Announcement center
Announcement
About us
Common problems
TIM|Typical Information Medical Chain Business White Paper
TIM|Typical Information Medical Chain Business White Paper

(1) Data storage procedure

IPFS is based on content storage, not file name, using content addressing instead of traditional IP and domain name-based addressing, users do not need to care about the location of the server, do not consider the name and path of file storage. IPFS a unique encrypted hash value calculated 14based on its content, the same content will have a unique HASH value. hash values directly reflect the contents of the file. When IPFS is asked for a file hash, it uses DHT to find the node where the file is located, retrieve the file and verify the file data.

IPFS is the general purpose infrastructure, the basic storage based on P2P storage technology, there are no storage restrictions. With the

perfect combination of the block chain, the system can use IPFS to process

data, store content on the IPFS network, and then store the corresponding

hash into the block chain and timestamp it. By this way, through the IPFS

storage of data, through the block chain to complete the pricing of data,

confirm the right and transfer of rights, the value of the data is fully

brought into play.

 

2Sub-chain management

One of the many main functions of the traceability main chain is to manage sub-chains, which can be operated on the main chain by authorized accounts. The creator will be able to customize the detailed information of the sub-chain and the specific information of the sub-chain. The token will form a data structure to describe the sub-chain and publish information in the main chain according to the application requirements. Create a sub-chain that focuses on creating the largest sub-chain in the world The traceability universal chain is established by calling the smart contract in the main chain, which will be recorded by the charging node during the current block deduction of certain TIM (including creation fee and handling fee). Therefore, the information of the sub-chain is recorded on the main chain. The sub-chain will act as a separate blockchain, recording the transaction records and related data corresponding to various businesses. The logic in the sub-chain (pictures, audio and video data will be stored in the IPFS cloud) Host). Since TIM transactions are only recorded in the main chain, the operation of the main chain is independent of the sub-chains.

Nodes running on the main chain only need to save main chain data, and can only perform consensus and verify TIM transaction blocks. The status of the TIM sub-chain has no impact on the integrity and integrity of the main chain, except for the record sub-chain. Descriptive information, other sub-chain related data will not affect the main chain.


(3) System platform

underlying blockchain

() Basic blockchain operation interface

 Using distributed cloud deployment to improve interface stability and throughput, support rpc call; support json data format;

(Ⅱ) Smart contract:

At present, the contract layer of the Typical information medical chain has been developed, and a decentralized cloud platform of the Typical information medical chain has been built. To make it easier for developers, we have completed the traceability verification of the contract-based security code, and the logistics code query corresponds to the smart contract one by one. The Typical information medical chain focuses on creating the world's largest traceability public chain application platform in the public business sector, so the Typical information medical chain will take a different approach from other methods.

The ecological integration of the smart contract platform of the public chain (main chain) promotes its formation. The Typical information medical chain will inspire third-party teams to build more ground, practical applications based on the Typical information medical chain, and the audience in front will eventually be ordinary consumers, and then used in the Typical information medical chain and sub-chain brand enterprises accumulate A large number of fan users.

() Functional characteristics of each seed chain

When creating a sub-chain, you can customize the conventional functions by calling the basic interface of the Typical information medical chain. You can make the sub-chain support the main chain or restrict or not provide certain functional features. According to the application scenario of the sub-chain, Quickly customize the functional features that meet the following requirements.

The functional characteristics of specific sub-chain application scenarios support customization mainly including sub-chain token transactions, sub-chain token and main chain token transactions, cross-sub-chain business transaction logic, account system, instant information, data storage and so on.

() Sub-chain token transactions

Through customization, the sub-chain can support the sub-chain native token transaction, and the sub-chain token and the main chain token are crossed .

() Simple cross-chain token transaction.

When the transaction is completed, the token holder requests the transaction. The request information includes transaction type (buy, sell), local currency type, target currency type, transaction price and transaction quantity. The sample agreement will delegate power to complete matching sales and purchase transactions, and the resulting transaction records will be recorded in two chains. Compared with the traditional trading center, it has the advantages of openness, fairness, reliability and traceability.

() DPOS 2. Consensus mechanism

The node consensus at the bottom of the Typical information medical chain uses the DPOS algorithm, and all blockchains are essentially transaction-driven deterministic state machines. The consensus mechanism is the process of reaching a consensus, determining the order of transactions and filtering invalid transactions.

