What does blockchain point-to-point payment mean
The strict definition of blockchain refers to the distributed database technology that multiple nodes in peer-to-peer network jointly maintain a continuously growing list ledger constructed by time stamp and orderly record data blocks through consensus mechanism based on cryptography technology. This technical solution allows any number of nodes in the participating system to calculate and record all the information exchange data in the system in a period of time to a data block through cryptography algorithm, and generate the fingerprint of the data block for linking the next data block and checking. All participating nodes in the system jointly determine whether the record is true
blockchain is a technical solution similar to NoSQL (non relational database). It is not a specific technology, and can be implemented through many programming languages and architectures. There are many ways to realize blockchain, including pow (proof of work), POS (proof of stake), dpos (delegate proof of stake), etc
the concept of blockchain was first proposed in the paper "bitcoin: a peer-to-peer electronic cash system" by indivials (or groups) who call themselves Satoshi Nakamoto. Therefore, bitcoin can be regarded as the first application of blockchain in the field of financial payment
< H2 > [popular explanation]no matter how big the system or how small the website is, there is a database behind it. So who will maintain this database? In general, who is responsible for the operation of the network or system, then who is responsible for the maintenance. If it is wechat database, it must be maintained by Tencent team, and Taobao database is maintained by Alibaba team. We must think that this way is natural, but blockchain technology is not P>
if we think of the database as a book, for example, Alipay is a typical account book. Any change of data is bookkeeping. We can think of database maintenance as a very simple way of accounting. In the world of blockchain, everyone in the blockchain system has the opportunity to participate in bookkeeping. The system will select the fastest and best bookkeeper in a period of time, maybe within ten seconds or ten minutes. The bookkeeper will record the changes of the database and the account book in a block. We can think of this block as a page. After the system confirms that the records are correct, the system will record the changes of the database and the account book in a block, It will link the fingerprint of the past account book to this paper, and then send this paper to everyone else in the whole system. Then, over and over again, the system will look for the next person with fast and good bookkeeping, and everyone else in the system will get a of the whole ledger. This means that everyone as like as two peas in the system is called Blockchain. It is also called distributed account technology. P>
as like as two peas (computer) have identical accounting books, and everyone has the same rights, they will not collapse e to the loss of contact or downtime of a single person. As like as two peas, the data is transparent and everyone can see what changes are in every account. Its very interesting feature is that the data can't be tampered with. Because the system will automatically compare, it will think that the same number of books with the largest number are real books, and a small number of books with different numbers are false books. In this case, it's meaningless for anyone to tamper with his own account book, because unless you can tamper with most nodes in the whole system. If there are only five or ten nodes in the whole system, it may be easy to do so. However, if there are tens of thousands or even hundreds of thousands of nodes and they are distributed in any corner of the Internet, unless someone can control most computers in the world, it is unlikely to tamper with such a large block chain
< H2 > [elements]combined with the definition of blockchain, we think that we must have the following four elements to be called public blockchain technology. If we only have the first three elements, we will consider it as private blockchain Technology (private chain)
1, peer-to-peer network (power equivalence, physical point-to-point connection)
2, verifiable data structure (verifiable PKC system, non tampering database)
3, distributed consensus mechanism (Solving Byzantine general problem, solving double payment)
4 Game design of Nash equilibrium (cooperation is the strategy of evolutionary stability)
combined with the definition of blockchain, blockchain will realize four main characteristics: decentralized, trustless, collective maintenance and reliable database. And the other two will be derived from the four characteristics Features: open source Privacy. If a system does not have these characteristics, it can not be regarded as an application based on blockchain technology
Decentralized: there is no centralized hardware or management organization in the whole network. The rights and obligations of any node are equal, and the damage or loss of any node will not affect the operation of the whole system. Therefore, it can also be considered that the blockchain system has excellent robustnesstrustworthiness: there is no need to trust each other when participating in the data exchange between each node in the whole system. The operation rules of the whole system are open and transparent, and all data contents are also open. Therefore, within the specified rule range and time range of the system, nodes cannot and cannot cheat other nodes
collective maintenance: the data blocks in the system are maintained by all the nodes with maintenance function in the whole system, and these nodes with maintenance function can be participated by anyone
reliable database: the whole system will enable each participating node to obtain a of the complete database in the form of sub databases. Unless more than 51% of the nodes in the whole system can be controlled at the same time, the modification of the database on a single node is invalid, and the data content on other nodes cannot be affected. Therefore, the more nodes and computing power in the system, the higher the data security in the system
Open Source: since the operation rules of the whole system must be open and transparent, the whole system must be open source for the program
Privacy Protection: since there is no need to trust each other between nodes, there is no need to disclose the identity between nodes, and the privacy of each participating node in the system is protected
imapp2.0 version of blockchain application center has been officially launched. Imapp is the world's first blockchain app store with universal dividends, which aims to create a super entrance to the blockchain instry and make it easier for users to use blockchain applications. The interface of imapp 2.0 is more concise and beautiful, the function adds news and DAPP, and the content enriches the guessing game. Through imapp, users can browse, forward, download, update and open the application to obtain imapp ecological token IA. The official imapp has reached a strategic cooperation with the bitcoin diamond foundation. Ecocard ia can exchange bitcoin diamond BCD at a certain proportion.
