Position: Home page » Blockchain » Blockchain diagram

Blockchain diagram

Publish: 2021-03-27 07:07:14
1. blockchain world is proced by Jingtong technology< Make complaints about br / > block chain
2.

Seeing some answers to the debate on the definition of blockchain, I suddenly realize that my answer to this explanation principle has always been directed at bitcoin. There is no specific and unique answer in the instry between the definition of blockchain. Here I first summarize the characteristics of "blockchain" according to the papers I read:

1; Hash chain & quot There are several nodes participating in the system operation (distributed)

3. Reach a consensus on the consistency of basic data (consensus agreement / algorithm) through a certain protocol or algorithm

since bitcoin is currently one of the most typical and influential applications of blockchain, it will be much easier to understand how bitcoin uses blockchain before understanding other forms of blockchain applications

3. Blockchain is a technology, but it is not a single technology, but the result of the integration of a variety of technologies, including cryptography, mathematics, economics, network science and so on. You can think of it as a distributed shared accounting technology, or as a database, but the database is jointly maintained by all nodes in the chain, and each node has an account book. Because the account books of all nodes are consistent, different nodes can trust each other, and there is no doubt about the data, so we all say that the blockchain has realized trust technically. For detailed professional technology, you can consult some professional technology companies, such as Jinbo technology, which focuses on the development of blockchain related procts, professional R & D team and perfect after-sales service, and you can consult by telephone.
4.

Does it have to be PDF? There are a series of blockchain books on hand. You can go to

5. Recently, the principle of blockchain has been talked about by many people. Obviously, blockchain has been deified by many people. It seems that all walks of life can use blockchain technology. However, to some extent, it is like a black box. We all know that blockchain has many features and benefits, but we don't know how to do it. In fact, as long as you understand the principle of blockchain, you don't have to hesitate

blockchain is not a single innovative technology. Instead, it brings together many cross domain technologies, including cryptography, mathematics, algorithms and economic models. Combined with the point-to-point network relationship, it can establish trust effect by using mathematical basis, and become a decentralized system that can operate without mutual trust or relying on a single centralized organization, Bitcoin is the first set of P2P e-cash system built by using blockchain technology, which is used to realize a decentralized digital currency system and ensure transaction security and traceability

however, how does the blockchain work and what key technologies it contains make it known as the trust machine? How can a transaction be verified in a P2P network that does not trust each other without the traditional trust institutions (such as banks, stock exchanges, third-party institutions and other centralized institutions)

to understand the operation principle of blockchain, we can first distinguish between transaction and block. Here, we understand the operation principle of blockchain from the generation of a transaction in the blockchain to the completion of the verification process and illustrate a block, and further disassemble the five key technologies of blockchain, See how it can be based on zero trust, decentralized, traceable and non tamperable

viewing the operation process of blockchain from a transaction

in bitcoin blockchain, when a transaction is generated through a node or wallet, the transaction needs to be transmitted to other nodes for verification. The method is to encrypt the transaction data by digital signature and get a string of unique hash values representing the transaction by hash function, and then broadcast the hash values to other participating nodes in bitcoin blockchain network for verification<

generate a new transaction

when a new transaction is generated, it will be broadcast to other participating nodes in the blockchain network first

each node will put several new transactions into the block

each node will collect several unverified transaction hash values into the block, Each block can contain hundreds or thousands of transactions

decide who will verify these transactions

each node will calculate the workload proof to decide who can verify the transactions, and the node with the fastest calculation result will verify the transactions, which is the consensus approach

the node that has obtained the verification right will broadcast the block to all nodes

the node that completes the pow as soon as possible will broadcast its block to other nodes

each node will verify and connect with a new block

other nodes will confirm whether the transaction contained in the block is valid, and accept the block after confirming that it has not been repeatedly spent and has a valid digital signature, At this time, the block is officially connected to the blockchain, and the data can no longer be tampered with

transaction verification is completed

once all nodes accept the block, the block that has not finished the pow calculation before will be invalid, and each node will re-establish a block to continue the next POW calculation

it can be seen that the principle of blockchain is not complicated, and its wide application is natural. Many companies have achieved fruitful results in the process of applying blockchain principles to reality. Bubi company is a leading blockchain service provider in China. It has made many breakthroughs in blockchain technology platform, which can meet the scenario of tens of millions of users, and has the ability to quickly build upper application business. Bubi blockchain platform is divided into bubichain and Bubi application adapters.
6. Look at the name, I think it's a bit hanging, be careful to be cheated; Now many places are cheating under the guise of blockchain.
7. It's possible, but some mobile phone security protection software has protection function. I use Tencent mobile phone housekeeper, both mobile phone and computer are in use. The download volume is very high, you can try it. For example, if you have a virus or don't know the phone, there will be a reminder, you can also set up direct shielding, and you can scan the software in your mobile phone to see if it is safe. It is suitable for mobile phones of all models and systems. Protecting your own information can protect the security of your mobile phone. Hope to help you!
8. After checking the information, this trusted number alliance was originally initiated by xinhuanet.com, telecom signal 114 and telephone state. Its purpose is to show you the real identity of the calling number before answering the phone, and indirectly crack down on the probability of Telecom fraud and harassing phone calls

it is different from the call assistant software. The latter is marked by the user's number identity, which is usually displayed as the fuzzy classification of advertising promotion and express delivery. Of course, this also works, but it will lead to misjudgment. For example, if I see who is upset, I will directly mark his phone as harassment phone, register several more accounts and mark it repeatedly, Basically, the number of the other party can't tear off the label (it's not totally impossible, or it's very cumbersome), so there are often cases where businesses and companies are maliciously marked
the trusted number alliance does different things. Its members are from operators such as China Mobile Unicom Telecom. All telephone numbers, whether personal or commercial, are registered by real name, so it shows the identity of the real calling number (only for companies willing to register)
here comes the question: how do the three telecom operators, Tencent, 360 and telephone bond display the unified calling number identity? Because it involves competition, no one is willing to develop their own database to each other
at this time, a company called micro bit technology provided blockchain technology to link all data, which solved the seemingly contradictory problem of "sharing and isolating" data
what is the situation now? As long as the enterprise phone registered in the trusted number alliance, no matter what mobile phone is used or whether the call assistant software is installed, the correct phone number identity can be displayed. We can understand that this is a super caller ID. This is also the advantage of blockchain, indicating that the R & D strength of micro technology is still good.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750