; The period of reaching consensus is long, which is not suitable for commercial application.
2. Proof of rights and interests of POS, a mechanism of upgrading consensus of pow; According to the token proportion and time of each node; It can rece the difficulty of mining in equal proportion, so as to speed up the speed of finding random numbers< Advantages: to a certain extent, it shortens the time to reach a consensus
disadvantages: mining is still needed, which does not solve the pain point of commercial application in essence
3. Dpos share authorization certification mechanism is similar to the voting of the board of directors, in which the coin holders cast a certain number of nodes to verify and account on their behalf
advantages: greatly rece the number of participating verification and accounting nodes, which can achieve second level consensus verification
disadvantages: the whole consensus mechanism still depends on token, and many commercial applications do not need token to exist
4. Pool verification pool, which is based on traditional distributed consistency technology and data verification mechanism; It is a consensus mechanism widely used in the instry chain at present.
advantages: it can work without token, and realizes second level consensus verification on the basis of mature distributed consistency algorithms (pasox and raft)
disadvantages: the degree of decentralization is not as good as that of bictin; The multi center business model is more suitable for multi-party participation
it has great advantages in using consensus mechanism to ensure data consistency (the consensus mechanism is first proposed by ripple, and the network transaction synchronization mechanism with data correctness priority. In the consensus network, no matter how the software code changes, if you can't reach a consensus, you can't enter the network, let alone fork)
- - - - - - - -
PS: a little black, although the consensus mechanism can absolutely ensure that there will be no hard bifurcation at any time. However, the disadvantage of this mechanism is obvious, that is, it is much longer than the current bitcoin network to reach a consensus with other nodes. In extreme cases, the consequences of disconnection in ripple consensus mechanism network are also very terrible
it is possible that one day after the power failure in your home, the whole system will no longer be able to reach a consensus with other rippled nodes (in fact, the consensus mechanism requires more than 80% of the nodes to acknowledge your data before your submission will be accepted by other nodes, otherwise it will be rejected by exclusive nodes), Even you can only empty all your 500 GB data and resynchronize to connect to other ripple nodes
so at present, the existing rippled end is not suitable for civil use (if it is commercial, the impact is relatively small. For example, RL's own rippled node is hosted in Amazon cloud data center. If it has no response for a long time, it can make high claims, and there is almost no break in that place except for large disasters). This is one of the aspects RL has always wanted to improve.
secondly, test verification includes test cases, test plans, test tools and test environment. According to GB / T 25000.10 -, 4.3.1 proct quality model and blockchain reference architecture
Third, promote the standard application demonstration. It can be divided into three stages. Firstly, it needs to go through the research stage, including the preparation of the white paper, the formation of the draft and the establishment of the standards working group at the end of 2016. In order to promote the development of blockchain technology, the focus of the next stage is to find real application cases in various instries (financial services, supply chain management, entertainment, etc.) and create typical cases. Li Ming said that this will be carried out graally in the second half of this year Fourth, build open source community, including open source official website, instry alliance, training and certification, summit and hacker marathon, technical committee, communication tools, etc. The goal is to form an independent, safe and controllable general technology solution for blockchain, to track and study the development trend of foreign blockchain open source, to explore the possibility of domestic technology open source, and to form an open source solution suitable for Chinablockchain focuses on keeping accurate records, authentication and execution, while AI helps to make decisions, evaluate and understand certain patterns and data sets, and ultimately proces autonomous interaction. AI and blockchain share several characteristics, which can ensure seamless interaction in the near future. Three main features are listed below
1. AI and blockchain need data sharing
distributed database emphasizes the importance of data sharing among multiple clients on a specific network. Similarly, AI relies on big data, especially data sharing. The more open data available for analysis, the more accurate the prediction and evaluation of the machine, and the more reliable the generated algorithm
2. Security
when dealing with high-value transactions on the blockchain network, there are great requirements for the security of the network. This can be implemented through existing agreements. For artificial intelligence, the autonomy of the machine also needs high security, in order to rece the possibility of catastrophic events
3. Trust is a necessary condition
