Cube Chain Technical White Paper

Size: px
Start display at page:

Download "Cube Chain Technical White Paper"

Transcription

1 1

2 2

3 Cube Chain Technical White Paper Cube Engine Version Overview 1.1 Overview Blockchain is an encryption system that creates blocks of data at regular intervals and validates data through hash values that are encoded within the blocks. It is a system that stores the recorded data on a distributed server. It is a system for securing the trust and the reliability of data by separately storing encrypted data along with verification data. Compared to the existing database, the advantage of the blockchain is that it is irreversible because data is encrypted in chronological order. By sharing and storing the same data in a P2P process, data can be highly protected and maintained. As the blockchain is used as the technology for digital currency, it should gain the trust of a number of users. It is now the base technology of today's cryptocurrency market for various reasons. Although the blockchain has broken new ground in new technology by using encryption and P2P communication to create a unique technique to record data, there are still technological limitations. For the blockchain to replace the existing database, it must be accompanied by the technical features that the existing database has, including improvements in velocity and ease of use. If the blockchain technology continues to evolve and becomes substitute for databases, it will be a very secure technique to record and manage data. In that sense, Cube Chain has used the database as the base structure for the expansion of its functional elements, instead of utilizing the block. Therefore, it is possible to utilize several advantages of the database, which is based on the existing blockchain. The development of Cube Chain will utilize the base technology from the advanced blockchain to issue cryptocurrency and introduce various online services that require access to the public databases. 3

4 1.2 Basic Information Cube Chain (QUB) Coin name: Cube Chain Total number issued: 12 billion Algorithms: SHA256, CH-S1, CHF, SHA384 Compensation technique: POH (Proof of POW+POS hybrid) Condition of participating in POS: should have at least 5,000 or more of Cube Chain in the wallet Development start date: January Features of Cube Chain First, hash, which is the core of blockchain is the term used for encryption technology, and is described below. SHA256 is a type of encryption hash. Hash means the act of converting specific data into data of the same length that represents the actual data. As the symbolic data has an ability that allows the data to be completely changed, the original data is changed only a little bit, which helps it to maintain integrity. For instance, although a hash of the string A and a hash of the string B have only one difference alphabetically, the results can be enormously different. For example, SHA 256, a typical hash algorithm, and always returns a different 64 digits of a hexadecimal value of 256 bits, no matter what values are input. 4

5 2.1 Cubing Cubing refers to a technology that combines twenty-seven blocks into a single cube. Twenty-four regular blocks that record transaction ledgers, and the three to five special blocks combine to create a single cube. It is not a simple grid concept, but a technique for generating blocks simultaneously. As soon as twenty-seven blocks are created the generated cube creates a hash value. After that, all the ledgers recorded continue to make the cube and the hash value connects a cube to another cube. This creates the primary encryption by connecting blocks and the secondary encryption that comes from connecting cubes. It has much stronger encryption technology than the existing blockchain. Although a special block consists primarily of three blocks, the special blocks allow for the adjustment of the number of and the percentage of the data blocks. As soon as the data block is created, cubing proceeds, and the generated cube creates another hash value. The cubing creates a hash value for the cube, allowing it to build a double-layered approval data with the hash value of the block. In order to solve the problem of speed reduction and scalability due to the existing serial connection structure, a cube chain, in which data blocks are created in a parallel structure, twenty-four data blocks are created concurrently in the transaction pool and are loaded into the cube, allowing fast and secure processing. It is designed to manage the parallel processing of a large amount of data blocks through the technique of cubing and to realize fast access between blocks by using double hash functions and pattern block structures. When blocks are combined into one cube, four hash function are used to increase security. The hash function used are SHA256, CH-S1, CHF, SHA384. SHA256 and SHA384 are open hash algorithms. The following describes the hash algorithm which were developed independently. CH- 5

6 S1 (Cube Hash Special Version 1) is an algorithm developed independently that a special block uses to create hash function when they are created. CHF (Cube Hash Function) is an algorithm developed independently that is used in the process of cubing to create a hash function with the pattern block. Structural decomposition and description Cube Chain has a structure that improves velocity by creating and accessing multiple ways of loading the block in a parallel way. When you decompose a cube, there are four different block patterns. 6

7 Each pattern block is linked with the nearest block of the previous cube and the hash value of the xn block is stored in the 2 nd hash. The cube is linked to the cube that had been created immediately before it by storing the hash values of the cube that has been created before in the 1 st hash [Figure 2]. It connects the blocks to each other block, and consequently the cubes to each other. The hash value of the block, which is connected by each pattern, is stored in the cube. 2.2 Indexing Block The indexing block is a block that indexes data for the entire block, enhancing the search function by arranging vast amounts of data clearly. The indexing block is a data block that organizes the cube s height (the block s height of the existing blockchain). Then the electronic wallet is identified in terms of address, which is included throughout the entire transaction. Therefore, indexing blocks can find the corresponding data in the electronic wallet in less time. For example, within the indexing block, address A: 20c (20: 20th cube, c: 3rd block), 32a, 105h, 201j, 302r Cube block position, address B: 3b, 102v, 201s, 1001q Cube block position and address C: 5c, 34e, 56g, 234k, 456y Cube block position, can be created. As shown, all addresses are arranged in order of the address value, and the corresponding block s height. When a searcher wants to find a specific transaction within the address B, he/she can quickly find the address B is organized due to the indexing block. The purpose of the indexing block is to help quickly find and easily manage the history of a particular address. 7

8 [The existing Blockchain Technique] Retrieve all data when searching for a specific wallet address transaction history (When all cubes create 1,000 cubes, 1,000x24=24,000 blocks are searched) The complexity in terms of time = O(B log2 T) [Cube Chain Technique] It only has information about the wallet address, the cube s height, and the block s location. It does not need to scan the entire block with the corresponding data, but can obtain the corresponding data by searching for the wallet address in the indexing block. The complexity in terms of time = O( log2 I + log2 T) E.g.) Search only the indexing block when searching for a specific wallet address transaction history (1 block + 1 cube) 2.3 Statistics Block By arranging the statistical values for the entire blocks, the statistics block enables service processing to be much faster. Application services and various APIs also provide rapid logic implementation and a variety of utilizations. A statistics block is a collection of statistical values for the entire blocks to ensure fast data processing. For example, since there are more than 5,000 POS targets within a statistics block, the data for an electronic wallet address with a balance of 5,000 or more, the top 1,000 list of electronic wallets with a high balance, and the list of electronic wallets with more than 100 transfers can be located quickly. Indeed, any statistical data, which is frequently used, can be gathered to quickly generate lists whenever needed. These statistics are part of a search that requires a great deal of time if there are no statistical values for the entire blocks, but the statistics block allows services to be processed almost immediately. A collection of frequently used output data, such as the top 1,000 electronic wallets, wallets with high balances and wallets with more than 100 transfers, can be effectively searched. As a result, APIs for applicable application services can be implemented very quickly. E.g.) A search block to locate the POS target based on cube s height [The existing blockchain technique] When the cube s height is 1,000: ,000=500,500x24=12,012,000 blocks When the cube s height is 10,000: ,998+9,999+10,000=50,005,000x24=1,200,120,000 blocks 8

9 [Cube Chain technique] When the cube s height is 1,000: =1,000 blocks When the cube s height is 10,000: =10,000 blocks The number of blocks that need to be searched even if there are only 1,000 cubes is 10,000 less using the Cube Chan technique. When considering the process of organizing the list and the process of retrieving the details, a even larger differences will arise. The functions that are considered for transactions in which 1000 QUB, 2000 QUB or more QUB are traded in a single transaction, are the statistics for the balance ranking (1 to 1000), the statistics for the total transaction volume, the total transaction count, and the unauthorized escrow statistics, and all of these statistics are easily searchable, and processed at a much faster rate. 2.4 Escrow Block Escrow means a service in which a third party, trusted between the seller and the purchaser, intermediates money or goods during a commercial transaction. It is used to ensure the safety of the transaction. The buyer shall assign the payment to a third party. The seller shall confirm the deposit to the third party and then send the goods to the buyer. The buyer shall check the goods sent and notify the third party that the goods have arrived. In any case other than the original agreed upon transaction, the goods may be returned, or the transaction may be cancelled. The third party sends the payment to the seller. The seller will receive the payment or a notification of the termination of the transaction. The third party will receive a certain fee in order to make a profit from the escrow transaction. Escrow transactions in the Cube Chain becomes unavailable immediately in the wallet of the receiver, even if the transaction is signed for and approved for use. General transactions are recorded in 24 separate data blocks, and are recorded in an escrow block during the escrow transaction. Approval encryption can be made and traded in a virtual currency escrow. The approval encryption key allows the sender and receiver to process approvals using the encryption key. At this time, the approved encryption key is automatically generated and sent by the receiver. As for the authorization technique of the encryption key, only the sender or the receiver can process it for approval. Additionally, only the sender and receiver can accept it. In addition, there is an automatic approval system after a certain period. If key fails to be released the key will be automatically approved after that period. If automatic approval is granted, the sender will accept it and the escrow status will be maintained until the transaction is allowed by the receiver. The receiver can then request to keep the deal or contract because he/she hasn t cancelled the transaction. In order for the receiver to be allowed to accept the key, and therefore receive payment, the receiver must deliver the approval key via a communication technique, such as or messenger, to the sender. 9

