Thinking and exploration of blockchain application and development technology

InfoQ 2021-05-09 09:04:22 阅读数:376

本文一共[544]字,预计阅读时长:1分钟~
thinking exploration blockchain application development
{"type":"doc","content":[{"type":"heading","attrs":{"align":null,"level":2},"content":[{"type":"text","text":" To the letter chain "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" When it comes to blockchain , I have to say a classic question : Can the data of the blockchain be changed ? Just now someone said yes , Some people said no . In fact, these two answers are right from different perspectives ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Blockchain is a distributed system , Data modification of a single node cannot change the data state of the whole network , These changes must be agreed on as a whole , To take effect in the blockchain . And it's a chain structure , The following block will include the hash of the previous block , Any modification to the previous block will result in the modification of all subsequent blocks . These blockchain features , It ensures that the data on the existing chain is difficult to be modified ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/3e\/3e2a54db68157574d4e1db3b7a6ad9bc.webp","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Based on the above , How to understand that the data on the chain can be changed or not ? Blockchain can be compared to our life , If you think of every day as a block , Once the day is over , Yesterday's data can't be modified . But today we can do better what we wanted to do yesterday , That is, we can attach a new block after yesterday's block ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" So the blockchain can't be modified , You can modify , Immutable is mainly for existing data , Modifiable means that new blocks can be added , The whole history goes back to ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The technical features of blockchain include the following parts :"}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The first is "},{"type":"text","marks":[{"type":"strong"}],"text":" Distributed consensus "},{"type":"text","text":", Through distributed consensus , Ensure that a single node cannot write data directly , Data can only be written in after consensus of multiple nodes ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The second is "},{"type":"text","marks":[{"type":"strong"}],"text":" Block chain structure "},{"type":"text","text":", It increases the difficulty of block modification , Ensure data integrity ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The third is "},{"type":"text","marks":[{"type":"strong"}],"text":" Intelligent contract "},{"type":"text","text":", With smart contracts on the chain , Users can put the business logic of cooperation between enterprises on the chain , Combine trusted data on the chain with transparent business logic , Accelerate the overall business flow ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The last one is "},{"type":"text","marks":[{"type":"strong"}],"text":" Cryptography technology "},{"type":"text","text":", Including symmetry 、 Asymmetric 、 Zero knowledge , Homomorphic encryption and so on to ensure the data on the chain trusted and transaction privacy ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/79\/79bdefe75454fd7f42700228db772699.webp","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","marks":[{"type":"strong"}],"text":" Blockchain data is difficult to tamper with , Full traceability , The whole network is transparent , Naturally, it is suitable for application in the field of certificate keeping "},{"type":"text","text":". With the development of information internet , Now there's more and more information , Every day, a huge amount of information is generated on the Internet , Some of this information may be used as electronic evidence in a case ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Let's look at the statistics ,2018 The total number of cases accepted by the whole country in 2800 Of the 10000 cases , Yes 73% The case involves electronic data , only 7% Electronic evidence was found . What is the underlying reason behind this ? There are several problems in electronic data : First of all, they are mostly centralized , It's easy to tamper with . Second, there's a huge amount of data , It's hard to have enough people to deal with . In addition, the ownership of electronic data is also difficult to solve ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" From electronic data to electronic evidence , This requires some necessary transformation process , So can blockchain help to achieve such a process ?"}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" In terms of policy , The judicial side is actively embracing blockchain technology , For example, Hangzhou Internet court made some cases based on blockchain , The Supreme Court has also recognized the way blockchain deposits its certificates ."},{"type":"text","marks":[{"type":"strong"}],"text":" Blockchain certificates can meet the requirements of compliance , At the same time, there are practical application requirements , This is the background of Zhixin chain "},{"type":"text","text":"."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/96\/96c1820a57fd33b71ca0dd5a8a6d8dea.png","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"    "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Blockchain application is a distributed application , It requires multiple organizations to join in the maintenance . We chose to work with some credibility agencies , Including network security 、 Beiming 、 Ministry of industry and information technology and other authoritative institutions , Let them also become the nodes of the blockchain , To jointly maintain the data on the chain ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" In addition, we also get through to the judicial side , Nodes to the chain will be deployed to some courts , For example, Sichuan high court 、 Qianhai court, etc ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" After meeting the basic needs of certificate deposit , And then there's a whole range of other requirements . For example, after the deposit of the certificate, is it possible to identify whether there is any infringement ? Whether it has the ability of infringement monitoring ? If the infringement occurs, can evidence be obtained ? Is it possible to upload the data to the court in time after obtaining evidence ......"