What is the Emperor of Taiqui?Do you understand?

The block chain is so hot in the market, and its application has been widely used in retail, healthcare, Internet of Things and financial / banks. The block chain is usually associated with the technique behind Bitcoin, but it is more than just a way to record encrypted currency, but also adapt to any form of digital assets and possible data.

The process involving manual operation, which is trusted third-party promoting transactions can use block chains automation, and both parties can trade without intermediary, so that the organization can be cheaper and easier to perform complex flows.

What is the block chain?

The block chain is a distributed database that maintains a list of growing records (here the log list can be understood as LinkedList). Each block has two parts (just like a node in the LinkedList) – Data and the address of the next node); a timestamp with transaction data, and a link to a first block (Hash pointer) .

The block chain does not mean modify and delete data. Therefore, once recorded, the data in the given block cannot be modified / erased without modifying all subsequent blocks and network conspiracy. This means that they can be updated in order when they need to modify.

The block chain is based on distributed LEDger technology, which helps the transaction have public opinions, thereby minimizing network crime and fraud. This is an open distributed book that records the transactions between the two parties in verification and persistent way.

The block chain is connected to the P2P network (node ??/ computer network, each of which is an administrator), which enables protocols for verifying new blocks and relay transactions. The new node will get a copy of the block chain after adding the network. Distributed accounts have programming capabilities, so it is possible to automatically trigger transactions.

Let us look at an example, two of which participated in the currency exchange transaction.

Suppose Party A wants to send money to Party B; thus the transaction is expressed as “block” online. This block will now be broadcast to each party in the network. If the transaction is valid, all parties in the network will approve the transaction (a block is only valid when it complies with all protocol rules). If it is invalid, it will not be forwarded. The block can then be added to the chain to provide a lasting and transparent transaction record. Now the money is transferred to Party B.

Any technology has three aspects: technology, business and law.

This also applies to the block chain. As a technician, you can connect the block chain as a backend database with a distributed book. As a business profession, you can deepen it as a switching network, transmitting data between peers. As a legal and compliance expert, this can be considered to be a way to verify the transaction.

Let us look at the structure of “block”.

Each block is linked to other blocks like a linked list. Each of the blocks is formed to form a chain using a hash value of the previous block. As shown in the figure below, the transaction record is in the block.

Most financial institutions and banks are exploring and evaluating zone chain technology in a variety of ways. Possible applications in the POC (Conceptual Verification) phase include P2P remittance, cross-border payment, digital currency exchange, trade financing, intelligent contract, and risk management.

The main challenge is to support technical adapt compliance, policies and legal frameworks.

What is the Tanfang?

Tanfri is an open source block chain platform. It can build and run the decentralized application. Tanfrie is a “single case” planetary computer, you can understand the single computer that everyone can use for each person. This is the first infrastructure platform that is almost zero.

Anyone who adds to the EDF network can upload the program to the EDF and can request the uploaded program.

Ether Square Virtual Machine (EVM)

EVM is the core of the ETA. This is a programmable block chain. You can use it to create any other complex operations. EVM focuses on providing security, so it can prevent a very common network attack, ie refused service (DOS). It can not only be used for encryption of monetary usage; for example, in the Land Registration Office, bank transactions, etc. It supports point-to-point network, so you can ensure that communication is created and is not subject to any interference.

How does it work in Taiquan?

Everything in the Emperor is based on an account. There are two types of accounts in the Tanfront State, and there are too much balance.

Each action in the Emperor is happening through the transaction triggered by EOA. EOA can trigger transactions with another EOA or contract. The contract code is performed by the EVM participating in each node of the EDF network. A contract can perform transaction / calls to other contracts.

Account interactions can be understood as:

Tanfront key pair

Private key: This is a 64-character string. A string of any 64 characters other than ‘0’ 64 times is a valid key.

Public key or wallet address: The last 40 characters of the hash private key. There is a ‘0x’ in front to indicate that it is a hexadecimal format.

Let’s take a look at the key conversion of the picture below (private to public):

Original: https://dzone.com/articles/blockchain-1, https: //dzone.com/articles/blockchain-ethereum-part-1