IPVC AVATAR
- 1 -
VALUE INTERNET STANDARD PROTOCOL BASED ON THE Big Calculation ERA
White Paper
Avatar kindling Plan
Intelligent Property Value Chain
IPVC
IPVC AVATAR
- 2 -
CONTENTS
01 Project Introduction
02 Project Introductionu Project Descriptionu Project conceptu Solutionu LOGO meaning
03 Big Calculation Era
IPVC AVATAR
- 2 -
06 IPVC Business Ecology
04 IPVC Value confirmation agreement
u IPVC 's basic hardware chain layeru IPVC distributed management systemu Innovative application of IPVC - distributed programming catu Resonance source communityu IPVC multi-dimensional public chain technology framework
05 IPVC Business model
07 Token Issue
08 Disclaimer
CONTENTS
IPVC AVATAR
- 3 -
LIFE AND INTEREST, SPIRIT, ETERNAL LIFE
LIVE FOR EVER AND EVER
IPVC AVATAR
- 5 -
Introduction
IPVC
IPVC
IPVC AVATAR
- 6 -
In Indian mythology, AVATAR refers to the cloak of material in existence in the world, in order to
participate in the creation of the Creator. In the language of Buddhism, Avatar refers to the Buddha
nature in human nature; in the language of God and Christianity, Avatar is the divinity in human nature.
If you do not use any religious language to explain Avatar, it means: a person who lives in complete
awareness; a person who deliberately, intentionally, and deliberately lives; a person who gets rid of
mental disorders and beliefs; how to achieve a discovery One's own dreams and the mission of life; one
who thinks about new possibilities and achievements; one who gets spiritual awakening.
Jobs once said: You can't see the future from this point; only when you look back, you will find the
relationship between them. So, believe that these points will be connected sooner or later. You must trust
something – intuition, destiny, life, and karma.
The principle of positive and negative forces is the outer garment of matter. In the language of
Buddhism, no matter how the universe is disillusioned, the karma is always sustainable, just like the
financial accounting book. The power of nature is like the stylus judge, the world law is just like this.
Joseph Li said: With the understanding of a devout Catholic who contains been engaged in computer
algorithm research for 20 years, blockchain technology does not exist in the dimension of world law. It
comes from the awakening of divinity.
From the day of the creation of the world block, it is like the light of the divine light buried in the earth,
when the species of life breaks through the Earth, it can resist any attack - an encryption algorithm that is
strong enough or even impossible to crack.
The sequence of cell genes in the division of life, the data is permanently recorded in the roots of the
huge tree of life, just as the irreversible karma hovered over the valley of Shiva, the eternal block book
system.
The species of life unleashes the energy tree of the power of the wild, the forest grows and thrives,
and the unique way of life reproduction - blockchain fork mechanism.
The emergence of intelligent life is a chance of great probability. The tree of wisdom--the birth of
intelligent contract is the inevitable life of the blockchain. The species of life in different blocks are derived
to the roots, and the wisdom of humanity shines.
AVATAR is the tree of eternal.
IPVC AVATAR Humanity following the agricultural era and the industrial ageAnd the Internet ageAfter that, I am about
to enterThe era of Big Calculation. The digitization of resources and the use of blockchain technology to form
digital assets are the only way for the digital economy in the era of Big Calculation. However, as the digital
economy and value Internet, only blockchain technologyInsufficient in fact, in addition to technology, the
blockchain contains brought us the ideas of distributed economy and economics, and it contains been
produced under the influence of this idea.Distributed chain storage, Smart Token and other protocols and
technologies, furtherMake up for the limitations of the blockchainSex.
In the era of Big Calculation, the individual's power will be fully exerted, distributed organizations and
distributed commerce will emerge, and finally realize the digital ecology with distributed collaboration as the
main form.
The Resonance Community calls this digital ecology the AVATAR system - "Digital Heaven and Earth":
a digital asset created by distributed, accurate big data technology that shares the value of creating value -
"Digital Earth" The Smart Token is used as an incentive mechanism for all relevant large-scale ecological
organizations--"Vatican Heaven"; distributed collaboration, the distributed organization ecology of the
intelligent network---"human network".
The distributed collaboration of digital forms contains rarely been realized since the concept was
proposed. The fundamental reason is mainly due to the lack of content-oriented communication and the
directed communication of resources, which contains caused the inefficiency of ineffective information in the
network world to become the norm, and the waste of a large amount of excess resources in the real world.
This makes the digital economy specific business level, especially the transaction, cooperation and other
aspects still rely too much on human participation.,Seriously hindered the development of the digital
economy.
In this regard, the top blockchain geeks and experts from the resonance source community have
developed the IPVC protocol, the value Internet protocol for the era of Big Calculation, to effectively solve
these problems, enabling content to be distributed, resources to be communicated, and distributed.
Collaboration contains been effectively implemented, leading the evolution of the digital economy to the
general economy.
- 7 -
IPVC AVATAR
- 8 -
Project Introduction
IPVC
IPVC
IPVC AVATAR
- 9 -
The fourth industrial revolution essentially opened the chapter of the digital economy in the era of Big
Calculation. Intellectual elements and real economy industrial resources are digitized and displayed in IP
form to form IP value chain (Intellectual Property Value)Chain) is the foundation of the digital economy.
The intellectual element and the real economy industrial resources are digitized and displayed in the
form of IP to form the IP value chain, which is the foundation of the digital economy. The digitization of
intellectual assets such as IP intellectual property is the core value asset of the era of Big Calculation.
After the agricultural economy and industrial economy, the digital economy contains also been widely
recognized by the society. The digitization of user resources, the digitization of industrial resources, the
digitization of content dissemination, the digitization of brand communication, and the network red V and
C can all be attributed to IP, and will also become the core assets of the digital economy.
The use of blockchain technology to reconstruct digital assets into digital assets is the only way for
the digital economy in the era of Big Calculation. However, as a digital economy and value Internet, only
blockchain technology is not enough. In addition to technology, the blockchain brings us the ideas of
distributed economy and generalized economy. Under the influence of this idea, it contains Protocols and
technologies such as distributed chain storage further compensate for the limitations of the blockchain.
The blockchain mainly realizes value exchange through features such as tamper resistance and double-
flower protection, while distributed chain storage realizes distributed storage through features such as
content addressing. At the same time, in the digital economy of the era of Big Calculation, the individual's
strength will be fully exerted, distributed organizations and distributed commerce will emerge, and finally
realize the digital ecology with distributed collaboration as the main form.
Among them, the “Digital Earth” composed of accurate big data (person, organization,
product/service) is used as the digital asset in which the value can be shared, and the series of related
certificates is used as the incentive mechanism for each relevant size and ecology. The technology of
identification proves the right to form a digital ecology of “Heaven and Earth”. (Day: a hybrid incentive
mechanism for machine consensus and humanity consensus; land: Digital Earth based on affirmative
data DNA, ecological digital assets; people: distributed collaboration, human networking).
The distributed collaboration of digital forms contains rarely been realized since the concept was
proposed. The fundamental reason is mainly due to the lack of content-oriented communication and the
directed communication of resources, which contains caused the inefficiency of ineffective information in
the network world to become the norm, and the waste of a large amount of excess resources in the real
world. This makes the digital economy still rely too much on people's participation in specific business
aspects, especially in transactions and cooperation.
u One: Project Introduction
IPVC AVATAR
the aboveThe phenomenon contains seriously hampered the development of the digital economy.In
case the solution is not implemented,It is difficult to fundamentally reduce costs and improve efficiency. In
this regard, the Resonance Community contains proposed IPVC (IP Value Chain) and IPVC protocols to
solve the current problems, while international blockchains and big data experts from the United States,
Taiwan and other places have further proposed large calculations based on the former two. As the
cornerstone of the overall solution, the content can be targeted, the resources can be communicated, the
deep learning API interface to achieve adaptive, evolving smart contracts can be effectively realized for
distributed collaboration.
