Position: Home page » Blockchain » Practical cases of blockchain performance evaluation

Practical cases of blockchain performance evaluation

Publish: 2021-05-25 03:22:04
1. In view of the security characteristics and shortcomings of the existing blockchain technology, we need to build a security system around the physical, data, application system, encryption, risk control and other aspects to improve the security performance of the blockchain system as a whole
1. Physical security
the network and host running the blockchain system should be in a protected environment. According to the regulatory requirements of specific business, the protection measures can be used to protect the physical network and host by means of VPN, firewall, physical isolation, etc
2. Data security
in principle, the data exchange between nodes of the blockchain should not be transmitted in clear text. For example, asymmetric encryption can be used to negotiate key, and symmetric encryption algorithm can be used to encrypt and decrypt data. The data provider should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures
3. Application system security
application system security needs to start from the aspects of identity authentication, authority system, transaction rules, anti fraud strategy, etc.
relevant personnel, transaction nodes and transaction data involved in application operation should be controlled in advance and auditable afterwards. Taking financial blockchain as an example, consensus algorithm with stronger fault tolerance, anti fraud and higher performance can be adopted to avoid joint fraud of some nodes
4. Key security
to encrypt the communication data between the blockchain nodes and the key to encrypt the data stored on the blockchain nodes, the plaintext should not exist on the same node, and the private key should be properly saved by the encryption machine. When the key is lost or leaked, the system can identify the relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to make the original key invalid. The key should also be managed strictly in the life cycle, and should not be permanently valid. It needs to be replaced after reaching a certain time cycle
5. Risk control mechanism
there should be careful detection measures for the network layer, host operation, data access of application system, transaction frequency and other dimensions of the system. For any suspicious operation, alarm, record and verification should be carried out. If illegal operation is found, loss assessment should be carried out, remedial measures should be taken at the technical and business levels, and security measures should be strengthened, And trace the source of illegal operation to prevent further attacks

Article source: white paper on blockchain technology and application development in China
2. Application of blockchain technology in voting
kuaishang takes the lead in applying blockchain technology to the voting field nationwide, effectively solving the trust problem of voting data, providing the most real and effective data for the participants, protecting the rights and interests of real voting users, and making blockchain technology "people-friendly", so that the general public can quickly perceive and share the information in the field of life services Enjoy the convenience of blockchain technology
Application of blockchain technology in digital asset registration
Jinzhu digital asset service platform takes the lead in using blockchain technology, which is a global distributed ledger technology with the characteristics of traceability, non tampering and non forgery. The digital assets of the platform come from the standard issuers of digital assets, and the asset value is determined by the open market to avoid overestimation or undervaluation
the application of blockchain technology in the financial instry
ant financial's independent and controllable financial grade commercial blockchain platform has been deployed in multiple social and commercial application scenarios by multiple institutions and countries. Ant blockchain platform supports second level confirmation for transactions, and the consensus mechanism uses efficient parallel consensus algorithm to ensure the high performance of the blockchain platform, Ant blockchain has been applied in many proction level applications, applying leading technologies to people's livelihood, commerce, finance and other fields.
3.

The attachment of the complete works of the universe has been uploaded to the network disk. Click to download it for free:
< file FSID = 2930786315 "link = / share / link? Shareid = 1292059481 & UK = 1260674192" name = "wealth =" 0 / >

content preview:
I'm very sorry, this chapter was originally the main body, please forgive me for uploading it quickly.