}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Combined with blockchain Technology , The whole ecology of content protection has formed a closed loop . In the whole closed loop , We're going to work in areas we're good at . At the same time, we also actively access other capacity partners , For example, the forensics , Copyright service providers, etc ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" At present, the whole content ecosystem of Zhixin chain has joined many members , For example, the penguin of Tencent 、 Tencent music, etc , There are also many external partners , Like shells 、 Get... Etc ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Each of us generates a lot of information on the Internet every day , Some information is valuable . For valuable information , We need to protect in time , Protect your own interests ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/f4\/f4a7d2a6fc77463b8c22b9e133750aeb.png","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" In the chain of letters , We mainly use blockchain to do the deposit of evidence . When the user generates data , The user hashes the data , And then it's stored on the to letter chain . Hash can ensure that a file to hash value is a one-to-one relationship , And it's hard to push back the original file from the hash value , If you make any changes to the original file, the hash value will also change dramatically ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/6f\/6f1c4cc14b738bb33c87089fab354048.png","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" When a user thinks a data is important , For example, a picture is very important , Users can hash it to the message chain . But a simple hash value can only prove the existence of this work , It doesn't prove who it belongs to yet , So we need to add some electronic signatures , With a time stamp . So we can know : When and who owns something ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Although it is impossible to know whether the photo already exists before the user saves the card , But at least it can guarantee : If you're the photo owner , The first time on the chain can basically guarantee your rights and interests ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" When you're on the chain , If this picture is found to have been stolen by someone else , The copyright owner can sue the infringer . The copyright owner submits the original evidence to the court , The court can get through to the information chain to check on the chain , Protect the rights and interests of copyright owners . Zhixin chain is closely related to our life , It doesn't just serve the supply chain 、 Finance , It also includes our personal copyright ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"heading","attrs":{"align":null,"level":2},"content":[{"type":"text","text":" Coalition governance "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","marks":[{"type":"strong"}],"text":"1.  Blockchain deployment "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Blockchain is a multi center distributed network . When we need to build a blockchain and do business on it , The first problem is : How do we build this chain ?"}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" There are several ways , The first is the "},{"type":"text","marks":[{"type":"strong"}],"text":" Privatization "},{"type":"text","text":". For the alliance with strong development ability and operation and maintenance ability , You may want to deploy your own blockchain network to connect all nodes of the participants , At the same time, all the operation and maintenance monitoring , Including smart contract deployment, all of them are in the charge of their own technicians ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" This is feasible , But there are also problems . The main problem is that the application of blockchain has not been formally launched yet , A lot of human and material resources have been invested in the bottom layer of the blockchain , This also relatively delayed the process of the chain ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Another way is "},{"type":"text","marks":[{"type":"strong"}],"text":" Public cloud "},{"type":"text","text":", Every cloud manufacturer now provides a complete set of blockchain solutions , Just click on the public cloud to help deploy your own blockchain network , Including deploying smart contracts , At the same time, it will automatically monitor the operation and maintenance of the blockchain network ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Users don't have to care about how the underlying chain is implemented , We only need to care about how the business layer is transformed into a smart contract recognized by the blockchain . This way is relatively fast ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" As the business grows , Some institutions will be introduced gradually , These institutions may have some compliance requirements for data , This is the time , You can pull another node on the public cloud to the user's IDC It's a hybrid cloud solution ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/12\/126bad0a6a24fc498c7e2523d92d2307.png","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","marks":[{"type":"strong"}],"text":"2.  