More important according to the role of IPThe characteristics of the digital economy in the era of Big
Calculation,C2B's large-scale personalized customization becomes inevitable。 Resonance source team
willIP value chain upgrade to value chain, to create key components of large computing technology: new
blockchain value chain, neural network engine, artificial intelligence, deep learning and new distributed data
perpetual technology. Finally, the IP node is the coreUsing new blockchain technology to build“Content /
Resources /Trustworthy/intelligent/Value communication“Trusted network system——IP Value Chain
( IPVC )。
Resonance source community will buildPeople networking with people as the main node,This is IPVC
Infrastructure。 The human IP node will be the digital avatar (Avatar) of the corresponding spiritual tree. The
static description data, relationship data, behavior data, reputation data, credit data and its subsidiary
resources of the node are stored in the distributed network in the form of data DNA ( Such as distributed
chain storage), and further asset storage in the blockchain to form a trusted digital asset. People based on
their relationshipThe degree of trust in the periphery naturally forms a chain of trust relationships.Tracing and
confirming rights through blockchain and Smart Token technology, under the premise of protecting the rights
of personal digital assets and ensuring the privacy rights in the relationship network,Communicate and
communicate within a chain of trust relationshipsTo form a credibleHuman network。
this willCan give full play to the important role and subjective initiative of the digital economy in the era of
Big Calculation, help them findPersonality endowmentBlooming lifePromote the digital economy, digital
ecologyAnd digital societyEvolution and development.- 10
u Second: The Project Vision
u Third: The Solution
IPVC AVATAR
- 11
1. IPVC is built on the core of consumers and consumers, so that the network's native support is people-
centered, organization-centered, product/service-centric, content/resource-centric, called IP, itself. Model-
based, object-oriented; rather than device-centric, object-centric static ID clustering;
2. Applications built on IPVC are easy to connect digital demand, trading power, productivity, and
production materials in a flexible production relationship to adapt to changing needs and patterns;
3, IPVC can fully exert the individual value of people, easily build a distributed trusted collaborative
network, and release the dividend of intellectual assets;
4. IPVC can support the formation of high quality and accurate big data.
5. IPVC , as the basic network of the digital economy in the era of Big Calculation, itself needs to design
the corresponding logical layer protocol, so that the applications based on it can effectively coordinate
and share resources/assets/data;
6, IPVC can easily implement different types of incentives;
7. IPVC can realize privacy grading and digital asset identification based on different circle groups.
Using the digital neural network model based on blockchain technology and the privacy security
model to construct the IP value chain ( IPVC ), the real world is isomorphic into the digital world, and the
node-to-node relationship is highly summarized—the real-world trusted digital mapping . Digital nodes
can be divided into three categories: people, organizations, products/services, using multidimensional
arrays to represent dynamic scores such as credibility/digital value, and distributed chain storage.(such
as IPFS、Yotta)To store related resources. Different nodes have different trust relationships and
different trust levels, which constitute a trust relationship chain and different privacy levels. Different
privacy levels have different content levels and value levels. The privacy security model can effectively
address content resource communication requirements and Conflicting privacy requirements. The digital
mapping model is like a real-time, multi-wall and channel set up in a specific use room to isolate multi-
dimensional space.
Natural people, organizations, and products/services can apply for isomorphic digital mapping of IP
nodes in the digital world and are assigned unique node IDs. Each node contains its own knowledge
traceability map and corresponding semantic descriptions according to the different identities given by the
network in the ancillary content and resources.
u The Role of The IPVC Value Chain Solution:
IPVC AVATAR
- 12
u Four: LOGO Curtural Innovation Back Earth
In Indian mythology, AVATAR refers to the force of the heart to voluntarily put on the coat of matter,
creating the world in the name of karma. In Buddhism, Avatar refers to the Buddha nature in human
nature; in the theory of God and Christianity, Avatar is the divinity in human nature.
The law of the world is a common cause, just like the community of destiny. Valuable lotus eight
petals, rounds of reincarnation, manas of the seventh consciousness, end of eighth consciousness
cosmic truth. The six foundations are the source of life, the end of the seven consciousness is the eye of
wisdom, and the eighth consciousness of Arayah is the power of the spirit. The combination of triple purity
means detaching of the three divisions of the universe. Curse wheels means eight kinds of
consciousness are eternal
The tree of the spirit is the meditation of the enlightened,eighth consciousness“Alaya”means the awakening is complete and the sacred ones.
The tree of life is in the shape of a lotus .It means the “God came to earth”.The source of everything buried in the soil.
The tree of wisdom is the shape of the cross and infinity, symbolizing all over the world is “Wisdom access”Even endless。
Tree of Spiritual
Tree of Life
Tree of wisdom
IPVC AVATAR
- 13
Big Calculation Era
IPVC
IPVC
IPVC AVATAR
- 14
1.1 Trends of the times Big calculation is the inevitable result of the times
The concept of Big Calculation was proposed by technology executives such as Microsoft and Google
in 2012.。 The emergence of cloud computing, machine intelligence and big data contains greatly
expanded the application of computingDemand, large and complex data processing requires a large
number of core large-scale workloads, usually in the hundreds or thousands of cores. The emergence of
blockchain technology is the beginning of the calculation of qualitative changes, so that computing contains
the ability to redefine value, determine value and transfer value. At the same time, intelligentBusiness
development, internet of thingsLarge-scale application、Big data and cloud storageAppeared
untilBlockchain revolutionBorn. The inevitable result of the development of the era of computers and the
Internet---big calculations came into being.
1.1.1 Development needs
Wide range of applications
Big Calculation is the one-stop solution for the future intelligent digital economy (Intelligent Digital
Economy One Stop Solution). Its emergence is based on the following major application claims:Image
rendering, fluid dynamics, financial risk modeling, oil exploration, drug design, and engineering stress
analysis。
1.1.2 Typical features of large computing applications
1、Distributed operation:Work can be split into discrete tasks that can run simultaneously across
multiple cores;
2、Low cost and energy consumption: Large calculations receive limited work tasks, receive input,
perform processing operations, and then generate output. The running time of the entire application (from
minutes to days) is limited. The common pattern is to suddenly provision a large number of cores, and the
number of cores is reduced to zero after the application is completed. At the same time, the application
does not need to run around the clock, which greatly saves energy consumption;
4,、intelligent result exchange: For some applications, tasks are independent and can run in parallel. In
other cases, tasks are tightly coupled, which means they must interact or exchange intermediate results;
5、The calculation is controllable: to use different sizes of calculations according to the workload.
1.1.3 The advantages of big calculations:
1、High performance with "easy parallel" processing;
2、Can use hundreds or thousands of computer cores to solve large problems faster;
3、Access to high-performance dedicated hardware through a dedicated network;
4、The amount of calculation can be pre-configured according to the needs of the work.
1、Big Calculation Era
IPVC AVATAR
1.1.4 Great Significance
"Big Calculation" is based on the value blockchain Internet, using smart value computing applications
in value demand areas, integrating IoT and big data, creating new value, providing users with unlimited
computing power and unlimited computing resources. Free-transaction, self-operating and automatically
expanding decentralized value application services.
The birth of Big Calculation can solve the bottlenecks and limitations of data integration, technology
convergence and value exchange, so that all current Internet data and technology applications can be
upgraded to higher dimensions, improve efficiency and reduce costs. All unnecessary production links,
management links, distribution links, transportation links, and rooms are central nodes in the middle of
compression. The use of intelligent algorithms can save a lot of time cost of value exchange. By means of
blockchain, the terminal equipment, network bandwidth, computing resources, data islands, technical
barriers and intelligent algorithms on the Internet are integrated into the large computing ecosystem to
empower the intelligent digital economy industry chain and reconstruct existing ones. Economic structure
and structure.
1.1.5 Companies in the era of Big Calculation
Decision layer: Business Intelligence Big Data
Management: Business Intelligence Algorithm
Executive layer: robot or AI artificial intelligence
IPVC AVATAR
- 16
Before the advent of Big Calculation, the human network was constantly proposed by different people
from all walks of life. However, because the economic, social, digital/model, and technology/protocols were
not effectively integrated, it was difficult to reach a general consensus and ultimately could not be realized.
In this regard, we use the neuron integrity value chain model and privacy security model to construct
the IP value chain (IPV).C), more universal than the human network. IPVC forms a chain of trust
relationships between trusted IP nodes, and the content and resources are directed to secure flow
(propagation and communication) within the chain of trust relationships, and further complete distributed
collaboration and corresponding value exchange.
The neuron integrity value chain model synthesizes the real world into a digital world, with a high
degree of generalization of the relationship between nodes and nodes. The nodes are divided into three
categories: person, organization, and product/service. The multi-dimensional array is used to represent the
two types of dynamic evaluation points of integrity/value, and the distributed chain storage protocol is used
to store related resources. The nodes have different trust relationships and different trust levels, which
constitute a trust relationship chain and different privacy levels. Different content levels and value levels of
different privacy levels are also different. This privacy security model effectively solves the content
resource dissemination. The problem of conflicting needs and privacy needs. In real life, we can assume
that a specific use room contains multiple doors to isolate multiple spaces.
