Nowadays, when we are shopping, we are always looking for quality, and sometimes we need to buy some overseas goods. So we are very fond of sweeping goods. We can’t help but pay attention to the source of goods and the transportation process. How can we grasp the changes without burden?
It’s also the pursuit of delicacy. The quality of fresh food is concerned by the public anytime and anywhere. No matter the chicken with pedometer or the ox keen to exercise, how can we accurately and accurately control the diverse data of fresh source anytime and anywhere?
In fact, whether it’s cross-border e-commerce or fresh quality, there is no doubt that blockchain technology has played an important role in the whole chain with goods as the unit, and JD, as a few large-scale enterprises with rich application and landing scenarios of blockchain in the world, is making full use of its nature to continuously promote the development of digital technology and intelligent application.
In the just concluded JD cloud technology salon activity, a number of technology celebrities from JD cloud face-to-face targeted at the technical details and open source plans of JD cloud BDS products; JD The practice of baas enabling application, the principle and application scenario of decentralized identity technology, lightning network and other key technology applications have been discussed in depth. The dry goods are full of profound repercussions. Presumably, these explorations will also provide reference and new ideas for practitioners related to this, which is worth learning and summarizing by developers!
all the time,JD cloud believes that data is an asset, AI is a capability, security is the foundation, IOT is a connection, and cloud computing exists as an industrial operating system。 In a simple analogy, cloud computing as an infrastructure platform can develop a variety of applications to achieve industrial empowerment and create industrial value, while blockchain plays a role as the carrier of industrial value transmission.
Although the potential of blockchain carrier is unlimited, at present, from the perspective of domestic market development, the industry attribute performance is still relatively single. According to the market research in 2018, the application industry ranking the first in the domestic blockchain market is the banking industry, with an overall expenditure of US $76 million, accounting for 46% of the total market expenditure of that year. Basically, one industry will account for half of the total; in addition, the industries ranking the second and third are discrete manufacturing and retail industries.
01 JD blockchain, delivering the value of Industrial Trust
Based on this, JD cloud hopes to make full use of the transparent, efficient and traceable ability of the blockchain to help the development of the industrial Internet and transfer the trust value between industries through cloud intelligence + blockchain. In sharing, Zhang Fan, cloud computing preacher of JD cloud, introduced: “baas is an enterprise blockchain service of JD cloud, which is based on the characteristics of high availability, high reliability, high security, elastic expansion and rapid deployment of cloud resources. The enterprise blockchain platform deployed on it supports minute level enterprise blockchain building, and JD chain, the engine of the underlying chain, is also self-developed by JD chain.”
If baas is considered as a platform product, the anti-counterfeiting traceability platform can be regarded as a ready to use SaaS usage mode. According to the statistics as of June this year, more than 700 top brands have access to the traceability platform, with 6 million + queries. In addition, JD cloud is also the first cloud provider of BDS services, which can aggregate the trusted data on the chain, overcome the data disorder and data island problems, and maximize the trust value of the data on the chain.
“We believe that cloud computing is not only as simple as selling virtual machines in the process of industrial empowerment, and the applications and solutions with industrial attributes carried on the cloud are important value creation points. The enrichment of cloud capabilities requires efforts from multiple parties, including self-study capability, business model, ecosystem represented by developers and partners, etc. We hope to help the development of the industrial Internet through cloud intelligence + blockchain, while delivering the trust value of the industry. ” Zhang Fan said.
02 BDS: strength empowering trusted data value and open source practice
As the second sharing guest of the salon, Zhu Lang, the product director of JD cloud blockchain, delivered a technical speech with the theme of “BDS: strength empowering trusted data value and open source practice” for developers.
Nowadays, blockchain technology is booming, with hundreds of well-known public chain projects represented by BTC, ETH, etc. and alliance chain fabric and JD chain projects. No matter the public chain or the alliance chain, different chains have their own characteristics. Therefore, there are some enterprises using BTC, some enterprises using eth, and some enterprises using fabric. For example, JD is used by JD Chain, because different blockchains can’t realize information exchange, they finally form a data island, so they can’t play the maximum value of data.
