Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting Helsinki
|
|
- Gertrude Patrick
- 6 years ago
- Views:
Transcription
1
2 Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting Helsinki Dr. Kari Korpela, Information Logistics Integration School of Business and Management Lappeenranta University of Technology with collaboration GS1 Innovation Network - Mark Harrison and Hussam El-Leithy IBM IoT Blockchain team - Timothy Hahn
3 Double-entry bookkeeping years Luca Pacioli establised 1494 Accounting called language of business for organization's economic activities and conveys this information to a variety of users, including investors, creditors, management, and regulators Ledger Debit Credit Equity = Assets Liabilities Double-entry system of book-keeping is a system of bookkeeping so named because every entry to an account requires a corresponding and opposite entry to a different account A ledger is for recording and totaling economic transactions measured with debits and credits in separate columns, beginning monetary balance and ending monetary balance for each account Source: WikipediA
4 Standards to support interoperability 60 s 70 s 80 s 90 s s Common Business Language (CBL) US Transportat ion Data Coordinatin g Committee ANSI ASC / X.12 EDI X.12 XML XML ebxml UBL UN / EDIFACT US Automotive Industry (AIAG EDI) SWIFT ISO System of System integration M2M A2A B2B Transportation layer FTP HTTP RosettaNet GS1 BLOCKCHAIN ARPANET TELENET INTERNET
5 Transactions trough use perspective Sending and receiving Blockchain transaction Block 1 is a current public ledger status Owner 1 s Public Key Owner 1 s Private Key Block 2 Block 2 Block 3 Block 3 SHA-256 hash Block 2 Block 3 Hash Hash Block 3 Block 2 Block 1 Block 2 SHA-256 hash Block 3 Owner 1 s Public Key Owner 1 s Public Key User A sends a transaction (secure with Private Key), address to User B and adds Public Key) = block 2: - Transaction is connected to a block - Transaction is propagated to the entire network to hash approval - Block 2 is then included to the chain that stores the transaction in a public ledger - User B receives transaction and opens with public key User B can respond and send new transaction to user A by the Public Key with same procedure = Block 3
6 What does it involve? A peer-to-peer network of computer nodes for storage and verification of blocks Node A announces a transaction to its peers B and C. If the transaction is verified, B and C forward the transaction to their peers. The transactions propagate rapidly across the network
7 Hashing of data SHA-256 hash ONE WAY SHA-256 hash ONE WAY 0567 d6v a6v632 Digital data is stored in binary as bits of 0 and 1. A hashing a function such as MD5, SHA-1, SHA-256 converts the data into a compact fingerprint in a oneway function If even one bit of data in the original file is changed, the resulting hash value looks completely different
8 Private key Decrypt Transaction Owner 1 s Public Key You can use your private key to encrypt data to prove that it was you who encrypted it. You also use your private key to decrypt data from others that is encrypted with your public key ( for your eyes only ) Only you can decrypt the data using your private key. You keep your private key secret. Encrypt Owner 1 s Private Key
9 Public key Transaction You can tell anybody your public key. Decrypt Owner 1 s Public Key Encrypt Anyone can use your public key to decrypt data that you encrypted with your private key. Anyone can use your public key to encrypt data that is only intended for you to see. Only you can decrypt the data using your private key. Encrypt Owner 1 s Private Key Decrypt
10 Sending / Receiving encrypted data WELL KNOWN Public Key Transaction Owner 1 s Public Key Transaction Owner 2 s Public Key Transaction Owner 3 s Public Key Other people can encrypt data using your public key and send it to you and only you can decrypt it using your private key. Anyone can encrypt that data using your public key. FOR YOURS EYES ONLY - Data encrypted with your public key Only you can decrypt the data using your private key. Keep your private key secret and can use it to encrypt data. Anyone can decrypt the data using your public key. Owner 1 s Private Key Owner 2 s Private Key Owner 3 s Private Key They know that only you could have encrypted it. TOP SECRECT Private Key
11 Creating digital signature 1. SHA-256 hash To create a digital signature, do 2 steps. 1. Create a hash of the data ONE WAY 0567 d6v Encrypt the hash with your private key 2. Encrypts TOP SECRET Digital signature
12 Verifying digital signature 1. SHA-256 hash To verify a digital signature, do 3 steps. 1. Create a has of the original data ONE WAY 0567 d6v Decrypt the digital signature using the public key 3. Check that step 1 and 2 both give the same result 2. Decrypts WELL KNOWN Digital signature
