Blockchain graphics
EOS can be understood as enterprise operation system, which is a blockchain operating system designed for commercial distributed applications. EOS is a new blockchain architecture, which aims to extend the performance of distributed applications
blockchain originated from bitcoin. On November 1, 2008, a person who called himself Satoshi Nakamoto published the article "bitcoin: a peer-to-peer e-cash system", which elaborated the architecture concept of e-cash system based on P2P network technology, encryption technology, timestamp technology, blockchain technology, etc., marking the birth of bitcoin
extended data
the main features of EOS are as follows:
1, decentralization. Blockchain technology does not rely on additional third-party management institutions or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes information self verification, transmission and management through distributed accounting and storage. Decentralization is the most prominent and essential feature of blockchain
2. Openness. Blockchain technology is based on open source. In addition to the private information of all parties involved in the transaction is encrypted, the data of blockchain is open to everyone. Anyone can query blockchain data and develop related applications through the open interface, so the information of the whole system is highly transparent
3. Independence. Based on consensus specifications and Protocols (similar to various mathematical algorithms such as hash algorithm used by bitcoin), the whole blockchain system does not rely on other third parties, and all nodes can automatically and safely verify and exchange data in the system without any human intervention
source: Network - EOS
Application of blockchain technology in banking
2.1 self regulatory platform
we rarely see a platform that can conct self-regulation without intervention. In all areas similar to the financial instry, central banks and regulators (such as the securities and Exchange Commission) come to set uniform rules and manage them. Blockchain technology makes the system no longer need the supervision from enterprises or government entities, so as to regulate the operation of the system. Blockchain provides a mechanism called "workload proof", which allows each computer node in the system to participate in the approval of each transaction. The system has built-in check and balance mechanism to ensure that no computer in the system can deceive the system. All of these reviews and supervisions are completely automated by the computer. At present, there are many other consensus models that can replace the "workload proof" mechanism, but still retain the core idea that each client or node can manage the system point-to-point. What's more, blockchain makes every element in the system completely transparent. Therefore, for such a large-scale community all over the world, blockchain technology can easily review and manage it - "supervision from the public", thus effectively recing fraud. Imagine how much it can save costs and improve efficiency
2.2 compliance with the law and easy tracking
actors (users) and their behaviors (sending money or assets to others) are recorded on the blockchain. Any transaction between the two parties can be tracked and inquired, and can be proved in court. This is because all transactions need a set of public key / private key to encrypt and decrypt processing and transactions. Once they are added to the blockchain, they are permanent and unchangeable. Any record, once written to the blockchain, cannot be tampered with. Anyone holding assets or digital currency on the blockchain will have their own public key on the blockchain. When a transaction occurs, it needs to be signed by the previous holder who controls these assets using the private key. Blockchain also allows a variety of mechanisms for transactions. For example, it can be set to require two people to jointly sign a transaction. In a system without endorsement of enterprises or government, the legally binding mechanism can greatly enhance the trust factor for the system
2.3 built in business continuity
a global platform can not bear the risk of downtime when concting major transactions. Blockchain, a complete point-to-point network, has many distributed nodes and computer servers to support, which has high reliability. Every node in the system keeps a of the complete blockchain data. This makes the whole network highly fault-tolerant, if any part of a few nodes have problems, it will not affect the other parts of the network continue to operate. This makes it possible to achieve 24 / 7 all-weather operation characteristics like disaster recovery center or database rendancy center without using complex technology
2.4 evolution model without burden
in the system, there are a series of rules and key points to help decide who has the right to approve the transaction and what needs to be reviewed before the transaction is written into the blockchain. Blockchain technology can fork out new versions according to different environments and business model requirements. The new version also needs to conform to the overall concept of blockchain. All these changes must be approved by all members of the system, and everyone can get the same benefits. In addition, these changes will not affect the transactions that have occurred and confirmed on the blockchain. For a system, it has enough robustness and flexibility. People often compare the similarities between the Internet and blockchain, including their growth potential and business prospects. These two systems have very similar characteristics. The Internet does not need or does not have a centralized management department (except for a few for the management of agreed URL and domain name registration), but also has enough rendancy and strong fault tolerance. The Internet has been developing for so many years, from basic text to rich graphics, video, animation, and all this has not affected other existing systems and content. Blockchain has fully proved its function and practicability in bitcoin system. Just as the famous Chinese philosopher Lao Tzu said, "the tree that embraces is born at the end of a tree."; The platform of nine layers starts from the base soil; A journey of a thousand miles begins with a single step. " I think this should be the creed of all the pioneers of blockchain technology
as a rookie of Bubi blockchain, I tell you so much!
