BROP Whitepaper: Insight into Chinese Government stance on cryptoassets and regulatory direction

BROP Whitepaper: Insight into Chinese Government stance on cryptoassets and regulatory direction


https://www.brop.cn/images/whitepaper1.pdf


"Spectrum" blockchain registration open platform Blockchain-Registry-Open-Platform white paper V1.1


White Paper Banknote Blockchain Technology Institute


1. Outline 


Banknote Credit Card Industry Development Co., Ltd. Hangzhou Blockchain Technology Research Institute (hereinafter referred to as “the Bank of China Blockchain Technology Research Institute") Blockchain Block Registry Registration Platform Blockchain-Registry-Open- Platform (hereinafter referred to as “profile”) is an open and trusted registration platform based on independent intellectual property rights. Luopu Through the underlying blockchain, all partners are trusted to record user identities, digital vouchers and stored data. Provide enterprise users with inquiry, verifiable, and supervisable ownership registration and information publicity services. Through the network The "Spectrum" of services, each participant can cross-institutional certification and circulation of stored information and digital vouchers, to achieve Decentralized, mutual trust and cooperation among the various independent participants. 


The network provides business-independent interfaces for the credible registration, publication, and query verification of information. Spectrum offer The services include not only the registration of information data, the storage of certificates and other services, but also the various elements on the blockchain. Implement interactive services. For example, changes to digital voucher ownership for the relationship between identity and assets Authentication and authorization of the relationship between identity and data. 


Through the basic services provided by the network, partners can realize mutual trust and mutual benefit. Extensive and deeper collaboration. End-users must also obtain more efficient, safe, and reliable services. 


2. Blockchain and information registration 


2.1. Problems with traditional information registration platforms 


● Cannot self-certify innocence 


Since all the data is stored on the platform itself, the third party cannot verify whether the data provided by the platform is Has been tampered or is complete, so the traditional registration platform cannot prove the reliability of its data externally; 


● difficult to monitor 


Because of the inability to obtain a trusted source of data, regulators cannot effectively supervise the data they register. Caused regulatory black holes; 


● Data silos and business faults 


It is because the registration platform cannot prove its innocence, between registration platforms or registration platforms and third parties It is almost impossible for the authors to connect directly to the business and cause business faults.



2.2. Blockchain Solutions 


First of all, the block chain synthesis adopts data digest and information signature algorithm so that the data it carries cannot be forged. It cannot be tampered with; at the same time, blockchain data is no longer stored in the same way as the traditional database by the authority, but in each Each participant saves one copy of data in the hands, so that the platform side completely eliminates the need for self-certification because the blockchain Technology ensures that data registered on the blockchain cannot be tampered with by a small number of participants.


Secondly, the core data of the registration platform is stored on the blockchain, and the user's privacy is appropriately desensitized. For regulators, it can retrieve and verify business data at any time without worrying about the platform hiding or Forged business data. 


Finally, the blockchain platform side is merely a rulemaker, and the platform itself is operated and maintained by all parties involved. Platform data is also pushed instantly to each participating node. So each participant can work under a unified rule Mutual trust cooperates with each other, thus breaking the island of information and establishing a new type of closer cooperation relationship. 



3. Introduction to music "Spectrum" 


The design concept of the platform is to provide data for the partners without interfering with the partner system. Trustworthy proof, and on this basis, promote cooperation among various partners. The design goals of the platform include The following aspects. 


● Data publicity 


We provide blockchain data registration, certificate storage services and necessary basic components, and are responsible for maintaining data Integrity, reliability, and verifiability. The network platform and the partner system are relatively independent and serve as partners. The credible publicity platform for data. The partner decides how to save the full amount of core data and can save it on its own. It can also be hosted on the off-block block storage space provided by the operator of the "Spectrum" platform. 


● Business neutrality 


The correctness of the data is the responsibility of the data registration party. The platform is not correct for data and business Legal endorsement, so users of data need to use the premise of trusting the data registration party's business data. 