Everyone, organization, and product/service can apply for a homogeneous IP node in the digital world
and be given a unique node ID. Each efficient node contains its own knowledge map semantic description
in the subsidiary content and resources according to the different identity of the node (divided into four
categories: content supply and demand and resource supply and demand).
Each IP node functions as a cloud server node, a cloud relay node, and a cloud storage node. The
cloud storage node uses distributed chain storage to store content and resources in a distributed manner.
The cloud servo service provides information synchronization between IP nodes and various types of
terminals and APP/DAPP applications of the corresponding owners. The cloud servo service
communicates with the cloud relay service. The communication and communication between the IP nodes
are completed, and the user sends a demand propagation instruction to the cloud servo node through the
DAPP, and the cloud servo node is directionally propagated to the target cloud servo node according to the
required knowledge map, and only the cloud servo node using the same knowledge map template and
matching the supply and demand is used. In order to receive the demand and provide related resources,
the cloud relay node in the trust relationship chain needs to trust the pre-relay node at the same time and
“willing” to relay to ensure the spread of demand. It should be noted here that the relay of the relay node
may be performed according to a prior setting or may be performed by the user after the DAPP operation
corresponding to the node.
1.2 People In The Era of Big Calculation
IPVC AVATAR
- 17
The above services implement the partial proxy function of the IP node to the affiliation (or organization), which combines new productivity, production materials, and production relationships. Through the targeted dissemination of content and the directed communication of resources, the digital form of distributed collaboration is completed, making full use of the resources of each node's affiliation/organization, reducing human intervention and participation, reducing costs and improving efficiency. In the digital economy of the intellectual age, the new productivity is AI and HI (human intelligence HI, far from being fully utilized), the new production data is big data, and the new production relationship is blockchain. In IPVC , the IPCP protocol is used to complete the identity management of the IP node, the IP node's propagation communication and the IP node's resource matching function, and the IP node and its subsidiary resources are stored based on the distributed chain storage protocol, and the IP node is completed based on the cross-chain protocol. Exchange of digital assets. The IPVC protocol, distributed chain storage, and cross-chain protocols form the basic protocol of IPVC and become the basis for realizing the digital economy to build a digital ecosystem.
productive forces
Production materials
Relations of production
Economic characteristics
Intellectual age
HI (senior, expert, think tank, intellectual property)
Project digitization
Distributed collaboration
High risk, high return, future revenue capital / talent / resources jointly
driven
Digital economy
AI/HI collaboration tool
Accurate big data, data
assets
Blockchain, pass model
Driving one, two, three production into
the real economy
IPVC implemen
tation
IP node-associated application
(human or AI driver)
Content and resources
attached to the IP node
IP node trust relationship
chain
Linking demand, trading power,
productivity, and production materials
with flexible production
relationships
TakePractical example: Networking the entrepreneurial network of 4,000 mentors and their
counseling entrepreneurs in YBC, the largest entrepreneurial support organization in China. Entrepreneur,
entrepreneurship projects, entrepreneurial resources, mentor resources, mentor resources, mentoring
service resources, and mentoring industry resources are digitized according to the above methods, and
the entrepreneurial knowledge map is defined. On this basis, the aspects of Haier’s foreign exchange
for five years are combined. Forming a sea-breaking chain——The new collaborative innovation
ecosystem and the truly co-founded platform create a multi-layered eco-tool from Idea to IPO.
1.3 New Productivity In The Era of Big Calculation
IPVC AVATAR
- 18
IPVC IPVC Value Confirmation Ggreement
IPVC AVATAR
- 19
In the era of Big Calculation, IPVC A basic protocol is needed to quantify and validate the value of data between IP nodes for accurate transmission and communication. The protocol is based on defining identity relationships and descriptive resources, and implementing content and resources through incentive layers and smart contracts. Securely directed propagation within the value relationship chain, ie IPVC (Intellectual PropertyValue Confirmation) agreement. The emergence of the IPVC protocol enables various IP nodes, terminals, and APP/DAPP to openly collaborate, share data, and distribute digital assets. At the same time, it reduces human participation and intervention in the process to achieve (semi) automated operation.
2.1 Semantics, knowledge map, authority relationship chain and governance mechanism Semantics, knowledge maps, privilege relationship chains, and governance mechanisms are the foundation of the IPVC protocol, and are related to organizational consensus, supply and demand matching, and privilege levels. The IPVC protocol borrows the existing achievements of the current knowledge map and applies the new blockchain technology to promote the standardization and continuous evolution of the knowledge map templates of people and organizations. Simultaneously, IPVC Defined a supply and demand map template, creating a new blockchain multiple confirmation mechanism, let IPVC Users are willing to participate in and improve the knowledge map of their respective fields and obtain corresponding data value rewards. The knowledge maps involved in the IPVC protocol and the IPVC value chain include: Chinese and English basic knowledge maps, domain knowledge maps, identity and relationship knowledge maps, supply and demand description knowledge maps, and knowledge map trees (knowledge maps of knowledge map templates).
2.2 Protocol implementation This protocol family includes the identity relationship layer, the resource description layer, the authority relationship and the governance mechanism layer, and the communication communication layer. The identity relationship layer and the resource description layer are the basis of the communication and communication layer.2.2.1 Identity relationship layerl ID and identity, registration ID, acquisition ID, definition of the same ID, different identity, identity in
the knowledge map defined by the system, can be inherited;l Identity and resources, resource types are related to identity, that is, resources are related to identity
and domain knowledge maps;l Identity and relationship, the same identity can have multiple relationships with different people;l Privacy security, relying on a particular relationship with identity and others is accompanied by a
trust relationship, and multiple levels of resource outlines can be set for resources of the corresponding identity. This involves relationship and privacy, relationship privacy and resource dissemination, and dissemination of relays;
l Synchronization, involves synchronization with the application, synchronization with the device, synchronization with the service node (AI proxy, knowledge map service node);
l Node supply and demand, describing the supply and demand knowledge map of the resource to which the node belongs;
2 IPVC Value Confirmation Agreement
IPVC AVATAR
- 20
2.2.2 The resource description layer(Requires a domain-specific knowledge map service node to provide services, not within the IPVC protocol standard, to fully enjoy the existing knowledge map results and retain flexibility and scalability)l Resource storage and extraction, complete data storage and extraction of resources through
distributed chain storage;l Resource summary and privacy level, complete multi-level resource summary through a specific
domain knowledge map service node according to different privacy levels;l The resource knowledge map tree management forms a knowledge map for the knowledge map
template involved in the entire IPVC , and forms a special ID number or containsh value of the knowledge map template;
l Resource matching management, for the supply and demand of two nodes, the resources are matched by the same knowledge map template, and the corresponding values are returned;
2.2.3 Authority relationship and governance mechanism layer(Level of application blockchain grading technology)l Linear permission rule 1: The parent rights management sub-rights, the power to unconditionally
reclaim sub-rights;l Linear permission rule 2: The child applies for digital permission to the parent, and the parent
custom permission uses the scope;l Parallel permission rules: brother and brother subcontract different permissions, have full authority
through certain mechanisms;l Adaptive governance mechanism 1: There is no arbitrary account usage authority within a certain
period of time in the authority system, and the system will freeze all account permissions in the system in batches;
l Adaptive Governance Mechanism 2: A frozen account requires a certain incentive layer fee to be reactivated;
l Adaptive Governance Mechanism 3: Sub-rights can restrict parent authority by voting.
2.2.4 Communication layerThe sending node sends a certain data resource request to the directional node. After the relay node that is valid in the trust relationship chain propagates multiple times, a receiving node receives the request. After N times of communication, it determines that the data can be supplied and sent. The order message is acknowledged or rejected by the sending node.Task node type:A. Sending node: sending corresponding content, data and resources within the chain of trust
relationships, including supply, demand and corresponding permission mechanisms;B. Orientation node, receiving node: receiving corresponding content, data and resources within the
trust relationship, including supply, demand and corresponding permission mechanism;C. Relay node: Forwards the corresponding content, data and resources within the trust relationship
chain, including the supply, demand and corresponding permission mechanism; including the definition of the preceding node and subsequent nodes and the propagation rules;
u Value Chain Agreement in The Era of Big Calculation
IPVC AVATAR
- 21
2.3 Task definition
A. Propagation task definition: The sending node specific identity sends a resource requirement to the
directional node, and carries the knowledge map ID of the corresponding requirement;
B. Relay task definition: After receiving the information of the previous node, the relay node
determines the process of the propagation policy according to the rules and permission rules;
C. The definition of the communication task: the sending node sends a certain resource request to the
directional node, carries the knowledge map ID of the corresponding demand, and the receiving
node feeds back its related resources to the sending node (AI/HI) to interact with it;
DReceiving task definition: After receiving the information, the directional node confirms that the task can
be received through the resource matching function of the resource description layer, and sends an
acknowledgement action to the sending node in the name of the receiving node;
ISRecognizing the task definition: After receiving the receiving task of the receiving node, the sending
node performs judgment (AI/HI) to send the acknowledgement action;
FRejecting the task definition: After receiving the receiving task of the receiving node, the sending node
performs a judgment (AI/HI) to send a reject action;
The IPVC value chain and IPVC protocol are important network foundations for large computing,
returning humans from device-based networks (PC Internet, mobile Internet, and various Internet of
Things) to the original, ie user-based human network, based on supply and demand IP. The value chain
(ie, IPVC , which includes the human network and networking with the corresponding organizations,
products/services), enables distributed collaboration of distributed organizations, distributed businesses,
and individuals to be realized, which will release huge individual energy, especially It is an individual's
relationship assets and intellectual assets, which produce nuclear fission and fusion effects through the
butterfly effect.