since then, Chinese scientists have carried out targeted research and put forward the corresponding concept of "Digital China". On October 14, 1999, at the Taiyuan Satellite Launch Center, the Long March 4 carrier rocket developed by the Shanghai Institute of Aerospace Technology launched the China Brazil Earth Resources Satellite (also known as ZY-1) and the Brazilian small satellite scai-1 into space. That night, according to the TT & C data, the resource satellite accurately entered the scheled near polar sun synchronous orbit
at about 12 noon on the 15th, the satellite ground in Beijing received the first remote sensing image of the satellite CCD camera, which was clear, and then received the early imaging network image of the infrared camera
resource satellite
this is the first transmission resource satellite since China and Pakistan launched“ The successful launch of ZY-1 is regarded as opening up a new era of "Digital China", which shocked all colleagues in the international aerospace instry
in the past, China mostly used conventional means to investigate land resources and environment, which could not reflect the dynamic changes of land, forest, agricultural resources and environment in time. For example, Lop Nor has dried up and is still painted on the map; Dongting Lake is half smaller, and it hasn't changed on the map
with ziyuan-1, we can draw a 1:100000 scale digital map and lay the foundation for the completion of 1:50000 and 1:10000 scale digital maps. We can collect important information such as land use, crop yield estimation, water resources, geology and mineral resources, urban planning, environmental protection and coastal zone monitoring, The data obtained are of great value to the Ministry of land and resources in the next five years to 2010
scientific basis
replace the Landsat and spotter in use, and provide decision-making and scientific basis for the formulation of national economic plan and planning and the implementation of comprehensive land management< In addition, there are 2223 environmental monitoring stations in China, so it is urgent to establish an efficient, accurate and rapid environmental monitoring, investigation and assessment system. The remote sensing monitoring system of resource satellite is an effective way to achieve this goal. It can be used to monitor the atmosphere, water (rivers, lakes and Seas), instrial and domestic solid waste, sudden environmental events, ecological (land, grassland, land, water, water, water, water, water, water, water, water, water, water, water, water, water, water, water, water, water, water, water, water, water, water, water Forest) and other factors
in the field of water conservancy remote sensing, the application prospect of resource satellite is also very promising, especially in flood disaster monitoring, soil erosion, engineering planning and so on. Gathering in Beijing
on October 16, 2009, dozens of GIS experts gathered in Beijing to participate in the national spatial information infrastructure development strategy seminar jointly organized by the National Development Planning Commission and the National Geospatial Information Coordination Commission. This paper discusses the construction and application of China's national spatial information infrastructure, the sharing of geospatial information, and the development strategy of "digital provinces", so as to outline the blueprint of "Digital China"< Experts believe that the construction and application of China's national spatial information infrastructure is an important part of China's national economic and social informatization, and its main goal is to improve China's geospatial information standards, policies and regulations, and establish a sound public welfare and basic geospatial information system and its exchange network system, Create conditions for the development of related instries; The development of "digital provinces" is of great significance to the final completion of "Digital China". Experts suggest that the construction and application of China's national spatial information infrastructure should take promoting the sharing of China's geospatial information as the main goal ring the Tenth Five Year Plan period, and improve the standards and norms of geospatial information; Accelerate the improvement of National Geospatial Information System and remote sensing earth observation system; And build a multi-level geospatial information exchange network as soon as possible; It is necessary to further strengthen the planning guidance and unified standards for the development of "digital provinces" in various regions, promote information sharing, and avoid repeated construction< It is reported that the state will further support the development of all kinds of basic and operational geospatial information system application projects, promote their practicality, and actively support the development and instrialization of key technologies of national spatial information infrastructure, so as to continuously improve the level of nationalization
according to the estimation of emarketer, the Market Research Institute, as the largest e-commerce market in the world, e-commerce in the Asia Pacific region will maintain a double-digit growth by 2020, and the trade volume will reach US $2.7 trillion
in 2016, China's e-commerce accounted for 47% of the regional total, reaching US $899 billion. Comparatively speaking, the proportion of e-commerce in Southeast Asia is still small. The import and export volume of cross-border e-commerce of China Customs increased by more than 50% annually, of which the export volume of cross-border e-commerce in 2017 was 33.65 billion yuan, an increase of 41.3%; Imports reached 56.59 billion yuan, an increase of 116.4%. In order to improve the digital infrastructure, many countries have formulated investment policies in line with their national conditions, such as the "digital Bangladesh strategic plan" proposed by Bangladesh and the "service for all fund" established by Pakistan[ 2]