● Relationship self-organization


We provide a number of basic identities for the participants of the platform so that they can complete different classes separately. Type of data registration certificate function. Combining the programmable features of blockchain smart contracts, these data and roles Mutual trust and cooperation can be realized on the platform. 


● Judicial traceability 


Each participant will sign with the platform and publish it through the platform before entering the network platform. Legal documents on the legality and validity of its registration data. The document will enter the participant’s registration data Take legal responsibility. Once a participant refuses to redeem their registered digital vouchers or provide an inability to The counterfeit data matching information is publicized, and stakeholders are entitled to obtain the legal document and submit it to the judicial agency for Arbitration. 


● Developer friendly 


The "Spectrum" platform will provide a simple but complete data access platform for the participants, and participants can be in real time Get a full block of data while making simple interface calls through middleware to implement local services. 



3.1. Platform Overview 


Each participant in the platform includes business accessors, billers, partners and users. Among them Banknotes, as platform operators, are also business accessors and bookkeepers, and business accessors are responsible for the bookkeepers, The partner signs the contract and authorizes the other party to conduct business on the network platform. The accounting party is jointly held by a number of companies. Responsible for packaging the data of the underlying open alliance chain. On the one hand, the partners access the network and open alliances. Conduct identity management, ownership registration and information storage, and on the other hand provide ordinary users with their own specific business Valuable service. All participants have the right to deploy independent blockchain nodes and synchronize blockchains All information on. Taking into account the simplicity of business, ordinary users generally access collaterals indirectly through partners. station. 


The business access party is the partner's right to register and assign identity management, information, and digital certificates. Limit, the partner registers and authenticates its user identity information, off-chain data, off-chain assets or services and Its authenticity bears legal responsibility. The partner can choose to recognize the identity of the user authenticated by the other party. You can then hold the other party’s digital voucher and trade it.


Picture: Network open alliance chain Certificate service Identity service Voucher service Digital certificate management Identity management Information storage Billing Party Billing Party Billing Party Billing Party Business access square Business access square Partners end user Billing Party Collaboration Diagram of Related Parties Collaboration Structure 


Through this design, each participant on the platform can not only share the underlying database, but also Share user identity information, digital voucher information, and certificate information. Collaboration between partners Provides the possibility of reality. 



3.2. Open Alliance Chain 


Picture: Access node Access node Access node Access node Access node Access node Access node Access node Luopu Open Alliance Chain consensus node consensus node consensus node consensus node consensus node consensus node Access node Access node business system Middleware group Pieces Partners Remotely node business system Middleware group Pieces Partners 


Open alliance chain architecture 


The bottom layer of the network is an open alliance chain. Intra-chain nodes are divided into consensus nodes, remote nodes, and access nodes. Three types. Among them, the consensus node is responsible for packaging the data of the underlying open alliance chain, and the banknote blockchain technology Research institutes and strategic partners own, and follow-up will gradually introduce more trusted strategic partners. For the consensus node. Ordinary partners are established by installing remote nodes locally or using access nodes in the cloud.


Exhibition business. Both the remote node and the access node can chain the data of the partner. The difference is only the location of the node. Different settings and access methods. For data-sensitive partners, remote nodes can be set up locally; A data-insensitive partner can use an access node built by the operator in the cloud and open it. Interface access, lower cost. This alliance chain structure guarantees a consensus algorithm by controlling the number of consensus nodes. The speed at the same time can support a wide range of cooperation. The technical features and advantages of the open alliance chain of the network: 


● Encryptor security 


The network consensus node adopts a customizable optional hardware encryptor or virtual encryptor to complete the accounting service. Impaired identity security. 


● stable performance 


The open time of the alliance's open alliance chain is about 3 seconds, and the blockchain capacity and smart contracts Optimized, performance can meet the requirements of most practical application scenarios. 


● Concurrency and overtime confirmation


Traditional blockchain transactions use incremental serial numbers as transaction identifiers and cannot achieve business concurrency. Network Spectrum open alliance chain uses patented technology, uses random numbers as serial numbers and specifies timeouts when sending transactions Blocks are high, realizing business-level transaction concurrency and time-out confirmation functions, in line with actual business needs. 