for any widely accepted technological progress, there is no greater threat than the lack of trust, and artificial intelligence and blockchain cannot be ruled out. In order to make the communication between machines more convenient, we need to have an expected trust level. In order to execute certain transactions on the blockchain network, trust is a necessary condition
the impact of blockchain and artificial intelligence on ordinary people
in short, blockchain is a community-based technology, which can make value exchange more secure. Blockchain is just like its name. Each block contains an encrypted transaction record. The blocks are arranged in chronological order, and the security is guaranteed by a cryptographic system. Blockchain is a technology that can change rules, and its emergence is a revolutionary innovation
there are many functions of blockchain, and the specific application is also very wide. For example: if blockchain is used in the food instry, people will no longer worry about eating harmful food. If blockchain is used for diamond proction, consumers will no longer have to worry about buying fake diamonds. If the blockchain is used in the ecation instry, intellectual property protection can be strengthened. If the blockchain is used in the insurance instry, it can alleviate the information asymmetry of the insurance business and help to improve the security of the insurance business
the impact of blockchain and artificial intelligence on ordinary people is enormous. Just imagine, if blockchain and artificial intelligence are combined, will their role expand? Yes, the combination of the two can really have more impact to change the lives of ordinary people
blockchain and artificial intelligence are two extremely important roles in the field of technology, which bring convenience to our proction and life. If we find an intelligent way to make them work together, the impact of their interaction is unimaginable. This is also the core of OMT. After the combination of these two technologies, the future application scenarios are revolutionary and exciting. In the new ecological construction, data storage, sharing mechanism, platform problems, security problems, etc. can be overcome by using each other's technologies. OMT will create maximum value for global users and enterprises and bring more convenience to ordinary people through blockchain + artificial intelligence technology
the answer is over, hope to adopt, thank you!
I hope I can help you:
webpage link
abey blockchain technology is from Ciprian pungela & amp; Co., two doctors in the Department of artificial intelligence from the Department of computer science, School of mathematics and information, Western University of timishwara, Romania; Vorel negru's own research project. Constant lightweight blockchain technology and multi-layer programming and extended blockchain solution are adopted. The scale of abey's blockchain remains unchanged, with only 50 active blocks. Abey blockchain technology is suitable for the use of e-money in e-commerce system for mass transactions, and has multi-level, scalability and security, and can be programmed
according to the official white paper, abey is suitable for the blockchain solution in e-commerce system, which uses digital currency to carry out mass transactions and can carry out multi-layer programming and expansion
specific implementation method of abey blockchain Technology:
using a multi-level and programmable blockchain method to realize digital currency (for simplicity, we call it "DC"). This method can pave the way for the implementation of various e-commerce purposes, such as loan financing, completion of refundable transactions and non refundable transactions. In the first layer of the blockchain, we can realize the inherent digital currency design, which is commonly referred to as the base layer ("FL"). The various upper layers built on this foundation can be used to describe various additional functions related to various business driven application examples (which we will briefly introce below). All of the above levels are fully programmable, and can be easily adapted for various applications
although most of today's digital goods store transaction balance in the blockchain, abey's method is more similar to Pascal coin digital currency. This method uses what we call a "vault" encryption structure“ The "vault" structure can only save the balance of all accounts in the network, instead of a complete list of all completed transactions, and can be reconstructed in the evolution history of the blockchain. Since vault allows the deletion of useless content at any time, it can significantly rece the storage cost of blockchain. In contrast, at the time of writing this article, the storage space required to download bitcoin database is 70gb (the alarm rate is still growing, and it is expected to reach 300gb in 2019), so it is not feasible to use ultrabooks or notebooks with small storage space (such as 120GB or 256gb) to carry out mining operation. On the other hand, the size of the abey blockchain will remain unchanged, with only 50 blocks (at the time of writing, there are more than 525000 blocks in the bitcoin blockchain)
vault fully supports digital currency transfer between accounts. In addition, vault can assign an owner defined name to each account instead of using hashing algorithms like today's cryptocurrency - which makes the account easier to remember and makes the name public