13 Timestamped immutable records Transaction Transaction Transaction Approximately every 10 minutes, another block is added to the BitCoin blockchain. Block n-1 Block n Block n+1 Transactions contained in earlier blocks become preserved and more trusted over time, as additional blocks are added somewhat like fossils buried deep in layers of sedimentary rocks, with new layers being added on top over time. Because of this, some people have used blockchain as an immutable timestamped record (i.e. a notary function) 10 min 10 min 10 min Typically they use special Zero-value output (OP_Return) to record some data Often the data is a reference to digital file and the corresponding hash value the hash value prevents them from tampering with the data contents of the file and the blockchain locks in the timestamp within an immutable log or ledger
14 Attaching assets to transactions Inputs Debits Outputs Credits It is also possible to use colored coins to not only exchange monetary value but to attach a virtual or real-world asset, so that the transfer of the monetary value also means a transfer of the ownership of the corresponding asset to a new owner.
15 How to benefit by blockchain? Blockchain - DBE Core business transactions DBE Core is a open technical standard for exchanging business process data typically within organizations and as they move trough supply chain and also including additional information as attachments. Each organization can capture, record and share DBE Core messages corresponding standardized process protocol for their peer-to-peer manner (if they know who to contact). Event data for uniquely identified objects is commercially sensitive so companies don t publish this openly but may be prepared to share with other parties on the same supply chain, to provide traceability information on a need-to-know basis Contracts, transaction data, timestamps, audit trail
16 Blockchain - DBE Core SC Financing Blockchain Tech Could Improve Banking, Says EBA Report. Blockchain technology has the potential to reduce costs, improve product offerings and increase speed for banks, according to the most recent report from the Euro Banking Association (EBA). "What can be safely said at this point in time is that crypto technologies are an area to be closely monitored and revised for further analysis." Here, the report says that the level of cooperation between Payment Service Providers (PSPs) and the crypto technology community also between PSPs themselves will determine the future relationship between banks and 'crypto 2.0' companies.
17 IoT Blockchain Blockchain options (how) examples Collect share store control agree - authorize Contract A Contract A Contract N Value add service development Business documents Integrating global trade documentation Manage agreement to do work or purchase service and record transaction IoT information Collect information from sensors and devices Locations of shipments as they move through system Equipment history, from usage, maintenance, warranty work, replacement parts Development Create development environment for new value add service design Automatically update the smart contract
18 IBM Beta Components Open Block Chain (IoT integration)
19 Structure areas of blockchain etc. Smart contracting - Digital identity - Digital authorization - Digital signing - Agreements and document to be shared - Secure participation for development - Control of Private/Public Keys IoT transactions - Sensors and adapters - Push and pull information - Open data - Data model - Smart Apps Business transactions - esourcing, eprocurement, elogistics, eaccounting, eattachments - Data model - Smart Apps - Intellectual Property - Patent protection Ledger for record keeping - Smart contracting - Business transactions - IoT transactions - Intellectual Property - Patent protection Blockchain areas to collect share store control agree - authorize Smart contracting Manage and control Business transactions Integrating global trade documentation IoT transactions Collect information from sensors and devices Locations of shipments as they move through system Equipment history, from usage, maintenance, warranty work, replacement parts Ledger to record, archive and for audit rail of transactions
20 Discussion: Blockchain Use Cases Manufacturing, Automotive, Marine, Aviation, Energy Information: business transactions, IOT: sensors, adapters Dynamic contracts, authentication, signatures, true history eprocurement Open data, analytics, micro payments Raw material esourcing Global Trade facilitation Standardization efinance Warranty: OM, owner, buyer, insurance Customer Tracking & tracing, RFID, global location elogistics Customs & Tax Track objects, shipping, payments Finance Transaction Based financing
