Position: Home page » Blockchain » Blockchain and bookkeeping
Blockchain and bookkeeping
Publish: 2021-05-20 15:55:29
1. blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. Blockchain is essentially a decentralized database
for example, if you are a woman, every time your boyfriend says something disgusting to you or promises to buy something for you, you immediately record it and send it to you and all his friends, classmates, colleagues, as well as various groups and circles of friends, so that he can no longer resist. This is called blockchain
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
for example, if you are a woman, every time your boyfriend says something disgusting to you or promises to buy something for you, you immediately record it and send it to you and all his friends, classmates, colleagues, as well as various groups and circles of friends, so that he can no longer resist. This is called blockchain
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
2. That's a good question. Let me give you an example. For example, when I deposit 100 yuan in the bank, the data of this deposit is only recorded in the bank's database, which can't be obtained by others, namely "central bookkeeping". The blockchain is a distributed accounting, a new information recording technology, and it is "encrypted" and "distributed". The data does not exist in a center, but is stored once on the computer of the whole network. For example, if I transfer 100 yuan to you, I will shout to all the computers in the whole network. Let's record the accounts together, that is, "Distributed Accounting".
3. Blockchain technology is also known as distributed ledger. Generally speaking, if we assume that the database is an ledger, reading and writing the database can be regarded as a kind of bookkeeping behavior. The principle of blockchain technology is to find the fastest and best person for bookkeeping in a period of time, and then send this page of information of the ledger to everyone else in the whole system. This is equivalent to changing all the records in the database and sending them to every other node in the whole network, which can not only ensure the data security, but also ensure the authenticity of the data, so as to enhance the social credit.
4. const SHA256 = require(crypto-js/SHA256);< br />class Block{
constructor(index,timestamp,data,previousHash=' 39;)< br />{
this.index=index;< br />this.timestamp=timestamp;< br />this.data=data;< br />this.previousHash=previousHash;< br />$this.hash=this.calculateHash();< br />}
calculateHash(){
return SHA256(this,index+this.previousHash+this.timestamp+JSON.stringify(this.data)).tostring();< br />}
}
class Blockchain{
constructor(){
this.chain=[this.createGenesisBlock()];<
}
/ / create a generated information block
creategenesis block() {
return new block (0, & quot; 01/01/2019",& quot; Genesis block", 0);
/ / the date is the user's data. In fact, it is the hash value obtained by adding several values together. Here, the information is encrypted and the picture is encrypted. Then the data is still stored in the database, but all the data are hash values. To get this data, you must know the hash value of the previous data block. Then, if the hacker needs to crack all the nodes, the hash value is decrypted, Then all the blocks from the first node to the last node can be decrypted to get the real data. So the security of data stored in the blockchain depends on whether the data is encrypted. If the plaintext is not encrypted, then it is not a blockchain
}
/ / get the last block
getlatesblock() {
return this.chain [this.chain. Length-1]
}
/ / create block
addblock (newblock) {
newblock. Previoushash = this. Getlatesblock(). Hash< br />newBlock.hash=newBlock.calculateHash();< br />this.chain.push(newBlock);< br />}
}
constructor(index,timestamp,data,previousHash=' 39;)< br />{
this.index=index;< br />this.timestamp=timestamp;< br />this.data=data;< br />this.previousHash=previousHash;< br />$this.hash=this.calculateHash();< br />}
calculateHash(){
return SHA256(this,index+this.previousHash+this.timestamp+JSON.stringify(this.data)).tostring();< br />}
}
class Blockchain{
constructor(){
this.chain=[this.createGenesisBlock()];<
}
/ / create a generated information block
creategenesis block() {
return new block (0, & quot; 01/01/2019",& quot; Genesis block", 0);
/ / the date is the user's data. In fact, it is the hash value obtained by adding several values together. Here, the information is encrypted and the picture is encrypted. Then the data is still stored in the database, but all the data are hash values. To get this data, you must know the hash value of the previous data block. Then, if the hacker needs to crack all the nodes, the hash value is decrypted, Then all the blocks from the first node to the last node can be decrypted to get the real data. So the security of data stored in the blockchain depends on whether the data is encrypted. If the plaintext is not encrypted, then it is not a blockchain
}
/ / get the last block
getlatesblock() {
return this.chain [this.chain. Length-1]
}
/ / create block
addblock (newblock) {
newblock. Previoushash = this. Getlatesblock(). Hash< br />newBlock.hash=newBlock.calculateHash();< br />this.chain.push(newBlock);< br />}
}
5. Blockchain technology will not affect efficiency and waste computing power. The key is to see how to innovate in a mode and how to use blockchain technology efficiently to achieve the effect of the mode
blockchain is essentially an encryption algorithm, which is based on the principle of hash 256 bit algorithm to achieve information security; The application of modern information will become more and more global and universal. Besides the basic requirements of anti tampering, anti repudiation and trustworthiness, the protection of privacy needs to be strengthened. The blockchain technology is proced because of the development of modern cryptography. The cryptography used today is the result of cryptography 20 years ago, Therefore, in order to apply the blockchain technology to more participation scenarios, especially in the Internet economy, more verification is needed to verify whether the existing encryption technology can meet the demand, and more in-depth integration of cryptographic frontier technology and continuous innovation are needed
as long as we use blockchain to make innovations in accounting methods based on our own mode, it will not affect efficiency and waste computing power, but will shorten the time and improve efficiency.