10 In existing escrow transactions, a broker plays the role of a medium for the transaction between the dealers. The escrow block has an escrow function and there is no broker. Although third parties can play an intermediate role as in the existing technique depending on the implementation of the service, there are many special features that escrow introduces through direct inter-party transactions. Escrow blocks could be a revolutionary way to make transactions simple and safe, not only for online shopping malls and open markets, but also for direct transactions between individuals. The double authorization data system is introduced in the escrow block to store data. The general data is recorded as one of the 24 data blocks, but the escrow data is stored and managed separately. The escrow data is re-written as general data at the time of the double authorization. The term double authorization data system refers to the technique where an encryption key must be additionally issued and approved apart from the electronic signature that is made during transactions by using general blockchain technology. This technique, using the escrow block, the payment is not immediately available in the receiver s wallet, even if the transaction is signed for. This may provide a function to protect transactions between trading parties, other than in the form of current escrow transactions mediated by a third party. In addition, the escrow block can be used by the owner to protect the data with a password, instead of using the data as an open format. Only users who know the password and only those with the encryption key can see the data. The time required to created and size a regular block and a special block: A regular block: One block is 4MB. A special block: The capacity of the three special blocks is variable, and are created when a regular block is created by cubing. The size of the cube: as the size of a special block is not specified, and is defined as α. 1 cube =24 blocks *4+α, i.e., 1 cube has the size of 96+α MB. The process from the arrival of the data to the creation of the cube within the transaction pool: When transaction history or other information (there may be multiple types of input data. However, all encrypted data has the same length and size) arrives in the transaction pool, the data from Tr1 to Tr24 in the transaction pool is allocated sequentially to create a regular block. A special block is created primarily by copying the special block of the previous cube while the previous cube is still being created. 10

11 Transaction Pool Listener Block1 Block2 Block3 Block24 11

12 Each block has a maximum size of 4MB. However, in some cases, it may be less than 4MB. The order of the input data in the transaction pool is defined by the block s order. One transaction is allocated to one block. In this way, parallel processing is conducted. Miners can participate in mining by selecting from the 24 blocks within the allowed resources. Out of the 24 regular blocks, the second and the third block can be selected for mining, and a special block can be selected for mining as well. 2.5 POH (Proof of Hybrid) Cube Chain adopts the POW+POS Hybrid technique to reduce power waste while inducing participation in the network. The disadvantage is that it takes too long to calculate and pay POS when blending POW and POS. However, with Cube Engine's statistics block function, there is no need to consider the balance because the flaws on calculations are eliminated, and POW and POS ratios are confirmed. The terms of participation in the POS require a balance of at least 5,000 Cube Coins in the wallet and the target who meets the conditions shall be paid in coin compensation according to the balance ratio. POH is a combination of POW and POS. POW is a protocol (rules and commitment on communication techniques when sending and receiving information between computers) and a program function. POW refers to proof-of-work. POW refers to a system where a person with a large amount hash can find more blocks to acquire coins. It has an economical technique of abandonment by requesting fewer tasks, and may be used to deal with service abuse, such as spam, within the network. Currently, all coins available for mining are POW, and are popular at the moment. Most of the coins, where the market is the largest and the infrastructure is expanding continuously, utilize the POW technique. (All coins, that issue coins as compensation for solving algorithms, such as Bitcoin, Lightcoin, and Dogecoin, are all now POW coins.) Because the predominant cryptocurrency is Bitcoin, which is a POW coin, the current mainstream technique is obviously for POW coins. The market size of POW is also much larger than that of POS. POS is a technique that is designed to address POW's biggest problems: 1) high costs of mining (electricity usage, purchase of equipment), 2) security issues due to the monopoly of the hash. In terms of POS, with just one PC that is connected to the Internet, everything is available and there is no need to purchase additional equipment, such as better CPUs or GPUs. Although the way to obtain coins differs in the amount and technique for each coin, the greater the number of coins a user in POS system has, the more coins they will continue to receive (like interest). In POS, a person who has a large amount of coins takes a large amount out of the coins that are additionally issued. The hash is the main determinate in POW. POS, however, has a standard amount of obtained coins. That is why the POS technique doesn t require a large-scale hash for security. It creates a strong security wall only by having individual coins and an interlocking wallet. 12

13 During the launch, large quantities of coins are issued in a short period of time. As a certain amount is steadily issued, and unlike POW which is gradually decreasing, the value of the coin doesn t dramatically fluctuate. It also eliminates the need for large amounts of electricity for a digger to mine, making it easier for more people to get access to and to use the coins. The increase in the value, however, is not large. There are few reasons for the weakness: 1) large amounts of funds haven t flown in yet (there is less need to hold funds at this point), 2) a person who has more funds can easily monopolize the market, 3) the initial distribution of coins is not even, Cube Chain started with the POW:POS ratio of 7:3, increasing the proportion of POS over time and eventually maintaining POS only. At the beginning, it increased POW to ensure a stable network foundation, and used the technique to increase POS, so that power waste could be reduced. There is a disadvantage to blending POW and POS. It takes a long time to calculate and pay POS. However, the statistics block of Cube Chain can dramatically reduce the inefficiency of repeated calculations. POW is predominant in the beginning because of miners, who are responsible for creating the ecosystem. However, there are a couple of problems, the waste of resources, and inefficiency due to competition. Although it has a high POW at first, Cube Chain makes it possible to adjust the proportion, so that only POS can be used. It distributes the advantages of POW and POS over time, eventually leading to POS gaining an advantage. 3. Encryption Technique 3.1 Creation of Wallet The most common way to create a wallet is by asymmetric (public key, private key) encryption. Asymmetric encryption has two keys pairs and can be decoded with an additional. One key is a public key, and is used as the wallet address. The other key is a private key, and used as the password for transfers. Cube Chain uses the RSA (Rivest Shamir Adleman) algorithm, which is an asymmetric cryptographic technique for generating the address and password of the wallet. 3.2 Digital Signature When making a transfer using the wallet, it will be digitally signed using AES256, which is a symmetric cryptographic technique. The asymmetric cryptographic technique of the RSA Algorithm, which creates the address and the password of the wallet, solves the problem of the transmission of the password, which can t be hacked even when the key is exposed. It, however, has weak point, which is that it is slow. Therefore, it is possible to mitigate the weakness of the RSA by mixing it with AES256, which has some difficulty in exchanging the key, but has a fast velocity for encryption and decryption. 13

14 If the size of the data is small, the data encryption processing technique of creating a digital signature encryption key by using a public key and a private key, which are generated by the RSA will not be efficient. However, the greater the size of the data, the greater the efficiency. 3.3 Block Hash Function The hash function is the function that converts data into hash values of fixed length and outputs. The converted data is not used to decode the original data, but is used for verifying the integrity of the data or authenticating a password. The hash value of the n th block in the blockchain is connected to the hash value of the n-1 th block. In Cube Chain, the hash value of each of the twenty-seven blocks in the corresponding block is created. The hash function used in the data block is SHA-256. Since the special blocks increases more steadily than the general data blocks, the hash function that is different from the existing hash function, and therefore should be generated by using the CH-S1 function, which was developed independently. The use of existing hash functions can cause a serious decrease in velocity. The CH-S1 hash function greatly improves the velocity of processing by extracting and compressing data. 3.4 Cubing Hash Function When conducting cubing, the encryption technique should be used with CHF-Algorithm (Cubing Hash Function Algorithm). The twenty-seven blocks in the cube are different from each other depending on the position in the block. It consists of eight blocks located at the corners, six blocks located in the center, twelve blocks surrounding the center, and one central block of the cube, forming the shape of a hexahedron. As the hash function used varies according to the four types of divisions, they are named CH-B3, CH-B4, CH-B5, and CH-B6, respectively. CH (Cubing Hash) refers to the cubing hash function, and B (Block) refers to the number of blocks that are located within the cube. The cubing hash function creates another hash value using the hash value of the adjacent block. In this way, the hash value of each of the twenty-seven blocks is obtained. The advantage of the cubing hash value, as opposed to the block hash value, is that the cubing hash value is based not on the block data, but on the relevant block hash value. The current block and the entire block are verified through the cubing hash value, and the twenty-seven blocks are individually verified by forming the chain relation. The position value within the cube is used to verify each other's block. In this case, the entire value becomes changed even if only one block is different. 3.5 Cube Hash Function The hash value of the current cube is generated including the total hash value of the 27 blocks obtained from the cube and the hash value of the previous cube. The SHA-384 function is used to create the hash value of the cube. 14

15 4. Special Block Generation Process 4.1 Creation of Special Block In Cube Chain, the special block is not moved by the only the data and is possible to divide and extend the area for the data and the special functions of the data. Three special blocks are set for the cryptocurrency, but the special blocks can also be set separately for other application development. This can be carried out through the Genesis file setting. The special blocks are available for setting when installing the core. It is designed to be easily applied to various fields. In Cube Chain, the special block, which is defined in various ways, has been prepared, and will be added in the future. 4.2 Types of Special Blocks There are indexing blocks, statistics blocks, escrow blocks, format blocks, and edit blocks, which are all considered to be special blocks. Three of these blocks (index blocks, statistics blocks, escrow blocks) have already been described above. Format Block A format block is used when the data format to be recorded on the data block needs to be flexible or must be changed. If the formatting information is changed, a format block will automatically validate the data, preventing invalid data from being included, and thus prevent users or programs from making errors. It only keeps data about the format, but is not used for the general data that users can access. Edit Block An edit block is used to modify the existing data. The irreversibility of the blockchain is an advantage and a disadvantage at the same time. It is an essential element for cryptocurrency, but the technology may need to modified for other applications. To do this, an edit block can be set to easily reflect and manage the modifications. The data to be modified is stored in the edit block. When the original data is referred to, the change is reflected in the edit block. As data in the blockchain can be modified and deleted, as well as being a transaction history, it is possible to retrieve, modify, delete, and input data. However, the format block and the edit block are intended for organizations or companies wishing to introduce a private blockchain. Two of the 24 blocks are converted into special blocks, thus leaving 22 data blocks. It can be understood that the block data can be modified and the position of the data to be referred to is changed instead of the form of the corrected data within the actual blockchain. In other words, it means a conversion from the existing data to data that can be used by a service or an application can be done. The edit and format blocks are not associated with the issue of QUB, but are a special block of options that can be added at the service provider's request. 4.3 The Process for Generation 15