In addition, the value of the human network in project incubation. Further development, the open-loop
collaborative innovation ecosystem and the corresponding value closed loop will be born, and finally form
a credible digital ecology.
u Value Chain Agreement in The Era of Big Calculation
IPVC AVATAR
- 22
IPVC Business Model IPVC
IPVC AVATAR
- 23
Intelligent Property Value Chain ( IPVC ) is also known as the intelligent intellectual property value chain.
Its business system consists of four basic systems: the basic hardware chain layer, the distributed
management system, the chain application matrix, and the IP intelligent business platform.
3.1 IPVC basic hardware chain layer The hardware chain layer is the infrastructure of the IPVC development business ecosystem. The chain
layer system is further divided into the Chain Hardware Cloud System and the Basic Chain Control System.
3.1.1 Hardware Distributed Cloud System (CHCS)
CHCS is the survival soil for IPVC big data and distributed Big Calculation. It is suitable for different
hardware manufacturers, B-end services and home market. The hardware cloud is composed of the
following three types of benchmark products:
1. Hardware cloud base station (super node)
The hardware cloud base station is the abbreviation of large-scale distributed cloud storage service
center. The base station-level chip matrix facility and the 10 Gigabit network environment ensure extremely
high data throughput and achieve high performance of distributed chain storage systems to meet large-scale
commercial applications. High TPS requirements for applications.
2. High-end distributed cloud server (high-end node)
High-end distributed cloud servers are targeted at cloud data service centers of SMEs and educational
institutions. High-end hardware devices and Gigabit network environments ensure high throughput and meet
the business needs of SMEs.
3. Household distributed cloud intelligent terminal (flow node)
The home distributed cloud intelligent terminal can carry, support and build various IPVC -based DAPP
application matrices and smart devices, and is the basic product for realizing the IPVC distributed global
intelligent cloud network.
3.1.2 Underlying Chain Control System (BCCS)
BCCS is a supporting control system for the Chain Cloud Storage System (DCCS), which consists of the
following three systems:
3.1.3 User Management System
The IPVC user login must provide the blockchain wallet address private key or mnemonic, and can also
be combined with identity and multiple authentication to enjoy more IPVC business functions.
3.1.4 Chain Hardware Cloud System
IPVC uses the exclusive development of Chain Eternity Permanent Encryption Reduplication, with the
latest features such as classification and encryption chain storage and encryption deduplication.
3.1.5 Authoration Scheduling System
The IPVC scheduling system is used to manage the privilege grading and data resource scheduling of
different users, and can realize the reasonable allocation of data confirmation and incentive layers. It is the
basis of distributed governance and chain application matrix.
3 IPVC Business Model
IPVC AVATAR
- 24
3.1.6 Advantages of IPVC basic hardware chain layer
1. The chain cloud storage system is based on the same hardware, compared with centralized cloud
systems, such as Microsoft Cloud, Google Cloud and Alibaba Cloud, based on the high security and
adaptive management of the blockchain system itself. The operation and maintenance cost is less than 1/3
of the traditional cloud;
2. Compared with the traditional cloud data resource monopoly, the unique incentive layer mechanism of
the blockchain system enables all developers, system vendors, B-ends and even individuals involved in the
construction of distributed cloud infrastructure to have a long-term value data production project. In the
middle, obtain the certificate value of the same value as its own contribution; with the continuous
accumulation and sharing of high-quality data resources, the value of the system itself will continue to grow.
In fact, the IPVC distributed cloud itself is a benign development of the sharing economy system.
3.2 IPVC distributed management system The DAO (Decentralized Autonomous Organization), also known as a distributed autonomous
organization, can be viewed as a company operating without any human intervention and handing over all
forms of control to the distributed governance charter, which is overseas and geeks. The circle is more
popular, operating under a set of non-destructible business rules, and its absolute credibility and execution
make it invaluable.
3.2.1 Distributed contract
Distributed Argeement is the core business of DAO organization execution rules, and is built on the
contract layer of the public chain system. In fact, as long as the smart contract does not suffer from attacks
that call most nodes during the execution time of the rule, its business logic must not be destroyed, which
means that the rule attacker (hacker) is paying far more than the value of the rule. There is also no
guarantee of a very small success rate.
3.2.2 Trusted Bylaws
Trustworthy Charter is a method for DAO organizations to implement an organizational (company)
system on a blockchain system. Based on the continuous development and maturity of smart contract
programming technology, organizations (companies) can make powerful based on public chain systems.
Execution and operation.
The intelligent "chaining" of rules is the key to truly implementing decentralized applications (DAPP).
Logically, it can be seen as the "two in one" of the contract layer and the application layer. In fact, this is
another manifestation of the company's (organization) charter system in blockchain technology. The
difference is that the traditional company charter is based on the logic of the rule, and the rule chaining is
based on the consensus logic of the blockchain.
u IPVC Business Model
IPVC AVATAR
- 25
In terms of execution, the rule based on the law depends on whether the natural person or organization is “obeying the law”, while the chain-based logic enforces the unconditional enforcement of the rules. That is to say, the former depends on the subjective initiative of the natural person, and the latter depends on the objective existence of the trusted mechanism. In terms of cost, those who subjectively violate the law are subject to due punishment. Defenders need real evidence, lawyers, and a lot of time, and there is a high risk of losing the law due to imperfections in the current regulations and other uncontrollable factors. . Based on the basic elements of the blockchain system: traceability and time stamping, the evidence of violations is conclusive, and the cost of evidence collection is extremely low; based on the data security and intelligent rules of the contract layer, the offenders will be based on the blockchain-based automatic law enforcement system. Get the punishment you deserve. The data is distributed to the trusted nodes in the block network. All transaction processes are confirmed and executed according to the intelligent rules according to the consensus reached in advance, and there is almost no possibility of human interference. Obviously, the chain-based intelligent charter system contains the unparalleled advantages of the traditional organizational system, and its characteristics can be briefly described as: code is the law.
3.2.3 IPVC 'S "trisomic" intelligent charter The Trusted Smart Charter is the basis for the DAO organization's strong enforcement rules, and the equity certification is the DAO organization's equity allocation optimization. In the current blockchain system, Token's Chinese title "tokens" is actually a pseudo-concept, which is actually more appropriate for the "digital equity" of DAO organizations. Looking at the blockchain or the closing of the stock market, the vast majority of organizations or companies Contains serious problems in governance. The reasonable equity distribution system is the basis for the company to become bigger and stronger, and its significance is not described here. Regardless of the size, the chain-based DAO organization can have both a credible charter and an intelligent pass-through equity allocation system, which is enforced on the basis of credible rules and constraints, greatly improving the DAO organization's own advantages and limits. From the point of view of chain business logic, the combination of credible charter and equity pass-through is the “three-in-one” of the incentive layer, contract layer and application layer, which can give full play to the advantages of blockchain technology.
Contract layer/Contract Layer
Application layer/Application Layer
Business element
Business element
Trusted mechanism
Powerful execution
Effective governance
Multiple application
Authority scheduling
Traffic flow
u IPVC Business Model
IPVC AVATAR
- 26
In summary, the distributed governance system is a magic weapon for DAO organizations to achieve
benign operation and high execution. IPVC contains established a reasonable DAO organization intelligent
pass-through governance mechanism - "trisomic intelligent charter", and in the blockchain system Strong
execution is a reliable guarantee for establishing high trust within the organization and between
organizations and performing business efficiently and reasonably.
