ComputersInformation Technology

Blocking is ... How it works, advantages, applications, prospects

Recently, many of us are increasingly confronted with such a concept as a blockade. What kind of system is this? Unfortunately, not everyone knows this, although it has very promising chances for development and implementation in everyday life. Let's try to describe what a blockage is, in simple words. To top it off, there will be several examples of using the new technology, as well as the advantages and disadvantages of the global information structure.

Block: it's what?

The system itself appeared relatively recently. If you do not yet delve into the main technical aspects of the operation, the technology of the block is a clearly structured database with certain rules for constructing chains of transactions and access to information that excludes data theft, fraud, violation of property rights, and so on.

In addition, when working with it, only two parties are involved, without involving intermediaries to conduct transactions of any type. If we talk about what a blockade is, in simple words, the technology can be compared to some transparent safe, say, from impenetrable glass, in which every registered customer (user) can put something. In this case, all the others see what is put there. But you can take something from the safe only if you have certain access rights, roughly speaking, a key that is known only to the person for whom it is intended. As already clear, it is impossible to break or break a safe. But, in fact, this is a fairly primitive comparison.

In a sense, the blocking system can be presented in the form of a global book, in which mathematical methods describe the basic rules for storing and distributing information, excluding access to it from outside even at the level of registered clients or administrators. It is not difficult to guess that this system does not have any one manager as such.

How does blockade work?

The main principle of functioning of the new technology is the transparency of transactions performed with the inability to change them by persons who do not have authorized access to it. Ancestor of the technology of the block system is the Bitkoyn system, created in the form of a self-regulating crypto currency, which does not require financial organizations or banks. She used the block platform to account for transactions of any type. Similarly, any blocking wallet works, for example, the same Qiwi system.

To understand the basic principles of the functioning of a global database, you can use the example of a DNA structure. It has its own chain of transaction units (transactions, payments, etc.). In this case, after committing and confirming any transaction (according to the established mathematical rules), a new block is added to the chain. And each such unit, like the DNA cell, contains information about the entire network as a whole. Thus, blocking technology initially predetermines the impossibility of adding a fake block or removing an existing one, since it will be immediately visible throughout the system. Roughly speaking, one can not add to the structure what should not be there. When a block is deleted, the system responds in the same way to the change in the global structure. So it turns out that fraud, attempts at unauthorized interference or the same piracy are virtually eliminated.

Main applications

At the stage of its appearance, blocking technology (from the English block chain) was used exclusively for crypto-currency, and was later adopted by some banking structures.

However, today, in its development, the new system penetrates into our daily life deeply enough. Platforms for the development of business applications based on blocking technology can control even the observance of copyrights, trace the production processes of a product to its compliance with the declared standards, not to mention absolutely all financial transactions.

The main platforms for building business applications

Among the most advanced and frequently used platforms on the basis of which software products for business can be created, it is possible to note the following:

  • EmcSSH.
  • EmcSSL.
  • Emc InfoCard.
  • EmcTTS.
  • Emc DPO.
  • Emc Atom.
  • Emc DNS.

Let's consider each of them separately.

EmcSSH

From the point of view of the EmcSSH platform, which is an additional extension of SSH technology for network administration, the block is a specialized store of public keys (passwords) and lists of users authorized to access.

For example, a network user has access to several machines. To do this, we use a password-protected secret key file stored in the locker, which excludes the manifestation of hacker attacks, called MIM ("man in the middle"). If the impossible happens - the file is stolen, the user can immediately change it to a new one or block access.

This method is most effective when you need to manage a large number of servers, a network of ATMs, remote computer terminals, etc. What is most interesting, such global control can be carried out regardless of geographical location, and with the same simplicity as when working In an ordinary local network.

EmcSSL

This platform is an extension of the custom SSL protocol. For him, the block is the place of storage of so-called digital fingerprints of certificates of individual users or organizations.

At the entrance, for example to the site of the bank, and the exchange of information between the user and the banking Internet system, authorization of the user occurs precisely on the basis of such certificates, which makes it impossible to steal passwords, codes or keys by third parties. If the client loses the certificate, the procedure for recovering it becomes much easier, although it has some disadvantages in terms of the imposed restrictions (recovery service is paid, and the process itself requires a lot of time).