Data link "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" When our network has been deployed , You need to think about data . When we do blockchain applications, we need to consider : What data should be put on the chain ?"}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The computing power and storage of blockchain itself are limited , So don't waste limited computing and storage , Just put some "},{"type":"text","marks":[{"type":"strong"}],"text":" Key information on the chain "},{"type":"text","text":" that will do , And if the key information is big , Key information summary can also be linked up ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" In addition, for controversial data , For example, data that you generate unilaterally , But other parties have to use , At this time, it is suggested to be on the chain ; And then there's the data produced by many parties , It's also recommended to put it on the chain ; For important data , The whole life cycle of data should leave traces on the chain ; The third is that the inseparable data jointly maintained by multiple parties is also recommended to be linked ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/32\/32cdffda67b30c0b52d701a970e60756.webp","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" When the data is linked , All nodes have ledgers , All participants can see the data on the chain ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The transparency of blockchain is a double-edged sword , All nodes can be seen, which means that privacy cannot be protected . This requires us to consider how to make a trade-off between data link and privacy security ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" There are several ways to link data . The first way is "},{"type":"text","marks":[{"type":"strong"}],"text":" Clear text on the chain "},{"type":"text","text":", As long as the data system ensures that the alliance participants do not disclose , And does not involve the user privacy, can be plaintext on the chain ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" If plaintext chaining is not feasible , You can also choose "},{"type":"text","marks":[{"type":"strong"}],"text":" Ciphertext on the chain "},{"type":"text","text":". The original text of the data is invisible to the participants , And it's not operational , And the lack of plaintext and the corresponding private key can not be verified . The typical scenario of ciphertext on the chain is to store evidence , Hash certificate is the ciphertext on the chain . Of course, symmetry can also be used 、 Asymmetric method of encryption on the chain ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" There are also some related to account operation , For example, although it's ciphertext , But it needs to be added and subtracted . In this case, homomorphic encryption can be introduced . The data on the chain is encrypted , These encrypted data can be directly operated with other data , For example, adding ciphertext to plaintext , Or ciphertext plus ciphertext , What we get is the result of ciphertext . Users holding the relevant private key , You can get the right result . Blockchain is responsible for the process of computation , This makes the ciphertext operable ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The disadvantage of ciphertext operability is that it is not verifiable . For example, the user turns on the chain 100 The assets of the , At this time, I don't know whether the user has 100 The assets of the , Blockchain is just a simple operation of subtracting assets . Now "},{"type":"text","marks":[{"type":"strong"}],"text":" I hope the ciphertext can be operated , And it has to be verifiable "},{"type":"text","text":"."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" For example, assets on the chain need to be subtracted 100, You don't need to know the exact amount of assets at this time , But as long as we can prove that the assets on the chain are greater than 100 That's enough . We can introduce "},{"type":"text","marks":[{"type":"strong"}],"text":" Zero knowledge "},{"type":"text","text":" To meet the corresponding needs ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/68\/68388831115b7b08550d0d3f4718b67c.webp","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" These encryption algorithms do not mean that every application should use all of them , Mainly according to the requirements of business scenarios . When we encounter these scenarios, we can integrate them into the smart contract together with the solutions provided by cloud vendors , Make development smoother ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","marks":[{"type":"strong"}],"text":"3. Data inflation "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" After the data is linked , Another challenge is about data inflation . Blockchain is a chain structure , After saving the data , New blocks will be added in the future , It's bound to lead to a lot of data expansion , How to deal with it ?"