16 A special block is data that is reprocessed based on the data block or data to be reflected. The three special blocks are adopted as mandatory special blocks. In order for the special block to be created, there must be a previous data block. Thus, the first cube is created with empty data. Special blocks are then created from the second cube. The creation of the special block starts at the time the formation of the previous cube is completed. The data blocks to be included in the current cube are included at the time when the creation is completed, and the cubing is subsequently carried out. This process is to prevent the delay caused by the creation of the special blocks in advance. The special block is reflected by adding the contents extracted from the special block data of the previous cube and the contents of the previous data block. In other words, the special block of the n th cube contains data up to the data of the (n-1) th cube. Upon the completion of the (n-1) th cube, the special block containing the data of the (n-2) th cube is combined with the (n-1) th data. When the n th cubing is formed, it creates an organic relation with the data block. Although the special block is created during the period of chaining the cube, the functional element is expanded, so there is no delay. In addition, the hash value can be obtained at a very high velocity compared to the amount of data by using the CH-S1 function developed by the special block. 16

17 5. Agreement Technique 5.1 POH (Proof of Hybrid) The standard mining technique of Cube Chain is to compensate the coins to the nodes participating in the proof of work. However, in order to solve the problem of increasing the levels of difficulty due to the excessive waste of network resources and excessive competition by caused POW, Cube Chain adopted the POH (Proof of POW + POS hybrid) technique. The POH technique of Cube Chain gradually increases the POS ratio while progressing POW and POS at the same time after 40 years. It aims to prevent the industrialisation of mining due to POW and to prevent the waste of network resources. POW mining can be done in three ways and it can be participated in by selecting each item: the creation of the data block, the creation of the special block, and cubing. 5.2 Compensation Type of POW The nodes participating in the proof-of-work are given of compensation that is calculated after the creation of each cube. In the case of participating in the duplication of work, compensation will be given after calculation and pay will be made for each item. When the data block is created, the random value added to the hash value is to be compensated for by conducting the calculation. In this case, each of twenty- 17

18 four data blocks are reimbursed separately and duplicate payments shall be made for duplicate participation. When creating the special block, they are compensated by conducting the calculation required to verify the hash value. In the process of cubing, by conducting the calculation that verifies the encryption function used for the cubing, they would be compensated. It consists of twenty-four general blocks, three special blocks, and one cube. This will be compensated respectively, and duplicate payments shall be made for duplicate participation. 5.3 Data Block Mining Process Check the timestamp of the block and the level of difficulty of the node. Check that the timestamp of the block is valid as compared to the timestamp of the previous block. Create a list of the data or transactions contained in the block. Check the Merkle trees of the block header to verify its validity. Connect the hash value of the block in the previous cube and create the first hash value. Create the second hash value using the pattern block of the previous cube. Create the block and spread the block data to the node. 5.4 Special Block Mining Process The special block mining is a mining technique that only Cube Chain has. Check the timestamp of the special block and check the header of the corresponding special block. Extract the data to be added to the special block at the data block. Calculate the number of data items by the subtotal and the total. Create the Merkle trees for this operation and check its validity Link the hash value of the block in the previous cube and create the first hash value. Create the second hash value using the pattern block of the previous cube. Put the data to be added on the previous special block. Create the block and spread the block data to the node. 5.5 Cubing Mining Process The mining of the cubing is conducted as an operation for data structuring in a unique way. The process of mining for the cubing is as follows. 18

19 Check the timestamp of the previous cube and check the hash value of the twenty-seven blocks. Make sure that the timestamp of the cube has a valid time as compared to the timestamp of the previous cube. Check the validity of the twenty-seven blocks hash values and the position value within the cube. Create the hash value with twenty-seven blocks with the pattern block. Create a cube hash value using the previous cube hash value and 27 block hash values. Create the cube and spread it to the node. 5.6 Diversification of Mining Cube Chain not only has a wide variety of mining techniques, but also has different efficiencies and the levels of difficulty depending on the technique. POW has been used for the purpose of facilitating network construction in the early stage of Cube Chain, thus broadening the range of participation, so that various participants can participate. General users from mining companies can mine by participating in the node through the wallet. The operation required for the mining of cubing is to improve in operational efficiency due to the development of a chip or a hardware device which decodes the functions used for cubing. This will actualize high efficiency low cost mining and overcome the inefficiency of investing in mining equipment during the period of infinite competition. 5.7 POS Compensation Method POH is a unique participation technique of Cube Chain that combines the POW mining technique and the POS compensation technique. In Cube Chain, regardless of the participation in the nodes, compensation is paid to the holders of more than 5,000 Cube Chain (QUB) based on the previous block, in proportion to the quantity of the cube. However, applications to participate in POS can be made through the mining program, and the amount of participation and the mining blocks would be determined. The amount of participation will not be able to be transferred during the participation period. The transfer made is dependent on the amount of participation. The payment can be made at the starting point, when the current block is created, and the amount of payment is determined by calculating the ratio of the amount held as compared to the total amount. In the statistics block of Cube Chain, since the number of POS holders are stored on each block, the compensation amount can be calculated quickly and transferred to each wallet address accordingly. 19

20 6. Wallet Service Cube Chain aims to be a high-availability and convenient blockchain service. To this end, we provide standard services to maximize the utilization of Cube Chain and to provide an environment that can focus on the development of applications and services. 6.1 Cube Chain Wallet Service The Cube Chain wallet supports services, such as transfers and history management, by using Cube Chain. The Cube Chain Wallet offers a number of distinctive wallet services in addition to basic transfers and transaction history services. As a new financial service that leads to the Fourth Industrial Revolution, it will show the unique identity of the Cube Chain wallet by adding the services that are highly usable and convenient. Domain service of wallet address The wallet domain service is a service to match the wallet address, which is difficult to remember, with a specific wallet name that is easy for users to memorize. As with connecting a specific IP address to a specific domain address, it connects a specific wallet address to a user-specified wallet domain address. The wallet domain can use mobile numbers or addresses, for example. that are used by individuals. The person, who will be making a transfer, will be able to easily remember and enter the wallet domain address. Cube Chain produces address in the type of CWxhQRgBrqZUbj6fj1ftprurb2U9yAFMhu. A simple string, such as Abc.com (case insensitive), can randomly selected by the user and it will replace the complicated wallet address, and it can be used in the Cube Chain wallet. Wallet grouping service A grouping service that bundles multiple wallets into a single wallet is a type of service that exposes only the address of the connected wallets without revealing the main wallet address. Users can manage multiple wallet addresses in one wallet, and multiple wallets can be opened or divided according to their purpose. Grouping services can be used to conveniently and easily manage the direct debit service connected to the wallet address. Direct debit service Direct debit service is a service that periodically transfers coins to a specific wallet address according to the terms and conditions of the transfer set by the user (receiver, wallet address to be deposited, amount and period). When using the direct debit service, the user can withdraw from 20

21 their wallet on a designated date without having to notify the recipient. Then it is possible to send a deposit to the recipient and be notified of the details thereof. Wallet messaging service This is a function to deliver a confirmation message or a message about a service request to a user of the wallet. This can be used for a few purposes, such as messages upon the completion of transfers or a request to return a wrong transaction. The message is used for notification services within the application. 6.2 Other services The base service with Cube Chain is a service distributed after building the infrastructure of the base service platform, so that the Cube Chain technology, based on blockchain can be used as a business model for various fields. The purpose of this is to provide a cornerstone for the development of a second Cube Chain application program, which can be used to develop an environment for a company or an individual to make a Cube Chain ecosystem. The base service with Cube Chain will be developed into a completed form that can be applied directly to the business model, and it will be distributed as a template application separately. Verification service for Cube Chain personal information It is a personal verification service that can universally be used to store personal s, mobile numbers, pin numbers, etc. on Cube Chain. The user can provide his/her personal information to the web or application, and that information will be stored on Cube Chain and be released only when the user is authenticated based on the protected data. This provides safely to the user who wants to provide personal information without that information being exposed to a third party. Cube Chain messaging service Messaging service based on Cube Chain is differentiated from the traditional messaging service as they are P2P. The messaging data sent and received is transferred to Cube Chain and then stored. As the messaging data is stored in a subordinate order, users can use the service without any delay in data transmission. The distributed data stored on Cube Chain can be converted into a message that is released only to the authenticator. The privacy protection feature is a protective wall that is not exposed or that can be hacked by a third party, allowing users to use a safe chat service. It is also possible to increase the usability by opening the chat room, setting up a participant list, and communicating through API. Cube Chain file storage service 21

22 Cube Chain file storage services allow the user to distribute specific files by using Cube Chain, so that a specific file can be used for public purposes or registered as an authorized file. The service of registering a document file or an image file allows the user to safely store important files. It can also increase the usability of the user s files through services that interlock with template apps or applications. Cube Chain database service The database service of Cube Chain is a service for using blockchain data in an efficient way, like in a database. It provides the advantage of structuring and managing data by using the edit blocks and format blocks of Cube Chain. It provides an API to store, modify, and delete data through the standard SQL statements. In addition, it has a feature to interlock the data of Cube Chain with relational DBs by sending data every time a cube is created. 22

23 7. Cube Chain Issue Quantity 7.1 Cube Chain Distribution 7.2 POH Ratio Cube Chain issue a total of 12 billion coins over 50 years, and the ratio of POW to POS is adjusted over 5-year intervals. Division The amount of Cube POW : POS The amount of the The amount of the Chain that has been ratio compensated POW compensated POS compensated for 5 years 5 years 960,008,400 7:3 672,005, ,002, years 960,008,400 6:4 576,005, ,003, years 960,008,400 5:5 480,004, ,004, years 960,008,400 4:6 384,003, ,005, years 960,008,400 3:7 288,002, ,005, years 960,008,400 2:8 192,001, ,006, years 960,008,400 1:9 96,000, ,007, years 960,008,400 0:10-960,008, years 960,008,400 0:10-960,008, years 960,008,400 0:10-960,008,400 23