Emc InfoCard

This platform is based on a system of electronic business cards, inextricably linked to user SSL certificates. Unlike the latter, such business cards are convenient in that the information contained in them can be changed.

When you enter a specific Internet resource that supports this technology (for example, a blocking wallet), authorization occurs on the basis of a virtual business card, and information from it is downloaded automatically. The convenience of such a system is that when you change the data in a business card, it changes on all the resources where it is registered, simultaneously and completely in automatic mode. So the user no longer needs to re-fill the registration fields on a huge number of sites manually.

EmcTTS

The TTS system is a means of fixing placed documents of any type in time with the creation of a print of the moment of their publication.

Such technology is indispensable in legal matters when it is required to prove the authenticity of a document, contract, patent or even the publication of copyright. From the time stamp, it is quite easy to check not only the date of issue or publication, but also the time to within a second. And in jurisprudence, this can sometimes play a key role.

For example, there are two companies that have concluded a contract for the provision of some services. The first after signing the contract made its publication using TTS technology. The second firm did not know about this, and after a while began to arbitrarily make changes to the contract, referring to the allegedly lost own copy, moreover, and stating that some items were spelled out in the proposed by her current edition. There is nothing easier than proving the rightness of the first company for a temporary print imprint.

Emc DPO

The DPO system is another branch of the basic technology used to prove the rights to any property in physical or intellectual terms.

To put it simply, on the basis of unique numbers or characteristics, the use of such technology can confirm, for example, the right to own a car, house or apartment, land, software development, etc. Equally, it is possible to use cadastral numbers, registration certificates, serial numbers Software licenses, and in some cases, for example, for real estate - location, etc. With such a system and re-registration of property rights is very simple. It's enough to perform a simple operation to change the data in the blockroom. As it is already clear, access to such processes can be obtained only by persons who have the right to do so, and interference is excluded from the outside.

Emc Atom

Atom is a system designed to enter into transactions between two parties without the participation of a third or intermediaries.

To make it clear, in some cases, when transferring ownership rights or concluding contracts, the two parties are forced to apply to a notary, a legal office, a bank and other organizations. In this situation, their participation is not required. Registration in the event of a transaction with property, when the seller received money, and the ownership was re-registered to the buyer, and is a confirmation of the legality of the operation with a preliminary verification of the ownership of the property by the seller, and in the future also with confirmation of the owner's ownership. True, such an approach can only be used when both sides trust each other unconditionally.

Emc DNS

Finally, another platform, which is an alternative system for distributing domain names in networks, preventing cybercriminals from attacking the DNS.

It is believed that with the use of such technology, any distributed network, tied to the Internet, becomes almost invulnerable.

High-speed transactions

This type of technology is designed to conduct micropayments with minimal costs and costs. Such calculations can have extremely small amounts (even a fraction of kopecks).

Since all transactions are virtual, the system allows you to remove any restrictions on performance in the so-called TPS metric, despite the fact that any calculation has its value, expressed either in monetary terms or in the resources consumed for its fulfillment.

The advantages and disadvantages of the system

Finally, it remains to say that the advantages of the blockade system are clearly expressed. The most important thing in technology is an impeccable reliability and, as claimed, absolute safety. Despite this, today there is an active debate about the advisability of the widespread introduction of such technology. Bankers, by the way, are slow to use it because of the low speed of work, initially dependent on traffic, although they acknowledge that performance has a lower priority compared to the reliability and security of operations.

But any consumer using blocking technology can even independently check the quality of the purchased product by tracking the entire chain of production and supplies to make sure that the purchase does meet the specified standards.

However, it is still too early to talk about the global introduction of this technology, the appearance of which, in the opinion of many experts, is comparable only with the emergence of a global Internet network. And the applications created on its basis, not to mention the organizations that use them, are not as many as many would like. However, most experts are inclined to think that the block has a great future. So it or not, time will tell. It remains to be hoped that this system will not suffer the fate of the crypto currency of bitcoins, which was recently decided to be abandoned.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.delachieve.com. Theme powered by WordPress.