21 We are looking for collaboration to find next disruptive solutions to create value DIGITAL BUSINESS ECOSYSTEM How to create new value by combining - DBE core solution and - Blockchain technology LUT School of Business and Management Lappeenranta University of Technology Prof. Jukka Hallikas, Dr. Kari Korpela IBM Academy of Technology kari.korpela@lut.fi Tel
22 Few references Blockchain Conference San Francisco Video: UK Government Office for Science Video: Avoiding The Pointless Block Chain Project Blockchain Tech Could Improve Banking, Says EBA Report IBM Talks Open Ledger Project, Bright Future for Blockchain IBM Reveals Proof of Concept for Blockchain-Powered Internet of Things Blockchain in the Investment Bank; Accenture THE BLOCKCHAIN FOR BUSINESS IS READY IN 2016 Linux Foundation Unites Industry Leaders to Advance Blockchain Technology Blockchain: The Next Big Thing in the Supply Chain Blockchain technology supports blockchains thinking
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationBlockchain! What consultants should know about it. Daniel
Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what
More informationBlockchain and Additive Manufacturing
Blockchain and Additive Manufacturing January 10, 2019 Presentation to the South Texas Section, AIChE Lisa M. Smith Chief Corporate Development Officer Data Gumbo Corporation Blockchain Basics Data Gumbo
More informationExecutive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation
2017 Executive Summary (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation www.blockchainofthings.com Abstract The Internet of Things (IoT) is not secure and we
More informationIntroduction to Cryptography in Blockchain Technology. December 23, 2018
Introduction to Cryptography in Blockchain Technology December 23, 2018 What is cryptography? The practice of developing protocols that prevent third parties from viewing private data. Modern cryptography
More informationBlockchain (de)constructed
Blockchain (de)constructed Fritz Henglein Department of Computer Science, University of Copenhagen (DIKU) DIKU Business Club meeting on blockchain January 11th, 2016 Fritz Henglein Professor of programming
More informationBitcoin and Blockchain
Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All
More informationCyber-Physical Chain (CPChain) Light Paper
Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain
More informationWhy is blockchain exciting? Data Sharing.
Blockchain Basics 2 Why is blockchain exciting? Data Sharing. Most of the excitement about blockchain is really just excitement about the possibility of sharing data across company lines For some entire
More informationThe power of Blockchain: Smart Contracts. Foteini Baldimtsi
The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave
More informationNot ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains
Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains Authors: Stefan Tai, Jacob Eberhardt and Markus Klems Presentation by: Georgiou Zacharias and Paschalides Demetris 1 Overview
More informationWhitepaper Rcoin Global
Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global
More informationDistributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017
Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently
More informationOverview of PBI-blockchain cooperation technology
FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview
More informationComputer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019
Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationBlockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany
Blockchain without Bitcoin Muralidhar Gopinath October 19, 2017 University at Albany What is Blockchain? Contains records (blocks) that are linked (chained) to one another using cryptography Each block
More informationBLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive
BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive www.blockchaintrainingalliance.com Blockchain Page 3 Blockchain is NOT Bitcoin Page 4 Transactions Page 5 Multi-Signature Addresses An Address
More informationBiomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs
Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain
More informationBitcoin, a decentralized and trustless protocol
Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction
More informationThe technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain.
1 The technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain. This document provides and explains in detail the technical
More informationPrelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.
