(1) Data storage procedure
IPFS is
based on content storage, not file name, using content addressing instead of
traditional IP and domain name-based addressing, users do not need to care
about the location of the server, do not consider the name and path of file
storage. IPFS a unique encrypted hash value calculated 14based on its content,
the same content will have a unique HASH value. hash values directly reflect
the contents of the file. When IPFS is asked for a file hash, it uses DHT to
find the node where the file is located, retrieve the file and verify the file
data.
IPFS is the general purpose
infrastructure, the basic storage based on P2P storage technology, there are no
storage restrictions. With the
perfect combination of the block
chain, the system can use IPFS to process
data, store content on the IPFS
network, and then store the corresponding
hash into the block chain and
timestamp it. By this way, through the IPFS
storage of data, through the block
chain to complete the pricing of data,
confirm the right and transfer of
rights, the value of the data is fully
brought into play.
(2)Sub-chain management
One of the many main
functions of the traceability main chain is to manage sub-chains, which can be
operated on the main chain by authorized accounts. The creator will be able to
customize the detailed information of the sub-chain and the specific information
of the sub-chain. The token will form a data structure to describe the
sub-chain and publish information in the main chain according to the
application requirements. Create a sub-chain that focuses on creating the
largest sub-chain in the world The traceability universal chain is established
by calling the smart contract in the main chain, which will be recorded by the
charging node during the current block deduction of certain TIM (including
creation fee and handling fee). Therefore, the information of the sub-chain is
recorded on the main chain. The sub-chain will act as a separate blockchain,
recording the transaction records and related data corresponding to various
businesses. The logic in the sub-chain (pictures, audio and video data will be
stored in the IPFS cloud) Host). Since TIM transactions are only recorded in
the main chain, the operation of the main chain is independent of the
sub-chains.
Nodes running on the main chain only need to save main chain data, and can only perform consensus and verify TIM transaction blocks. The status of the TIM sub-chain has no impact on the integrity and integrity of the main chain, except for the record sub-chain. Descriptive information, other sub-chain related data will not affect the main chain.
(3) System platform
① underlying
blockchain
(Ⅰ) Basic blockchain operation interface
Using distributed cloud deployment to improve
interface stability and throughput, support rpc call; support json data format;
(Ⅱ) Smart contract:
At present, the
contract layer of the Typical information medical chain has been developed, and
a decentralized cloud platform of the Typical information medical chain has
been built. To make it easier for developers, we have completed the
traceability verification of the contract-based security code, and the
logistics code query corresponds to the smart contract one by one. The Typical
information medical chain focuses on creating the world's largest traceability
public chain application platform in the public business sector, so the Typical
information medical chain will take a different approach from other methods.
The ecological integration of the smart contract platform of the
public chain (main chain) promotes its formation. The Typical information
medical chain will inspire third-party teams to build more ground, practical
applications based on the Typical information medical chain, and the audience
in front will eventually be ordinary consumers, and then used in the Typical
information medical chain and sub-chain brand enterprises accumulate A large
number of fan users.
(Ⅲ) Functional
characteristics of each seed chain
When creating a sub-chain, you can customize the conventional functions
by calling the basic interface of the Typical information medical chain. You
can make the sub-chain support the main chain or restrict or not provide
certain functional features. According to the application scenario of the
sub-chain, Quickly customize the functional features that meet the following
requirements.
The functional characteristics of specific sub-chain application
scenarios support customization mainly including sub-chain token transactions,
sub-chain token and main chain token transactions, cross-sub-chain business
transaction logic, account system, instant information, data storage and so on.
(Ⅳ) Sub-chain token transactions
Through
customization, the sub-chain can support the sub-chain native token
transaction, and the sub-chain token and the main chain token are crossed .
(Ⅴ) Simple
cross-chain token transaction.
When
the transaction is completed, the token holder requests the transaction. The
request information includes transaction type (buy, sell), local currency type,
target currency type, transaction price and transaction quantity. The sample
agreement will delegate power to complete matching sales and purchase
transactions, and the resulting transaction records will be recorded in two
chains. Compared with the traditional trading center, it has the advantages of
openness, fairness, reliability and traceability.
(Ⅵ) DPOS 2. Consensus mechanism
The node consensus at the bottom of the Typical
information medical chain uses the DPOS algorithm, and all blockchains are
essentially transaction-driven deterministic state machines. The consensus
mechanism is the process of reaching a consensus, determining the order of
transactions and filtering invalid transactions.
Many different consensus algorithms can produce
transaction ordering with the same effect, but DPOS has been running reliably
on multiple devices, and the blockchain has been proven to be a robust, safe
and effective consensus mechanism for many years. Like all consensus
algorithms, the biggest damage, the possible consequences of the block
generator is under review. The validity of all blocks must follow the
deterministic open source state machine logic.
