Position: Home page » Blockchain » Building iris data blockchain

Building iris data blockchain

Publish: 2021-04-17 21:21:32
1. How to explain the concept of blockchain? The understanding of people in each instry is different, and the relevant explanations are graally emerging because of more and more practical applications. With the popularity of this blockchain technology, the relevant achievements are also growing. If we want to understand this kind of technology, we must have a deep understanding from the reality

in the past six months, the concept of blockchain has graally become hot in China, and the financial circle has been blowing waves of blockchain whirlwind. With its unique technical advantages, blockchain has attracted more and more attention and favor from people in the instry. With the characteristics of decentralization (or multi centralization), high transparency, impossibility of tampering and no single point of failure, blockchain technology is coming into the vision of financial institutions and enterprises. At least it has been applied from theoretical discussion to practical application in many fields, such as digital currency, payment and exchange, registration and settlement, digital assets, traceability and anti-counterfeiting, supply chain, Internet of things, etc

"blockchain" was first released in early 2009 as "bitcoin". Blockchain has become the basic protocol and technical application for the launch, recording and circulation of bitcoin. Although bitcoin has been controversial since it came into being, and it can not even be regarded as "currency" by the government and monetary authorities, the blockchain technology applied by bitcoin has been widely concerned by the government and monetary authorities

why has blockchain become a hot technology and topic

perhaps the most important of these is that bitcoin, which is based on blockchain technology, has opened a new technology and rule system exploration and attempt, which has little connection with traditional society (offline) and is completely applied to the online world (online), such as Internet users' identity verification, wealth confirmation, transaction records, notarization verification, etc, This provides people with an alternative path and unlimited reverie to adapt to the development of the Internet society
from the perspective of its application in bitcoin, blockchain intuitively means a new set of network block (block, also known as community) establishment, bitcoin configuration, netizen identity verification, and bitcoin (value) confirmation and transaction records formed by mining by combining encryption technology with Internet technology, As well as the extended encryption of bitcoin cross block flow (value transfer) (including factors such as block and transaction time identification) registration and verification, the internet protocol rules and ledger system including block chain, whole process encryption and mutual authentication. Because bitcoin is not a substitute for offline fiat money, but a new and decentralized network currency (virtual currency) issued and managed by the illegal monetary authority, which mainly imitates the mode of gold and is completely protected and supported by the Internet basic protocol and strict encryption technology, it has also formed a set of virtual currency which is different from It is also not subject to the new monetary rules and systems of social laws, and can be traded or exchanged with legal tender. Bitcoin has been more than eight years since it was launched, and there has been no record of funds or user information stolen. Its security has been verified, and its efficiency and cost of capital clearing also have obvious advantages. This makes people have more confidence in the blockchain technology applied by bitcoin, and it is also more and more clear that although blockchain is a technology and protocol initiated and applied by bitcoin, blockchain is not the same as bitcoin, and its application will never be limited to bitcoin. The application of blockchain can be decentralized or centralized; It can be public chain mode or private chain mode. Therefore, after bitcoin, blockchain technology is constantly developing and innovating, and constantly exploring new application fields, especially in the financial field

the reason why more and more people attach great importance to blockchain is that with the development and wide application of the Internet, more and more economic exchanges and trading activities have been transferred to the Internet, and the network world (or online society) is rapidly expanding, enriching and active, while online transactions must solve the problems of identity verification, value verification, transaction records, etc The efficiency and security protection of inspection and verification need strict intermediary and agreement (rules or constitution). In this regard, the traditional thinking and practice is to conform to the development track of the transfer from offline trading to online trading, and push the common rules and practices of the real (offline) society to the online (Network) society, but it is increasingly difficult to adapt to the needs of online trading in practice
for example, the natural choice of the party's identity verification is to add the account or transaction password, as well as biometrics such as Facebook, iris, fingerprint, etc., based on the information of the identity documents protected by the laws of various countries, to carry out the identity verification of online transactions. But this method, first of all, makes the citizenship information of the cross-border interconnected network world subject to the real social administrative jurisdiction, At the same time, non digital, multi identity information collection and verification will greatly increase the cost and rece the efficiency
moreover, in real society, all kinds of economic activities involving capital liquidation, except direct cash transactions, require the parties to open accounts in banks and other institutions first, and carry out capital liquidation through the account opening institutions. However, for various reasons, even in a country, it is impossible to require all citizens to open accounts in an account opening institution (including its branches), It is even more impossible to do this between multinational companies, which makes the transactions of the parties who open accounts in different institutions must be completed through the clearing between their account opening institutions. It will seriously affect the efficiency and cost of transaction confirmation and capital clearing if this mode is implemented in the network world