24 8. Technology Utilization 8.1 RPC Server The node participating in Cube Chain is available as the RPC server. It can run functions remotely when being used as an RPC server. Therefore, it can control the nodes remotely using Cube Chain. In the nodes of the Cube Chain network, the RPC server can be used to refer to the data of Cube Chain or control the node through a PC or server that doesn t directly participate in Cube Chain. It is also possible to set the limit to the remote sites or to set the range of the functions, so that remote control is available. 8.2 API By creating and providing API with the Cube Chain RPC server, node management is easy at remote locations. Both the delivery and response of the RPC server's API use the json format. The detailed API document will be opened separately, after the time of processing time of Cube Chain. The API commands and simple examples are as follows: rpc_ver: get the current version s information of the RPC server. curl -X POST --data '{"callno":100,"com":"rpc_ver","vars":{},rmsg:" 서버버전확인요청 "}' network_info: obtain information about the type of network participation, the participating node, and activation state of the server. curl -X POST --data '{"callno":100,"com":"network_info","vars":{},rmsg:" a request to confirm the network information"}' p2p_info: get the relevant information on p2p. curl -X POST --data '{"callno":100,"com":"p2p_info","vars":{},rmsg:"peer to peer info"}' cube_pow : possible to obtain information on whether to participate in POW. curl -X POST --data '{"callno":100,"com":"cube_pow","vars":{},rmsg:"confirm the status of POW "}' cube_pos : possible to get information about the POS of the delivered wallet address. curl -X POST --data '{"callno":100,"com":"cube_pos", "vars":{"address":"q9eeb85d32cf465507dd71d503d8a85d32s"},rmsg:" confirm the status of POS"}' 24

25 cube_height : get the height of the current chain, in other words, the number of cubes to the present. curl -X POST --data '{"callno":100,"com":"cube_height","vars":{},rmsg:"confirm the number of chains "}' cube_balance : confirm the balance of the delivered wallet address. curl -X POST --data '{"callno":100,"com":"cube_balance","vars":{"address":"q9eeb85d32cf465507dd71d503d8a85d 32s"},rmsg:"confirm the balance of the wallet"}' cube_transaction_count : confirm the number of transactions of the delivered wallet address. curl -X POST --data '{"callno":100,"com":"cube_transaction_count","vars":{"address":"q9eeb85d32cf465507dd71d5 03d8a85d32s"},rmsg:" confirm the number of transactions of the wallet "}' cube_transaction_list : Extract he transaction hash value, i.e., the transaction ID. It is possible to find transaction history in a specific address or transaction history at a specific cube s height. curl -X POST --data '{"callno":100,"com":"cube_transaction_list","vars":{"address":"q9eeb85d32cf465507dd71d503 d8a85d32s"},rmsg:"send the transaction history"}' cube_transaction_detail : send the history of the hash value of the transaction. curl -X POST --data '{"callno":100,"com":"cube_transaction_detail","vars":{"tr_hash":"6e8dd67c5d32be8058bb8eb f bb8eb97f"},rmsg:"send the transaction or data"}' cube_transaction : proceed with the transaction between the delivered wallet addresses. curl -X POST --data '{"callno":100,"com":"cube_transaction","vars":{"address_from":"q9eeb85d32cf465507dd71d50 3d8a85d32s","address_to":"Qd2be8058bb8eb970870f b60e8dd","amount":1.2,"fee": },rmsg:" send the transaction or data"}' cube_transaction_data : upload the specific data on Cube Chain. curl -X POST --data '{"callno":100,"com":"cube_transaction","vars":{"address_from":"q9eeb85d32cf465507dd71d50 3d8a85d32s","address_to":"Qd2be8058bb8eb970870f b60e8dd","data":{"no":1,"id":"cu 25

26 bechain","chapter":"cubechain_api","book_name":"cube Chain whitepaper"}},rmsg:"send the general data"}' 9. Conclusion The blockchain technology is developing to become the base technology that will lead the Fourth Industrial Revolution. It is not long before the cryptocurrency market will become popular due to technology that ensures both free sharing and the safety of data. Cube Chain intends to mitigate the existing blockchain s flaws and contribute to the development of blockchain technology. Hopefully, Cube Chain will play a leading role in the Fourth Industrial Revolution, while being widely used in various fields. 26

27 27

28 28

29 Cube Chain White Paper Version Abstract This white paper is described in three stages: the blockchain and e-commerce industry, the Cube Chain service, and crowdfunding. The main objective is to describe the technology that ensures fast transaction speed while maintaining security levels by using the Cube Chain, that is to say, a pattern block algorithm. It also specifies the direction Cube Chain has as a platform for e-commerce. The core (engine) development of Cube Chain is now in its final stages. The team is planning to develop additional APIs and protocols for e-commerce services and will also open up the source code to development groups that have acquired the Cube Working Group (CWG) license to participate in development and testing. The five services of the white paper will be open to APIs and protocols and are for service providers who want to use Cube Chain in their e-commerce. 2. Blockchain Technology Introduction A blockchain is an encryption system that creates blocks of data at regular intervals and validates that data through hash values that are coded into the blocks. A hash is a method of converting a string of data into a shorter value or key that represents it, verifying the integrity of the information. By using a hash with symmetric and asymmetric encryption techniques, we can actualise it as a function for various e-commerce. These blockchains can prevent hacking, which can occur when trading cryptocurrency, through the disclosed transaction history. In particular, data is distributed across a Peer to Peer network without a central organisation, so that participants can jointly record and manage data. Each block validates the transaction ledgers, preventing forgery or falsification. 29

30 A traditional blockchain, such as Bitcoin, has a linear connection of blocks. It has a disadvantage in that data processing is slow since it only communicates between adjacent blocks. Cube Chain has been structured to extend the functional elements of the database through the concept of cubes instead of blocks. This provides a method of three-dimensional implementation and multiplexing of blocks, which can enhance speed through parallel data processing. Typical technical features of the Cube Chain are as follows. For more information, see the Cube Chain Technical Paper. Cubing technology, which is a technique for cubing data Special blocks containing a data index, data statistics processing, and an escrow function Multiple pattern block technology Hybrid (POH) Agreement Algorithm to prevent waste of resources from mining A double hashed, dual- approval method Cube Chain aims to launch a platform based on the blockchain in the current e-commerce industry by utilising technical features. It provides 5 services with a theme of All in One Blockchain for E-commerce. 1. One ID, a Login system for personal information protection and customer convenience 2. Cube Chain Product, a system to establish on/offline franchises 3. CubeON, a Social Network Service to become blockchain (Cube Chain Open Network) 4. CubeChat, a Marketplace Messenger that enables secure P2P transactions 5. ASM, an AI agent that replaces the company's existing call centre Cube Chain technology will provide solutions in all directions for the e-commerce industry. It is planning to provide services for other decentralised SNS, transactions between individuals, enterprise management maximisation, login system change, and the establishment of the chain. In other words, it provides comprehensive solutions for public relations, transactions, operations, personal information, and business expansion. 3. Cube Chain and E-commerce E-commerce is the purchase and sale of goods and services through the Internet or through a network. It can be understood that it is not just the transaction itself but the entire process that connects producers and consumers. Therefore, it includes all activities such as advertising, promotion, strategy, customer support, delivery, payment, and etc. Cube Chain will internally improve customer service as a blockchain for e-commerce and cut the cost through reduced fees. It will also expand the market externally throughout the world. 30

31 To this end, the Cube Chain team has been working continuously to make Cube Chain (QUB) safer and more competitive. In addition, a new policy has been established for transaction authentication and security, payment, and protection of the consumers and intellectual property rights. Information and communication technologies and information systems have brought changes in the individuals conscious and social structures. Indeed, we expect another revolution through blockchains. There is a new era in which the reciprocal transaction will be widely used without a central organisation or a third-party broker. History is a constant conversation between the past and the present and is a ceaseless interaction between historians and past facts. E.H.Carr. Before opening the era of e-commerce through the blockchain, we intend to pursue a corporate strategy based on history. The Web 1.0 era was all about given one-sided information through the Internet. Web 2.0 has evolved into a way for users to produce contents and interact with each other. Efforts to develop this ecosystem through the platform have continued, and there were keywords, such as participation, sharing, and openness. They appeared in various features including encyclopaedic knowledge, blogs, comments, and video production. Let s learn about the platform that started with Web 2.0. Apple itunes Store It is a sales service for online media provided by Apple through itunes. Various creations are shared, including music and audio books, music videos, movies, and TV programs. Starting in earnest in2003, we can see brisk sales and purchases of online contents. Amazon Prime It established premium service through an annual membership system and applied early personalised product recommendation services. They have successfully operated through the $99 advance payment as a strategy to attract customers. Google AdWords and AdSense AdWords can be viewed as advertisers-recruitment and advertisement-publishing and AdSense as a profit distribution program. Through enhancement of the algorithm, it is planning to increase overall profit from advertisements. Starting with Web 2.0, e-commerce has brought a revolutionary change. With the era of Web 3.0, the strategies for sales and advertisements are becoming more sophisticated. We 31

32 recommend products and services by analysing preferences with consumer clicks. Intelligent web technology has further developed personalised information. Web 4.0 refers to the evolution of artificial intelligence (AI), which is more powerful than web 3.0's semantic web technology. It will play an important role in large networks and top tier search engines. Brokers such as Apple, Amazon, and Google have become more influential, and whether they enter a market or not has a huge impact on the sales of individual businesses. The reality is that you have to pay too much for advertising or give a large percentage of your content sales to brokers. The Cube Chain team aims to have innovative changes in all aspects of this omnidirectional e- commerce industry. It will break the existing framework of recognition for membership, product sales, advertising, promotion, and business expansion and will change the current form that is dominated by the influence of the middleman. It will fulfil a shared economy using Cube Chain (QUB) to distribute profits reasonably. 4. Cube Chain Service Cube Chain is aimed at a platform coin. We will not only provide the platform but also provide and implement it directly in connection with the ecosystem. Therefore, we propose five service applications for e-commerce industry. 4.1 OneID Service Introduction and Vision Because of the input and authentication required for personal information, there is inconvenience whenever you join a new website. To solve this inconvenience, social login services are becoming popular. 93% of users prefer social login services as it is a hassle to sign up for new sites. If a social login ID and password are hacked, there would be serious security problems in which the privacy of other connected applications can be compromised. OneID is a service that allows users to authenticate and log in to other services once the user's process registration using Cube Chain is complete. This will help ease the hassle of repeatedly completing membership procedures and the inconvenience of managing identity and 32

