Practical cases of blockchain performance evaluation
1. Physical security
the network and host running the blockchain system should be in a protected environment. According to the regulatory requirements of specific business, the protection measures can be used to protect the physical network and host by means of VPN, firewall, physical isolation, etc
2. Data security
in principle, the data exchange between nodes of the blockchain should not be transmitted in clear text. For example, asymmetric encryption can be used to negotiate key, and symmetric encryption algorithm can be used to encrypt and decrypt data. The data provider should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures
3. Application system security
application system security needs to start from the aspects of identity authentication, authority system, transaction rules, anti fraud strategy, etc.
relevant personnel, transaction nodes and transaction data involved in application operation should be controlled in advance and auditable afterwards. Taking financial blockchain as an example, consensus algorithm with stronger fault tolerance, anti fraud and higher performance can be adopted to avoid joint fraud of some nodes
4. Key security
to encrypt the communication data between the blockchain nodes and the key to encrypt the data stored on the blockchain nodes, the plaintext should not exist on the same node, and the private key should be properly saved by the encryption machine. When the key is lost or leaked, the system can identify the relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to make the original key invalid. The key should also be managed strictly in the life cycle, and should not be permanently valid. It needs to be replaced after reaching a certain time cycle
5. Risk control mechanism
there should be careful detection measures for the network layer, host operation, data access of application system, transaction frequency and other dimensions of the system. For any suspicious operation, alarm, record and verification should be carried out. If illegal operation is found, loss assessment should be carried out, remedial measures should be taken at the technical and business levels, and security measures should be strengthened, And trace the source of illegal operation to prevent further attacks
Article source: white paper on blockchain technology and application development in China
kuaishang takes the lead in applying blockchain technology to the voting field nationwide, effectively solving the trust problem of voting data, providing the most real and effective data for the participants, protecting the rights and interests of real voting users, and making blockchain technology "people-friendly", so that the general public can quickly perceive and share the information in the field of life services Enjoy the convenience of blockchain technology
Application of blockchain technology in digital asset registration
Jinzhu digital asset service platform takes the lead in using blockchain technology, which is a global distributed ledger technology with the characteristics of traceability, non tampering and non forgery. The digital assets of the platform come from the standard issuers of digital assets, and the asset value is determined by the open market to avoid overestimation or undervaluation
the application of blockchain technology in the financial instry
ant financial's independent and controllable financial grade commercial blockchain platform has been deployed in multiple social and commercial application scenarios by multiple institutions and countries. Ant blockchain platform supports second level confirmation for transactions, and the consensus mechanism uses efficient parallel consensus algorithm to ensure the high performance of the blockchain platform, Ant blockchain has been applied in many proction level applications, applying leading technologies to people's livelihood, commerce, finance and other fields.
The attachment of the complete works of the universe has been uploaded to the network disk. Click to download it for free:
< file FSID = 2930786315 "link = / share / link? Shareid = 1292059481 & UK = 1260674192" name = "wealth =" 0 / >
content preview:
I'm very sorry, this chapter was originally the main body, please forgive me for uploading it quickly.
xiuzhenren: Kaiguang, jiedan, Yuanying, Chuqiao, fitness, Dujie, distraction
immortal: Xiaoxian, Jinxian, Shangxian, Daluo Jinxian and Tianxian
God Man: Xiaoshen, Jinshen, Shangshen, Dali Tathagata and Tianshen
Demons: Little demons, demons, goblins, demon immortals and demon gods
Demons: small demons, demons, demons, demons and demons
spirit: spirit body, Xuanling, Lingjing, Lingxian and Lingshen
the above levels can be divided into three stages: early stage, middle stage and late stage
beast: Warcraft, immortal beast, divine beast, super divine beast
magic weapon: human tool, treasure tool, immortal tool, artifact and super artifact
the above levels are divided into three levels: lower level, intermediate level, and higher level
crystal: inferior, medium, top and best
for those who care about this book, green is here. I'm really sorry, because there are so many green things ring this period, so it can't be updated in time. Please forgive green. When green has finished all the things, it will come to update at the first time. After all, green is the first time to write a book, but also an amateur author, so you can also cool the difficulties of all cool green. Green is here. Thank you very much. Please continue to support...
please accept
Why do we say that eth ecology is complex? If we want to fully deploy privacy, it will be difficult in a short time. However, as a new public chain, AOS can quickly deploy its functions, so it is entirely possible for AOS to surpass eth in privacy.
February 24 (Xinhua) the security of encrypted digital currency assets is completely based on the security of the private key of encrypted digital wallet, which is the only digital asset certificate. Once the private key is created, it cannot be modified and reset. As long as the private key is not lost, the asset will not be lost. Therefore, the whole security topic of encrypted digital assets is around the storage and use of private key. For the light wallet mode used in mobile terminal wallet, the security of user terminal private key storage is a very core and key problem. If the design is improper, it may lead to the loss of private key and the theft of assets
Jaxx is another well-known mobile cryptocurrency wallet, which has a large number of functions, including supporting multiple currency types, as well as the recently added digital currency exchange platform, allowing users to exchange bitcoin, Ethernet and erc20 tokens in the wallet
when we check the data backup mechanism of Jaxx, we find a major security vulnerability, which is more serious than bitcoin wallet. In fact, the private key stored in Jaxx can be stolen by hackers with little effort
: China dream shede Group Co., Ltd., registered in Hong Kong, After investigation, it has been cancelled in June, 18, and has no business activities since its registration. TIANCHAO Network Technology Co., Ltd., registered in Shanghai, has a registered capital of only 2 million yuan. Since 2016, it has no relevant financial statements and tax payment records. It is a leather bag company. The website of blockchain company is Io terminated and belongs to the domain name of British Indian Ocean. The maintenance fee is only a few hundred yuan a year
behind the high returns, there are opportunities to kill. Please think twice before you act. If you have invested, I will not say
on October 9, at the "2018 trusted blockchain summit" jointly sponsored by China information and Communication Research Institute and China Communications Standardization Association, "trusted blockchain promotion plan" released the evaluation results of the first batch of trusted blockchain procts
a total of 20 enterprises have passed the CBC function evaluation, and 7 enterprises have passed the CBC performance evaluation. Among them, the procts of two blockchain enterprises in Chongqing have passed the trusted blockchain function evaluation, and the gold chain system of Chongqing jinwowo Network Technology Co., Ltd. is one of them.