in addition, in real society, the valuation and liquidation of trading activities must involve money, which is legal tender protected by national or regional sovereignty. In the case of cross-border Internet Interconnection and cross-border development of Internet transactions, transaction pricing and capital clearing also involve currency issues. The operation of multiple currencies will greatly increase the cost and risk of clearing. Therefore, the development of network world and network transaction needs the innovation of identity verification, value verification, currency valuation, transaction confirmation and record, account management and verification. Bitcoin and blockchain technology provide very important enlightenment and practice

of course, blockchain is still a new concept and technology, which needs further verification and improvement; The application of bitcoin is also an extreme example: the initial bitcoin can not be directly converted from legal tender, but can only be obtained through "mining" in the network world. Therefore, bitcoin can completely set aside the offline social rules, form a new set of game rules by using blockchain technology, and extend from online to offline. In real society, whether online or offline transactions, the main body is people (including legal persons). The management of their wealth or value should not be completely divided into two worlds, but must be connected and integrated. Therefore, o2o is necessary. This requires the application of blockchain not only to study and solve the problems of the network world, but also to study and solve the connection and integration between the network world and the real society. This will bring more challenges and risks, and also require more people, more strength, more in-depth discussion and innovation. It is also possible that blockchain technology will be replaced by more advanced and perfect technology in the future, but the historical value of blockchain will be indelible

the development of blockchain technology in China

Bubi blockchain is a commercial blockchain. Bubi covers seven areas: exchange, points (multiple points, gege points), insurance (sunshine insurance will launch accident insurance on our blockchain in a month, which can greatly rece channel costs), equity crowdfunding (gold stock chain, etc.), supply chain finance (Qian Xiang, etc.), supply chain (cooperation with the material chain, etc.), jewelry anti-counterfeiting, etc. Some funds cooperating with Bubby have committed 150 million investment funds. Bubby plays the role of "LP" in the fund, helping the fund identify and invest in companies related to blockchain. At present, the average amount of angel investment obtained through Bubi blockchain is about 3 million, with an average valuation of more than 40 million

blockchain can drive the birth of a new business model

the characteristics of blockchain technology enable it to achieve some business models that are difficult to achieve in the centralized mode. For example, in the Internet of things instry, some organizations have proposed to use blockchain technology to manage the identity, payment and maintenance tasks of tens of billions of Internet of things devices. Using blockchain technology, IOT equipment manufacturers can greatly extend the life cycle of procts and rece the cost of IOT maintenance

blockchain technology has a flexible architecture

according to different application scenarios and user needs, blockchain technology can be divided into public chain, private chain and alliance chain, which can be selected according to the actual use of institutions<

blockchain technology is a useful tool to realize sharing finance

the essence of sharing finance is to realize the optimal allocation of financial resources by recing the asymmetry of financial information, and to ensure the implementation of the rights and interests of both parties in the transaction and facilitate the transaction through strict third-party authentication and supervision mechanism. Through the use of blockchain technology, financial information and financial value can be more strictly protected, and more efficient and lower cost flow can be realized, so as to realize the sharing of value and information