Prelude The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. This document will explain methodically, the details of the
More informationHyperledger Quilt and Interledger Protocol. Nathan Aw - Technical Ambassador Edmund To - Organizer of Hyperledger Meetup Hong Kong
Hyperledger Quilt and Interledger Protocol Nathan Aw - Technical Ambassador Edmund To - Organizer of Hyperledger Meetup Hong Kong Housekeeping Road Map of 2018 - More meet ups! Thank you to our sponsor
More informationOpenbankIT: a banking platform for e- money management based on blockchain technology
OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com
More informationBaFin-Tech 2018 BlockChain & Security (from #developerview)
BaFin-Tech 2018 BlockChain & Security (from #developerview) DLT Lab 10 th April 2018 sven.lehnert@main-incubator.com, @itnext_de Experiences from practice Agenda: Blockchain Security 1 Theory: Blockchain
More informationToken White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e
Token White Paper Global marketplace based on Block chain for small-scale business 1 P a g e 2018 I ver. 1.0 Contents Qatar Coin Token 3 Contents 4 1. What is QatarCoin 5 2. What is a digital currency
More informationTable of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner.
Table of contents Technical Features Our approach Technical Overview Stage 1 (Using Ethereum blockchain) Participants Data Owner Data Verifier Marketplace Data Buyer Creditor Data Platform Architecture
More informationPreserving Data Privacy in the IoT World
MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu
More informationLecture 41 Blockchain in Government III (Digital Identity)
Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III
More informationChapter 13. Digital Cash. Information Security/System Security p. 570/626
Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not
More informationThe World s first Public Chain for Decentralized NaaS (Network-as-a-Service)
The World s first Public Chain for Decentralized NaaS (Network-as-a-Service) Disclaimer Presentation and the information contained herein is not intended to be a source of advice or credit analysis with
More informationUsing Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment
Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Gary Leeming, Chief Technology Officer Connected Health Cities, University of Manchester 1 Connected Health
More informationHow Formal Analysis and Verification Add Security to Blockchain-based Systems
Verification Add Security to Blockchain-based Systems January 26, 2017 (MIT Media Lab) Pindar Wong (VeriFi Ltd.) 2 Outline of this talk Security Definition of Blockchain-based system Technology and Security
More informationAuthentication with Privacy for Connected Cars - A research perspective -
Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk
More informationBlockchain & Distributed Internet Infrastructure
Blockchain & Distributed Internet Infrastructure Dirk Kutscher NEC Laboratories Europe 1 Purpose of this Meeting Discuss blockchain-based and Distributed Internet Infrastructure concepts, state of the
More informationEnhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network
Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network Abstract Azeem Ahmed (azeem.ahmed@consensys.net) Jim Zhang (jim.zhang@consensys.net) Permissioned
More informationENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationBAA Oracle EBS R12.1 isupplier Portal Created on 11/26/2012 3:18:00 PM
Created on 11/26/2012 3:18:00 PM COPYRIGHT & TRADEMARKS Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates.