The product architecture of BDS is mainly divided into the following three parts:
Part I:Data collection level, access to public chains including BTC, ETH, XRP, LTC, BCH, etc., and obtain some third-party data such as exchanges, forums, information, etc. through technical means.
The second part,Data processing levelThe first part of the data will be imported into the big data analysis platform. After data analysis and processing, data indicators such as transaction amount, transaction times, transaction amount distribution, transaction fees, new address, active address, address balance distribution, address classification, etc. will be obtained.
The third part,Data visualizationIn order to facilitate everyone’s experience and use, it provides the blockchain data Bi tool, supports SQL query and condition query, supports various data visualization methods for query results including but not limited to tables, curves, histograms, etc.; it also includes data intelligence to provide real-time update, real-time monitoring and other functions.
If we want to summarize the product features of BDS, we can simply summarize them in several aspects: richness, that is, the whole BDS currently covers dozens of well-known blockchain projects, such as BTC, ETH, EOS, LTC, JD chain, and defines more than 100 blockchain data indicators; convenience, supports condition query through click and drag interaction, as well as standard SQL Query statement, realizing complex query logic, can generate all kinds of data reports and graphical interfaces in real time; professional, providing a set of standardized block chain data index model, and relying on the support of JD cloud’s hardware and software and architecture, it has the characteristics of fast query speed and high query efficiency.
What are the application scenarios of BDS?
First of all, blockchain data service can provide 100 + user-defined data indicators such as daily, monthly, retention rate and transaction frequency of users on the chain. The data truly and objectively reflects the operation status of the blockchain, thus forming a complete operation analysis report of the blockchain. In addition, through the blockchain data service, real-time monitoring of the digital currency transaction situation, real-time understanding of the market dynamics, and combining with the block It is also feasible to provide effective data support for financial decision-making and project analysis with financial information, social public opinion and other information related to the chain. In addition, because of the anonymity of digital currency’s address, it is often used by lawbreakers for illegal criminal activities. In the blockchain data service, transaction information is completely recorded. By analyzing the transaction behavior between addresses, the capital flow is located, and effective evidence of financial crimes is obtained.
It is understood that the whole blockchain product department was established in January 2018. In June 2018, the Department signed a strategic cooperation agreement with Huo coin network to jointly exchange and explore the foreword technology and application scenarios of blockchain. “In August 2018, our blockchain product department released version 1.0 of blockchain data service, version 2.0 in June 2019, and ready to open source in July 2019.”
At present, BDS has opened two modules, one is the modified blockchain full node service, the other is BDS splitter service. In the future, other modules such as real-time processing, event processing and machine learning will be open-source. Referring to open source, Zhu Lang said that this can standardize the data model of the blockchain and formulate the data index standard of the blockchain industry; make contributions to the blockchain open source community, as a tool to provide blockchain data analysis, based on the open source community, and hope to make data-driven, attract more blockchain enthusiasts to join in it, participate in the development, and jointly promote the whole blockchain Keep moving forward.
03 BDS: system data analysis
Wang Huanyu, senior R & D Manager of JD cloud, said that the mainstream consensus algorithms are now pow, POS and dpos. Some famous supply chains such as BTC and eth used POW consensus algorithm in the early stage, but with the technology upgrading, the consensus algorithm has many serious problems and low efficiency.
In order to solve this problem, there is a POS mechanism, and dpos is based on the evolution of pos. dpos consensus algorithm is used in wave field. Its Chinese name is proxy proof of rights and interests, which is based on voting consensus algorithm. Specifically, dpos is a super node that must be selected through common nodes. Only super nodes can have the block production right of this chain and the ability of super nodes to maintain the security and performance of the whole blockchain.
“To sum up the advantages and disadvantages of dpos algorithm, its advantage is that the consensus period is particularly short, which improves its own block speed and saves a lot of energy; using dpos, there is basically no bifurcation; but its disadvantage is also obvious, that is, the realization of pseudo decentralization, which is also a place often suffering from scaling disease.”
