-
Cryptocurrencies
-
Exchanges
-
Media
All languages
Cryptocurrencies
Exchanges
Media
YuanChain platform combines hot-swap smart contracts, blockchain cross-chain and other innovative technologies to build a new blockchain network architecture. It has the distribution characteristics of public blockchains, while taking into account the high performance and privacy of permissioned chains. Yuan Chain Coin (YCC) is the symbol of the Yuan Chain platform and the main part of the Yuan Chain ecosystem. The original chain token is a fuel token that can be used for: payment services, implementation of smart contracts, transaction services and DAPP operations.
Patents: More than 30 blockchain core invention patent applications, among the top ten in the world, two of which have been authorized.
Performance: The transaction performance of the public chain can exceed 10,000 transactions per second, and the alliance chain and private chain can reach more than 100,000 transactions per second.
Function: The original chain realizes cross-chain transactions with public chains such as Bitcoin and Ethereum, and the alliance chain, private chain and original chain information interconnection and value exchange. Consortium chains and private chains can realize more specialized blockchain functions and easily meet the needs of privacy protection.
Goal: Promote more enterprises on the original blockchain community, greatly improve the efficiency of enterprise operations and reduce costs.
Features: Safe, easy to use, green, classified, scale, privacy, high frequency, free.
1. Registry smart contract, hot replacement smart contract. The original chain smart contract can be upgraded (hot replacement), because the owner of the original chain smart contract can update the contract address through the registry contract when the system is running (no need to shut down the node). The caller of the smart contract must obtain the address of the smart contract through the registry.
If necessary, access control can be added to only allow authorized access to certain restricted smart contracts. Each permissioned subchain uses a similar design pattern, defining its own registry contract and similar access control policies.
2. Smart contracts are heterogeneous. Ethereum’s Parity Wallet’s multi-signature contract once had a vulnerability that resulted in the theft of 150,000 ETH worth $30 million. The original chain can use smart contracts with the same rules but different codes (such as different development languages or smart contracts written by different developers) on different nodes. As long as the rules are consistent, the correct smart contract will calculate the same result.
3. Easy to develop and deploy. Supports mainstream development languages to write smart contracts (JAVA, GO, etc.), and blockchain application developers are easy to use. The template development of various scenarios of smart contracts greatly reduces the difficulty of developing smart contracts without reducing flexibility. The original chain team will vigorously train blockchain smart contract technology in various industries to make blockchain technology faster. Serving enterprises, reducing costs and improving business levels. The original chain team independently developed Docker-based automated operation and maintenance tools to facilitate the deployment and maintenance of blockchain applications; and has complete monitoring functions to manage the entire life cycle of blockchain applications.
4. Fast launch and easy operation. The original intention of the original chain design is to customize the blockchain for enterprises. Business operations need to ensure reliability, security, uptime and integration with existing systems. Yuanlian provides a one-stop solution at the SaaS layer. Enterprises do not need to spend expensive software development consulting fees to deploy SaaS applications, but only need to configure to enjoy the service. At the network layer, we support public and private cloud deployments as well as hybrid public/private cloud deployments. We utilize site-to-site VPN, leased line, and other secure network technologies to deploy permissioned sub-chains. The communication between the licensed sub-chain and the public chain can be encrypted by TLS. In addition, even in the same licensed subchain, peer-to-peer communication can be encrypted according to the business needs of the subchain.
5. Identity and access management. Each permissioned subchain must define identities for users on the chain in its own way. This method is necessary for KYC (Know Your Customer) and setting permissions to access the resources of the permissioned subchain. Unlike R3 Corda or HyperLedger Fabric, the original chain does not use a single root node CA certification, because the CA certification itself is centralized, which has the disadvantage of being vulnerable to centralization. We allow each permissioned subchain to have its own identity and access management. For example, one child chain could use Microsoft Active Directory to manage its identity, and another child chain could use an IBM LDAP server to manage its identity. Every identity on the permissioned subchain has a corresponding unique identity on the main chain. The identity ID of the main chain can be deduced from the sub-chain
, but not vice versa. This is to ensure the privacy of user IDs on subchains and to allow the main chain to authenticate subchain user IDs.