● Single block confirmation 


Another advantage of the open alliance chain is the monolithic verification technology, which is different from the traditional longest chain block chain. The selection strategy and the use of a new consensus scheme ensure that the blockchain uncertainty does not exceed one block height. This Makes real-world business ground feasible, otherwise, once the blockchain is forked, based on a certain time point in the past All businesses will be reset, which is not tolerable in real business systems. 


● Complete development tools 


We provide blockchain node deployment packages, middleware toolkits, and sample code to make blockchains The difficulty of access and development is greatly reduced. Developers only need to focus on the middleware business interface, no need Understand the complex technology behind it. At the same time, we provide optional solutions for node cloud deployment so that developers can Access and test the spectrum service faster.


● Reliable consensus 


Due to the single-block acknowledgment feature, participants do not need to worry about the business security of remote nodes. Compared with The non-deterministic nature of the special currency is different. As long as the partner receives the package receipt, it can prove that the business has been The entire network confirms and will not be overturned by a malicious or software error in the consensus node. Therefore, the partner does not need to Master consensus nodes to improve your business security. The consensus node needs to provide a large amount of computing resources and networks The network bandwidth is provided by the "Spectrum" operator and strategic partners to provide the corresponding funding. 



3.3. Middleware 


In order to facilitate the partners to access blockchain data, we provide middleware components. Business system passed The use of middleware in the way of interface calls greatly simplifies the way the partners access the blockchain platform. Less learning costs and development costs. The main problems it solves include the following aspects: 


● Data retrieval 


Blockchains store data in the form of key-values ​​and can only perform in-block retrieval based on block ids. Unable to query based on business field. In order to implement a structured query of the data in the blockchain, middleware Maintaining the corresponding index between the service field and the blockchain data structure for the uplink data, enabling the business system No need to deal with the underlying data retrieval logic of the blockchain, database-level query can be achieved. 


● Notification of events 


There is usually no event notification mechanism in the blockchain, and the business system cannot obtain changes in the blockchain network. Feed. Middleware defines a series of event types and tracks them, such as blockchain growth events, transactions Chaining events, contract data change events, etc. Business systems simply select the events they care about and receive Push of related business data messages. 


● Data uplink 


Submitting data to the blockchain requires multiple steps. Middleware encapsulates all the underlying chain related The operation of the business system only needs to care about the data to be linked and the data signature.


3.4. Structured components 


The role of the scalar structured component is to structure and classify the data stored in smart contracts. Programmable operation interfaces make these data related to each other in the face of a specific business context. Interaction. 


3.4.1. Identity component 


The account identities in the profile refer specifically to the authenticated user account smart contract, which does not refer to specific Business identities that are bound to users' access rights, business roles, etc. User account authentication by The partners are responsible for their own, and the network will only provide data for the certification results. Taking into account the ease of business, the Department of Pedigree Assign a system account ID to each user account address, optionally with an authenticated name The name or custom name is set as the account name. 


The identity component provides an authentication interface to the partner on the one hand, and provides a user account with a block on the one hand. Chain trading operation interface. Its main features include the following: 


● Identification 


Each user account smart contract has corresponding identity information that is approved by the partner. The information exists on the blockchain in the form of identification, indicating that the corresponding user has been approved by the partner. 


The proof of identity certification has two meanings: The first is to avoid repeated identity verification by a third party; The second is that when a user violates the rules, he or she can obtain his or her true information through judicial cooperation. 


Taking into account the user's identity privacy, the corresponding identity text information exists only in summary form in the block On the chain, the partner records the complete information. When the third party needs to identify the user's identity information, the third Can calculate the summary based on the user's self-submitted identity information, and pass the information stored on the blockchain. Compare to confirm user identity. 


● Trading license 


The identity authentication of the partner to the user may have digital certificates (with legal effect), common real names, Anonymous, mobile phone number verification, registration only and other levels, different authentication levels correspond to different blockchain transactions Permissions.