Wang Yihui, senior architect of JD baas blockchain R & D Department of JD science and Technology Co., Ltd., started from the difficulties in the implementation of enterprise blockchain, based on the relevant solutions proposed by JD blockchain and the implementation scenarios based on the solutions, and cooperated with the quick trial of JD baas to further empower developers in the sharing of “from technology enhancement to ecological creation, panoramic interpretation of JD baas”.
04 from technical support to ecological creation, panoramic interpretation of JD baas
“The scene of JD landing the blockchain started from the supply chain traceability system. At that time, we were full of confidence, but the ideal was very full and the reality was bone felt. In the process of landing, there are some problems, which can be roughly classified into six categories: first, the complexity of technology. Everyone knows that blockchain technology is the integration of cryptography, network communication, distributed storage and various algorithms. Generally speaking, it is not easy to be proficient in using one of them, and blockchain engineers need to have a deeper understanding of each one. This is not a small challenge for SMEs in terms of human resources. The second point is ease of use. At present, the blockchain system is not very friendly to the end users, and the operation tools provided can not well support the enterprise customers to apply the blockchain to the business system. The third is the lack of function completeness, such as the lack of user authentication mechanism, multi-level authorization mechanism and cross enterprise system mechanism, which are common functions in enterprise application system at present. The fourth is maintainability. Whether blockchain technology can achieve smooth expansion and real-time fault processing is very important for enterprise applications. The fifth is security, which involves the management of secret key, the security of running environment, the control of user’s authority and so on. Finally, identity recognition. In order to respond to regulatory requirements, it is necessary to match the real world identity with the identity in the blockchain, which is also a problem that the blockchain must solve. ” Wang Yi concluded.
In the face of these problems, JD cloud has come up with a complete set of solutions for JD blockchain after refining and summarizing.
It is reported that the scheme is roughly divided into three parts. The first part is business in Taiwan. Based on the anti-counterfeiting traceability system, we have summarized the business abstractly, extracted some common things, and built a business middle platform. It can make enterprise applications quickly access to the blockchain, modularization, configuration, and customization on demand. Wang Yi said that based on business middle platform, JD blockchain has implemented many scenarios, such as data storage or traceability issues mentioned before, which are all built based on business middle platform. The middle part is the baas platform, which is simple and easy to use, providing a complete tool set, and easy to maintain and upgrade. The third part is the JD chain, the bottom layer of the blockchain with independent intellectual property rights, with outstanding performance indicators. In the case of 16 nodes, the TPS can reach more than 10000, which can be developed based on the module architecture and configured on demand.
Generally speaking, the main feature of JD baas is that it can make the resource layer irrelevant. Specifically, both the public cloud and the private cloud can facilitate the deployment of applications. ” The block layer integrates the currently popular fabric or Ethereum systems, and users can choose different block chain bottom layers according to their own scenarios; the middle service layer is the abstraction of the bottom block chain, which can be exposed to the application layer through API; the service layer involves the rapid deployment of enterprise services, which can be a key part of the block chain system Deployment, cross cloud deployment can achieve different organizations in different underlying resources to achieve the formation of alliance network. ” He added.
Further, Wang Yi said that the identity chain mainly solves the problem of identity recognition, which can be considered as a decentralized PKI system implementation, mainly through the formation of an alliance chain or the participation of regulatory agencies by alliance enterprises, to realize the real name authentication of enterprises. Based on the real name authentication, the specific identity of each alliance member can be known in the process of establishing the alliance network.
When it comes to specific deployment, Wang Yi first mentioned one click deployment, that is, to build an alliance network through some simple configurations on the baas platform. The enterprise level dynamic networking is the production link to carry out some business information for the realization of enterprise alliance network in the weak trust link. “When it comes to elastic capacity expansion, our transformed fabric TPS can reach more than 5000 and JD chain can reach more than 10000; but in this case, if there is a higher demand, we can divide a chain into multiple chains through horizontal expansion to improve performance.”
In addition, most blockchains on the market now provide their own browsers, which are generally oriented to more technicians, but only show data coding, without a specific business meaning. Wang Yi proposed that the browser of Jingdong blockchain can put the displayed page correlation in the contract, and each query displays some business data in the browser. For example, to store a picture, you can find a picture information or license information in the browser. At present, there are two ways for quick trial of JD baas: one is to apply for an account on JD cloud and then purchase resources for quick trial; the other is to import its private resources into baas system through its own deployment or provided public baas system to deploy blockchain.