one of the important functions that vault can help prevent the daily expenses of blockchain from being too high (especially those related to transaction history) is that vault can save such states and rece the size of blockchain itself by creating a secure of blockchain states. Because there is no transaction history and all accounts can save their direct balance, the blockchain information has the feature of partial erasure. All the blockchain states that can be stored can be regarded as landmarks of the blockchain
secure data sharing:
through the block chain structure design, for each transaction sent to the network, the block chain may contain encrypted metadata. The metadata can only be decrypted by the transaction recipient. For the transaction sent to the network, the sender's public key is included in the transaction, and the transaction receiver decrypts the metadata using the public key. Since the transaction receiver holds the private key for decryption, only the transaction receiver can implement the data decryption process. From the perspective of encryption method, although bitcoin is limited to elliptic curve cryptography, blockchain metadata can use any other encryption mechanism to complete the encryption process. This not only provides complete flexibility in security selection, but also does not have any adverse impact on the structure or function of the blockchain
scalability:
since the abey blockchain supports the creation of historical landmarks by design, it is very easy for the network itself to achieve high scalability from the point of view that the blockchain will always need to store (related to the latest existing SLS). This method completely eliminates the need to store transaction history to calculate the balance of all accounts, and can directly store all account balances, so as to ensure that the specific balance information provided by all nodes in the network meets the requirements of Byzantine consistency
proof of security and workload:
it is impossible to have two-way payment operation in abey's method (in the specified appropriate scenario, the vast majority of today's mainstream cryptocurrencies may theoretically have two-way payment operation). Each transaction means that the balance of the corresponding account is updated in a relatively simple way, and there is no special way to restore the transaction from the network pending transaction team. For the abey blockchain, since all technical / functional layers are built on vault, vault is the infrastructure of our blockchain, so vault is very important for mining operations. Our proposed blockchain model is composed of a series of blocks, each of which is generated by the nodes in the network who are willing to mine. All nodes in the network can update the account balance independently according to the transaction (part of the block), and are independent of other nodes. The mining operation will affect the first functional layer. In addition to updating the balance, each node can also update other matters that may belong to the upper functional layer in the composition of the blockchain structure. Once an update occurs, a new mining incentive block will be created. The mining reward block contains a number of new reward accounts that have been assigned to miners. The miner is the winner of the above reward according to the workload Certificate (currently there are 50 reward accounts). The way to reward is to distribute the public key of all such accounts to the reward recipient
blockchain technology layer:
abey's digital currency model contains a multi-layer structure, in which the first layer represents the realization of the digital currency itself (see Figure 7 for graphic explanation). The corresponding levels include:
tier 1 → digital currency (cryptocurrency): currency transfer, mining
tier 2 → refundable transaction and non refundable transaction: allowing the use of digital justice system to complete refundable transaction
Tier 3 → related parties and commission: allowing the automatic distribution of Commission to related parties
Tier 4 → contacting currency: by lending currency, Income based on interest
layer 5 → programmable: reserved for future realization of Turing complete programming model, so as to process blockchain data in a customized way (such as smart contract)
layer 6 → custom protocol: reserved for future use
transaction type:
abey mode allows different levels in blockchain through design, Complete a variety of transaction types. The transaction types in the second layer are as follows:
1 → fund transfer: fund transfer between accounts (1-to-1 transfer)
2 → refundable fund transfer: refundable transaction between accounts. Use escrow balance instead of regular account balance
3 → key change: change the key that can be used to process the account
4 → restore the account: recover funds from the lost and invalid account
5 → set account name: define the name of the account held by the founder
6 → sales preparation: mark the account for sale
7 → move out of the sales queue: remove the account sales mark, And the account is marked as non saleable
refundable transaction and mediator:
for the vast majority of cases, non refundable transaction is equivalent to all "pay to pay" transactions in blockchain based digital currency mode. But abey has introced the concept of refundable transactions into its digital currency model. In abey mode, the transaction marked with small flag belongs to refundable or non refundable transaction. In addition, in abey's blockchain network, each account contains two types of balance: regular and unchangeable balance (used to mark the amount that the account has received and can be paid immediately, but cannot be recovered after the payment) and escrow balance (including the transaction list marked as refundable transaction and the minutes of each transaction)
8 → payment dispute: for the corresponding transaction that has been marked as a refundable transaction, the payment dispute can be initiated only by the payer
9 → refund request: for the corresponding transaction previously marked as a refundable transaction, a refund request can be initiated, but only by the payer
10 → cancel escrow: cancel the escrow funds and return the funds to the payer immediately. It can only be initiated by the payee
11 → release trusteeship: release the trusteeship fund and add the amount to the balance of the payee's account immediately. It can only be initiated by the payer
related parties and commissions:
one of the important deficiencies in today's blockchain driven financial technology is the lack of the ability to provide rewards to related parties who sell specific procts or services. The third layer of abey blockchain can solve this problem< Lending digital currency:
lending digital currency is not only a simple and quick way to allow people to borrow legal tender, but also to ensure the security of encrypted assets. Given that today's valuable digital currencies are also used for transactions, the reason why lending digital currencies is feasible is not only that it allows borrowers to mortgage any type of cryptocurrency they save, but also that it is attractive because it is a way to retain their digital assets in a completely safe or very low-risk way. In addition, abey's model also provides built-in protection through the customer vault lending gateway (VLG), and enables the VLG to act as a buffer between the lender and the borrower
12 → borrowed funds: the borrower initiates transactions in the network, announces the intention of borrowing funds, and specifies the VLG account of the borrowed funds. The transaction is similar to depositing the balance of the regular / escrow account in the selected VLG account
13 → return of collateral: the transaction is initiated by the VLG itself. VLG will return the collateral to the borrower in accordance with the risk management policy
14 → loan repayment: the transaction is initiated by the borrower. If VLG accepts repayment of the loan in digital currency, the borrower may choose to repay the loan in digital currency. Under this condition, the digital monetary fund will be converted into VLG regular account balance<
programmable blockchain:
with its associated metadata payload, the layer of blockchain can be retained to allow the further creation of intelligent contracts between peers in the network by executing the grammar based "complete Turing basic programming language" according to the original blockchain data processing mode. For each payload, encryption or public visibility processing can be implemented, and can be performed in a dedicated virtual environment (similar to a virtual machine). This method can effectively protect data security and avoid the impact of data destruction and security vulnerabilities. The main advantage of this method is that this layer can create and enforce digital contracts without any blockchain specific programming. For Ben
, # 160
Coin Purse
we are committed to becoming a leader in the field of digital currency. One stop management of multi currency digital assets is safe and convenient; Second reading of global trading market, rational management and control of assets; Comprehensive analysis, explore the value of digital assets 1) Private key encryption technology to create advanced security privacy, your private key is only known to you, the platform does not store any user private key information 2) A set of mnemonics can generate the private keys of different blockchains, manage the assets of different blockchains, and make the asset transaction more smooth 3) Multi signature technology increases the security of digital assets 4) Team members include experts in information security, blockchain development risk control and other fields, and digital asset security control is strengthened. Moreover, the development team of coin purse attaches great importance to the user experience. As long as they feed back questions, they will be answered and solved< br /> < br />Bitcoin core
bitcoin core is one of the earliest wallets and the most mainstream wallets at present. Almost people who play with bitcoin are using it. It has complete functions, and can query block, transaction, public key, private key and other information. Moreover, bitcoin core can also encrypt the wallet, which has very high security. However, bitcoin core only supports the PC side, and it is a full node wallet with a node size of 150gb, which requires high computer hard disk space< br /> < br />Blockchain
blockchain is also a wallet dedicated to bitcoin service. Its size is only 50m. Although it is a light wallet, it has many functions. It not only supports the storage of Ethereum and bitcoin, but also has its own mnemonic words. Even if you forget all your ID and password, you can also recover capital and transaction information through mnemonic words. However, blockchain only supports IOS devices on the mobile end, and users using Android or PC can only log in to blockchain.info.