In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-05 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
Today, I will introduce to you what you need to pay attention to in the design of blockchain system. The content of the article is good. Now I would like to share it with you. Friends who feel in need can understand it. I hope it will be helpful to you. Let's read it along with the editor's ideas.
Application service perspective
Identity management
Only by registering and logging in to the system and obtaining the official registration of the user, can you use the private key to sign (similar to my seal, and sign it with my point seal) the message can be confirmed only after receiving the message.
Account book management
After authorization, users can query account data (dba permission). The query methods can be as follows: query the block according to the block number, query the block according to the block hash, query the block according to the transaction number, query the transaction according to the transaction number, or query the block chain information through "channel" (channel is an important concept of fabric).
Transaction management
Unlike the traditional database, the account book can be added, deleted, checked and changed, and his records can only be updated through transactions. Through transaction management, the application submits the transaction proposal, and obtains the transaction endorsement, then submits the transaction to the sorting service node, and then packages it to generate a block.
Intelligent contract
Only intelligent contracts can update account data, and other service nodes cannot modify status data directly.
System support Angle
Member management
MSP (membership service provider), every organization has a set of msp, will establish a root trust certificate system.
Consensus service
Blockchain is highly consistent, and blockchain trading is effective and orderly.
Chain code service
The execution environment needs to be secure, and the execution process is isolated from user data
Security and password services
Through bccsp (blockchain cryptographic service provider) hsm (hardware security modeul)
Commonly used peer commands
Create a pipe and heidsoft is the name of the pipe
Peer channel create-o oderer-host:7050-c heidsoft-f / etc/hyperledger/configtx/channel.tx
Join the pipe
Peer channel jobin-b heidsoft.block
The above is the whole content of what you need to pay attention to when designing the blockchain system, and you can search the previous articles or browse the following articles to learn more about what you need to pay attention to when designing the blockchain system. I believe the editor will add more knowledge to you. I hope you can support it!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.