Unlike public chains, the open alliance chain does not allow anonymous accounts to have digital certificates. Can initiate The address of the digital voucher transaction must be authenticated by real name, and all addresses that accept digital voucher must also be After real name authentication. 


In the case that the partner is willing to be responsible for the uploading of the anonymous account, the anonymous account can be online The blockchain initiates information transaction. Accounts without any authentication can only be queried. 


Each partner in the blockchain blockchain can authenticate the trading account, and the transaction account records its certification. The partner's index and the accredited certification level of the partner. The specific upper service can be rejected as those Accounts certified by the partner that he does not recognize and accounts certified by the partner but whose certification level is not closed. Business. 


● Key management 


A user contract is generated when the partner authenticates the user. The contract is a follow-up block. The transaction carrier of the chain business, the key held by the user is the operation key of the user contract. If the user holds The key is lost and can provide the necessary proof of identity to apply for a key reset to the partner. After the key is reset, The address of the user's contract and the digital vouchers held are unchanged. The only change is the operation key held by the user. 


In order to prevent the cooperation management personnel from abusing their power to falsify the user's intention to modify the contract key and cause disputes, The identity identity component requires that each time the user key is reset, the partner must involve this modification. The user's application materials and certification materials are stored on the network. If the partner cannot provide the user's application If there is any discrepancy between the certification information or the information on the certification and the information on the network, the partner has legal responsibility. Ren. 


● Identity supervision 


At the request of the authoritative regulatory authority, the partner can provide it with the plaintext of all its authenticated user identities. Information, authoritative regulators can match and identify with the blockchain certificate information. The operator is not mandatory Require cooperation to provide the user's identity information. 


3.4.2. Keeping Components 


The certificate storage component is used by the cooperation to provide third party information publicity and data certification services. Cooperation The Party is responsible for the authenticity of its deposit data, and is responsible for its integrity and reliability. Business third parties are themselves


Decide whether to trust the partner. The certificate component provides a series of standardized data certification methods to achieve Information disclosure. We will provide comprehensive technical tools to facilitate the application of data validation components and their own Use integration to provide data publicity websites and interfaces for users to query. 


● Proof of time


There are two types of timestamps on the "Spectrum", one is the timestamp of the block itself, which is packaged by the consensus node. Provide the local time and submit it to the consensus of other nodes; the second type is the timestamp provided by the trusted time service organization. signature. According to different business requirements and legal requirements, partners can attach both Proof of time in the form. 


● Proof of reliability


The reliability of the data proves that the problem is how to prevent data from being tampered with. The partner will save the object The data summary is stored on the network platform. The verifier can summarize the data in the original text and on the network platform. Registered summary information is compared to confirm the reliability of the data. 


● Proof of completeness 


There may be multiple associated data records for the same object. We provide multiple pieces of data. The integrity verification mechanism has its typical scenes such as food traceability and inventory circulation. The specific form of implementation is Data that is related to business through the context of the previous information contains a summary of the previous information. Union. Loss or tampering of any record cannot be verified through blockchain. 


● Multiple confirmation 


This function provides proof that certain data has been simultaneously confirmed by multiple parties, the main application The scenario is the signing of a multi-party electronic contract. If and only if multiple parties are confirmed, the contract document can take effect. Confirmed participants may withdraw confirmation at any time before confirmation by other participants. 


● Data hosting 


For partners may need to save the file associated with the blockchain data (such as pictures), we Provides data hosting services, saves files in cloud storage, and saves hosted places on the blockchain Address Summary. Partners can choose their own file storage method. Size is extra charge.




3.4.3. Credential components 


A digital voucher specifically refers to a record of ownership that corresponds to an out-of-chain physical object, a virtual commodity, or a service. Each number The voucher is registered and registered by the specific partner, and the partner is responsible for the payment of the corresponding product and service. 