xiuzhenren: Kaiguang, jiedan, Yuanying, Chuqiao, fitness, Dujie, distraction
immortal: Xiaoxian, Jinxian, Shangxian, Daluo Jinxian and Tianxian
God Man: Xiaoshen, Jinshen, Shangshen, Dali Tathagata and Tianshen
Demons: Little demons, demons, goblins, demon immortals and demon gods
Demons: small demons, demons, demons, demons and demons
spirit: spirit body, Xuanling, Lingjing, Lingxian and Lingshen
the above levels can be divided into three stages: early stage, middle stage and late stage
beast: Warcraft, immortal beast, divine beast, super divine beast
magic weapon: human tool, treasure tool, immortal tool, artifact and super artifact
the above levels are divided into three levels: lower level, intermediate level, and higher level
crystal: inferior, medium, top and best
for those who care about this book, green is here. I'm really sorry, because there are so many green things ring this period, so it can't be updated in time. Please forgive green. When green has finished all the things, it will come to update at the first time. After all, green is the first time to write a book, but also an amateur author, so you can also cool the difficulties of all cool green. Green is here. Thank you very much. Please continue to support...
please accept

4. bitcoin is characterized by decentralization. As long as you have a network and can use your wallet, you can use it regardless of national boundaries. If you don't understand, maybe you can go to Babbitt to find a master.
5. New technology is born to overthrow tradition! The law of human competition! Traditional instries do not realize how to start transformation! Of course, transformation is as painful as cutting meat
6. AOS is a public chain of privacy, ETH is a comprehensive public chain of smart contracts, and the track is different. However, God V said that privacy features should be added to eth in the summer of 2020. If we compare this point, it is still possible

Why do we say that eth ecology is complex? If we want to fully deploy privacy, it will be difficult in a short time. However, as a new public chain, AOS can quickly deploy its functions, so it is entirely possible for AOS to surpass eth in privacy.
7.

February 24 (Xinhua) the security of encrypted digital currency assets is completely based on the security of the private key of encrypted digital wallet, which is the only digital asset certificate. Once the private key is created, it cannot be modified and reset. As long as the private key is not lost, the asset will not be lost. Therefore, the whole security topic of encrypted digital assets is around the storage and use of private key. For the light wallet mode used in mobile terminal wallet, the security of user terminal private key storage is a very core and key problem. If the design is improper, it may lead to the loss of private key and the theft of assets

Jaxx is another well-known mobile cryptocurrency wallet, which has a large number of functions, including supporting multiple currency types, as well as the recently added digital currency exchange platform, allowing users to exchange bitcoin, Ethernet and erc20 tokens in the wallet

when we check the data backup mechanism of Jaxx, we find a major security vulnerability, which is more serious than bitcoin wallet. In fact, the private key stored in Jaxx can be stolen by hackers with little effort

8. It's known that it's a Ponzi scheme. Whether the blockchain can be traded or not can be verified by the owner himself. My mother-in-law can't persuade her to do so. She claims that she will go public. After many investigations, I found that the so-called VR maker, namely shede alliance, does not exist. The only two remaining companies are
: China dream shede Group Co., Ltd., registered in Hong Kong, After investigation, it has been cancelled in June, 18, and has no business activities since its registration. TIANCHAO Network Technology Co., Ltd., registered in Shanghai, has a registered capital of only 2 million yuan. Since 2016, it has no relevant financial statements and tax payment records. It is a leather bag company. The website of blockchain company is Io terminated and belongs to the domain name of British Indian Ocean. The maintenance fee is only a few hundred yuan a year
behind the high returns, there are opportunities to kill. Please think twice before you act. If you have invested, I will not say
9. Old fellow iron is the golden chain system of Chongqing's Golden Nest, is it? The gold chain system of their home is a system developed independently based on the block chain technology.
on October 9, at the "2018 trusted blockchain summit" jointly sponsored by China information and Communication Research Institute and China Communications Standardization Association, "trusted blockchain promotion plan" released the evaluation results of the first batch of trusted blockchain procts
a total of 20 enterprises have passed the CBC function evaluation, and 7 enterprises have passed the CBC performance evaluation. Among them, the procts of two blockchain enterprises in Chongqing have passed the trusted blockchain function evaluation, and the gold chain system of Chongqing jinwowo Network Technology Co., Ltd. is one of them.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750