More informationA New Right for Industrial Data Producers Searching for an Appropriate Framework for a European Data Economy
Legal Innovation 2017 Wroclaw A New Right for Industrial Data Producers Searching for an Appropriate Framework for a European Data Economy Prof. Dr. Andreas Wiebe, LL.M. Chair for Civil Law, Intellectual
More informationDAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS
DAVID ANDREWS, FOUNDER RYATTA GROUP, CRYPTOGRAPHY IS THE STUDY OF TECHNIQUES FOR SECURE COMMUNICATION cryptography is defined as the practice and study of techniques for secure communication in the early
More informationQUADCORECHAIN. White Paper ver.1
QUADCORECHAIN White Paper ver.1 INTRO QuadCoreChain is designed to be a smart contract, crypto currency platform, decentralizing Live Streaming of Video. The platform ecosystem is to create favorable conditions
More informationECC: Peer-to-Peer Electronic Cash with Trustless Network Services
ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network
More informationBlockchain & Smart Contracts Introduction. Dr. Sebastian Bürgel
Blockchain & Smart Contracts Introduction Dr. Sebastian Bürgel Does the following make sense? State-of-the-Art Trade Finance (2017) http://blog.zuehlke.com/en/how-the-blockchain-can-disrupt-trade-finance/
More informationUsing Chains for what They re Good For
Using Chains for what They re Good For Andrew Poelstra usingchainsfor@wpsoftware.net Scaling Bitcoin, November 5, 2017 1 / 14 On-Chain Smart Contracting Bitcoin (and Ethereum, etc.) uses a scripting language
More informationBlockchain Certification Protocol (BCP)
Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer
More informationPrivacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data
Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable
More informationBitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman
Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for
More informationA simple approach of Peer-to-Peer E-Cash system
A simple approach of Peer-to-Peer E-Cash system Mr. Dharamvir, Mr. Rabinarayan Panda Asst. Professor, Dept. of MCA, The Oxford College of Engineering Bangalore, India. Abstract-With the popularization
More informationKey Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature
Key Management Digital signatures: classical and public key Classic and Public Key exchange 1 Handwritten Signature Used everyday in a letter, on a check, sign a contract A signature on a signed paper
More informationIntroduction to Bitcoin I
Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2
More informationBlockchain for the energy market. Erwin Smole gridsingularity.com
Blockchain for the energy market Erwin Smole gridsingularity.com Company Name: Grid Singularity GSy GmbH Place: Vienna, Austria Date: Feb. 2016 Co-founders: Ewald Hesse CEO Dr. Ana S. Trbovich STRATEGY
More information$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales
WHITE PAPER Flexible Key Provisioning with SRAM PUF SRAM PUF Benefits Uses standard SRAM Device-unique keys No secrets reside on the chip No key material programmed Flexible and scalable Certifications:
More informationCYBER SECURITY MADE SIMPLE
CYBER SECURITY MADE SIMPLE Author: Christopher Gorog www.logiccentral.org www.newcyberfrontier.com Christopher Gorog, MBA, PMP, CISSP Lead Faculty for Cybersecurity at Colorado Technical University; Published
More informationBitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1
Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes
More informationWhite Paper. Blockchain alternatives: The case for CRAQ
White Paper Blockchain alternatives: The case for CRAQ Blockchain technology continues to gain attention as the foundation of the bitcoin economy. Given the rapid gain in popularity of bitcoin, it s no
More informationAs a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.
Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression
More informationHARDWARE SECURITY MODULES (HSMs)
HARDWARE SECURITY MODULES (HSMs) Cryptography: The basics Protection of data by using keys based on complex, randomly-generated, unique numbers Data is processed by using standard algorithms (mathematical
More informationEnglish. Smart API Using Smart API for open data and in the sharing economy
English Smart API Using Smart API for open data and in the sharing economy Table of Contents 1. Why and how should you share data... 1 2. Smart API Sharing... 2 2.1. How does it work... 2 2.2. How to take
More informationDistributed Ledger With Secure Data Deletion
Distributed Ledger With Secure Data Deletion Vitalii Demianets (norbloc AB), Astyanax Kanakakis (norbloc AB) Revision 1.4, November 2016 Abstract One of the core attributes of distributed ledgers, the
More informationThailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)
ขอแค ประมาณ ร ปน นะโม Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) 1 Government agencies need to develop the Digital Government Master
More informationRegional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America
Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America CLT 217 - Cartagena, 21 June 217 Elena Scaramuzzi - Cullen International 216 comparison digital strategies
More informationSOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits
SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship
More informationHK ASTRI FinTech Initiative
HK ASTRI FinTech Initiative October 2016 HK Financial Services Industry (FSI) FSI: one of HK s four pillar industries HK ranked third in the Global Financial Centres Index (GFCI) by London released in
More informationNOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB
NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB Discussion topics Introductions The digital transformation Innovating at scale How
More informationBlockchain Beyond Bitcoin. Mark O Connell
Mark O Connell mark@mkoconnell.com SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material
More informationTable Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...