33 passwords. In addition, Cube Chain technology ensures a safe solution to the risk and reliability of hacking Service Architecture OneID is a platform for login authentication built on Cube Chain. A single ID generated by OneID supports all of the services of the Cube Chain service group (Cube Chain Product, CubeON, CubeChat, ASM). It can also support OneID login authentication for a wide range of services based on Cube Chain in the future. Cubing refers to a technology that combines 27 blocks into a single cube. As the block is connected, the first hash value is generated and then the cube is connected to another cube to proceed to secondary validation. This provides a dual-validation encryption technology more powerful than the existing blockchain. In addition, the parallel operation processing function provides fast transactional speed and reliable data processing. OneID can process data quickly and securely through Cube Chain. It also provides stability and reliability through establishment of the real-time authentication system, validation testing of data, and the interworking of biometric information, such as fingerprints, iris, face recognition, and veins. 1. Create, authenticate, change, deactivate, and retrieve information from a OneID account 2. Smooth integration with Cube Chain service group servers 3. Interlocks with other services for authentication services by providing Open API 4. Provide authentication services using the value of the Personal Information to allow local storage and hash ID 5. Process user authentication hash value information and establish a stable authentication system through the Indexing Block 6. Conduct data validation test and secure reliability through Format Block 7. Establish a real-time authentication system and enhance security through bio information 33

34 4.2 Cube Chain Product Service Introduction and Vision Mobile trading through the online community is exploding. The second-hand market has grown to over 10 trillion won and the online community has a membership of about 16 million. As the number of members increased, the range of used goods expanded to the entire range of consumer products. Despite the size and convenience of large markets, there are problems that must be solved. In terms of a direct transaction, as it proceeds on the basis of mutual trust without brokers, there has been a steady stream of fake transactions. Although there is the big advantage of 0% commission, it contains risk because there is no standardised trading and security system to protect users. Examples of problems with direct transactions between users are as follows: 1. Seller has received payment for the goods but has not sent the goods 2. Seller sends the wrong item 3. Seller sells a counterfeit product represented as a genuine product To address this problem, Cube Chain Product provides a way to sell by storing the product information and transaction history on Cube Chain when it is first sold. By including the product information, such as the place of purchase and the sales information of the seller, in Cube Chain, it provides the certified product information in the Cube Chain for future resale. The Cube Chain-based marketplace, where users can resale, is provided for trading through Cube Chain (QUB). Safe transactions can be made through genuine product certification and payment guarantee by the franchise Service Architecture 1. Secured direct transactions with no fees through Escrow Block's proprietary escrow function 2. You can view the certificate for a genuine product, transaction statement, and information about the place of purchase. 3. Easy to make payment through Cube Chain (QUB) and an electronic wallet 4. Both commodity and coupon transactions are possible. 5. Register product information and purchase details on Cube Chain through the POS server of each franchise and the affiliate card 6. Division of wired and wireless network communications 7. Provide reliability and security for trading products Cube Chain Product: making CUCUDAS Cube Chain 34

35 CUCUDAS is a coupon building system that can be used for P2P transactions. If the transaction amount grows above a certain level, merchants can issue coupons voluntarily. Additional sales are generated by local merchants and no shows can be prevented through the advance payment system. They can also get CRM DB. Consumers have the advantage of being able to get a discount. Cube Chain Product establishes a P2P transaction and a platform for genuine product certification based on Cube Chain. We are also planning to enhance the service into a transparent and safe resale market. We will enhance payment stability through the CUCUDAS coupon system and Cube Chain's own escrow function. By making goods register on the blockchain and using the encryption method of Cube Chain s coupons, it can reduce the risk of copying and forgery. Product information, franchise information, and transaction history of products sold at Cube Chain Product franchises are registered in the Cube Chain. This allows the buyer to trust in the product authenticity, and if it is resold through the Cube Chain, the new buyer can safely purchase the product as well. In addition, transaction information for resold products is also registered in the Cube Chain, and it can be used as a product authentication platform for real commodity trading since all the transaction histories of the original product and the resale can be retrieved through the Cube Chain. 35

36 4.3 Cube Open Network Service Introduction and Vision SNS refers to a Social Network Service that allows users to communicate freely and share information. This means an online platform that creates and enhances social relationships. The most important part of SNS is the creation and expansion of social networks through the service. This relationship network becomes more meaningful when information is shared and distributed. However, privacy issues on social networking sites such as Facebook continue to come to the fore as social issues. The Cube Chain team is planning a Social Blockchain Service, which is a social networking site by utilising Cube Chain based on decentralisation. Just like the current SNS, there are advantages that can be used in various forms depending on the customer's needs. CubeON will be used for purposes such as online content, products, and offline business promotion. Segmentation of category and tags by themes enable active sharing of knowledge among experts. There is no inequality according to Stake Power, so that having Stake Power through preoccupancy like an existing blog does not always draw much attention. It is important to understand how often users in the category communicate and sympathize with each other through writing. 36

37 4.3.2 Service Architecture What is Token Economy? A Token Economy is a concept that starts with behavioural psychology and is an economic principle based on the theory of operant conditioning by B.F Skinner. The reward is a token to draw out an action by the target. It is also a way to reinforce behaviour by having the token be exchangeable for tangible/intangible value. The basic concept of a token economy is to reinforce the desired behaviour with the token as compensation. Because of the technical features of the blockchain, the details of all transactions are disclosed in writing in the ledger. As it is the system that is fair and decentralised, it is an optimized means for a token economy. For this token economy to be more stable, abnormal behaviours such as repeatedly writing meaningless postings, swearing, and defamation should be identified and controlled. If repeatedly reported by multiple users, the corresponding contents will be identified and their probability of exposure will be reduced. 37

38 1. Blockchaining of content uploads (Social Blockchain Service) 2. Aim to enable equalization of content sharing without central curation 3. Freely search for knowledge, sharing opinions 4. Mutual token economy with "Stake" and "Work" 5. Actual rewards for content creation 6. Provide equal opportunities through solving the shortcomings and preoccupancy effects of existing blockchain blogs 7. Create a community centered on experts for each subject 38

39 Types of CubeON Welfare The types of Welfare are divided into Stake, Work, and Drop. Stake is active support, and Work is effort. Drop is the reporting function of abnormal contents such as insalutary contents, profanity, slander, and personal attacks. When Welfare points are calculated for creative content, the number of Stakes acquired is multiplied by the additional points and the number of Works acquired is multiplied by the additional points. For curation distribution, no additional points are added, and it is calculated according to the number obtained. Types of CubeON Token Reward If the content is recognized as a regular block by Welfare to the user who contributed to CubeON, the service token is rewarded. There are two types of reward. Content creation reward 80% of the value of the acquired Welfare is rewarded with the service token for the content posted by the creator who created the quality content. Curation reward Among the values equivalent to 20% of total Welfare earned by the supported content, it is rewarded according to the participation rate of all of the Welfare participants. Content Welfare 100% = Creator 80%: Curation 20% Cube ON Service Content Creation Reward If the created content is recognized as a regular block, 80% of the total Welfare points earned are rewarded. Welfare reward for content creation = ((Stake x 3 x n) +( Work x 1 x m)) x 80% (n = Number of stake acquired, m= Number of Work acquired, 3 = Stake additional point, 1= Work additional point) Cube ON Service Curation Reward If the created content is recognized as a regular block, the reward equivalent to 20% of the Welfare points acquired by the content will be distributed to the supporters. Welfare reward for curation by content = ((Stake x 3 x n) + (Work x 1 x m)) x 20% (n = Number of stake acquired, m= Number of Work acquired, 3 = Stake additional point, 1= Work additional point) 39

40 The curation reward is distributed according to the ratio of the number of Stake and Work of the participant in the total number of Stake and Work of the content. Curation reward distribution = Q x ( M / N ) (Q = Curation reward for the content, N = Total Stake, Work, M= participants Stake, Work) The curation reward distribution is calculated according to participant s Stake and Work regardless of additional points of Stake and Work. Token Economy for CubeON 40

41 4.4 CubeChat Service Introduction and Vision CubeChat is a P2P transaction messenger created by combining a marketplace, electronic wallet, distributed ledger system, coin, escrow function, and messenger. A P2P transaction is a one-to-one transaction and electronic transfer that can be made through a P2P payment application. It can be done through mobile devices and computers that can connect to the Internet. The Cube Chain team supports a safe P2P transaction function through its own escrow feature. They aim for active P2P trading within the application. Marketplace This is where sellers post and sell goods directly on the Internet. By eliminating middle distribution margins in online shopping malls and connecting sellers and buyers directly, they can sell at a lower price than ever before. Coin This is the certified currency that has maintained the security of transactions through the encryption of digital assets. It refers to QUB based on ERC 20, QUB based on Cube Chain, and the service token. Ledger This is a ledger that records data. In the blockchain, it is the distributed ledger system that operates through the agreed algorithm. Cube Chain is operated by POH (Power of Hybrid), which is POW+POS. Wallet This is a software program that protects digital assets and can exchange coins through the blockchain. It can contain all QUB based on ERC 20, QUB based on Cube Chain, and the service token. Escrow This is a device for ensuring transaction stability between sellers and buyers. Cube Chain contains the escrow function within the blockchain technology itself. 41