Why is the Internet era coming to an end and the blockchain era coming
Once the
blockchain develops, it will burst out more innovation. As the first proct of blockchain, bitcoin has proced many innovations since its birth. For example, small cross-border payment, recording transfer transactions between currencies, recording various stocks, registering housing property rights, recording program codes, etc.
the steam age liberates social proctivity, the electrical age enlivens social cooperation ability, the Internet age connects the world, and the blockchain era will let us truly realize freedom
Second, OTC trading is relatively simple and flexible, meeting the needs of investors
thirdly, with the development of computer and network technology, the over-the-counter trading is constantly improving, and its efficiency is comparable to that of the floor trading< Fourthly, the transaction cost is low. Because the buyers and sellers trade directly without brokerage service, their commission is much less than that in other markets
the fifth point is to improve the confidentiality mechanism. Because there is no need to go through a broker, it is concive to anonymous transactions and keep the confidentiality of transactions< The sixth point does not affect the securities market. If block trading is carried out in the stock exchange, it may have a greater impact on the price of the stock market
the seventh point is that the information of the whole platform is sensitive and transactions are fast
peer to peer trading is like a green rose outside the window, a hope growing in the wind and rain. How can we say that opportunities are coming? In fact, the purpose of supervision is nothing more than that the exchange does not have any national certification as the basis, and a large amount of funds are stored on the platform, which can not avoid the risk of running the exchange. But the point-to-point does not exist, and the funds no longer gather on the platform. Is it necessary for the operators to run without money? It can be imagined that many people in this situation want to throw money, but the platform is not allowed to go up. There are countless coins that want to be sold at a low price, so what should we do? At that time, we went to the point-to-point trading platform and sold it at a low price. People with vision went to develop a point-to-point trading platform. In troubled times, there was another opportunity to make wealth
the development of point-to-point trading platform many people think that the digital assets represented by bitcoin are the inevitable proct of the development of Internet technology and the largest practice of blockchain technology at present. Bitcoin's blockchain network may become the underlying network of other public chains, which may have a far-reaching impact on the real economy. Even if the report is true, it is still legal to hold and trade bitcoin in China. There is no need to panic excessively. Bitcoin can still be traded and realized in a point-to-point manner. The progress of technology in the world can not be stopped. China has occupied a certain leading edge in the development of blockchain. I believe that China will also be at the forefront of the world in the future.
according to the relevant part of the U.S. federal communication regulations (CFR 47), all electronic procts entering the U.S. are required to undergo EMC certification (except for some procts specified in the relevant provisions). There are three common certification methods: certification, DOC and verification. The certification methods and proceres of these three procts are quite different, and the optional certification methods for different procts are stipulated in FCC. The strict degree of its certification is decreasing. For these three kinds of certification, the FCC committee also has relevant requirements for each laboratory< At present, the United States has become China's second largest trading partner for several consecutive years, and the trade volume between China and the United States is increasing year by year, so the export to the United States should not be underestimated. The strictness of proct technical standards and import regulations of the United States is the first in the world. Understanding the market access rules of the United States will help our procts further open the U.S. market< The Federal Communications Commission (FCC) - regulates the import and use of radio frequency devices, including computers, fax machines, electronic devices, radio receiving and transmitting equipment, radio controlled toys, telephones, personal computers and other procts that may harm personal safety. If these procts want to be exported to the United States, they must be tested and approved by a government authorized laboratory according to FCC technical standards. Importers and customs agents are required to declare that each radio frequency device complies with the FCC standard, or FCC license< Self verification: manufacturers or importers ensure that their procts have undergone necessary tests to confirm that the procts comply with relevant technical standards and retain test reports. FCC has the right to require manufacturers to submit test data of equipment samples or procts. Devices suitable for self verification include commercial computers, TV and FM receivers, and instrial, scientific and medical devices used by non mass consumers of FCC rule Part 18
2. Declaration of conformity: the party in charge of the equipment (generally the manufacturer or importer) shall test the procts at the qualified testing agency designated by FCC to ensure that the equipment meets the relevant technical standards and keep the test report. FCC has the right to require the party in charge to submit the test data of the equipment samples or procts. The devices applicable to the declaration of conformity include home computers and peripherals, civil broadcast receivers, super regenerative receivers, other receivers of FCC rule Part 15, TV interface devices, cable system terminal devices and instrial, scientific research and medical devices used by the mass consumers of Part 18. The responsible party shall mark the equipment as follows:
3. ID authentication: FCC shall review the samples (or photos) and test data submitted by the applicant, and grant an FCC ID number to the equipment if it meets the requirements of FCC rules. Equipment suitable for certification include low power transmitters such as cordless phones, remote controls for automatic doors, radio controlled toys and safety alarm systems, equipment for intentionally transmitting radio frequency energy in part 15, instrial, scientific research and medical equipment for mass consumers in part 18, automatic frequency conversion receivers and super regenerative receivers, TV interface equipment, And home computers and peripherals. The responsible party shall mark the equipment with FCC ID:
note: if a certain equipment is suitable for two or three kinds of approved types, it shall be selected by the responsible party
FCC certification process
1. Declaration of conformity: the proct responsible party (manufacturer or importer) will test the proct in the qualified testing agency designated by FCC and make a test report. If the proct meets the FCC standard, the corresponding label will be pasted on the proct, the relevant compliance with FCC standard will be declared in the user manual, and the test report will be reserved for request by FCC
2. To apply for an ID, first apply for an FRN to fill in other forms. If the applicant is applying for FCC ID for the first time, it needs to apply for a permanent grant code. While waiting for FCC approval to distribute grant code to the applicant, the applicant should seize the time to test the equipment. When all the materials required by FCC are ready and the test report has been completed, the FCC should have approved the grant code. The applicant uses the code, test report and required materials to complete FCC form 731 and form 159 online. After FCC receives form 159 and remittance, it begins to accept the application for certification. The average time for FCC to accept ID application is 60 days. At the end of the processing, FCC will send the original grant of FCC ID to the applicant. The applicant can sell or export the corresponding procts after getting the certificate< Materials to be submitted for FCC certification
1
2. A of the installation and operation manual of the certified proct to be provided to the user If there is no user manual for the proct, the draft of relevant contents can be provided)
3. Electrical schematic diagram and working principle description of the proct If the proct has grounding or antenna, it should be described)
4. Table of working oscillation frequency of relevant procts, in which the signal propagation path and corresponding oscillation frequency should be listed
5. Other proct features that need to be explained. Note
1. Relevant documents should be in both Chinese and English
2. In order to shorten the authentication cycle, the information provided should preferably be in the form of electronic documents
3. In the process of certification, in view of some special circumstances, enterprises may need to hand in additional relevant information
Shenzhen Lixun Proct Technology Service Co., Ltd. is specialized in instrial consumer proct safety certification, electromagnetic compatibility testing, chemical material testing and analysis services. At present, our testing and certification procts cover wireless communication equipment, mechanical equipment, household appliances, audio and video equipment, information technology equipment, toys, medical devices, building materials, personal protective equipment, etc
CE certification process
1. The manufacturer's relevant laboratory (hereinafter referred to as the laboratory) puts forward oral or written preliminary application
2. The applicant fills in the CE marking application form and sends the application form, proct instructions and technical documents to the laboratory (if necessary, the applicant company is required to provide a prototype)
3. The laboratory determines the test standards and test items, and makes a quotation
4. The applicant confirms the quotation and sends the samples and relevant technical documents to the laboratory
5. Technical documents provided by the applicant
6. The laboratory issues a charging notice to the applicant, and the applicant pays the certification fee according to the charging notice
7. The Laboratory concts proct testing and reviews technical documents
8. Review of technical documents includes:
A. whether the documents are perfect
B. whether the document is written in the official language of the European Community (English, German or French)
9. If the technical documents are incomplete or do not use the specified language, the laboratory will inform the applicant to improve
10. If the test fails, the laboratory will inform the applicant in time and allow the applicant to improve the proct. In this way, until the test is qualified. The applicant shall change the technical data in the original application so as to reflect the actual situation after the change
11. The laboratory will issue a supplementary charge notice to the applicant for the rectification costs involved in items 9 and 10 of this page
12. The applicant shall pay the rectification fee according to the supplementary fee notice
13. The laboratory provides the applicant with test report or technical document (TCF), CE certificate of conformity (COC) and CE mark
14. The applicant signs the CE guarantee self declaration and attaches the CE mark on the proct
if you have any questions about certification, please feel free to send a private message or Q, thank you!!
Fashion Chain English: fac (fashion chain)
technical team: fac blockchain Research Institute
release date: April 2018
block speed: 15 seconds / block
total issue: 42000000 pieces
total circulation: 220000000 pieces
proof method: POS + POW
quantity of cornerstone: 500000000 pieces
price of cornerstone: 1eth = 150000fac pieces
income:
1 Fac point-to-point payment, application related fields expansion, payment, transaction application increase and application value growth (circulation value-added)
2. Effective nodes of fac generate miners' income every day (candy)
3. Effective nodes of worker system generate computing income every day.
this setting is troublesome, because it is a piece of paper, which can be forged, and there will be various gaps. The issuing authority is also a person, and there will be various gaps in the middle. As long as it is related to people, there will be various possibilities related to which media
blockchain provides a good opportunity. As soon as you graate, you can generate a record on the blockchain. No one can change this record. This thing exists objectively. As a physical existence, and then as a data existence, blockchain will be generated
in this way, it is easy for anyone who wants to find out where he graated from
this is similar to the big data often used in social networking (WeChat) and payment platforms (Alipay, Yi Bao).