}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Here are a few solutions :"}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The first one is :"},{"type":"text","marks":[{"type":"strong"}],"text":" Reduce the size of the block itself "},{"type":"text","text":". On the one hand, this is to optimize the bottom layer of the blockchain , Remove some unnecessary data from the underlying engine of the blockchain or store it in another place , As long as the validity of the block can be proved ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" On the other hand "},{"type":"text","marks":[{"type":"strong"}],"text":" Reduce the data in the business layer of the block "},{"type":"text","text":", The data in the blockchain should be as concise as possible , Cherish limited storage resources ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" In addition, we can put the storage in the block device on the cloud or in the distributed storage device , This can support a lot of storage space . In addition, if it has a large amount of storage , Consider archiving some storage that is not commonly used or that was a few years ago ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/e1\/e1b0573d183749a8003fb213791f2b67.png","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Last , We can consider it from another angle , For example, there are many single data links , We can split the blockchain , This is also a common way to do applications : When a library can't solve , It's going to be a branch , Moving here is "},{"type":"text","marks":[{"type":"strong"}],"text":" In chains "},{"type":"text","text":"."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" For example, the application of deposit certificate , Specific certificates are put on different chains , There can be multiple chains at the bottom , Solve the problem of single chain expansion through the bottom multi chain structure ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/f9\/f9a3dca2f57c6dfe167ea7b49d0d15d6.png","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","marks":[{"type":"strong"}],"text":"4.  Cross chain mechanism "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" With the development of blockchain Technology , In the future, it may not only involve the deposit of certificates , There are also scenarios like data trading on the chain . It is difficult to guarantee the atomic operation of the service if the access layer is simply layered , At this time, we need to introduce the cross chain mechanism , There needs to be a cross chain transaction layer to solve the transactions between chains ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" How to ensure consistency across the chain ? Like deduction from this chain , Add to another chain , In the whole process, either it's all successful , Or it's a total failure , So there must be a cross chain transaction layer ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The alliance chain network has identity management , Cross chain management also includes cross chain identity management , Combining them is a cross chain governance platform . When we build blockchain applications , If the scene needs to , Also consider cross chain technology ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/dc\/dce13b6b9fa4df13334f0b72cb5e0d47.png","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","marks":[{"type":"strong"}],"text":"5. Business compliance     "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" At the business compliance level , Plaintext on the chain will lead to some sensitive words on the chain . Because blockchain cannot be tampered with , Although new data can be added to subsequent blocks , But it can't modify the original data , This sensitive word will stay on the chain forever . We suggest : In the process of doing business, we should consider the filtering of sensitive words ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Another point is : The relationship between your business and blockchain is strong synchronization , Asynchronous is still acceptable . Strong synchronization means that business data is strongly dependent on blockchain data , When doing one business at a time , Data must be taken from the blockchain , Now you need strong synchronization . But because blockchain itself is an asynchronous system , If we do strong synchronization , Waiting time can affect the business experience , This is a question to consider ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" If it's asynchronous , For example, the scene of certificate deposit , Although a large amount of data has been generated in a short time , But it can slowly push the data to the chain . But here's a premise : In the process of data generation , We need to generate timestamps as soon as possible . Because only when you attach a time stamp can you locate the time when the data is generated . Although the follow-up is to slowly push the data to the chain , But at least it turns out that at some point in time , This solves the problem of timeliness of data ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" In addition, in the application of blockchain, we need to consider how to cancel or withdraw the whole business , In fact, this is what the contract level needs to consider ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" It's very difficult to stop service in the blockchain , Because the service of business layer can be stopped at most , But it doesn't stop the bottom chain , If you stop the underlying chain, you need to work with all parties . So we have to "},{"type":"text","marks":[{"type":"strong"}],"text":" Set the bottom line "},{"type":"text","text":", When the whole business layer encounters problems, how to find out , Can we introduce insurance institutions or other institutions , Especially in extreme cases, it can compensate the loss of users ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/0c\/0c898a559830fe4dc44f77c11eaa81fe.png","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","marks":[{"type":"strong"}],"text":"6. Tencent cloud alliance Chain Governance "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Finally, let's introduce the process of Tencent cloud alliance chain governance . When we first built the information chain, we talked with network security 、 Beiming works with the judiciary . First of all, we need to reach a consensus , The consensus is : What are we going to do with blockchain . Finally, a unified consensus was reached : Start with trusted e-Cert ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" After that , We work with the relevant partners to set up an organizational structure , Including