The concept and characteristics of blockchain Technology
1-decentralization
2-transparency
3 - openness
4-autonomy
5 - information cannot be tampered with
6 - anonymity.
the core idea of blockchain is decentralization
in the blockchain system, the rights and obligations of any node are equal, and all nodes have the ability to vote with computing power, Thus, the result recognized by more than half of the nodes is guaranteed. Even under serious hacker attacks, as long as the number of nodes controlled by hackers does not exceed half of the total number of nodes in the world, the system can still operate normally and the data will not be tampered with
block chain's biggest subversive nature is the establishment of credit
theoretically, block chain technology can make WeChat payment and Alipay no longer exist value. The economist makes an image metaphor for blockchain: in short, it is "a machine for creating trust". Blockchain enables people to cooperate with each other in the case of mutual distrust and no neutral central institution. The fight against counterfeit money and financial fraud will not be needed in the future
the collective maintenance of blockchain can rece the cost
under the centralized network system, the maintenance and operation of the system depend on the operation and maintenance of platforms such as data center, and the cost cannot be omitted. Anyone can participate in the nodes of the blockchain. Each node can verify the correctness of the results of other nodes' records while participating in the records, which improves the maintenance efficiency and reces the cost
in a word, blockchain touches money, trust and power, which are the fundamental basis for human survival.
decentralization. Blockchain technology does not rely on additional third-party management institutions or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes information self verification, transmission and management through distributed accounting and storage. Decentralization is the most prominent and essential feature of blockchain
openness. Blockchain technology is based on open source. In addition to the private information of all parties involved in the transaction is encrypted, the data of blockchain is open to everyone. Anyone can query blockchain data and develop related applications through the open interface, so the information of the whole system is highly transparent
independence. Based on consensus specifications and Protocols (similar to various mathematical algorithms such as hash algorithm used by bitcoin), the whole blockchain system does not rely on other third parties, and all nodes can automatically and safely verify and exchange data in the system without any human intervention
1. Block chain technology is a decentralized consensus mechanism to maintain a complete, distributed and tamper proof ledger database. It can enable the participants in the blockchain to achieve a unified ledger system without establishing a trust relationship. 2. Renren blockchain technology service platform does not need to develop one click to create its own blockchain system to quickly build blockchain infrastructure; One click to complete the development and deployment of blockchain applications; To provide your customers with open, transparent and credible services.
A: the basic characteristics of blockchain
I. decentralization
blockchain technology does not rely on additional third-party management institutions or hardware facilities, and there is no central control. In addition to the self-contained blockchain itself, each node realizes information self verification, transmission and management through distributed accounting and storage
the foundation of blockchain technology is open source. In addition to the private information of all parties involved in the transaction is encrypted, the data of blockchain is open to everyone. Anyone can query blockchain data and develop related applications through the open interface, so the information of the whole system is highly transparent
Third, independencebased on consensus specifications and Protocols (similar to various mathematical algorithms such as hash algorithm used by bitcoin), the whole blockchain system does not rely on other third parties, and all nodes can automatically and safely verify and exchange data in the system without any human intervention
Four, safetyas long as 51% of all data nodes cannot be controlled, the network data cannot be arbitrarily controlled and modified, which makes the blockchain itself relatively safe and avoids subjective and artificial data changes
5. Anonymityunless there are legal requirements, technically speaking, the identity information of each block node does not need to be disclosed or verified, and the information transmission can be anonymous
once the information is recorded in the blockchain, it will become permanent and impossible to change or delete. If a user wants to create a new entry (called a block) to the ledger, other users in the network must verify the information they propose to add. Each computer on the network (called a "node") compares the submitted information with the existing ledger. If most nodes can verify the accuracy of the new block of information, it is allowed to become a permanent part of the ledger. Because the blockchain network is composed of computers in multiple locations, even if a certain network is destroyed, the security of the whole data will not be affected
to understand the working principle of blockchain technology, we must first know the data type of each block in Dimon. Except for transaction data, all blocks contain digital fingerprints called hashes. Each unique hash is generated based on the information within the block, so if the data is changed in any way, the hash will change automatically. This cryptography is the key to decentralized authority of blockchain. The new block also contains the imprint of the hash assigned to the previous block and the chain of entries being audited. If the user attempts to tamper with the block data, the hash cannot be authenticated and the entry is rejected.