Introducing the specific application, Wang Yi listed the cases of supply chain traceability.
“Recently, we have done a case of Pu’er tea traceability, which can be considered as the integration of blockchain, AI or IOT technology. First of all, when the tea cake leaves the factory, it will acquire some characteristics of the tea cake through AI technology and store them in the blockchain with the tracking code; when packaging, there will be an RFID, which will be written into the blockchain together with the anti-counterfeiting tracking source code. According to the anti-counterfeiting tracking source code, this information can be added, such as some information in the transportation process and the stored temperature After purchase, consumers can scan the anti-counterfeiting traceback source code to know the whole process from delivery to logistics to purchase; after purchase, the ownership of this tea cake will be transferred to consumers, and the transfer process will also be recorded in the blockchain. If the consumer sells or transfers the tea cake again, the ownership will be transferred along with the anti-counterfeiting tracing source code. “
05 from payment channel, isolated witness, to lightning network
Hou Liang said that when it comes to competing products of lightning network, the first is liquid. “If you are a quantitative company, you will not use python, but you may use MATLAB. Lightning network is just a protocol. It’s easy to lose assets when the network goes wrong. Exchanges or large commercial institutions pay more attention to this. Liquid is a technical way of quick transfer between exchanges. In addition to the addition of hot money, some large exchanges are using liquid, so there is no burden to transfer large amount of money in and out of exchanges. ” He added. In addition, lightning networks, Ethereum or other smart contract networks will use similar technologies.
What is the development direction of lightning network? The first is atomic multipathing. If the micro payment channel or the current lightning network may not have better optimization, consider whether each channel can be automatically turned into a distribution nature? The second is privacy. Whether the information can be encrypted more safely to ensure the privacy between the transportation.
06 decentralized identity: Technology Discussion and application based on identity
So far, “decentralized identity” is a relatively small demand, not as popular as bitcoin and Ethereum. It is mainly manifested in one is the subject and attribute of identity, that is, each identity under multiple identities must have corresponding attributes, such as name, health status, position, salary, etc. Identity based identification, how are these identities displayed? Identity interaction, that is, how to interact with each other?
Around these levels, it can be divided into four steps: the centralized way is a center, recognized as an organization to control the authorization of all identities, which is the most common CA authentication. This way can be achieved in specific fields, but there must be problems in the overall use of identities. “The new way appeared in 1999 and 2000 is federated alliance. The initiator is Microsoft, and some big guy companies at that time jointly do mutual recognition of each other’s identity. Later, the standard is not clear, and there are very few people applying it.” Yang added.
User centric is a user centered online identity mode, that is, to form a comprehensive control of self-identity at the level of everyone, which has made a lot of progress, with a good initial intention. That is to say, to form a comprehensive control of self-identity at the level of everyone; self sovereign is the way of self sovereignty generation. It is understood that at present, identity recognition is mainly used in sovrin projects and smart parks. “This chain is very different from the bitcoin and Ethereum that we often use. In terms of node types, it is divided into two layers: one is the gray area in the middle, the validator nodes are the verification nodes or witness nodes, and they have combined write permission for the information on the chain; the other is the observer nodes, which are read-only. After our authentication, a lot of information only needs to be obtained from the chain without reverse writing. The design index is based on our DNS design index, so the performance is very good. “
As for the smart Park, Yang Desheng said that there are practices in Chongqing, Ningbo and other places: presenting a partial regional semi closed and semi open park, and using decentralized applications as a whole, such as access control, entrance gate, and even identity verification of Park takers.
The main use of industrial Internet is to improve and verify the identity of this system and process, “but in reality, only this process is a little inadequate. In the industrial Internet, we have done such functions as trusted data transmission and trusted archiving, that is, using blockchain technology, mainly the collaboration of hyperledger Indy and some hardware level digital gateways, which are currently centralized in Chongqing. ” He added.
Welcome to “JD cloud” for more highlights