"from the perspective of historical development trend, money has always evolved with the development of technological progress and economic activities. From the early physical money, commodity money to the later credit money, it is a natural choice to adapt to the development of human commercial society. As the currency of the previous generation, paper money has low technology content. From the perspective of safety and cost, it is the general trend to be replaced by new technology and new procts. It will take at least 10 years for China to implement digital currency, so digital currency and cash will be in parallel and graally replaced for quite a long time. "“ For digital currency, blockchain technology is an optional technology, which is characterized by distributed bookkeeping, non account based and non tampering. If digital currency focuses on the protection of personal privacy, blockchain technology can be selected. The people's Bank of China has deployed an important force to study and discuss blockchain application technology. However, so far, blockchain still occupies too many resources, whether it is computing resources or storage resources, which can not cope with the current transaction scale. Whether it can be solved in the future depends on the situation. "

the development of Internet is in the ascendant and irreversible. The development of the network world and its connection and integration with the real society are also the general trend, and the corresponding rules and technology are of great significance. China has been in the forefront of the world in Internet application, and should actively explore and contribute to new rule making and technology application, and strive to lead the new development of the Internet world

what is the concept of blockchain? People will realize that blockchain technology plays a more and more important role in reality, and is supported by many organizations, so that the popularization of blockchain in reality has entered a new application stage.
2. 1、 Decentralization:
blockchain technology does not rely on additional third-party management institutions or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes information self verification, transmission and management through distributed accounting and storage. Decentralization is the most prominent and essential feature of blockchain< Second, openness:
the foundation of blockchain technology is open source. In addition to the private information of all parties to the transaction is encrypted, the data of blockchain is open to all. Anyone can query blockchain data and develop related applications through the open interface, so the information of the whole system is highly transparent< Third, independence:
based on consensus specifications and Protocols (similar to various mathematical algorithms such as hash algorithm used by bitcoin), the whole blockchain system does not rely on other third parties, and all nodes can automatically and safely verify and exchange data in the system without any human intervention< Fourth, security:
as long as 51% of all data nodes cannot be controlled, the network data cannot be arbitrarily controlled and modified, which makes the blockchain itself relatively safe and avoids subjective and artificial data changes
5. Anonymity:
unless there are legal requirements, technically speaking, the identity information of each block node does not need to be disclosed or verified, and information transmission can be carried out anonymously
Digital China is the first major development strategy explicitly put forward in the report of the 19th National Congress of the Communist Party of China. The application of digital technology represented by cloud computing, big data and mobile Internet is no longer limited to the economic field, but widely penetrated into all aspects of public services, social development and people's life, which requires macro coordination, overall control and integrated development
with the deepening of a new round of scientific and technological revolution and instrial change, the tide of digital economy in the world is unstoppable. The development of digital economy has become a global consensus, known as the key to the fourth instrial revolution
adhering to the connotation of the University of nice's world inclusive humanistic spirit, always embracing change, standing up to the tide, conforming to the development trend of the digital economy era, and integrating the essence of Chinese and Western cultural thinking, the University of nice's doctor of blockchain and digital economy management (DDE) came into being
based on this, we can enable the managers of digital economy instry to have global vision and global integration thinking, integrate knowledge, operate digital economy intelligently, promote the sustainable development of the instry, and contribute to the community of human destiny. Therefore, DDE project will cooperate with colleagues in the field of digital economy
if you have MBA related questions, you are welcome to contact me personally&# 180;&# 65381;&# 7447;&# 65381;` ) Bixin~~~~
3. The two have different meanings
the purpose of proct anti-counterfeiting is to identify the authenticity of goods and prevent counterfeiting. And proct traceability is to use blockchain technology to check the source information of goods. Cryptography focuses on blockchain information.
4.