3.3 IPVC innovation application - distributed programming cat Graphical programming is the current trend and trend, especially in the children's programming
education market, which contains gained popularity around the world. However, there is currently
no landing application that can be combined with the blockchain ecology and the education
industry chain. The distributed programming cat developed by the IPVC team contains made up for
this gap.
Programming cat product innovation:
1 Renovate existing Arduino robots and Scratch graphical programming software to anchor Token
and works, knowledge and Token binding value;
2 A large number of high-quality or ordinary works and a different number of Token anchors, to
achieve circulation in the secondary game program market;
3 Buyers and sellers can even anchor gizmos and procedures with the corresponding number of
Tokens for circulation on a global scale;
4 At the same time of Coder's assetization, it introduces new products such as big data, distributed
security, AI robots, and deep learning, and then creates a new educational ecology in the chain: the
global DIY era.
Contract layer/Contract Layer
Application layer/Application Layer
Business element
Business element
Trusted mechanism
Powerful execution
Effective governance
Multiple application
Authority scheduling
Traffic flow
Incentive layer/Actuator Layer Business element
Cloud hub
Data determination
Pass through
u IPVC Business Model
IPVC AVATAR
- 27
3.4 IPVC 'S Intelligent IP Business Platform The physical layer of the intelligent IP (intellectual property) commercial platform consists of three
systems: IP digital asset registration and confirmation platform, intellectual property data trading platform and
data resource storage platform.
At present, the IP market contains been over-interpreted, resulting in a variety of chaos, including:
messy licensing, content homogeneity, pricing system disorder and transaction opacity. Throughout the
above situation, after the deposition of a large number of academic creation practices and commercial
transactions, the blockchain + IP industry is integrated into the intelligent business landscape of the IP
industry chain.
Its content includes: IP copyright protection, content-based education product sales, digital advertising
precision delivery and industrial IP cross-border and integration.
The Expert Advisor Market Consists of Four Levels:Level 1: Knowledge copyright protection deposit and IP confirmation
Level 2: IP-derived Expert Advisors
Level 3: IP equity split
Level 4: IP Rights Sharing
3.4.1 Copyright Rotection Based on the blockchain technology, the decentralized copyright protection platform can digitize the
works of educators and original authors, and maintain data retention.
Traditional copyright deposit method: an original method to protect its own intellectual property rights.
The postal express mail is used to send the printed copy of the work to itself. After receiving it, it will not be
opened, and the time on the postmark will be used to prove that it already owns the work. The drawbacks of
this are obvious, that is, the postmark can be fraudulent; it is difficult to prove that the envelope contains
never been opened; only part of the physical copyright can be accessed. Therefore, the deposit of copyright
contains always been the pain point of the entertainment industry. However, from this original method of
deposit, we can still learn from its basic principles and necessary elements, that is, the need for reliable
storage, proof of tampering, privacy protection of content, and time stamp. Through the traceability,
distributed, non-tamperable characteristics of the blockchain itself, as well as the technical characteristics of
containsh algorithm, asymmetric encryption and timestamp, we can easily realize the deposit of the user's
digital IP assets.
Such as copyright disputes:
In the first step, the trading platform will provide evidence of complete legal action and time stamps for the
original author.
In the second step, the outcome of litigation disputes will have an impact on personal credit. This credit will
be gradually opened up with a credit information platform like Sesame Credit, with a view to jointly promoting
the establishment of a new social credit system.
u IPVC Business Model
IPVC AVATAR
- 28
3.4.2 IPVC 's new O2O advantage
The traditional "three difficulties" of O2O:
It is difficult to conduct on-line diversion; IP homogenization is serious; incremental conversion under the line
is difficult.
Advantages of the new O2O:
1. Apply intelligent charter technology to anchor the rights and flows;
2. Change the way IP knows the right to confirm, and encourage originality and sharing through the equity
incentive system;
3, through the IPVC DAPP tool flow, to ensure the high efficiency of offline drainage conversion.
3.4.6 IP copyright extension transaction
The type of product tradable is theoretically infinitely subdivided over time. For the moment, it mainly
includes: IP creation, online education, offline lectures, and knowledge competitions. It is not difficult to see
that these large blocks can be split twice, such as IP creation including narrative, application, description and
so on. Among them, the IP value produced by the literary creation in the narrative is the largest.
In the era of traffic economy, online education is realized, including the landing event itself (education
lecture hall, exchange meeting, live competition, etc.), including second-degree communication based on the
scene, including live broadcast and VR live broadcast. Such things can radiate hundreds of people and even
single scenes to everyone. As a result, IP copyrights are likely to be deeply realized.
Based on this class, we found that the content of IP in the ubiquitous entertainment industry is deeply
overlapping. Such as literary creation IP,TianYa's novel creation The Legend of the Sword and the
Chivalrous Man, selling the copyright of its derivative TV drama to South Korea’s A party, shot out Fairy
sword5 as TV drama, at the same time will Fairy sword3 as The film adaptation rights were sold to the
Chinese party B. Party B sold the concert copyright of the movie of the same name to the Chinese C party
for the need of its own box office sales. In order to ease the pressure on the box office of the concert, Party
C sold the live broadcast of the concert to the live broadcast video website D. The copyright was sold to the
E party. Due to the need for self-realization, the D party sold part of the live broadcast to the online title, and
the other part was sold to the company's content purccontainse party F and party G. At last,The author of the
fairy swordIt is very likely that I saw the movie concert on the LED screen of the airline.
By analogy, the derivation of IP must be the process of re-creation.
u IPVC Business Model
IPVC AVATAR
- 29
3.4.3 Intellectual property rights and multi-layered income Using intelligent pass and contract nesting technology, multi-level management and privilege grading of
IP products and intellectual property rights, complete ownership of copyright owners on sidechain Smart
Token, ensuring legal income of intellectual property owners, and passing Chain incentives reward original
creators and knowledge IP reprocessors. The principle is to encourage original creators and intellectual
reworkers, each transaction can generate incentive income for the original and the previous batch of IP
reprocessers.
Example: The third-tier premium yield can generate additional benefits for the second-tier reworker and the
first-tier creator.
3.4.3 Intellectual IP and Intelligent Rule Anchoring Schematic
Contract nesting
digital signature
IP data assetsTwo-way anchoring
IP data increment
digital signature
Known production three times IP data increment
Mixed
Reed
Floor
CAN POC
CAN POC
CAN POC digital signature
Known production N development IP data increment
rights and interestsAnchored
Intellectual propertyConfirmation
Equity transfer
Equity transfer
Payment pass
CAN POC
Intellectual property transferEquity transfer
Three levels of separation
Payment pass
Intellectual property transfer
Smart Token Smart charter
Intellectual originator
Secondary development of intellectual property
Intellectual Property IP Reprocessing Chained Incentive Mechanism
Knowledge IP creator
Equity and Smart Token binding
Knowing property ownership buyer
+ 10 + 1 +1 + 10 + 1+ 10
First layer incentiveSecond layer incentiveMulti-layer incentive
u IPVC Business Model
Development
Pass gain
IPVC AVATAR
- 30
3.4.5 Content-based IP product sales and intellectual property trading platform The blockchain-based de-intermediation IP intellectual property trading platform will bring users peer-to-
peer media data content and eliminate the operating costs and share of the centralized platform. Content
creators and users can maximize their content. reward.
There are usually two types of IP transactions. First, in the process of trading this type of IP, traders
have low influence due to short creation cycle. Usually sell your own IP products directly for liquidation. In
this case, the buyer and the seller basically only follow one decision condition: the price is higher. In such
cases, buyers and sellers only need the most basic anonymous transactions.
The second is medium-sized or large-scale IP. The author is largely concerned with the consideration of
his own reputation and the quality of his works. The bidding of the highest bidder is not the only condition.
The author usually conducts actual investigations on the qualifications of the seller, the ability to adapt, the
company or personal reputation. Such large-scale IP sales require more repeated exchanges and
confirmation of anchors between online and offline buyers and sellers.
The trading model of IP IP trading platform created by IPVC follows the following process:
1.Copyright Protection2.Transparent market3.Reduce the cost4.Smart contract
next levelcycle
platformpurpose
next levelcycleEntertainment IP
IPType split seller
Secondary element
Event Movie literatureon siteeducation
Professional skills, art, academic education, short
film...
Knowledge contestphysical education......
Seller sets intrinsic properties
Stage playLive houseCommunication festival
1.Cycle2.Types of3.Price4.Purccontainsing resource5.Prepaid6......
1,Budget range2.Seller qualification3.means of transaction4.......