blockchain is essentially an encryption algorithm, which is based on the principle of hash 256 bit algorithm to achieve information security; The application of modern information will become more and more global and universal. Besides the basic requirements of anti tampering, anti repudiation and trustworthiness, the protection of privacy needs to be strengthened. The blockchain technology is proced because of the development of modern cryptography. The cryptography used today is the result of cryptography 20 years ago, Therefore, in order to apply the blockchain technology to more participation scenarios, especially in the Internet economy, more verification is needed to verify whether the existing encryption technology can meet the demand, and more in-depth integration of cryptographic frontier technology and continuous innovation are needed
as long as we use blockchain to make innovations in accounting methods based on our own mode, it will not affect efficiency and waste computing power, but will shorten the time and improve efficiency.
6. Blockchain is a technical solution to collectively maintain a reliable database through centralization and distrust. This technical solution allows any number of nodes in the participating system to calculate and record all the information exchange data in the system in a period of time to a data block through cryptography algorithm, and generate the fingerprint of the data block for linking the next data block and checking. All participating nodes in the system jointly determine whether the record is true
blockchain can improve the way of data recording in audit. In the current network audit, although there is an early warning mechanism, it still needs auditors to judge and handle the abnormal records manually; Blockchain can automatically process the abnormal records through whether each node verifies and approves the block and the transaction information in it, whether the network node is attacked, and whether the account book of each node is complete, so as to make real-time audit possible. Auditors can directly access and query the effective information on the blockchain, judge whether the processing is reasonable and make corrections. In the blockchain, timestamps are used to record various transactions and operations, which can achieve historical traceability and tracking, and greatly improve the quality and efficiency of audit
blockchain can change the storage mode of audit data. In traditional audit, data are stored in an audit center server, which not only has the problems of high load and slow running speed, but also is vulnerable to attack; The blockchain audit system is a typical distributed storage, each node has the same backup, which can not only save the high cost and maintenance costs of the server, but also ensure the integrity of the data
semi public private chain can be used for audit. Blockchain can be divided into three forms: public chain, semi open private chain and full private chain. Considering the characteristics of audit instry, it is appropriate to adopt semi open private chain mode. For the audited units and enterprises, some trade secret information is not disclosed, but the pre selected nodes within the group decide the generation of the block. External suppliers can participate in the transaction but not the accounting process. Externally, it provides a third-party query node to query through the open API. In this way, it can not only ensure the internal privacy of the enterprise, but also enable the external auditors to implement real-time audit query.