42 4.2.2 Service Architecture Weegle This is a new-concept messenger application that allows users to watch online contents in a messenger window while communicating at the same time. It supports live streaming to enable real-time communication and has a secret chat function. Taking advantage of this, the Cube Chain team will develop it into a blockchain messenger that can go beyond sharing messages and content to P2P transactions, payments, and delivery. CubeChat: making Weegle Cube Chain (Weegle by Cube Chain) 1. Message function 2. Easy and fast content sharing 3. Various P2P transactions 4. A new concept marketplace 5. Secure payment through Cube Chain (QUB) 6. A delivery system through partnership with shipping companies 7. 24/7 real-time response through its own ASM When joining OneID, real-time payments can be made within CubeChat without a third party by using Cube Chain's electronic wallet, coin, and escrow functions. Many P2P transactions are made regardless of the category of item and the type of service. This will create a new marketplace. Secure payments are made through Cube Chain (QUB) and the safe Cube Chain wallet and can be exchanged for legal tender through currency exchange. Delivery will be made available later through a partnership with shipping companies. ASM is also planned, which is the third service of Cube Chain, to carry out realtime response as well. The primary goal is to increase the total worth of the Gross Merchandise Value (GMV) or the finished goods. We are making great efforts to grow into a platform that can make as many transactions as possible. Seller revenue, buyer satisfaction, platform speed and reliability will all be met. In addition, knowing how to set Net Revenue of the marketplace operator is important. Currently, most companies set the figure at between 10% and 30%. The Cube Chain service model has its own identity as a decentralised platform. It is important to ensure that the minimum cost of operating the platform is in line with the vision. Therefore, it will be set from 1 to 3%. 42

43 4.5 ASM Service Introduction and Vision ASM stands for AI Service Manager and is created by combining an AI-Chatbot, Big Data, and Cube Chain. The AI Chatbot is a robot that can chat and is designed to respond to user questions according to the specified rules for response. This can be seen as software that automatically communicates with people based on artificial intelligence. This is a service where users can obtain information as if they were talking with someone without needing to use a separate website or application. Big Data is not just a simple compound word for Big + Data. It has features of Volume, Variety, Velocity, Value, and Complexity. That is to say, it is a next-generation technology designed to draw the value needed from the data. It can be described as a technology that can effectively process and analyse a large amount of data. Thus, in order to provide a customised ASM, a model needs to be built that can identify corporate business requirements then build and analyse the data required. The key, then, is to validate the modelling and create a model suitable for real-life Service Architecture ChatCall by Cube Chain As a call centre application for businesses, it provides all SI types that are installed on the ChatCall website or installed on the company's own webpage. SI stands for system integration, providing all services, from planning to development and establishment in the operation, in terms of the information system required by the company. 43

44 ASM: making ChatCall Cube Chain 1. Q&A Automated Response Service 2. Process reservations and changes in real-time 3. 24/7 response 4. Build Big Data for customised corporation 5. Enhancement of responses by using machine learning 6. Reduce call centre costs and make business more efficient 7. Give Cube Chain service tokens to users It aims to overcome the role of chat centres in solving existing call centre problems. In many cases face to face response, not through the online customer service centre, is necessary. The turnover rate of call centre employees exceeds about 130%. Assuming that 100 people are needed for call centres, this means that 130 employees must be hired each year to operate normally. Therefore, AI Service Manager (ASM), which combines ChatCall and Cube Chain, has great advantages for both corporations and customers when considering the consistent operation, expenses for recruitment, and mental stress of call centre employees. The Q&A automation and real-time response services also enable efficient work. As the answer progresses through customised big data and machine learning, the cost will decrease and the efficiency for dealing with the task will increase. It can also provide incentives for customers to use chat centres. You can get Cube Chain (QUB) as an incentive rather than just using a service. As the value is determined by market price, the more you participate in the Cube Chain platform the more value you gain. 44

45 5. Conclusion The five main services of Cube Chain have a new technology paradigm that can generate innovation and productivity for various industries, starting with the e-commerce industry. Of course, the Cube Chain technology itself can t implement all these services. It will be combined with a variety of protocols, such as Big Data, AI-Chatbot, and machine learning, carrying out innovation in the process. Cube Chain will create an environment where you can support, analyse, and learn in a transparent and secure data sharing environment, which will result in a dramatic improvement in customised services. The vision of Cube Chain is to provide a cryptocurrency ecosystem through blockchain technology for more people to use. We will strive for an effective, systematic, and cooperative model by establishing partnerships with other industries, institutions, and related e-commerce companies, as it has great scalability in various industries. 45

46 6. References Esther Pacitti, Reza Akbarinia, Manal El-Dick. (2012). P2P Techniques for Decentralized Applications Chip Heath, Dan Heath. (2012). Decisive New Digital Universe Study Reveals Big Data Gap: Less Than 1% of World s Data is Analyzed; Less Than 20% is Protected. Retrieved from Edward Hallett Carr. (2008) What is History? McLeod, S. A. (2018). Skinner - operant conditioning. Retrieved from TMichael Tasner. (2010). The Limiting Factors of Web 2.0 and How Web 3.0 Is Different Eric Schmidt, Jonathan Rosenberg. (2014) How Google Works Patricia Wilson Amazon Prime. (2018) The World's Leading Subscription Business Alan Kazdin. (2012) The Token Economy: A Review and Evaluation Tsan-Ming Choi, Jianjun Gao, James H. Lambert, Chi-Kong Ng, Jun Wang. (2017). Optimization and Control for Systems in the Big-Data Era Lourdes Casanova, Peter Klaus Cornelius, Soumitra Dutta. (2017). Financing Entrepreneurship and Innovation in Emerging Markets Andrei Brasoveanu, 10 Marketplace KPIs That Matter. Retrieved from Analysis of C2C Internet Fraud and Its Counter Measures Daniel R. A. Schallmo, Christopher A. Williams. (2018). Digital Transformation Now!: Guiding the Successful Digitalization of Your Business Model 46

47 7. Roadmap Cube Chain One ID December Open Beta Service The First Half of Open Commercial Services Interworking 4 services of Cube Chain and other operational services Cube Chain Product December Open Beta Service The First Half of Open Commercial Services Interworking 4 services of Cube Chain and Africa TV, Livemate, mobile gift voucher agencies CubeON December Open Beta Service The First Half of Open Commercial Services Interworking Local Government Services and public services for the local economy CubeChat June Open Beta Service The Second Half of Open Commercial Services Release several versions including Iranian and Korean ASM June Open Beta Service The Second Half of Open Commercial Services Appendix 1 Crowdfunding [Token information and Crowdfunding] Name: Cube Chain Symbol: QUB Total quantity: issue 12,000,000,000 QUB during a period of 50 years Price: 1st: 1 ETH=8,000 QUB 2nd: 1 ETH = 7,200 QUB Crowdfunding quantity: 300,000,000 QUB (2.5% of the total) 47

48 [Plan for funding] Out of the total 12 billion Cube Chain, 2.5% of the initial 10 % development were for the ICO and 7.5 % were for pre-sale. 2%, will be used for marketing, 3%, for developing Cube Chain, and 5% for developing business model and service. [Info of Cube Chain (QUB) ERC20 token] Symbol: QUB Decimal Places: 8 Contract address: 0x977EF527E44a826D7A3821b03BfD453b554C3bf1 Cube Chain, firstly, plans to issue and distribute ERC 20 tokens based on Ethereum. After the Genesis Block is created, a one-to-one exchange will be made for Cube Chain coin (QUB) based on the Cube Chain. The listing will be done in October and is currently under discussion with the domestic and international exchange. [QUB wallet] Plan to develop for PC, Web, Android, and OS Starting in September, release in order starting with PC Plan to open a website for QUB transaction history Conditions of participating in POS If having more than 5,000 Cube Chain (QUB), one can participate in a node after announcing participation intention in POS. [The distribution rate of the coin] The total number of Cube Chain to be issued is 12 billion and distribution method of coins is as follows. As shown in the graph above, 80% (9,600,000,000 QUB) of Cube Chain (QUB) is open mining. The remaining 20% will be generated with Genesis block. When the network is released, it will be assigned to an account that will be in charge of the coin distribution. This 20% is divided into 5 parts. 10% (1,200,000,000,000 QUB) of Cube Chain (QUB) shall be assigned to participants in Pre-sale and Crowdfunding. 5% (600,000,000 QUB) is allocated as the initial establishment of the business model. 3% (360,000,000 QUB) will be allocated as expenses for platform maintenance and Cube Chain team members. 2% (240,000,000 QUB) will be allocated for domestic and international marketing. 48

49 Allocation for budget The top priority for budget allocation of Cube Chain is to build a capable team and to set a future prospect for service projects. Therefore, 55 % of fund-raising will be used for development and research of the 5 services (OneID, Cube Chain Product, CubeON, CubeChat, ASM) based on Cube Chain. 49

50 Appendix 2 Disclaimer This Cube Chain whitepaper is provided for informational purposes only and shall not guarantee the accuracy of the conclusions reached. This is implied and does not guarantee anything. Therefore, decisions made based on this whitepaper are the responsibility of the parties directly concerned. The whitepaper is subject to change without notice, and Cube System, Cube Asia Pacific Sdn. Bhd, and its subsidiaries and the parties are not legally bound to anything therein. Cube System, Cube Asia Pacific Sdn. Bhd shall not be liable for any financial damage, such as harms and losses arising from the loss of property and the loss of profit or loss of tokens, by referring to this whitepaper. In addition, participating in the issuance of tokens does not guarantee future profits or losses. 50

Cube Chain Technical White Paper

Cube Chain Technical White Paper 1 2 Cube Chain Technical White Paper Cube Engine Version 2.0 1. Overview 1.1 Overview Blockchain is an encryption system that creates blocks of data at regular intervals and validates data through hash

More information

Technical White Paper. Cube Engine Version 1.0

Technical White Paper. Cube Engine Version 1.0 Technical White Paper Cube Engine Version 1.0 Last Updated: Feb 06. 2018 1 Contents 1. Summary 1) Introduction 2) Overview 2. Features of Cube Chain 1) Cubing 2) Indexing Block 3) Statistics Block 4) Escrow

More information

NON-TECHNICAL WHITEPAPER Version 1.0

NON-TECHNICAL WHITEPAPER Version 1.0 NON-TECHNICAL WHITEPAPER Version 1.0 Abstract Decentralization in Cryptocurrency Standard blockchain environments contain many centralization vulnerabilities, such as monolithic development, consensus

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

Visualization & Convenience

Visualization & Convenience 93% of consumers consider visual appearance to be the key deciding factor in a purchasing decision.(justuno, 2017) 73% of consumers are more likely to purchase a product or service if they can watch a

More information

GENESIS VISION NETWORK

GENESIS VISION NETWORK GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit

More information

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. Prelude The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. This document will explain methodically, the details of the

More information

Yada. A blockchain-based social graph

Yada. A blockchain-based social graph Yada A blockchain-based social graph January 2018 Abstract The goal of Yada is to achieve an acceptable level anonymity, privacy, and freedom of expression while making available to the public a structure

More information

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017 Technical White Paper of MOAC Mother of All Chains June 8 th, 2017 [Abstract] MOAC is to design a scalable and resilient Blockchain that supports transactions, data access, control flow in a layered structure.

