ID blockchain
blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies
blockchain is an important concept of bitcoin. It is essentially a decentralized database. At the same time, as the underlying technology of bitcoin, it is a series of data blocks generated by using cryptographic methods. Each data block contains the information of a bitcoin network transaction, Used to verify the validity of its information (anti-counterfeiting) and generate the next block
some areas where blockchain can be used can be as follows:
& ᦇ 9642; Smart contract; Securities trading; E-commerce; Internet of things; Social communication; File storage; Proof of existence; Authentication
&9642; Equity crowdfunding
we can compare the development of blockchain with the development of the Internet itself. In the future, something called finance Internet will be formed on the Internet. This thing is based on blockchain, and its precursor is bitcoin, that is, traditional finance starts from private chain and instry chain (LAN), bitcoin series starts from public chain (WAN), They all express the same concept - digital asset, and finally converge to an intermediate equilibrium point
The evolution mode ofblockchain is as follows:
& 9642; Blockchain 1.0 digital currency; Blockchain 2.0 digital assets and smart contracts; Blockchain 3.0: implementation of distributed applications in various instries
blockchain originates from the underlying technology of bitcoin and is the blockchain technology of Internet. IP is connected by blockchain technology to form distributed accounting. It is not easy to tamper with and decentralize
code chain technology is the code chain technology of the Internet of things, which superimposes the Internet of things IDS one by one in a two-dimensional way to form personal records. The application of "code chain" technology will bring more efficient link forms of "people to people", "people to things" and "things to things"
Introction to code chain:
"code chain" refers to a "two-dimensional code chain" formed by using a smart phone to aim at the "two-dimensional code" and "scan", that is, to "generate a new two-dimensional code containing the scanner's DNA" and access to the "service". The whole process can be traced, supervised and managed
"code chain technology" is the most widely used two-dimensional code "scan" payment technology
code chain technology can realize more efficient link form of people to people, people to things and things to things
Introction to blockchain:
blockchain is an important concept of bitcoin. Blockchain is a series of data blocks generated by cryptography. Each data block contains the information of a bitcoin network transaction, which is used to verify the validity of the information (anti-counterfeiting) and generate the next block
in a narrow sense, blockchain is a kind of chain data structure that combines data blocks in chronological order in a sequential way, and it can not be tampered with and forged by cryptography
broadly speaking, blockchain technology is a new distributed infrastructure and computing paradigm, which uses blockchain data structure to verify and store data, uses distributed node consensus algorithm to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses intelligent contract composed of automated script code to program and operate data
the difference between code chain digital currency and blockchain digital currency:
the difference between "code chain digital currency" based on code chain technology and the existing blockchain digital currency is that "code chain digital currency" is based on the control of property rights, and uses "intelligent two-dimensional code" as the medium to transform the contracts of various instry chains into divisible, tradable, transferable, exchangeable Traceable "smart contract" and real right exchange within the code chain alliance. In the code chain monetary system, "intelligent two-dimensional code" means "SGR". That is to say, each commodity corresponds to a "smart QR code", and this "QR code" represents the "special reference property" of the commodity. Through special reference to the exchange of property rights, the exchange of goods (barter) can be realized. This two-dimensional code, which represents "special mention of property rights", can be used as the carrier and payment means of digital currency at the same time, and payment can be completed through "two-dimensional code scanning".
a bitcoin address is like a physical address or an e-mail address. This is the only information you need to provide when someone pays you bitcoin. An important difference, however, is that each address should only be used for a single transaction
block chain is a public record of bitcoin transactions in chronological order. The block chain is shared by all bitcoin users. It is used to verify the permanence of bitcoin transactions and prevent double consumption.
the proct has been finalized, you can only choose to accept or not, but the technology can be applied to all walks of life
the block ID is equivalent to the QQ number in Tencent proct ecosystem. The differences between the block ID and QQ number are as follows:
a. the user's personal data will be stored in their respective block address, and the user can login through the block ID for management. b. Block ID is developed based on blockchain technology, which has the characteristics of decentralization, distributed accounting, anonymity, security and controllability of blockchain
2. Block ID is the pass of TTC ecological community, which can be used to log in to all applications in TTC ecological community with one click, including various dapps launched in the future. There is no need to register repeatedly, so it is more convenient to collect and pay. Now there is a six digit number for registration.