1,title2.broadcast3.Reporting with other credit platforms
END
Punishment mechanism
Private transactions
Real name transaction(Large IP) Unnamed transaction
(Small and medium IP)
END
FALSE TRUE END
witnessInitiate witness
Seller(maximum part)
Platform fee(very small part)
Buyer sets intrinsic properties
Initiating a request
transaction match
Seller(maximum part)
Platform fee(very small part)
unfinishedtransaction
Seal the dealboth sidesDeclining credit
platformprovideMatch line
Third party involvement Increased
creditworthiness between the two parties
Transaction amount
carry out
Transaction amount
u IPVC Business Model
IPVC AVATAR
- 31
3.4.6 IP Sharing
Every IP fan should hold this IP, just like a product shareholder. When IP values are distributed among
the various holders in a fragmented manner, we can tailor smart contracts to individual requirements and
intelligently share a premium IP copyright. The quality of the IP should be tested by the market, not by any IP
holder or resource monopoly. Once the direction of distributed development is determined, the trend of IP
resource centralization will be effectively curbed.
When a literary creation, the author indicates that the purpose of writing is to allow more people to
accept the enlightenment of the content rather than profit, then the IP source can be shared without the
authorization of the source author and the IPVC autonomous committee (refer to the current copyright open
Some IPs, such as the four major books).
u IPVC Business Model
IPVC AVATAR
- 32
3.4.7 Autonomous Commission of IP Intellectual Property Trading Platform
Generation of the IPVC Autonomous Commission:
The Autonomous Commission will be elected by all members of the IPVC community in accordance with the
DPOS mechanism.
IPVC Autonomous Commission ruling mechanism:
(1) The members of the autonomous committee that are elected for each vote will vote on an asset-based
transaction; when 10% of the members of the self-governing committee believe that the IP contains
fraudulent activities such as plagiarism, the IP's request for shelves is rejected;
(2) The members of the autonomous committee participating in the voting will receive the fee for the IP on
the basis of the contribution;
(3) The members of the autonomous committee that participated in the voting cannot participate in the next
election, but the right to participate in the voting election guarantees the decentralization of rights.
3.5 IPVC Talent Value Resource Market Through distributed big data technology, real-time collection of recruitment demand data of various
industry companies, creating a model of the pass-through economy, encouraging industry practitioners to
share and upload their own social media, resumes, job search needs and other data, and through
decentralized encryption storage The way to return the data to the user. For industry executives and industry
veterans, the IPVC platform will motivate users to upload resume data, and build anonymous trading spaces
through smart contracts and encryption technologies to facilitate data exchange between headhunters or HR.
u IPVC Business Model
IPVC AVATAR
- 33
4.1 Resonance Source Community Introduction Resonance Source Community (RSC) in 2017 by International Computer Experts within the United Nations Blockchain TechnologyGeeksThe established programmer distributed organization (Coder DAO) aims to deepen the blockchain technology and popularize technology while targeting the Github open resonance source community, setting up a global programmer community based on the public chain system to implement open source code blocks. Chain assetization, creating a blockchain digital world that belongs to the programmer. Science and technology are the primary productive forces, and outstanding talents are the first resources. Based on the spirit of the DAO organization contract, the backbone of the resonance source community technology contains a long-term consensus on the blockchain dimension, deep understanding of the blockchain technology, and the development of the public chain, consensus algorithm mechanism and sidechain application. Major breakthroughs have been made in technology and other aspects.
4.1.1 Resonance source community historical mission Most programmers belong to the "both physically and mentally exploited class" crushed by the company and the boss. They do the hardest work, but often do not receive fair and just rewards or evaluations. A considerable number of older programmers have been ruthlessly dismissed by commercial companies due to declining energy, not being promoted or transformed in time. New companies often rely on their age to be more efficient than young programmers, making it difficult to find the right job. This is the universal status quo that contains been ruthlessly sung as a “code farmer sweatshop”. The programmer community contains created tremendous value for the society. The entire Internet age was created by the youth, wisdom and blood of the programmers, but most of the treatment and real value have not been truly fulfilled. Based on this situation, the resonance source community will re-polist the value consensus tool flow in the blockchain era, develop a distributed collaboration system for programmers based on the public chain system, and redefine the reality and potential value of the programmer community - liberating "code farmers" .
4.1.2 Resonance source community organization form Resonance source community core personnelInternationalizedSenior hardware and software development experts, functional departments are divided into open source (closed source) development project team,Business resourcesThe department, while the operations marketing department is composed of marketers who understand technology.
4 Resonance Source Community
Ministry of Education and
Resources
Development project team
Resonance source
community
Development project team
Founding
Core layer
Partnership
Executive layer
IPVC AVATAR
- 34
5.1 Introduction to IPVC Public Chain System:
The public chain system is based on the generally accepted value consensus mechanism and is the
best digital carrier for value addition. The public chain system adopting the first consensus mechanism can
often achieve success, such as: BTC, the first POW workload proof mechanism; ETH first intelligent contract
chain layer; EOS, BTS first DPOS voting authorization mechanism; IPFS pioneered distributed data
excitation layer; VDS initiative Resonance V pool financial mode; thus the importance of the first launch
mechanism.
IPVC parallel public chain system innovation multi-dimensional incentive layer, innovatively DPOS,
BFT,POWThe consensus mechanism is ingeniously integrated, and the IPVC project matrix is empowered
according to technical characteristics.
5.2 IPVC public chain technical characteristics
A blockchain is a string of data blocks generated by cryptographic methods. Each block contains
information about several network transactions for verifying the validity of its information (anti-counterfeiting)
and generating the next block. The user is a public account book that records all transaction records and can
be understood as a distributed database for developers. The blockchain database is characterized by
decentralization, openness, autonomy, and non-tamperability. Blockchain is closely related to decentralized
applications, and is ideal for providing storage functions for decentralized applications (DAPP).
5.2.1 Consensus mechanism
The IPVC multi-dimensional public chain is derived from the research results of the large computing
founding team and the resonance source community, and creatively proposes the DPOS+BFT+Zero—
Knowledge Proof optimal algorithm, the multi-chain heterogeneous value data excitation layer and the space
inventory proof POC (Proof on Space) consensus mechanism, according to Technology type and application
scenario characteristics to achieve the ultimate form of blockchain technology in the era of large computing.
5.2.2 Public chain architecture
5.2.2.1 Basic Data Layer / Base Data Layer
The distributed key is used to store the private key owner signature and the basic data in the underlying
chain. When the user uploads the basic data, the system automatically stamps the time stamp. It is the
lowest-level structure and is the core value carrier of the IPVC multi-dimensional public chain.
5 IPVC Multidimensional Public Chain
IPVC AVATAR
- 35
5.2.2.2 Network Layer / Network Layer The P2P protocol (P2P Protocol) supports data transmission and exchange of nodes in a blockchain network. It is a communication guarantee for data distribution or consensus mechanism. VES supports multiple P2P protocols, communication mechanisms, and serialization mechanisms. Use flexible protocols. In terms of communication security, it supports flexible communication protocols such as WSS (Secure Websockets), HTTPS, TLS, etc., and extends the OAuth-certified integration on the external service interface of the platform application.
5.2.2.3 Consensus Layer/Consensus Layer This layer contains a consensus algorithm and a consensus mechanism, which enables highly decentralized nodes to efficiently agree on the validity of block data in a decentralized blockchain network. It is one of the core technologies of the blockchain and also a community. An effective mechanism for governance.The IPVC public chain will adopt the 1+N composite public chain structure to meet the high concurrency and high interaction requirements of the DAPP application matrix in the 5G+ era. With the hybrid node network and the hybrid consensus mechanism in the round robin, the final achievable capacity expansion effect will be better than the lightning network. The bottom layer of the public chain adopts the multi-chain structure of the Token chain + hybrid data link. The Token chain is based on the DPOS+BFT optimal algorithm, the multi-chain heterogeneous value data excitation layer and the space inventory proof PO.S(Proof on Space) and the public chain established by the importance proof mechanism. The data chain consensus layer is a transaction main chain composed of N different types of consensus mechanisms divided according to the autonomous domain technology, belonging to the 1+N type multi-chain structure. It perfectly solves the problem of performance and expansion of the public chain system. The Token chain and the multi-dimensional data chain are processed according to different divisions and types of business logic and data storage, and communication interactions are implemented between the SEC gateways. The 1+N multi-chain structure changes the technical bottleneck and impossible triangle defect of the traditional blockchain single-chain structure, greatly improves the transaction confirmation speed, greatly reduces the resource occupation of the public account book, and the large-scale transaction demand in the 5G era. Perfect match.