I hope I can help you:
webpage link
abey blockchain technology is from Ciprian pungela & amp; Co., two doctors in the Department of artificial intelligence from the Department of computer science, School of mathematics and information, Western University of timishwara, Romania; Vorel negru's own research project. Constant lightweight blockchain technology and multi-layer programming and extended blockchain solution are adopted. The scale of abey's blockchain remains unchanged, with only 50 active blocks. Abey blockchain technology is suitable for the use of e-money in e-commerce system for mass transactions, and has multi-level, scalability and security, and can be programmed
according to the official white paper, abey is suitable for the blockchain solution in e-commerce system, which uses digital currency to carry out mass transactions and can carry out multi-layer programming and expansion
specific implementation method of abey blockchain Technology:
using a multi-level and programmable blockchain method to realize digital currency (for simplicity, we call it "DC"). This method can pave the way for the implementation of various e-commerce purposes, such as loan financing, completion of refundable transactions and non refundable transactions. In the first layer of the blockchain, we can realize the inherent digital currency design, which is commonly referred to as the base layer ("FL"). The various upper layers built on this foundation can be used to describe various additional functions related to various business driven application examples (which we will briefly introce below). All of the above levels are fully programmable, and can be easily adapted for various applications
although most of today's digital goods store transaction balance in the blockchain, abey's method is more similar to Pascal coin digital currency. This method uses what we call a "vault" encryption structure“ The "vault" structure can only save the balance of all accounts in the network, instead of a complete list of all completed transactions, and can be reconstructed in the evolution history of the blockchain. Since vault allows the deletion of useless content at any time, it can significantly rece the storage cost of blockchain. In contrast, at the time of writing this article, the storage space required to download bitcoin database is 70gb (the alarm rate is still growing, and it is expected to reach 300gb in 2019), so it is not feasible to use ultrabooks or notebooks with small storage space (such as 120GB or 256gb) to carry out mining operation. On the other hand, the size of the abey blockchain will remain unchanged, with only 50 blocks (at the time of writing, there are more than 525000 blocks in the bitcoin blockchain)
vault fully supports digital currency transfer between accounts. In addition, vault can assign an owner defined name to each account instead of using hashing algorithms like today's cryptocurrency - which makes the account easier to remember and makes the name public
one of the important functions that vault can help prevent the daily expenses of blockchain from being too high (especially those related to transaction history) is that vault can save such states and rece the size of blockchain itself by creating a secure of blockchain states. Because there is no transaction history and all accounts can save their direct balance, the blockchain information has the feature of partial erasure. All the blockchain states that can be stored can be regarded as landmarks of the blockchain
secure data sharing:
through the block chain structure design, for each transaction sent to the network, the block chain may contain encrypted metadata. The metadata can only be decrypted by the transaction recipient. For the transaction sent to the network, the sender's public key is included in the transaction, and the transaction receiver decrypts the metadata using the public key. Since the transaction receiver holds the private key for decryption, only the transaction receiver can implement the data decryption process. From the perspective of encryption method, although bitcoin is limited to elliptic curve cryptography, blockchain metadata can use any other encryption mechanism to complete the encryption process. This not only provides complete flexibility in security selection, but also does not have any adverse impact on the structure or function of the blockchain
scalability:
since the abey blockchain supports the creation of historical landmarks by design, it is very easy for the network itself to achieve high scalability from the point of view that the blockchain will always need to store (related to the latest existing SLS). This method completely eliminates the need to store transaction history to calculate the balance of all accounts, and can directly store all account balances, so as to ensure that the specific balance information provided by all nodes in the network meets the requirements of Byzantine consistency
proof of security and workload:
it is impossible to have two-way payment operation in abey's method (in the specified appropriate scenario, the vast majority of today's mainstream cryptocurrencies may theoretically have two-way payment operation). Each transaction means that the balance of the corresponding account is updated in a relatively simple way, and there is no special way to restore the transaction from the network pending transaction team. For the abey blockchain, since all technical / functional layers are built on vault, vault is the infrastructure of our blockchain, so vault is very important for mining operations. Our proposed blockchain model is composed of a series of blocks, each of which is generated by the nodes in the network who are willing to mine. All nodes in the network can update the account balance independently according to the transaction (part of the block), and are independent of other nodes. The mining operation will affect the first functional layer. In addition to updating the balance, each node can also update other matters that may belong to the upper functional layer in the composition of the blockchain structure. Once an update occurs, a new mining incentive block will be created. The mining reward block contains a number of new reward accounts that have been assigned to miners. The miner is the winner of the above reward according to the workload Certificate (currently there are 50 reward accounts). The way to reward is to distribute the public key of all such accounts to the reward recipient
blockchain technology layer:
abey's digital currency model contains a multi-layer structure, in which the first layer represents the realization of the digital currency itself (see Figure 7 for graphic explanation). The corresponding levels include:
tier 1 → digital currency (cryptocurrency): currency transfer, mining
tier 2 → refundable transaction and non refundable transaction: allowing the use of digital justice system to complete refundable transaction
Tier 3 → related parties and commission: allowing the automatic distribution of Commission to related parties
Tier 4 → contacting currency: by lending currency, Income based on interest
layer 5 → programmable: reserved for future realization of Turing complete programming model, so as to process blockchain data in a customized way (such as smart contract)
layer 6 → custom protocol: reserved for future use
transaction type:
abey mode allows different levels in blockchain through design, Complete a variety of transaction types. The transaction types in the second layer are as follows:
1 → fund transfer: fund transfer between accounts (1-to-1 transfer)
2 → refundable fund transfer: refundable transaction between accounts. Use escrow balance instead of regular account balance
3 → key change: change the key that can be used to process the account
4 → restore the account: recover funds from the lost and invalid account
5 → set account name: define the name of the account held by the founder
6 → sales preparation: mark the account for sale
7 → move out of the sales queue: remove the account sales mark, And the account is marked as non saleable
refundable transaction and mediator:
for the vast majority of cases, non refundable transaction is equivalent to all "pay to pay" transactions in blockchain based digital currency mode. But abey has introced the concept of refundable transactions into its digital currency model. In abey mode, the transaction marked with small flag belongs to refundable or non refundable transaction. In addition, in abey's blockchain network, each account contains two types of balance: regular and unchangeable balance (used to mark the amount that the account has received and can be paid immediately, but cannot be recovered after the payment) and escrow balance (including the transaction list marked as refundable transaction and the minutes of each transaction)
8 → payment dispute: for the corresponding transaction that has been marked as a refundable transaction, the payment dispute can be initiated only by the payer
9 → refund request: for the corresponding transaction previously marked as a refundable transaction, a refund request can be initiated, but only by the payer
10 → cancel escrow: cancel the escrow funds and return the funds to the payer immediately. It can only be initiated by the payee
11 → release trusteeship: release the trusteeship fund and add the amount to the balance of the payee's account immediately. It can only be initiated by the payer
related parties and commissions:
one of the important deficiencies in today's blockchain driven financial technology is the lack of the ability to provide rewards to related parties who sell specific procts or services. The third layer of abey blockchain can solve this problem< Lending digital currency:
lending digital currency is not only a simple and quick way to allow people to borrow legal tender, but also to ensure the security of encrypted assets. Given that today's valuable digital currencies are also used for transactions, the reason why lending digital currencies is feasible is not only that it allows borrowers to mortgage any type of cryptocurrency they save, but also that it is attractive because it is a way to retain their digital assets in a completely safe or very low-risk way. In addition, abey's model also provides built-in protection through the customer vault lending gateway (VLG), and enables the VLG to act as a buffer between the lender and the borrower
12 → borrowed funds: the borrower initiates transactions in the network, announces the intention of borrowing funds, and specifies the VLG account of the borrowed funds. The transaction is similar to depositing the balance of the regular / escrow account in the selected VLG account
13 → return of collateral: the transaction is initiated by the VLG itself. VLG will return the collateral to the borrower in accordance with the risk management policy
14 → loan repayment: the transaction is initiated by the borrower. If VLG accepts repayment of the loan in digital currency, the borrower may choose to repay the loan in digital currency. Under this condition, the digital monetary fund will be converted into VLG regular account balance<