6. The original chain system includes different versions of public chain, alliance chain, and private chain, and can allow digital assets and digital currencies to circulate on the three chains without barriers. All users can establish their own private chain to protect their privacy, and at the same time, associate with the alliance chain to ensure that the data cannot be tampered with and can be verified. The private chain quickly conducts transactions with other companies through the intercommunication with the alliance chain, which greatly reduces transaction costs. China currently has 40 million enterprises, of which 99% are small and medium-sized enterprises, contributing 60% of China's GDP. In 2016, the loan balance of the real economy of the whole society was about 100 trillion yuan, and it is estimated that the financing gap for small and medium-sized enterprises is no less than 50 trillion yuan. These small and medium-sized enterprises are suffering double interest rates due to lack of credit, and the original chain technology is expected to greatly improve the financing capabilities of small and medium-sized enterprises
.
7. The original chain has a high-performance architecture design. The original chain uses the following technologies to ensure its high performance:
Most of the transactions in the original chain network occur in the permissioned sub-chain, and each participant in the blockchain is authenticated. Without compromising security, licensed subchains can use high-performance Raft algorithms or other high-performance verification algorithms;
Each licensed subchain is isolated and independent. Sub-chains cannot be called directly or synchronously (as described below, sub-chains communicate asynchronously through queues and must be coordinated through the main chain). The isolation and independence of sub-chains allows each sub-chain to execute transactions in parallel;
Similar to the Plasma method (https://plasma.io/), we can use the MapReduce algorithm to further improve performance.
8. The original chain will use a large number of high-performance heterogeneous computing technologies. It is planned to use FPGA or ASIC to speed up the data processing capability of the blockchain. Currently, the minimum block interval of the original chain is 5ms, and it is expected to reach within 1ms through hardware acceleration and other technologies. High-frequency blockchain technology is widely used. In addition to being used in high-frequency financial trading markets, intelligent robots, industry 4.0, and big data processing are all inseparable from high-performance blockchain technology.
9. Original chain users entrust mining rights to consensus nodes according to their currency holdings. Consensus nodes can only obtain corresponding income every time they successfully vote for accounting. Mining income can include interest, traffic quota, tax deduction, research and development expenses, and other fees. The unused traffic quota will be charged The proportion is automatically attenuated, or it can be sold at a discount, and the tax deduction part can be handed over to the government department. The research and development expenses or other expenses can only be paid to the institutions or groups agreed after the blockchain vote, and the detailed rules can be determined by voting.
10. Safety innovation. Public chain permission chain cross-chain identity authentication and management, node server behavior and fingerprint recognition equipment can resist the following attacks: double flower attack, Grinding attack, denial of transaction attack, desynchronization attack (sun attack) , bribery attack, long-range attack, irrelevant attack, surpassing majority attack, and self-interested mining attack.
11. Inter-chain communication between the main chain of the original chain and the sub-chain. Permission sub-chains can exchange information through the main chain. In the original chain system, transactions performed in one permissioned subchain (according to the logic of the chain) can be sent to another permissioned subchain. Like intra-chain transactions on blockchains, inter-chain communication of permissioned subchains is fully asynchronous, and sent information cannot be returned to the subchain of origin. To reduce implementation complexity and risk, inter-chain transactions share the same information types as intra-chain transactions. Transactions have a start segment that provides authentication of permissioned subchains and addresses of arbitrary size. Unlike the Bitcoin and Ethereum systems, interchain transactions do not incur payment fees of any kind. In order to ensure the correctness of inter-chain transactions, the original chain uses a Merkle tree-based queue mechanism. The main chain moves transactions on the output queue of the source permissioned subchain to the input queue of the target permissioned subchain. The main chain transmits the transaction information of the licensed sub-chain, not the transaction information of the main chain itself.
12. The oracle (Oracle) ensures the connection of on-chain and off-chain information. Oracles provide information such as interest rates, exchange rates, and other information that form part of a contract. The information provided by the oracle is signed, and the parties to the transaction can verify its origin through the information. This information can be traced back to verify its origin both during the transaction and in subsequent audits or disputes, since the information provided by the oracle is immutable. Oracles operate in a commercial manner, ensuring that the system can charge for services.
1. Supply chain finance: bill financing, credit financing, receivables financing, warehouse receipt pledge financing, etc.;
2. Establish a global points alliance with multi-level blockchains of public chains and licensed chains;
3. Commodity orders, design, procurement, manufacturing, and delivery are managed by blockchain throughout the supply chain;
4. Industrial robot 4.0 blockchain security command system;
5. Assets are chained, liabilities On-chain, real-time financial accounting system;
6. Product traceability, project management traceability;
7. Medical, health, education blockchain;
8. Blockchain exchange, equity, debt, Futures, foreign exchange, commodities;
9. Government affairs blockchain, identity management, business registration, taxation.
*The above content is organized by YouToCoin official. If reprinted, please indicate the source.