5.2.2.4 Expanding the Data Layer / Expanding Data Layer This layer uses extended chain storage techniques, such as distributed encryption deduplication, to store private key owner signatures and underlying data on the extension chain. When users upload large data, they automatically search for nodes in the chained data storage network to form a new peer-to-peer transmission network, which ensures data security on the basis of ensuring data integrity, thereby further improving the security of storage and access.
5.2.2.5 Mixed excitation layer / Actuator Layer The IPVC multi-dimensional public chain system consists of three layers of excitation and mixing, and can be expanded according to technical characteristics. According to the consensus mechanism of different functional characteristics, it is divided into DPOS+BFT+Zero—Knowledge Proof layer, data excitation layer and POC space layer. The three provide customers with a variety of services, and at the same time transform different types of digital certificates into a diversified data and algorithm market, the market runs on the block with local agreement certificate, by providing customers with multi-function node protocol, Node miners of different types of equipment make a profit.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 36
5.2.2.6 Hierarchical Smart Contract Layer / Any Contract Layer
The hierarchical intelligent contract layer of IPVC multi-dimensional public chain is divided into IBIOS layer, IBCS
layer and IVP layer according to functions. It can run various scripts, codes, algorithm mechanisms and smart contracts
whose functions are restricted by hierarchy, among which IVP The layer is compatible with the Ethereum's Solidity
bottom layer. Embedding code into a multi-level blockchain or pass, to achieve customizable smart contracts, to achieve
certain constraints, without the need to be automatically executed by a third party, is the basis for blockchain
decentralized trust. 5.2.2.7 Application Layer / Application Layer
The application layer of the IPVC multi-dimensional blockchain encapsulates various application scenarios and cases,
similar to applications on computer operating systems, portals on Internet browsers, search engines, exchanges, malls,
or apps on mobile phones. The blockchain technology application is deployed on public networks such as Ethereum and
EOS and landed in real life scenarios. Future programmable finance and programmable societies will also be built on the
application layer.
5.2.2.8 Value Confirmation Protocol Layer / Cross Link Protocol Layer
The value confirmation protocol layer of the IPVC multi-dimensional public chain system is combined with intelligent
side chain technology, containsh locking technology and distributed private key control technology development. The use
of multi-party computing and threshold key sharing schemes, combined with Smart Token and multi-party authentication
path, can achieve distributed computing and more practical functions. (See Chapter 4 for details)
5.3 IPVC public chain integrated application The IPVC public chain is responsible for data sharing and asset routing between infrastructure and applications. The
SDK is responsible for building specific applications.
Application Management:
The DAPP application needs to register the meta information to the main chain before the release. The information
includes the name, description, initial witness, and related configuration information required for asset routing. The user
can browse and retrieve the decentralized application through the module. , traceability, download and access.
Asset routing:
Assets registered on the IPVC backbone can be interoperable (cross-chain) with each application. Although the
applications are isolated, the value routing can be achieved through the asset routing function of the backbone.
Certified Digital Asset Management:
Any account can register and issue several assets based on the underlying smart contract, and the issuer can
configure various assets, such as access control lists.
Non-performing assets can be functionally restricted through the DPOS authorized voting consensus mechanism,
and reactivation requires a number of miners' fees.
Trustee management:
The trustee is also called a witness. Each account with a digital equity credit in the IPVC main chain can be
registered as a trustee. The top trustee contains the opportunity to become the system's bookkeeper. The bookkeeper
contains forge (or called digging). The power of mining, bookkeeping, and submission of blocks, and obtaining certain
digital certificate awards, the trustee can increase the ranking by obtaining the votes of the number owner, and each
number of rights holders can vote for any trustee.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 37
Account Management: The IPVC public chain uses the account model. Each private key corresponds to an account. The account stores basic information such as the user's wallet address, public key, and nickname, as well as other configuration or statistical information. Each application chain uses the same account model. There are currently four different types of applications in the account, and the account owner can use the corresponding functions according to the requirements of the registration function.5.3.1 Side chain structure of IPVC main chainSidechain (SideChain)
Pegged Sidechains, which enable the transfer of digital assets across multiple blockchains, which means users can access new ones with their existing assets and existing applications. The cryptocurrency system. The sidechain is a special blockchain that uses "SPV wedge" technology to transfer assets to and from other blockchains, allowing users to use existing cryptocurrency systems with existing assets. People no longer have to worry that the incentive layer Token is difficult to adopt innovation and adapt to new demands. Just create a side chain and then connect to the original system. By inheriting and reusing the original blockchain, it also avoids the liquidity shortage of the new currency. And issues such as market volatility. And because the side chain is an independent, relatively isolated system, the serious problems in the side chain only affect the side chain itself, which greatly reduces system risk and cost.
Side chain origin: The side chain (SideChains) does not specifically refer to a blockchain, but refers to all blockchains that follow the sidechain protocol. The term is relative to the native backbone.The side chain protocol means: A protocol that allows the main chain Token to safely move from the native backbone to other blockchains, and safely return to the native backbone from other blockchains. Obviously, all existing blockchains, such as Ethereum, can be sidechains as long as they conform to the sidechain protocol. The sidechain protocol is of great significance. It means that the native Token can not only be circulated in the native blockchain, but also can be circulated in other different types of blockchains. Its application scope and application prospects will be more extensive; creative people will Various applications have been developed to allow the sidechain protocol to interface with the native backbone, making the status based on the native chain more robust.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 38
Wedge side chain protocol:
The purpose of the sidechain protocol is to implement Two-Way Peg, so that the native Token can be
rotated in the main chain and the side chain (Figure).
Main chain and side chain diagram
Two-way anchoring is divided into the following stages:
Send a locked transaction and lock the bitcoin on the main chain.
Operated by the native certificate holder, a special transaction is sent to lock the token on the blockchain.
Two-way anchoring diagram
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 39
Wedge side chain protocol:
Ø Waiting for a confirmation period
The role of the confirmation period is to wait for the locked transaction to be confirmed by more blocks,
preventing counterfeit lock transactions and denial of service attacks. The typical wait time is 1-2 days.
Ø Redeem the original Token on the side chain
At the end of the validation period, the user creates a transaction on the sidechain to spend the output of
the locked transaction and provides an SPV workload proof that is output to the address on the sidechain.
The transaction is called a redemption transaction and the SPV workload certification is a proof of the
workload of the redemption transaction block.
Ø Waiting for a competition period
The role of the competition period is to prevent double flowers. During this period (1) the redemption
transaction will not be packaged into the block. (2) The new bitcoin transferred to the side chain cannot be
used. (3) If there is a work permit with a larger workload, that is, the redemption transaction includes The
more difficult SPV proof of the Bitcoin main chain, the last redemption transaction will be replaced.
The role of the side chain:
Sidechains allow blockchains to achieve better performance and privacy protection. They can also scale
to support a variety of assets, such as stocks, bonds, real-world or virtual world currencies, as well as smart
contracts, security processing, and real-world property registration. The side chains can also have other side
chains for micropayments. They can be used for experiments with pre-release versions of future sidechains,
or for experiments with bitcoin test versions.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 40
5.3.2 Technical Status: Complete Script VS Side Chain One of the highlights of the design of the large public chain system is the scripting engine. Based on a
complete scripting engine, not only can the ordinary transfer function be realized, but also smart contract
applications such as multi-party signature, mortgage guarantee, and gaming games. However, due to
security and the difficulty of implementation at that time, the script system of the first-generation blockchain
system was designed to be relatively simple and limited. For example, it does not support loops, script length
is limited, and only supports several standards. Type of transaction.
Ethereumto representThe second generation blockchain system is an example. Its biggest feature is to
build an extended intelligent contract layer, which greatly improves the function of the script engine. It adds
new commands such as reading blockchain, billing, and jump, and also releases Stack memory, function call
depth, and script length limits. Its scripting language is basically complete with Turing. With such a script,
developers can implement almost any function that can be expressed mathematically.
Since Ethereum, extended scripts have become a popular way to implement decentralized development
platforms, but a big disadvantage of this approach is that the application code itself and the data generated
by the application are in the same blockchain, resulting in The rapid expansion of the blockchain. Ethereum
tried to delay this expansion by optimizing and compressing the block and the transaction itself, and it was
just a way to cure the problem.
In addition, the script-based applications share the same book, and parameters such as block generation
time cannot be customized, which undoubtedly limits the personalization of the application.
