Position: Home page » Blockchain » Implementation document of blockchain verification mechanism
Implementation document of blockchain verification mechanism
Publish: 2021-04-16 19:13:12
1. Because blockchain technology has natural advantages in realizing smart contracts
bitcoin, Ruitai coin, Laite coin, Ethereum and other digital cryptocurrencies all use blockchain technology
blockchain is an important concept of bitcoin, which is essentially a decentralized database and the underlying technology of bitcoin. Blockchain is a series of data blocks generated by cryptography. Each data block contains the information of a bitcoin network transaction, which is used to verify the validity of the information (anti-counterfeiting) and generate the next block.
bitcoin, Ruitai coin, Laite coin, Ethereum and other digital cryptocurrencies all use blockchain technology
blockchain is an important concept of bitcoin, which is essentially a decentralized database and the underlying technology of bitcoin. Blockchain is a series of data blocks generated by cryptography. Each data block contains the information of a bitcoin network transaction, which is used to verify the validity of the information (anti-counterfeiting) and generate the next block.
2. Specifically, the ID card and driver's license information entered by the user will be verified. The ID card and driver's license information that have passed the verification will be identified as valid, and the ID card and driver's license information that have not passed the verification will be identified as invalid. For more wonderful application problems, you can pay attention to the central area chain service platform for real-time understanding
3. Basically, the principle is the same. Take baopin.com as an example, baopin.com's video blockchain authentication is actually DAPP. First, it takes a screenshot of the video's key frames per minute, then transcodes it into a string of unique numbers, and then uploads and records it into the Ethereum blockchain.
4.
The three characteristics of blockchain are well known, that is, decentralization, transparency and non tampering. The tamper proof feature makes blockchain used in many places. Such as proct traceability, privacy protection and so on
because the proction process it traces back to is artificially uploaded, so even if it is tamperable data, the authenticity of the data can not be guaranteed, and the substantive problem still can not be solved
generally speaking, although blockchain has brought great benefits, it is not perfect after all. However, blockchain technology has promoted the development of the times, and I believe its future is worth looking forward to
5. 1. Pow (proof of work) workload proof
one sentence introction: the more you do, the more you get
2. POS proof of stake
in a word: the more you hold, the more you get< Pbft: practical Byzantine fault tolerance
3. Pbft: practical Byzantine fault tolerance
Introction: it provides (n-1) / 3 fault tolerance on the premise of ensuring the activity and safety< Dbft: Byzantine fault tolerant algorithm authorized by delegated BFT
Introction: dbft mechanism adopted by ant is that bookkeepers are selected by rights and interests, and then bookkeepers reach a consensus through Byzantine fault tolerant algorithm
5. Pool verification pool
is based on traditional distributed consistency technology and data verification mechanism
chainnova is a blockchain company. I feel it's very good. Although I don't know any hash algorithm, I still know a little bit.
one sentence introction: the more you do, the more you get
2. POS proof of stake
in a word: the more you hold, the more you get< Pbft: practical Byzantine fault tolerance
3. Pbft: practical Byzantine fault tolerance
Introction: it provides (n-1) / 3 fault tolerance on the premise of ensuring the activity and safety< Dbft: Byzantine fault tolerant algorithm authorized by delegated BFT
Introction: dbft mechanism adopted by ant is that bookkeepers are selected by rights and interests, and then bookkeepers reach a consensus through Byzantine fault tolerant algorithm
5. Pool verification pool
is based on traditional distributed consistency technology and data verification mechanism
chainnova is a blockchain company. I feel it's very good. Although I don't know any hash algorithm, I still know a little bit.
6. Jinwowo network analysis: consensus mechanism is how to reach a consensus among all accounting nodes to determine the validity of a record, which is not only a means of identification, but also a means of preventing tampering.
7. In the blockchain network, verification nodes are specially deployed for pow calculation. These verification nodes can be built by a number of different Internet of things service providers using mainstream PC servers for the purpose of transaction settlement. Therefore, bitbox thinks that there is no possibility of user data leakage and utilization
Hot content