Electronic signature is a form of electronic signature. It not only retains the visual effect of physical seal (i.e. seal appearance), but also contains digital certificate, which is used to ensure that the electronic contract with electronic signature has the characteristics of identity recognition and content tampering

According to Article 14 of the electronic signature law, a reliable electronic signature has the same legal effect as a handwritten signature. At the same time, Article 13 stipulates that an electronic signature can only be regarded as a reliable electronic signature if it meets the following conditions at the same time:

(1) when the proction data of the electronic signature is used for the electronic signature, it belongs to the exclusive property of the electronic signer

(2) when signing, the proction data of electronic signature is only controlled by the electronic signer

(3) any changes to the electronic signature after signing can be found

(4) any changes to the content and form of the data message can be found after signing

principle of electronic signature: following the above explanation of electronic signature, we can simply understand that digital certificate is an "electronic ID card" of "I am me" in the network environment, and this "electronic ID card" needs to be managed by a special organization, that is, CA organization

when a user signs a contract online with an electronic signature, the CA authority verifies the authenticity of the signer's identity information through a series of technical means and specific steps, and then issues a digital certificate to the party and authorizes him to sign the contract, which is the process of CA authentication

(Note: because the explanation of electronic signature involves many technical principles, it is not applicable to users without technical background, so it will not be repeated here, and friends who need it can contact the author for communication)

the role of electronic signature can be reflected as follows: after passing the above authentication process and signing the electronic contract, The parties only need to identify the electronic signature to quickly identify the signer's identity and signing content and other important information, so as to avoid the illegal acts such as seal theft, misappropriation, contract tampering and so on

application scenarios of electronic signature: at present, electronic signature continues to be popular, and is applied in many instries, such as finance, e-commerce, law, personnel, medical treatment, manufacturing, tourism, ecation, real estate, building materials, etc., which makes the signature scenarios of various instries electronic, so as to speed up the cost rection and control the hidden dangers caused by illegal use of seals

5.

Electronic signature is a form of electronic signature. It not only retains the visual effect of physical seal (i.e. seal appearance), but also contains digital certificate, which is used to ensure that the electronic contract with electronic signature has the characteristics of identity recognition and content tampering

principle of electronic signature: following the above explanation of electronic signature, we can simply understand that digital certificate is an "electronic ID card" of "I am me" in the network environment, and this "electronic ID card" needs to be managed by a special organization, that is, CA organization

when a user signs a contract online with an electronic signature, the CA authority verifies the authenticity of the signer's identity information through a series of technical means and specific steps, and then issues a digital certificate to the party and authorizes him to sign the contract, which is the process of CA authentication

(Note: because the explanation of electronic signature involves many technical principles, it is not applicable to users without technical background, so it will not be repeated here, and friends who need it can contact the author for communication)

the role of electronic signature can be reflected as follows: after passing the above authentication process and signing the electronic contract, The parties only need to identify the electronic signature to quickly identify the signer's identity and signing content and other important information, so as to avoid the illegal acts such as seal theft, misappropriation, contract tampering and so on

application scenarios of electronic signature: at present, electronic signature continues to be popular, and is applied in many instries, such as finance, e-commerce, law, personnel, medical treatment, manufacturing, tourism, ecation, real estate, building materials, etc., which makes the signature scenarios of various instries electronic, so as to speed up the cost rection and control the hidden dangers caused by illegal use of seals

6.

Electronic signature is a form of electronic signature, which mainly uses image processing technology to transform electronic signature operation into the same visual effect as paper document seal operation. At the same time, electronic signature technology is used to ensure the authenticity and integrity of electronic information and the non repudiation of the signer The law of the people's Republic of China on electronic signature stipulates that "reliable electronic signature has the same legal effect as handwritten signature or seal". Therefore, electronic signature is protected by law and has legal effect