The registrant of the digital voucher needs to meet the relevant requirements of the country for voucher registration and transactions. Documents that carry out public transactions, such as unlicensed bonds, shares, etc. You must register on the network platform. Otherwise, all the consequences resulting from this are the responsibility of the registered party. Luopu Responsible only for the atomicity of structured records and ownership changes of digital vouchers and not responsible for its legal compliance, Nor does it endorse the value of the product or service to which the digital voucher corresponds. 


● Certificate registration 


The partner provides information about the digital voucher, including the name of the digital voucher, the corresponding service (or product), The digital voucher type (whether it can be split and merged), the maximum number of digital voucher, etc., are created by the network operator. The digital credential smart contract should be managed by the partner.


● Document distribution 


The partner can pass the identity within the allowable range of the issuance quantity according to his business needs. Authenticated users make digital credential assignments. The user holding the digital certificate can transfer his ownership to him people. 


● Certificate confirmation 


The holder of the digital voucher has the right to transfer the digital voucher to the digital account approved by the issuing party of the digital voucher. Under the name, the ownership change is confirmed and publicized by the blockchain. So the transaction intermediary can be issued with digital certificates The parties collaborate through collusion blockchains to improve the mobility of digital vouchers. In this form, the digital voucher issuer and the transaction intermediary have realized data interoperability and Business collaboration provides users with reliable and convenient services. 


● Document supervision


The digital voucher issued by the partner corresponds to the promised product or service and must not exceed its commitment. force. Regulators can evaluate their asset capabilities and issue digital caps, issuance models, and Circulation is supervised. Specific regulatory measures include reporting statistics, circulation caps, liquidity Limits, etc. 


● Proof certificate 


When a user needs to trade digital vouchers, their digital vouchers need to be traded in a centralized service The hosting was conducted. At this time, there may be a case where the exchange maliciously transferred the user's digital certificate. Network The spectrum platform provides a certificate attestation interface that the exchange invokes to generate a Merkle Tree based algorithm. Certification information, providing 100% proof of quantity for its credential hosting. The business system can also call this interface pair Proof of assets for verification. 



3.5. Quota model 


Similar reasons for the introduction of the GAS mechanism to the Ethereum platform, the quota must be introduced into the "Spectrum" to avoid Zero-cost transaction attacks by malicious users. This quota model specifically refers to the price that users need to pay for using the "Spectrum". The measurement method, although it can be used as a reference, is not a specific commercial charging model. 


Since the "Spectrum" does not allow users to deploy smart contracts on their own, there is no need to introduce similar Ethereum OPCODE Calculated GAS system. The "Spectrum" only affects the workload of the platform and the amount of data. Performance indicators for quota management. Quota management refers to the allocation and consumption of quotas, and the allocation of quotas. The mechanism is only for the purpose of replenishing the consumed computing quotas. Therefore, a simple periodic recovery can be implemented and the follow-up can be achieved. More complicated allocation strategies. 


● Quota units 


The grid measures the transaction complexity in the form of quota points, which are only for the initiation of blockchain The measurement and use of the computing resources occupied by Ease does not have the functions of transfer, transaction, etc. The characteristics of digital currency such as constant or incremental determination. 


● Allocation of quotas 


Under normal circumstances, the platform transaction is completed by the partner, so each partner is the main elimination of quota points. Consumers; At the same time, end-users also have a situation initiating transaction services, so end-users will also be in some situations. There are requirements for quota points under the circumstances.


The network will periodically allocate a certain number of quota points to each partner. End users will also root According to the business upper limit, the number of quotas allocated by the system is periodically obtained. If a user maliciously initiates a large number of Yi’s quota points will soon be consumed. 


● Trading quota measurement 


When each transaction is initiated, the trader needs to pay the system a quota number of predetermined values. Required for trading The number of quota points is related to the complexity of the transaction and the amount of accompanying data. When the quota points are insufficient, the consensus node rejects The transaction is packaged. Note: The network provides out-of-chain data hosting services. The amount of data stored in the service and the number of quotas on the chain are not Off, not within the scope of this white paper. 