blockchain can improve the way of data recording in audit. In the current network audit, although there is an early warning mechanism, it still needs auditors to judge and handle the abnormal records manually; Blockchain can automatically process the abnormal records through whether each node verifies and approves the block and the transaction information in it, whether the network node is attacked, and whether the account book of each node is complete, so as to make real-time audit possible. Auditors can directly access and query the effective information on the blockchain, judge whether the processing is reasonable and make corrections. In the blockchain, timestamps are used to record various transactions and operations, which can achieve historical traceability and tracking, and greatly improve the quality and efficiency of audit
blockchain can change the storage mode of audit data. In traditional audit, data are stored in an audit center server, which not only has the problems of high load and slow running speed, but also is vulnerable to attack; The blockchain audit system is a typical distributed storage, each node has the same backup, which can not only save the high cost and maintenance costs of the server, but also ensure the integrity of the data
semi public private chain can be used for audit. Blockchain can be divided into three forms: public chain, semi open private chain and full private chain. Considering the characteristics of audit instry, it is appropriate to adopt semi open private chain mode. For the audited units and enterprises, some trade secret information is not disclosed, but the pre selected nodes within the group decide the generation of the block. External suppliers can participate in the transaction but not the accounting process. Externally, it provides a third-party query node to query through the open API. In this way, it can not only ensure the internal privacy of the enterprise, but also enable the external auditors to implement real-time audit query.
7. Blockchain is a decentralized distributed record book and a credit data system. Its advantages are obvious
1. What the Internet changes is the acquisition and transmission of information, while what blockchain does is the transmission of value
for example, on the Internet, we can easily and quickly generate information and it to any place. All information can be spread efficiently, but some valuable information that can only be transferred but cannot be shared often needs credit endorsement
for example, we can't the payment directly to the other party, but we need to subtract some money from the payment account and add some money to the collection account to complete the payment process. The current Internet protocol does not support the function of value transfer. The current value transfer is not direct transmission. Instead, it is endorsed by a centralized third party, such as Alipay, such as banks.
now these centralized organizations put all the calculation of value transfer in a centralized server, which will certainly involve the participation of people, which will cause many problems, such as some "finite theory" and "opportunistic behavior", which will make the whole behavior less credible. So there is a basic question, how to reach a credit consensus
this is how blockchain technology came into being. It can be said that blockchain can build a pure point-to-point value transfer system. Without the mutual trust of each node, blockchain can ensure the integrity and security of data records in the system, and can be separated from the endorsement of third-party organizations, effectively recing the complexity and risk of transactions
2. It is open and transparent, and can not be tampered with
all data of the blockchain can not be tampered with or deleted, and the information of the whole system is open and transparent. If someone owes you a sum of money, and now the data has been put on the blockchain, if he doesn't want to return it to you and play a rogue with you, you can go to the court to protect your rights through the data forensics on the blockchain, so as to get back your legitimate funds. Because the data on the blockchain is open to the whole network, the users of the whole network will know his rogue behavior, which will greatly increase his credit cost. Dishonesty will make him have an important impact in the next life.
1. What the Internet changes is the acquisition and transmission of information, while what blockchain does is the transmission of value
for example, on the Internet, we can easily and quickly generate information and it to any place. All information can be spread efficiently, but some valuable information that can only be transferred but cannot be shared often needs credit endorsement
for example, we can't the payment directly to the other party, but we need to subtract some money from the payment account and add some money to the collection account to complete the payment process. The current Internet protocol does not support the function of value transfer. The current value transfer is not direct transmission. Instead, it is endorsed by a centralized third party, such as Alipay, such as banks.
now these centralized organizations put all the calculation of value transfer in a centralized server, which will certainly involve the participation of people, which will cause many problems, such as some "finite theory" and "opportunistic behavior", which will make the whole behavior less credible. So there is a basic question, how to reach a credit consensus
this is how blockchain technology came into being. It can be said that blockchain can build a pure point-to-point value transfer system. Without the mutual trust of each node, blockchain can ensure the integrity and security of data records in the system, and can be separated from the endorsement of third-party organizations, effectively recing the complexity and risk of transactions
2. It is open and transparent, and can not be tampered with
all data of the blockchain can not be tampered with or deleted, and the information of the whole system is open and transparent. If someone owes you a sum of money, and now the data has been put on the blockchain, if he doesn't want to return it to you and play a rogue with you, you can go to the court to protect your rights through the data forensics on the blockchain, so as to get back your legitimate funds. Because the data on the blockchain is open to the whole network, the users of the whole network will know his rogue behavior, which will greatly increase his credit cost. Dishonesty will make him have an important impact in the next life.
8. On the nodes of the blockchain, everyone can access the P2P network for accounting, but no one can tamper with the information in the database, so it is a public accounting book. The technology of recing risk is being introced into the six degree chain
9. MD5? That is to check the integrity of BT files, authenticity, must have seeds to be able to download
Hot content