the definition of the operation process and the relevant person in charge , So that we can work together to push this thing forward . We know , Even if different departments of a company want to do a good job together, it is very difficult . When it comes to multiple companies , If there is no constitution system, it is very difficult to promote , So this is important ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" When we have a process architecture , The next step is to find out if what we do is compliant , This should be interpreted from the perspective of policy and compliance , If something doesn't conform, it can't be done ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" If we are compliant, we also have to consider one point : What's the bottom line . Blockchain has so many features , For example, in the supply chain scenario, we can combine IoT、AI Equal ability , Proof of the existence of the goods in the warehouse . But we can't rule out that there will be some problems . Because it's about money , So there has to be a bottom up plan ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" When there is a compliance system , We also need long-term operational investment . After setting up the application , And then there's the iterative process , In the iterative process, it also needs the cooperation of other mechanisms . In the process , It is necessary to define the distribution of benefits among the participants in advance , In addition, the evaluation system should be well defined . With all this , To push the app all the way forward ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The first three points are mostly of the nature of documents and organizational structure , It doesn't seem to have much to do with the business . But if there is no good foundation for the first three points , The fourth point behind is castle in the air , When there are the first three points as a cushion, we really enter the technical specifications , The technical specification includes the Alliance Network 、 Node planning 、 Link data 、 Privacy protection 、 External system access and smart contracts, etc ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/86\/86b61bec9e689473c284ee55598a41fd.png","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"heading","attrs":{"align":null,"level":2},"content":[{"type":"text","text":" Think about the future "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" In the process of doing to the letter chain , We are also considering what the future of blockchain will be like , Is there no blockchain in the future ? I personally think "},{"type":"text","marks":[{"type":"strong"}],"text":" Blockchain will become an underlying infrastructure in the future , Users don't need to build their own chains , Blockchain and other technologies , Like the Internet of things 、 big data 、 Video services and AI will come together , Working together to serve complex business scenarios "},{"type":"text","text":"."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/16\/16a0e6466493513c6047250344eb39d2.png","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" What blockchain carries is the credibility of data and services , Who is the bottom maintainer of the chain , Do you need to build an independent chain for your business , This is also the problem we need to consider . From my personal point of view , In my opinion, not every business in the future needs to build a blockchain , It is likely to share part of the chain ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"    "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" So what is the future development orientation of Zhixin chain ? At present, we are working with authoritative institutions to build a data storage chain , To ensure the credibility of the data , At the same time, reliable data can be transferred to the court in time , To better serve content organizations 、 Financial institutions , The current services include the deposit of content 、 Evidence of infringement 、 Rights protection and so on ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" In the future, we will combine other ecological capabilities , Like copyright 、 Contractual , We should also put all kinds of strong related abilities on this chain , Perfect Zhixin chain service types . When these capabilities are perfected , Zhixin chain will serve other different industrial blockchains . For example, users may have their own blockchain applications , But when it comes to judicial protection , It can be applied to the information chain to transmit these data across the chain ."}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"image","attrs":{"src":"https:\/\/static001.geekbang.org\/infoq\/00\/00ef32b9b05d22dfcccc1f79338aa81f.png","alt":"Image","title":null,"style":[{"key":"width","value":"75%"},{"key":"bordertype","value":"none"}],"href":null,"fromPaste":true,"pastePass":true}},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null}},{"type":"horizontalrule"},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" The first figure :Unsplash"}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" author : Li Liang "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" original text :https:\/\/mp.weixin.qq.com\/s\/PaehAdgNNacl0z65dhMCKA"}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" original text : Thinking and exploration of blockchain application and development technology "}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" source : Cloud and community - WeChat official account [ID:QcloudCommunity]"}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":" Reprint : The copyright belongs to the author . Commercial reprint please contact the author for authorization , Non-commercial reprint please indicate the source ."}]}]}
版权声明:本文为[InfoQ]所创,转载请带上原文链接,感谢。 https://netfreeman.com/2021/05/20210509090329657b.html