3.6. Judicial tracing 


Each participant will sign with the platform and publish it through the platform before entering the network platform. Legal documents on the legality and validity of its registration data. Through the design of this legal document, we can It requires the user to take corresponding legal responsibility for each operation on the open alliance chain. These laws The statement includes, but is not limited to, the authenticity of the public identity, the authenticity of the registration data, and the registration of digital certificates. The legality, the legitimacy of ownership transfer, etc. 


Through the legal constraints on the business conduct of the participants, and the joint and several liability of their business results Bundle, we can form a chain of legal responsibility on the network of open alliances. Once the participants are in the "Spectrum" There was a legal dispute in one of the operating steps of the platform, and the participants were entitled to obtain a complete legal liability document. Responsible parties are subject to judicial review. 



3.7. Supervision and intervention 


The network platform will encounter various scenarios that require manual intervention during its operation. We divide it into three. class: 


One is that authoritative regulators (such as the judiciary) issue regulatory orders with legal effects. For a participant, the order is executed by the banknote and the corresponding legal certificate is stored in the area. Block chain


The second is for the technical needs of the platform, such as system function upgrades or emergency patches, by the billing parties Make decisions after the meeting; 


The third is the order issued by an authoritative regulatory agency for ordinary users, and the corresponding partner of the user is responsible for negative Responsible for supervision and enforcement. 



4. Application scenario 


The application scenarios of the network platform mainly include two aspects: information disclosure and asset registration. The former will be static State information is publicly available on the platform to provide evidence of the existence, completeness, and falsification of the partner's information. The latter registers the ownership information on the platform and implements asset registration through trusted changes and enquiries of ownership. Multi-party collaboration between parties, transaction parties, and verifiers. 


4.1. Information disclosure 


4.1.1. Food traceability 


Scenario pain points: There are many links from production to sales, and various types of information generated at each stage are discretized. It is stored in the respective systems of each link, and the information flow lacks transparency. The problem this brings is: food Information may be falsified because production and distribution information is not transparent or smooth. The production date is ahead of the sales date, and it is difficult for the end consumer to confirm the quality of the food through the existing information. 


Solution based on the "Spectrum": Through the data digest and the information signature algorithm, the data it carries is not The forgery cannot be tampered with to effectively solve the traceability problem of food. The specific form of implementation is the food traceability enterprise The food authentication and circulation process is recorded on the local server, and the data summary is uploaded to the network. station. Among them, the business-related data is in mathematics through the inclusion of historical information summary. Before and after the association. Such food production records, transportation records, distribution records, retail records will be Associated and faithful records are on the blockchain. When third parties need to read the traceable data, food The traceability enterprise provides the corresponding detailed information, and the third party only needs to perform the summary information on the network platform. By contrast, you can judge the truth and completeness of the data.


4.1.2. Publicity of government and enterprises 


Scenario: The development of Internet technology has led more and more governments and companies to use the Internet Public announcements promote efficient, accurate, and convenient services, but at the same time increase convenience, the number of guarantees According to the security and the massive increase in the volume of data, it has become an urgent problem to be solved. 


Based on the "Spectrum" of the solution: government and corporate public service companies will be related to the core data labels and desensitization picks To be stored on the blockchain, when the third party needs to read the public data, the government-owned enterprise publicizing service company Provide corresponding detailed information. The third party only needs to compare it with the summary information on the network platform. Can determine the truth and completeness of the data. 


4.1.3. Authentication Certificate Registration 


Scenario pain points: traditional authentication certificate management relies on relevant government or inspection inspection units, while limited The data dimension, the unestablished historical data information chain often leads to the inability to obtain complete and effective information or The authenticity of the authentication certificate itself cannot be judged. 


Solution based on the "Spectrum": Make full use of the blockchain to establish a digital proof that cannot be tampered with. The certificate number of the item or qualification certified by the accreditation body and the summary information of the certificate picture are registered to the platform. on. Other users can check the registration information and the information on the blockchain through the platform of the certification authority. Compare the authenticity of the confirmation information. Further services include the hosting of registered products by partners. And registering the ownership information on the music platform, users can directly transfer their ownership rights in the trading market. Yi, which greatly promoted the mobility of identification items in the trading market. 