More information

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins. Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression

More information

Technical Specifications for Platform Development

Technical Specifications for Platform Development Technical Specifications for Platform Development Contents 1. General Information about the Product... 2 2. Software Requirements... 3 2.1. Functional Requirements... 3 2.2. Server Requirements... 4 3.

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

Proof-of-Stake Protocol v3.0

Proof-of-Stake Protocol v3.0 Proof-of-Stake Protocol v3.0 Abstract Proof of Stake's security has proven itself reliable & effective over years of testing while at the same time solving Bitcoin s issues caused by the Proof of Work

More information

Decentralized prediction game platform, powered by public

Decentralized prediction game platform, powered by public Decentralized prediction game platform, powered by public Table of Contents Overview 3 1.Secured Scalability 3 1.1.Blockchain network delay and Blockbuster attack 3 1.2.Blockchain Transaction Monitoring

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

TeleX AI. Cryptocurrency Wallet and Exchange Services on Telegram. Telex AI Company Ltd telexai.com November 2017

TeleX AI. Cryptocurrency Wallet and Exchange Services on Telegram. Telex AI Company Ltd telexai.com November 2017 TeleX AI Cryptocurrency Wallet and Exchange Services on Telegram Telex AI Company Ltd telexai.com November 2017 TeleX AI is a chatbot powered by artificial intelligence, designed to provide cryptocurrency-related

More information

OpenbankIT: a banking platform for e- money management based on blockchain technology

OpenbankIT: a banking platform for e- money management based on blockchain technology OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com

More information

Compiling Data on International Mobile Money Transfer Services

Compiling Data on International Mobile Money Transfer Services Thirtieth Meeting of the IMF Committee on Balance of Payments Statistics Paris, France October 24 26, 2017 BOPCOM 17/11 Compiling Data on International Mobile Money Transfer Services Prepared by the Bank

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager

Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager Overview The next phase of our support of blockchain on Microsoft Azure is the release of the Ethereum Consortium

More information

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN ABSTRACT A PEER-TO-PEER CRYPTO-CURRENCY DESIGN DERIVED FROM SATOSHI NAKAMOTO S BITCOIN. PROOF- OF-STAKE REPLACES PROOF-OF- WORK TO PROVIDE

More information

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable

More information

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e Token White Paper Global marketplace based on Block chain for small-scale business 1 P a g e 2018 I ver. 1.0 Contents Qatar Coin Token 3 Contents 4 1. What is QatarCoin 5 2. What is a digital currency

More information

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Yashar Dehkan Asl Chapter I Introduction Decentralized Cryptocurrencies: Such as Bitcoin and altcoins are getting more

More information

Mobilink-Network Partial List of Partners

Mobilink-Network Partial List of Partners Introduction MOBILINK-Network will provide its users with unlimited voice and data services while eliminating all monthly fees. Revenues generated from digital mobile Ads shown on the users phone will

More information

MCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC?

MCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC? MCB Lite FAQs What is MCB Lite? MCB Lite is a socially connected payments solution that saves you time and money by enabling you to make unlimited free payments through a Visa Card and a Mobile Wallet.

More information

QNB Bank-ONLINE AGREEMENT

QNB Bank-ONLINE AGREEMENT This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Mobilink-Network Partial List of Partners

Mobilink-Network Partial List of Partners Introduction MOBILINK-Network will provide its users with unlimited voice and data services while eliminating all monthly fees. Revenues generated from digital mobile Ads shown on the user s phone will

More information

/ 1. Online Banking User Guide SouthStateBank.com / (800)

/ 1. Online Banking User Guide SouthStateBank.com / (800) / 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 01242018 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will

More information

A Step By Step Guide To Use PayPal

A Step By Step Guide To Use PayPal A Step By Step Guide To Use PayPal Table of Contents Introduction... 3 Creating an Account... 4 PayPal Verification... 5 Verification Process... 5 Utility of Each Account... 7 Transfer of Funds... 8 Checking

More information

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake. DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits

More information

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4 Color Spectrum: Next Paradigm for Decentralized Apps Table of Contents Table of Contents 1 Introduction 1 Color Spectrum Overview 3 Two-tier Architecture of Color Spectrum 4 Clouds in Color Spectrum 4

More information

Proof-of-Work & Bitcoin

Proof-of-Work & Bitcoin CS 220: Introduction to Parallel Computing Proof-of-Work & Bitcoin Lecture 19 Bitcoin: Mining for Heat https://qz.com/1117836/bitcoin-mining-heatshomes-for-free-in-siberia/ 4/25/18 CS 220: Parallel Computing

More information

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according

More information

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner.

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner. Table of contents Technical Features Our approach Technical Overview Stage 1 (Using Ethereum blockchain) Participants Data Owner Data Verifier Marketplace Data Buyer Creditor Data Platform Architecture

More information

Introduction to Bitcoin I

Introduction to Bitcoin I Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2

More information

Banking System Upgrade - Frequently Asked Questions (FAQs)

Banking System Upgrade - Frequently Asked Questions (FAQs) Banking System Upgrade - Frequently Asked Questions (FAQs) What does banking system upgrade mean and why do we need to upgrade our banking system? A banking system upgrade means we are changing the technology

More information

IoT security based on the DPK platform

IoT security based on the DPK platform Zz S E C U M O B I. WHITE PAPER IoT security based on the DPK platform Powered by Ethereum David Khoury Elie Kfoury ABSTRACT Public key distribution remains one of the main security weaknesses in many

More information

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA 1 SECURING DIGITAL IDENTITY THE KEY TO ASIA S VAST POTENTIAL IN E-COMMERCE We are living through an exciting time for digital commerce in Asia.

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

MyCreditChain FAQ. Anyone can download and use the MCC App from the App Store. The procedure is

MyCreditChain FAQ. Anyone can download and use the MCC App from the App Store. The procedure is MyCreditChain FA How can I join the network? Individual Anyone can download and use the MCC App from the App Store. The procedure is following. First, download the Wallet App, and follow KYC according

More information

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain

More information

A SYSTEM FOR ENABLING SHORT-TERM FINANCING

A SYSTEM FOR ENABLING SHORT-TERM FINANCING A SYSTEM FOR ENABLING SHORT-TERM FINANCING 5 The present invention relates generally to a system and method for enabling short-term financing, and finds particular, although not exclusive, utility in invoice

More information

/ 1. Online Banking User Guide SouthStateBank.com / (800)

/ 1. Online Banking User Guide SouthStateBank.com / (800) / 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 06132017 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will

More information

Biomedical Security. Cipher Block Chaining and Applications

Biomedical Security. Cipher Block Chaining and Applications 1 Biomedical Security Erwin M. Bakker 2 Cipher Block Chaining and Applications Slides and figures are adapted from: W. Stallings, Cryptography and Network Security 4 th Edition and 7 th Edition 1 3 Block

More information

Overview of PBI-blockchain cooperation technology

Overview of PBI-blockchain cooperation technology FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview

More information

Oracle Banking Digital Experience

Oracle Banking Digital Experience Oracle Banking Digital Experience Wallets User Manual Release 18.1.0.0.0 Part No. E92727-01 January 2018 Wallets User Manual January 2018 Oracle Financial Services Software Limited Oracle Park Off Western

More information

IntForex demonstration bank account list IntForex demonstration rates IntForex demonstration rates... 22

IntForex demonstration bank account list IntForex demonstration rates IntForex demonstration rates... 22 Table of Contents int-forex.com Home screen... 3 IntForex registration... 4 IntForex activation... 6 IntForex login... 8 IntForex home... 8 IntForex exchange rates... 9 IntForex client functions... 10

More information

Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote

Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote This is the First Version of the Elphyrecoin s White Paper Please Check the Website for Future Updates White

More information

ONE2ONE MONEY: FREQUENTLY ASKED QUESTIONS

ONE2ONE MONEY: FREQUENTLY ASKED QUESTIONS ONE2ONE MONEY: FREQUENTLY ASKED QUESTIONS Moore ONE2ONE MONEY Contents FAQ... 2 Senders... 2 What do I need to send money via One2One Money?... 2 How much money can I send?... 2 To whom can I send money

More information

FAQ S About Unicâmbio Prepaid Card

FAQ S About Unicâmbio Prepaid Card FAQ S About Unicâmbio Prepaid Card What are the advantages of the Unicâmbio Prepaid Card when compared with a credit or debit card? Security. It is common knowledge that the risks of credit and debit cards

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

XSN coin. TPoS Setup Guide. https://discord.gg/cyf5yca. https://xsncoin.io

XSN coin. TPoS Setup Guide. https://discord.gg/cyf5yca. https://xsncoin.io XSN coin TPoS Setup Guide https://discord.gg/cyf5yca https://xsncoin.io Contents Introduction... 3 What is TPoS?... 3 DISCLAIMER:... 4 How to be an Owner... 4 How to be a merchant... 5 Step 1. Controller

More information

INX Tokenomics I

INX Tokenomics I Content: 1. INX Tokenomics 2. Why is our blockchain needed? 3. Why are our INX needed? 4. Our technology 5. Blockchain specifications 6. INX details 7. INX distribution 8. INX sales 9. Use of funds 10.

More information

Overview & White Paper.

Overview & White Paper. Overview & White Paper www.phantomx.co CONTENT 2. Introduction 7. Scalability and Network 3. Summary 3. About PhantomX 3. Our mission 4. The team behind PhantomX 5. Specification 8. Proof-of-Work 9. Proof-of-Stake

More information

Tenant Portal Guide PURPOSE. Page 1. The purpose of this document is to review the features associated with the Tenant Portal.