Table Of Contents Introduction... 1 Blockchain and Cryptocurrency...1 Stellar (payment network)...2 Internet and its issues...3 LocalXpose... 5 How LocalXpose Actually works?...6 Why to use LocalXpose?...7
More informationLecture 44 Blockchain Security I (Overview)
Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Prof. Praveen Jayachandran Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 44 Blockchain
More informationProblem: Equivocation!
Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS
More informationBBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -
BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain
More informationA HASH-CASH BASED MUSIC STREAMING PAYMENT SYSTEM. Timothy Chen San Jose State University Fall 2014
A HASH-CASH BASED MUSIC STREAMING PAYMENT SYSTEM Timothy Chen San Jose State University Fall 2014 AGENDA Introduction Background Features implemented Issues Encountered During Testing Conclusion 2 INTRODUCTION
More informationWeek 11: MIS 3537: Internet and Supply Chains
Week 11: and Case MIS 3537: Internet and Supply Chains and 2003: Video and and 7 C s of Strategic Collaboration 1. Connection with Purpose and People 2. Clarity of Purpose 3. Congruence of Mission, Strategy
More informationA New Right for Industrial Data Producers Searching for an Appropriate Framework for a European Data Economy
Legal Innovation 2017 Wroclaw A New Right for Industrial Data Producers Searching for an Appropriate Framework for a European Data Economy Prof. Dr. Andreas Wiebe, LL.M. Chair for Civil Law, Intellectual
More informationEnabling Open Standards at Scale
Enabling Open Standards at Scale February 2019 Feng Hou, CIO and Chief Digital Learning Officer, Central New Mexico Community College Alex Kaplan, Global Leader, Strategic Deals, Watson Education; Member,
More informationHow to buy LIVE Token with Ethereum and Bitcoin step by step
How to buy LIVE Token with Ethereum and Bitcoin step by step Ethereum Step 1. Create new wallet. Go to https://www.myetherwallet.com/, think of a strong password and enter it here: Click the button Create
More informationLeveraging Smart Contracts for Automatic SLA Compensation The Case of NFV Environments
AIMS 2018, June 4-5, Munich, Germany Leveraging Smart Contracts for Automatic SLA Compensation The Case of NFV Environments Eder John Scheid, Burkhard Stiller Department of Informatics IFI, Communication
More informationKey concepts of blockchain
Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first
More informationOracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017
Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationE-commerce security: SSL/TLS, SET and others. 4.1
E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:
More informationNKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet.
A NEW KIND OF NETWORK NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet. W H Y Shortcomings of today s Internet The Missing
More informationMobile Security Fall 2012
Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,
More informationNON-TECHNICAL WHITEPAPER Version 1.0
NON-TECHNICAL WHITEPAPER Version 1.0 Abstract Decentralization in Cryptocurrency Standard blockchain environments contain many centralization vulnerabilities, such as monolithic development, consensus
More informationINTRODUCTION WHY DAPS?
DAPS WHITEPAPER INTRODUCTION DAPS is a planned experimental hybrid fork-swap of Peepcoin, to be conducted in 2018. The goal of DAPS protocol is to create a fully anonymous coin and eventually payment system
More informationGSA Protocols: How and Why they are Important and Relevant to
GSA Protocols: How and Why they are Important and Relevant to Lotteries and Lottery Operations By Marc McDermott, Technical Director, Gaming Standards Association (GSA) As posted at PGRI - Public Gaming
More informationBITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW
BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while
More informationBLOCKCHAIN The foundation behind Bitcoin
BLOCKCHAIN The foundation behind Bitcoin Sourav Sen Gupta Indian Statistical Institute, Kolkata CRYPTOGRAPHY Backbone of Blockchain Technology Component 1 : Cryptographic Hash Functions HASH FUNCTIONS
More informationDecentralised Communication: The challenge of balancing interoperability and privacy.