Many different consensus algorithms can produce transaction ordering with the same effect, but DPOS has been running reliably on multiple devices, and the blockchain has been proven to be a robust, safe and effective consensus mechanism for many years. Like all consensus algorithms, the biggest damage, the possible consequences of the block generator is under review. The validity of all blocks must follow the deterministic open source state machine logic.

 

Summary of DPOS Algorithm

The DPoS mechanism, called the shared authorization authentication mechanism (also called the trustee mechanism) is based on the following principles:

Those who hold a little share will vote and generate 101 representatives. We can interpret it as 101 super nodes or mining pools, and these 101 super nodes have completely equal rights among each other. From a certain perspective, DPOS is a bit like a parliamentary system or a NPC system. If representatives fail to perform their duties (when it is their turn, they cannot generate data blocks), they are removed from the list and the network will select new data block super nodes to replace them. DPOS is mainly due to mining production machines. Many people who dont know and understand dont care about Bitcoin, which is similar to a concert cow. They accumulate many tickets and dont care about the content of the concert. In order to better explain the algorithm, suppose there are three block generators A, B and C. Because there is a consensus that 2/3 1 should be ruled in all cases, in this simplified model, it is assumed that producer C is the role of breaking the deadlock. In fact, 17 will have 21 or more block producers. A similar general rule for proof of work is that the oldest winner in the chain. Whenever an honest node sees a longer valid chain, it will switch from the current fork to the longer one.

The Certificate of Rights (DPOS) is broken as we can imagine in any situation on the natural network. When most producers cheat, it is very powerful. Unlike other consensus algorithms, DPOS can continue to run most producers fail functionality in the following situations. In this way, regions can vote to replace unqualified regional producers until the 100% participation rate is restored. As far as we know, under such high intensity, no other update algorithm can maintain robustness and variable failure conditions. After all, the reason why DPOS has such strong security is because it selects block producers and verifies the quality of nodes. The voting procedure ensures that even those who have 50% of the rights cannot even choose a producer. The DPOS design aims to optimize the network connection of a mechanism in which powerful honest nodes participate 100%. As a result, DPOS can confirm and obtain 99.9% certainty in only 1.5 seconds on average, and can degrade and restore trivial things from degraded to normal.

 

Application

In the early stage, the Typical information medical chain provides a universal application protocol to develop different landing projects, and the fastest delivery of the regional blockchain. For most people's goal of using and developing blockchains, it is not really to create a set of blockchains by themselves, but to develop their own application layer or technical framework based on the bottom of the existing blockchains.

VRC is a blockchain application that provides a next-generation platform, allowing the development and distribution of blockchain applications based on the Typical information medical chain. TIM provides an easy-to-use interface and access rights to a fully functional ecosystem. Through TIM, developers can build, publish, distribute and customize the blockchain, smart contracts, cloud storage and computing 18 nodes through the applications allowed in the supply system. TIM provides standardized program modules and develops business scenarios with different templates for the following aspects.

 

technology advantages

()Smart contract visualization template.

The Typical information medical chain provides open smart contract templates, open industry contract template libraries, and smart contract generators for operators, which greatly reduces the threshold and flexible manufacturing of smart contracts. So that more developers can join the ecology of the Typical information medical chain.

()Good architectural compatibility.

The application development chain of Typical information medical can be compatible with the current mainstream technology to adapt to the original technical framework of various industries and save the cost of system migration. The Typical information medical chain enables easy-to-use blockchain applications through humanized operation functions such as data analysis, smart contract release and upgrade, data asset transaction monitoring, etc.

()Support millions levels TPS throughput.

The goal of the Typical information medical chain is a million-level TPS level, which can meet the long-term development of the business of biopharmaceutical enterprises. We also continue to upgrade the technology and improve the processing capacity to move towards further goals.

()Automation of system operation and maintenance.

Through the deployment of node privatization, it can realize the automation of node operation and maintenance, the service on the second on the chain, enhances the efficiency, saves the manpower.

()Perfect developer support.

Typical information medical chain development kit interface API, community certified developers can easily call various functions and resource chains on the development platform, asset wallets, stable development of browsers, and various traceable pharmaceutical applications, anti-counterfeiting, supply chain finance , Big data marketing, etc.

In addition to the security consensus mechanism of the blockchain itself, building architecture and applications on top is not safe. The use of artificial intelligence can be used to deploy blockchain services and applications. The Typical information medical chain can effectively enhance and prevent services and applications. The 19 hackers deployed on the Typical information medical chain application platform through information medical artificial intelligence attack in a timely manner.