Tenant Portal Guide PURPOSE. Page 1. The purpose of this document is to review the features associated with the Tenant Portal. Tenant Portal Guide Page 1 PURPOSE The purpose of this document is to review the features associated with the Tenant Portal. Page 2 Table of Contents Tenant Portal... 3 Logging into the Tenant Portal...

More information

To receive money, just share your enrolled address or U.S. mobile phone number with a friend and ask them to send you money with Zelle.

To receive money, just share your enrolled  address or U.S. mobile phone number with a friend and ask them to send you money with Zelle. Consumer FAQs 1. What is Zelle? Zelle is a fast, safe and easy way to send money directly between almost any bank accounts in the U.S., typically within minutes 1. With just an email address or U.S. mobile

More information

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

EECS 498 Introduction to Distributed Systems

EECS 498 Introduction to Distributed Systems EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December

More information

Bitcoin and Blockchain

Bitcoin and Blockchain Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All

More information

Frequently Asked Questions (FAQs) - Customers

Frequently Asked Questions (FAQs) - Customers Frequently Asked Questions (FAQs) - Customers What is Upay? Upay is Bangladesh s 1 st cryptographically secured QR (Quick Response) Code based digital payment system of UCB which can be used in payments

More information

Ergo platform: from prototypes to a survivable cryptocurrency

Ergo platform: from prototypes to a survivable cryptocurrency January 2019 Dmitry Meshkov Ergo platform: from prototypes to a survivable cryptocurrency Outline Ergo Consensus Light Storage vision protocol clients fee Voting Smart Monetary Roadmap system contracts

More information

TOKENSALE PARTICIPATION GUIDE

TOKENSALE PARTICIPATION GUIDE NEXT GENERATION INTERNET An open source platform for creation of 3D and VR compatible web-spaces (websites) and objects, powered by Blockchain. TOKENSALE PARTICIPATION GUIDE TABLE OF CONTENTS Contribute

More information

ETSY.COM - PRIVACY POLICY

ETSY.COM - PRIVACY POLICY At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,

More information

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1 Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Token Sale. Participation guide

Token Sale. Participation guide Token Sale Participation guide 2 As the DataBroker DAO token sale is closing in, we want to inform our future participants on how to properly take part in our presale on 19th of March. At first glance,

More information

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011 University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer

More information

This short tutorial will explain how to use the GCC web wallet and how you can authenticate your wallet address using Sign Message option to connect

This short tutorial will explain how to use the GCC web wallet and how you can authenticate your wallet address using Sign Message option to connect W E B WA L L E T G U I D E This short tutorial will explain how to use the GCC web wallet and how you can authenticate your wallet address using Sign Message option to connect it to your GCC account. We

More information

Distributed Ledger With Secure Data Deletion

Distributed Ledger With Secure Data Deletion Distributed Ledger With Secure Data Deletion Vitalii Demianets (norbloc AB), Astyanax Kanakakis (norbloc AB) Revision 1.4, November 2016 Abstract One of the core attributes of distributed ledgers, the

More information

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation 2017 Executive Summary (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation www.blockchainofthings.com Abstract The Internet of Things (IoT) is not secure and we

More information

WOLFCOIN MASTERNODE MANUAL

WOLFCOIN MASTERNODE MANUAL WOLFCOIN MASTERNODE MANUAL Contents Introduction... 3 About Wolfcoin Blockchain... 3 Download the Wolfcoin Wallet... 4 Installation of your Wallet... 5 Make a receiving address... 12 Closing the Wolfcoin

More information

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic

More information

A Lightweight Blockchain Consensus Protocol

A Lightweight Blockchain Consensus Protocol A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained

More information

Ergo platform. Dmitry Meshkov

Ergo platform. Dmitry Meshkov Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features

More information

Privacy Enhancing Technologies CSE 701 Fall 2017

Privacy Enhancing Technologies CSE 701 Fall 2017 Privacy Enhancing Technologies Lecture 2: Anonymity Applications Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Anonymous communication mixes, anonymizing proxies,

More information

STX & ios Devices. Setting up and using STX iphone, ipad, ipod touch

STX & ios Devices. Setting up and using STX iphone, ipad, ipod touch STX & ios Devices Setting up and using STX iphone, ipad, ipod touch STX for ios provides more flexibility and efficiency for you and your staff. With all the most often used features of STX desktop built-in,

More information

TWIST: Revolutionising Blockchain Accessibility

TWIST: Revolutionising Blockchain Accessibility TWIST: Revolutionising Blockchain Accessibility TWIST Developers April 18, 2018 Note: TWIST is a work in progress and this project is development driven in nature. This paper will be continually updated

More information

(Some details might be added) CREDITS

(Some details might be added) CREDITS White Paper (Some details might be added) Decentralized financial system CREDITS Version 1.6/26 Nov 2017 Contents Abstract 3 Introduction 3 1. Network ledger 4 Definitions 4 Network Nodes 4 The Last Saved

More information

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T

More information

Isi Net User Manual for Bank customers

Isi Net User Manual for Bank customers 1 Table of Contents 1 Introduction and overview... 4 1.1 Isi Net User Types... 4 1.2 Accessing the Isi Net service... 5 1.2.1 User Login... 5 1.2.2 User Logout... 7 1.3 User Interface... 7 1.3.1 Menus...

More information

Team One Mobile Banking App DETAILED ENHANCEMENTS

Team One Mobile Banking App DETAILED ENHANCEMENTS Team One Mobile Banking App DETAILED ENHANCEMENTS Team One Mobile Banking App DETAILED ENHANCEMENTS Table of Contents Page Touch ID 3 QuickBalance 4 MiSnap 6 Bill Pay Enhancement 6 AnyWhereMobile Set Up

More information

POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS

POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS WHAT IS POLARCOIN? (POL) Polarcoin is an open source peer to peer decentralized cryptocurrency. There is no server for this network cause computer

More information

Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager

Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager Update History October 19, 2016: The document was revised to reflect the most recent update to the template.

More information

Supplier Quick Reference and How To Guide

Supplier Quick Reference and How To Guide and How To Guide For Help or Support support@primerevenue.com Toll Free USA & Canada: 1 800 557 8047 Toll Free Europe: 00800 7746 3000 Toll Free Asia: 001 800 7746 3000 Toll Free Australia: 1 800 217 718

More information

Bitcoin, Security for Cloud & Big Data

Bitcoin, Security for Cloud & Big Data Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).

More information

Realization and Addressing Analysis In Blockchain Bitcoin

Realization and Addressing Analysis In Blockchain Bitcoin IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Realization and Addressing Analysis In Blockchain Bitcoin To cite this article: Raja Sakti Arief Daulay et al 2017 IOP Conf. Ser.:

More information

The new Service Account For citizens and authorities

The new Service Account For citizens and authorities The new Service Account For citizens and authorities - 1 - Legal Notices Copyright 2016 of the Ministry of Internal Affairs of the State of Baden-Württemberg and SEITENBAU GmbH, Konstanz All rights reserved,

More information

Daalou dating and love united USER MANUAL

Daalou dating and love united USER MANUAL Daalou dating and love united USER MANUAL 1 Contents 1. Home page... 4 2. User Registration... 4 3. Login/Sign In... 5 4. Forgot Password... 5 5. Profile Page... 6 5.1 User s Short Profile Information...

More information

The technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain.

The technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain. 1 The technical notes represented on the following pages are intended to describe and officially document the concepts behind NulleX Blockchain. This document provides and explains in detail the technical

More information

PascalCoin - A Comprehensive Guide for Noobs

PascalCoin - A Comprehensive Guide for Noobs PascalCoin - A Comprehensive Guide for Noobs What/who/when/why by: Jason Knapp (donations welcome - 291000-95), date: Aug 16, 2017 PascalCoin (PASC) was created by Albert Molina in 2016. It is written

More information

Three-Dimensional Scalable Blockchain. Tokenomics draft v. 0.3 (En)

Three-Dimensional Scalable Blockchain. Tokenomics draft v. 0.3 (En) Three-Dimensional Scalable Blockchain Tokenomics draft v. 0.3 (En) info@thepower.io Introduction to tokenomiсs 1 Token "Smart Key" 1 Token purpose and functions 1 Token key features 1 Token distribution

More information

Technical White Paper. (Some details might be added) Decentralized financial system CREDITS. Version 1.6/26 nov 2017

Technical White Paper. (Some details might be added) Decentralized financial system CREDITS. Version 1.6/26 nov 2017 Technical White Paper (Some details might be added) Decentralized financial system CREDITS Version 1.6/26 nov 2017 Contents Abstract 3 Introduction 3 1. Network ledger 4 Definitions 4 Network Nodes 4 The

More information

I. Introduction. II. Security, Coinage and Attacks

I. Introduction. II. Security, Coinage and Attacks Abstract Proof of Stake's security has proven itself over years of testing. Advances in this technology in Blackcoin's Proof-of-Stake 3.0 have solved the issues faced with Coin-Age, Block Reward and Blockchain

More information

Your step-by-step instructions to getting started on ipage. Includes:

Your step-by-step instructions to getting started on ipage. Includes: Your step-by-step instructions to getting started on ipage. Includes: Ordering Setting up Selection Lists What's on ipage Managing Your Relationship with Spring Arbor Through ipage Welcome to ipage, Spring

More information

Terms and Conditions for Remote Data Transmission

Terms and Conditions for Remote Data Transmission Terms and Conditions for Remote Data Transmission (As amended on 15 November 2013) 1. Scope of services (1) The Bank is available to its Customer (account holder) for remote transmission of data by electronic

More information

SECURE CLOUD BACKUP AND RECOVERY

SECURE CLOUD BACKUP AND RECOVERY SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and

More information

Hi this is Anna Jarrett, I am here to present today s Digital Cookie online training.

Hi this is Anna Jarrett, I am here to present today s Digital Cookie online training. Hi this is Anna Jarrett, I am here to present today s Digital Cookie online training. You will notice on the top right on most slides I have a page number referencing the Cookie Manual that you will receive

More information