programmable blockchain:
with its associated metadata payload, the layer of blockchain can be retained to allow the further creation of intelligent contracts between peers in the network by executing the grammar based "complete Turing basic programming language" according to the original blockchain data processing mode. For each payload, encryption or public visibility processing can be implemented, and can be performed in a dedicated virtual environment (similar to a virtual machine). This method can effectively protect data security and avoid the impact of data destruction and security vulnerabilities. The main advantage of this method is that this layer can create and enforce digital contracts without any blockchain specific programming. For Ben
2. Free right registration: blockchain has the characteristics of permanent preservation and non tampering. More and more people in the world choose blockchain for free right registration. In China, more and more people choose the blockchain right registration service. No matter digital works such as photos, graphics, templates, audio or video, they can be registered free of charge through Renren blockchain right registration. Legal basis: according to the right law of the people's Republic of China, works of Chinese citizens, legal persons or other organizations, whether published or not, enjoy right in accordance with this law. Copyright belongs to the author. In the absence of proof to the contrary, the citizen, legal person or other organization who signs the work shall be the author. Therefore, it is an effective way to protect your right by publishing your works on the public platform. Blockchain has the characteristics of permanent preservation and non tampering. Through Renren blockchain right registration platform, your right can be effectively protected. Operation process: login Renren chain creative platform official website → register users → select right registration column → upload works and register
Second, digital watermarking encryption technology digital watermarking technology is a kind of information hiding technology, which can embed right information, identification information, image and other information into video, audio, image, text and other carrier images in a visible or invisible way. When embedding invisible watermark information, because the embedded watermark information is lower than the minimum granularity detection range that the human visual system can bear, on the one hand, it can be used to prove the source of the work as the evidence of infringement prosecution, on the other hand, it can also be used to detect and analyze the watermark of digital works to achieve the integrity protection of works. However, this can only be achieved by professional companies. At present, there is no standard price for the cost, which varies from high to low.
support outside the chain of the network disk can realize your idea. After the file is uploaded, a connection will be generated, which can be connected in blogs or other websites
hope to help you!
the static elements in the game, such as characters, clothing accessories, game background, game props, Game App icons, can be protected as art works. In the game, there are many static three-dimensional renderings, renderings, game interfaces (such as the main interface, operation interface) and so on, which can also be registered as "art works"
the dynamic special effects, dynamic scenes, cut through animations, animated propaganda films, etc. in the game are composed of a series of pictures with or without accompanying sound, which can be projected with the help of appropriate devices or spread in other ways. They are registered according to "films and works created by similar film making methods"
the original music in the game, such as background music, theme music, role specific music, etc., and its score, such as staff score, simplified score, strike score, etc., can be registered as "music works"
if the role introction, world outlook setting and scene introction in the game form a complete and original content, they can be registered as "written works"
the scene map describing the geographical phenomenon in the game reflects certain personality and intellectual creativity, and the designer has made certain artistic treatment in the process of drawing, so it can be registered according to "graphic works"
in recent years, with the rapid development of short video, we media, music, design and other Internet instries, it has driven the development and dissemination of content, but also brought challenges to right protection. Internet right protection is facing various problems from right registration to litigation protection. In order to effectively solve the problems of traditional right registration, such as time-consuming, high cost and cumbersome proceres, micro right, a blockchain intellectual property protection platform of EBAO, cooperates with the right office to launch an online right registration service by using blockchain technology to help users quickly complete the process of online right registration and authentication. In terms of work rights confirmation, micro right uses sha-512 hash algorithm and Time stamp service and pbft consensus algorithm are used to encrypt the original data, generate a unique corresponding digital fingerprint for the depositor, the depositor time, the depositor process and the depositor content, and encrypt and store them on the blockchain to effectively guarantee the integrity and originality of the depositor data. Build a new digital right ecosystem with blockchain technology.