7. Intelligent site is the use of modern information technology, such as 5G, Internet of things, Internet plus, big data, cloud platform, block chain technology, etc., to manage information from safety to efficiency in the construction site, and improve the overall security and quality and efficiency of the site.
8. Samsung first introced iris scanning technology in Galaxy note 7. It allows computers to scan the eyes of users to verify their identity. This is what we often see in movies. It is used to ensure safe access to real government facilities. Samsung has adopted the same concept in its iris scanning system, only narrowing the scope so that it can work faster and take advantage of the limited resources of smartphones. It's safe enough for your mobile phone. Even if it's not 100%, every eye has a different iris pattern structure. Even if the right eye and the left eye of the same person are very different
iris patterns are actually more unique and clearer than fingerprints. Because each eye is unique, Samsung can use your eyes to identify you and use it as your identity certificate. These credentials can be used for any fingerprint or even password. Users only need to hold the phone to the relevant position, so that the special camera can see your eyes and your phone can be unlocked
to do this, Samsung uses dedicated hardware on its mobile phones. The diode emits near-infrared light to illuminate your eyes. It's a wavelength of light that humans can't see, but it's quite intense and "bright.". There are two reasons for using near-infrared light: your pupils don't contract, your vision doesn't change, and it can illuminate any object with color pattern better than other wavelengths we see
if you look closely at your iris, you will find hundreds of different colors and patterns. In the near infrared, there are thousands of colors, and the contrast between them is very good. This will capture your iris image better, because even if you don't see any of these images, your phone can use it to build a dataset
Samsung uses near-infrared light and a special camera to collect and process data from your eyes
once the iris is illuminated, an image can be captured by a specially tuned narrow focus lens. The ordinary front camera on your galaxy S8 can register color information under infrared illumination, but ordinary cameras can't recognize the iris, which is why you need a second camera
after analyzing this image, the device will create a clear set of data on your mobile phone. All the data processing, analysis and storage are done locally and encrypted, so only the iris of the user can have access to it. This data is used to create a token. If the iris scanning process provides the correct mark - the security check is passed - the iris information registered by the user is detected. Then any software that needs identity can continue to operate
of course, Samsung will also use ordinary front-end cameras to collect users' facial data. Most likely, the face data is used to help build the position of the user's face so that the iris scanner has a clear view
your eyes need to set up and use the iris scanner in the right place
there are some inherent defects. Because users use iris scanning to unlock the phone, they often want to be very fast, rather than waiting for the data collected in their eyes to match exactly. Samsung must find the right balance between safety and convenience, because no one is willing to wait 5 to 10 seconds for each scan, so iris recognition may be misled by color high-resolution laser printed photos and ordinary contact lens simulation. But to be honest, basically no one has a picture of your eye that's clear enough to unlock your galaxy S8 or note 8. If they can get photos, mobile security may not be the biggest problem for you
as long as your eyes are in the "best position", Samsung's iris scanning will work well
the bigger problem is accuracy. Your iris needs to be analyzed before it can pass the software inspection, because the images captured by the camera are very limited, so your eyes need to have a "best balance point". You need to spend enough time at that point to pass the validation. If you don't collect enough data to prevent others from hacking into your mobile phone, the system will be useless, so that's how it works
this is a good system in terms of biometric security. And for many users, this will effectively increase their device security. Only your eye data can make it work, and it's quite fast. You just need to learn to use it correctly - yes, usually it doesn't work because your eyes don't open naturally many times.
9. At present, a new round of scientific and technological revolution and instrial change in the global financial instry is ready to take place. Big data, cloud computing, artificial intelligence, blockchain, Internet of things and other innovative ICT technologies are continuously impacting the traditional business model of financial institutions. Science and technology will become an important breakthrough in the innovation and transformation of financial institutions: business cloud, mobile payment, precision marketing, social based small and micro loans, intelligent investment advisory, intelligent outlets, risk control management, intelligent payment, supply chain finance and other fields will become hot spots of innovation

from the perspective of the general trend of financial and business environment, the focus of the whole business chain is constantly shifting from the supply side to the demand side. Customers of financial institutions are becoming more powerful than ever, and more autonomous and digital. Financial institutions need to constantly sublimate their smart finance strategy, implement the key measures of digitization, and realize comprehensive digital transformation, so as to make the customer experience they provide match the constantly pushed up customer expectations

with innovative financial ICT technology, Huawei joins hands with instry partners to build smart finance with financial institutions and accelerate comprehensive digital transformation.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750