② Summary of DPOS
Algorithm
The DPoS mechanism, called the shared authorization
authentication mechanism (also called the trustee mechanism) is based on the
following principles:
Those who hold a little share will vote and generate 101 representatives.
We can interpret it as 101 super nodes or mining pools, and these 101 super
nodes have completely equal rights among each other. From a certain
perspective, DPOS is a bit like a parliamentary system or a NPC system. If
representatives fail to perform their duties (when it is their turn, they
cannot generate data blocks), they are removed from the list and the network
will select new data block super nodes to replace them. DPOS is mainly due to
mining production machines. Many people who don’t know and understand don’t care about Bitcoin, which is similar to a concert cow. They
accumulate many tickets and don’t care about the
content of the concert. In order to better explain the algorithm, suppose there
are three block generators A, B and C. Because there is a consensus that 2/3 1
should be ruled in all cases, in this simplified model, it is assumed that
producer C is the role of breaking the deadlock. In fact, 17 will have 21 or
more block producers. A similar general rule for proof of work is that the
oldest winner in the chain. Whenever an honest node sees a longer valid chain,
it will switch from the current fork to the longer one.
The Certificate of Rights (DPOS) is broken as we can
imagine in any situation on the natural network. When most producers cheat, it
is very powerful. Unlike other consensus algorithms, DPOS can continue to run
most producers fail functionality in the following situations. In this way,
regions can vote to replace unqualified regional producers until the 100% participation
rate is restored. As far as we know, under such high intensity, no other update
algorithm can maintain robustness and variable failure conditions. After all,
the reason why DPOS has such strong security is because it selects block
producers and verifies the quality of nodes. The voting procedure ensures that
even those who have 50% of the rights cannot even choose a producer. The DPOS
design aims to optimize the network connection of a mechanism in which powerful
honest nodes participate 100%. As a result, DPOS can confirm and obtain 99.9%
certainty in only 1.5 seconds on average, and can degrade and restore trivial
things from degraded to normal.
③ Application
In the early stage, the Typical information medical chain
provides a universal application protocol to develop different landing
projects, and the fastest delivery of the regional blockchain. For most
people's goal of using and developing blockchains, it is not really to create a
set of blockchains by themselves, but to develop their own application layer or
technical framework based on the bottom of the existing blockchains.
VRC is a blockchain application that provides a
next-generation platform, allowing the development and distribution of
blockchain applications based on the Typical information medical chain. TIM
provides an easy-to-use interface and access rights to a fully functional
ecosystem. Through TIM, developers can build, publish, distribute and customize
the blockchain, smart contracts, cloud storage and computing 18 nodes through
the applications allowed in the supply system. TIM provides standardized
program modules and develops business scenarios with different templates for
the following aspects.
④ technology
advantages
(Ⅰ)Smart contract visualization template.
The Typical information medical chain provides open smart
contract templates, open industry contract template libraries, and smart
contract generators for operators, which greatly reduces the threshold and
flexible manufacturing of smart contracts. So that more developers can join the
ecology of the Typical information medical chain.
(Ⅱ)Good architectural compatibility.
The application development chain of Typical information
medical can be compatible with the current mainstream technology to adapt to
the original technical framework of various industries and save the cost of
system migration. The Typical information medical chain enables easy-to-use
blockchain applications through humanized operation functions such as data
analysis, smart contract release and upgrade, data asset transaction
monitoring, etc.
(Ⅲ)Support millions levels TPS throughput.
The goal of the Typical information medical chain is a
million-level TPS level, which can meet the long-term development of the
business of biopharmaceutical enterprises. We also continue to upgrade the
technology and improve the processing capacity to move towards further goals.
(Ⅳ)Automation of system operation and maintenance.
Through the deployment of node privatization, it can
realize the automation of node operation and maintenance, the service on the
second on the chain, enhances the efficiency, saves the manpower.
(Ⅴ)Perfect developer support.
Typical information
medical chain development kit interface API, community certified developers can
easily call various functions and resource chains on the development platform,
asset wallets, stable development of browsers, and various traceable
pharmaceutical applications, anti-counterfeiting, supply chain finance , Big
data marketing, etc.
In addition to the
security consensus mechanism of the blockchain itself, building architecture
and applications on top is not safe. The use of artificial intelligence can be
used to deploy blockchain services and applications. The Typical information
medical chain can effectively enhance and prevent services and applications.
The 19 hackers deployed on the Typical information medical chain application
platform through information medical artificial intelligence attack in a timely
manner.