Decentralised Communication: The challenge of balancing interoperability and privacy. matthew@matrix.org http://www.matrix.org Privacy in Matrix 2 Two basic types of privacy: 1. Can attackers see what
More informationCloud Computing und der Datenschutz (k)ein Widerspruch?
Dr. Andreas Leupold, Leupold Legal Cloud Computing und der Datenschutz (k)ein Widerspruch? What is data? 220 Data Photo: Photo: www. www.colourbox.de Colourbox.de Data is a reinterpretable representation
More informationThese patterns include: The use of proprietary software
Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal
More informationWAVE: A decentralised authorization system for IoT via blockchain smart contracts
WAVE: A decentralised authorization system for IoT via blockchain smart contracts Michael P Andersen, John Kolb, Kaifei Chen, Gabe Fierro, David E. Culler, Raluca Ada Popa The problem Authorization mechanisms
More informationP2P BitCoin: Technical details
ELT-53206 Peer-to-Peer Networks P2P BitCoin: Technical details Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2 Outline
More informationBlockchain (a.k.a. the slowest, most fascinating database you ll ever see)
Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) GOTO Amsterdam 13 June, 2017 Stefan Tilkov, @stilkov I don t know Blockchain and so can you 1. Bitcoin > Practical application
More informationThe Design of an Anonymous and a Fair Novel E-cash System
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of
More informationTechnical White Paper. Cube Engine Version 1.0
Technical White Paper Cube Engine Version 1.0 Last Updated: Feb 06. 2018 1 Contents 1. Summary 1) Introduction 2) Overview 2. Features of Cube Chain 1) Cubing 2) Indexing Block 3) Statistics Block 4) Escrow
More informationHow I Learned to Stop Worrying and Love the Internet of Things
SESSION ID: SSC-W07 How I Learned to Stop Worrying and Love the Internet of Things Steven Sprague CEO Rivetz Corp @skswave The Big Shift Known Networks Ports Firewalls Packets SSL Known Devices Identity
More informationA Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2449-2456 Research India Publications http://www.ripublication.com A Review on Blockchain Application for
More informationINX Tokenomics I
Content: 1. INX Tokenomics 2. Why is our blockchain needed? 3. Why are our INX needed? 4. Our technology 5. Blockchain specifications 6. INX details 7. INX distribution 8. INX sales 9. Use of funds 10.
More informationPublic Wallet Interface for Ripple
CS 795 Blockchain Technologies CS 795 Authors: May 15, 2017 Contents 1 Abstract 2 2 Introduction 3 3 Program Design Architecture 6 4 Functionality 7 5 Preview 10 6 In-comparison with other wallets 13 7
More informationTrustworthy user authentication, authorization, data integrity AND consent management
RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY
More informationConfirmed VPN Privacy Audit and Open Watch Analysis Summary Report and Documentation
Confirmed VPN Privacy Audit and Open Watch Analysis Summary Report and Documentation November 21, 2018 Document Revision History Version Modification Date Author 1.0 Created Report Tue, Nov 20, 2018 Ryan
More informationIndustry 4.0 and the importance of norms and standards within collaborative, digitized process networks
ProStep ivip Symposium 2017 Industry 4.0 and the importance of norms and standards within collaborative, digitized process networks DIN e. V., Dr. Michael Stephan, Dr. Stefan Weisgerber Essen, 2017-05-17,
More informationSmart City in the 5G Era
Smart City in the 5G Era Forging Ahead in 2017 RMB 10 bn+ R&D investment 57 application systems for 20+ cities Data sharing in 30+ cites 1,000+ ecosystem partners 52 counties along the Belt and Road 2
More information