4.1.4. Charity Fund Registration 


Scenario Pain: The information is not transparent, and the public cannot trace back what the money and materials donated are used. The outbreak of public welfare charities in the past few years has greatly dampened public confidence in the charity industry. Rendu. Public information is opaque and unpublicized. It is the public's biggest challenge to public welfare organizations and the public interest industry. Public welfare transparency affects public credibility, and public credibility determines the speed of development of social welfare. 


Based on the "Spectrum" of solutions: public welfare institutions will be related information in the process of public welfare, such as donations, The summary of information such as fundraising details, fund flow, and recipient feedback is stored on the blockchain. And traceability Similar to registration, third parties can use the full amount of information provided by the public interest organization for data identification. In addition, through. The full amount of fund verification tool provided by the Teletrac platform, the public interest organization can prove its use in the alliance chain. The donations donated by users have been included in the public information, which greatly improves the transparency of public welfare. 


4.2. Identity Registration and Authorization 


4.2.1. Unified Identity Authentication 


Scenario Pain: There is not yet a public identity authentication platform. Each application cannot The identity information of tripartite endorsements is fully recognized; it is also difficult for regulators to apply to different users on the premise of cross-application. Credit information and asset information are evaluated. 


The solution based on the "Spectrum": an identity certification agency to individual users and corporate users out of chain KYC, carries out the summary of its identity information; the partner chooses to trust the identity certification authority when the partner When it is necessary to know the identity information of the individual user, the identity certification institution will use it with the consent of the user. The identity information of the household is sent to the partner (similar to the WeChat login third-party authorization service), and the partner passes the This information is compared with the fortification summary on the blockchain to determine the authenticity of user information. At the same time, with The user may choose to send all digital vouchers and transaction information on the blockchain chain to the supervisor or Partners to provide their credit information. 


4.2.2. Medical Big Data Platform 


Scenario Pain: Medical information for individual users is scattered across hospitals. Hospitals cannot be allowed without permission The distribution of the user's private data is mentioned; however, the user's medical data needs to be aggregated in order to serve the user. The comprehensive analysis of the physical condition. 


Solutions based on the "Spectrum": users use the unified identity on the network to register or associate hospitals ID, each hospital encrypts the user's visit information as a data sharing node on the network. user After authorizing a medical institution to access its treatment data, the medical institution uses the signature signed by the user's private key. Request to get the original user's original visit information. Can complete the credible sharing of medical big data.


4.3. Voucher registration 


4.3.1. Coupons registration and circulation 


Scene pain points: traditional paper or electronic coupons as one of the most effective means of business promotion. There was a problem of insufficient liquidity. Many coupons have not been used since they were issued, failing to acquire new users Play an active role in the process. 


Solution based on the "Spectrum": Coupon issuers can use their own products or services on the blockchain As digital certificates are issued, individual users can easily and conveniently purchase or be given corresponding digital certificates. The transfer of ownership to third-party websites has solved the problem of insufficient liquidity in the secondary market of digital vouchers. 


4.3.2. Ticket Registration and Transfer 


Scenario pain points: tickets are issued as a ticket issued by a ticketing party and sold by a distributor. Think of it as a pledge of assets based on a certain service of the organizer. Event organizers authorize sellers to vote After the sale of sales and sales parties through multi-channel and multi-level market transactions, ticketing rights are difficult to obtain. main reason First, the organizers could not track and control the situation of tickets after multi-channel and multi-level markets; second, the organizers There is no incentive to trace back after the ticket. 


Based on the "Spectrum" of the solution ideas: the development of ticket circulation rules, registration of the ownership of tickets and doors The right to transfer ownership of tickets and other functions. With the openness, regulatable, verifiable, and unforgeable of blockchain technology The properties of the digital tickets registered on the platform are clear and the transfer process is transparent. This can enable various companies in the ticketing industry to conduct various business cooperation based on this ownership. Users purchase tickets It can also be easily transferred later.

Report Page