1. ID chain solves the problem of efficient, low-cost and reliable authentication of identity, credit and data among people, people and things, and between things through blockchain technology, and reconstructs the global authentication instry
2. ID chain deals with the effective authorization of data owner and data verifier, privacy protection and data value transmission through smart contract
3. The data on ID chain can be dynamically added and adjusted according to the user's needs, so as to meet the diversified needs of the application level
4. The decentralized structure of ID chain does not rely on the authentication of a single central node, which makes the distributed nodes have the authentication ability and the node co governance authentication more efficient
the total amount of its issuance is 10 billion, of which 60% is proced by mining. The founding team believes that ID chain, as a public chain project with huge market scale and instry users, makes the token value and application value strongly related, and graally releases through the mechanism of core business sharing storage and computing power mining. Each token corresponds to the calculated value of the service provided at the time of publication
in addition, ID chain is one of the few blockchain projects with several years of experience and partial implementation
1. The technical team of the project is the Hong Kong Academy of applied technology. In 2014, based on the deep understanding of the underlying protocol, the bitcoin mining chip was developed< In 2016, the team was commissioned by the Hong Kong Monetary Authority to draft a white paper on the application of digital ID in the banking field, which mainly focused on the research of distributed bookkeeping. The top five banks in Hong Kong participated in the project demonstration, including HSBC and Standard Chartered Bank; The second edition of the white paper was updated in 2017
3. The project marketing and operation team has more than 15 years of business experience in big data, financial credit, artificial intelligence, semiconctor chips and other instries, and the ongoing financial certification business has provided a hot start for IC chain
4. ID chain will bid to participate in the construction of a national identity authentication system in the Asia Pacific region in 2018, and strive to combine blockchain technology with traditional technology to build a first-class ecosystem.
distributed
git ensures that each code warehouse maintains a complete project library locally, not just the branch in which it works and its own submission history. At the same time, it also keeps all the snapshot and index information after the latest pull
on the blockchain, each node keeps a complete database locally, not just its own transaction information
traceability
in Git commit chain, each commit object contains a parent object (the object of the last commit, except the first commit), which can trace all the previous records
on the blockchain, each block contains the index of the previous block (except the genesis block), which can trace all valid transactions before<
tamper proof
in Git's commit chain, each object itself calculates a checksum before storing, and then references it with a checksum. Once modified, the checksums will not be correct, which means that it is impossible to change the contents of any file or directory without git's knowledge< The mechanism used by git to calculate the checksums is called SHA-1 hash. This is a string composed of 40 hexadecimal characters (0-9 and A-F), which is calculated based on the content or directory structure of the file in GIT. SHA-1 hash looks like this:
in the blockchain, each block contains the last block ID, and this block ID has two SHA-256 hashes, which are calculated based on the block content. Once the content is modified, the hash will change, which is inconsistent with the chain of other nodes and cannot be added to the longest chain, so the content cannot be tampered with< 2. Difference
collective consensus and central node will: 1 - blockchain merges based on collective consensus (POW / POS) to form the longest chain, which is the main chain
2 - in Git system, when multi node cooperation is carried out through the warehouse hosting platform, it is the manager of the platform project who controls the power of merge, which reflects the will of the central node<
cryptography
1 - in bitcoin blockchain, cryptography mainly uses the following methods
in the whole system of bitcoin blockchain, a large number of public encryption algorithms are used, such as Merkle tree hash number algorithm, elliptic curve algorithm, hash algorithm, symmetric encryption algorithm and some coding algorithms. The functions of various algorithms in bitcoin blockchain are as follows:
A) hash algorithm
the two hash functions used in bitcoin system are: 1. SHA-256, which is mainly used to complete pow (proof of workload) calculation; 2. Ripemd160, mainly used to generate bitcoin address
b) Merkle hash tree
binary tree or multi tree based on hash value. In the computer field, Merkle tree is mostly used for integrity verification. In the distributed environment, integrity verification can greatly rece the complexity of data transmission and calculation<
C) elliptic curve algorithm
in bitcoin, the public key cryptography algorithm based on secp256k1 elliptic curve mathematics is used for signature and verification. On the one hand, it can ensure that the user's account is not replaced by an impostor, on the other hand, it can ensure that the user can not deny the signed transaction. The private key is used to sign the transaction information, and the user's public key is used to verify the signature. If the verification is passed, the transaction information will be recorded and the transaction will be completed
d) symmetric encryption algorithm
the official bitcoin client uses AES (symmetric block cipher algorithm) to encrypt the wallet file. After the user sets the password, the private key of the wallet is encrypted by the user set password through AES to ensure the security of the private key of the client
e) base58 encoding
base58 is a unique encoding method used in bitcoin. It is mainly used to generate the wallet address of bitcoin, which is similar to the permutation algorithm mechanism in classical cryptography. Its purpose is to increase the readability of bitcoin and change the binary hash value into the address we see
2 - git: SSH key is mainly used for remote login verification, SHA-1 is used for code content checking sum<
SSH is the abbreviation of secure shell, developed by IETF's network working group. It is a protocol designed to provide security for remote login sessions and other network services. SSH protocol can effectively prevent information leakage in the process of remote management< The process of SSH transmission is as follows: (1) the remote host receives the user's login request and sends its public key to the user 2) The user uses the public key to encrypt the login password and send it back 3) The remote host uses its own private key to decrypt the login password. If the password is correct, the user is allowed to log in.