The sidechain mechanism is scalable through another dimension, each running on a different distributed
node network with separate audiences, investors, and development teams. This natural sharding solution not
only solves the problem of blockchain expansion, but also contains a personalized set of books for each
application. The consensus mechanism, block parameters, and transaction types can all be customized. We
believe that sidechains are a lower cost, more flexible, and easier to use solution than full trading scripts.
u IPVC Multidimensional Public Chain
Ledger 1 Ledger 2
Sender Market maker Recever
IPVC AVATAR
- 41
5.3.3 Status of Chains: Analysis of "Currency" and "Shares" If the primary token access method of the public chain system, “mining”, is regarded as the “currency”
issuance system of the digital kingdom, then the sidechain token issued based on the smart contract is the
digital equity of the digital kingdom “company”.
At present, the block chain is the most common side chain of Ethereum. Sidechain Token's smart
contracts generally have only six common functions: trading, authorized address usage, authorized address
transactions, viewing authorized quantities, viewing token balances, and viewing token information. The flaw
is obvious, the ordinary Token does not have any governance functions.
In the stock market, the final guarantee for investors is the regulatory authorities. If legal or natural
persons violate the law and discipline, their stocks will be frozen. Even if the heads of listed companies hang
the "Sword of Damocles", the stock market is still in turmoil.
In the currency circle, the final guarantee of the currency is the “conscience” of the project party and the
exchange. Based on the anonymity of the wallet private key and the imperfect legal system, the violation of
laws and regulations is difficult to be confirmed, the lack of relevant institutional supervision, the ordinary
Token without governance function can not be frozen, and it is quite difficult for private investors and even
the currency to defend their rights. It can be seen that the reason for the niche of the currency circle is, in the
final analysis, the problem of many project organizations' own governance. The more critical issue is that
even if community governance reaches a high level, there is no emergency mechanism, and there is no
corresponding technical means and regulatory agencies to carry out the final guarantee.
5.3.4 Technology breakthrough: multi-layer authorized smart contract Taking the Ethereum smart contract system as an example, its drawback is that the function is not
graded. The POW consensus mechanism of the distributed node causes its TPS performance to be low, the
blockchain data chain layer expands too fast, and some function calls are also likely to cause network
congestion. The intelligent contract layer of the IPVC public chain is divided into IBIOS layer, IBCS layer and
IVP layer by restricting and grading different functions. There are various scripts, code, algorithmic
mechanisms, and smart contracts on which functions can be restricted by grading.
IBIOS layer This layer is an abbreviation of ( IPVC Basic Intput/Output System), which satisfies the basic input and
output interrupt function and is divided into three parts. The first part is the self-test and initialization of the
operating environment. It is mainly responsible for calling related hardware facilities, including detection,
initialization and booting of the hardware. The second part is program service processing, mainly for simple
application services, mainly with input and output devices. Related, such as reading disk data for output to
other actual or virtual devices; the third part is to respond to interrupt processing, mainly to separately handle
the output requirements of simple programs, IBIOS service functions are implemented by calling the interrupt
service program. Calling this layer requires installing and setting up a PC, a flat-end blockchain client, or
installing a blockchain browser, a VMware virtual machine plug-in, and a certain amount of ViAssets digital
asset credits.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 42
IBCS layer
This layer is a shorthand for ( IPVC Base Calling System), which satisfies various types of reference
library calls and database directory operation commands, file operation commands, and other extended
function commands. Using the underlying Source Customization (SCOM) developed by the Resonance
Source Community, a hierarchical custom smart contract can be implemented, which can be automatically
executed without a third party if certain constraints are met. The perfection of its function is similar to the
underlying layer of Solidity of Ethereum. The difference is that the function package, relational library and
application data package after program compilation output are divided into different data link layers. The
function integration package and relational library belong to the basic data layer/ Base Data Layer,
application data package belongs to the extended data layer / Expanding Data Layer. The hierarchical
processing method is used to solve the problem that the blockchain data packet is too large, and the network
transmission efficiency is greatly improved.
The complete call of this layer function must meet one of two conditions: the blockchain address in this
area contains a certain number of IPDA data passes and the IBCS chain layer for permanent pledge; this
layer introduces DPOS voting governance rules, and no corresponding IPDA data points can be used.
Authorized voting rules, which get full functionality by getting 51% of the votes of active nodes.
The complete invocation of this layer function is the basic condition for issuing sidechains, and the single-
block chain wallet account can only issue sidechain passes every 24 hours. The new pass will not be
certified by the system or the total liquidity will be frozen within 90 days. The thawing will require a certain
amount of ViSource digital certificate.
An important feature of the IBCS layer is the ability to reward a certain number of ViSource digital passes,
distributing subtask packages to different programmer block addresses for distributed collaboration. Within a
predetermined period of time, after the development team contains made a POV value consensus based on
the completion of the task, each address will receive a reward for the corresponding ViSource digital
certificate.
Source factory
POV valueConsensus mechanism
Gained income after performance, otherwise there is only minimum guarantee
Development team
Point reward Work
quantification
Development task package
u IPVC Multidimensional Public Chain
Digital integration
Intelligentrule
IPVC AVATAR
- 43
IVP layer
This layer is a shorthand for ( IPVC Visual Packaging). This layer is a source code template library for
complex functions. It can be used as a credit template by the source community review committee. It can
also be signed and approved by other programmers. After passing the review, the source provider is
approved. And the auditor can get the corresponding ViSource data integration incentive, call the source
library to write a program to pay a certain number of ViSource points.
The DVP layer's functional properties are connected to distributed programming cats. It is a user-friendly
graphical editing interface that meets the needs of programmers and even beginners and children to edit
decentralized applications (DAPP).
5.3.4 Technical breakthrough: Smart Token
Smart Token is organized by programmers Resonance Source community (RSC) The blockchain project
team contains been successfully developed through multi-contract nesting technology. In addition to the six
basic functions of the ordinary Token, it contains powerful governance functions, and can realize the project
and Token according to the customization requirements of the project or community governance. Distributed
governance."
The Smart Token realizes the "three-in-one" of the chain system. Through code writing, the contract
layer, the incentive layer and the application layer of the blockchain extension chain layer are organically
linked, and the consensus layer function of the public chain system is legally called. Can fully utilize the true
energy of blockchain technology. Before the smart charter DAPP is not perfect, the Smart Token can
achieve realistic application.
One of the principles of the "three-in-one" of the Smart Token is to write code at the contract level of the
public chain, call the inner logic mechanism from the bottom of the consensus, and assign "advanced
administrative authority" or "hierarchical management authority" to some specific addresses. Gain control
over the application and functionality of the newly issued Token. That is, regardless of the Token at any
address, the above editable permissions other than Token ownership can be obtained.
In this way, Token's ownership, control and functional rights belong to different address holders in the
chain system, and the “three powers separation” of the blockchain layer is completely realized, and the
Token holders can supervise each other. And constraints, easy to govern; at the same time, management
authority can be transferred to another holding address under certain conditions (such as DPOS mechanism),
achieving a democratic consensus system based on the side chain system.
5.3.5 Technical advantages: Advanced functions of Smart Token
1. After the contract address is added, the airdrop (on/off): after adding the Token contract address, there is
a custom (N) token;
2. batch airdrop: batch transfer from the super-privilege address according to the rule lock bin release, only
the super-privilege address can be operated;
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 44
3. Tokens that are dropped to different wallet addresses can be released according to the custom lock rules;
4. custom smart lock bin: N (custom) start Token, set the rules for each Token own address, the release
amount per release and the total number of days released can be defined according to the project party;
5. Conflicts and priority rules between different functions: Priority is set for the last time. The function of
changing the wallet address of the Token can be changed and the lock release mode can be changed.
6. advanced batch processing: advanced smart contract can manage the different rules of the bulk wallet
address, common with Imtoken and other decentralized type of wallet, to achieve different lock, freeze,
custom release and other rules;
7. Transfer and hierarchical management of Token management authority;
8.data confirmation and source code anti-plagiarism technology.
The advantages of multi-contract Smart Token for ordinary side chain Token:
1. No need to centralize the wallet, the Smart Token can realize the function of the central wallet such as
Token lock, release, interest and even freeze;
2. 100% implement the certificate management according to the project and the chain contract of the DAO
organization, completely avoiding the human factors leading to the failure of the certificate management, and
bringing the real application of the blockchain technology to the project governance;
3. In the normal case of the public chain system, the Smart Token is based on the function of the chain will
never expire, and will not be like the central wallet, such as loopholes, bugs and even crashes, project
running, etc.;
4. Using smart contract nesting technology, Smart Token will evolve into a smart charter DAPP to achieve
more powerful functions and assist DAO organizations and companies to achieve efficient governance of
organizations, equity and systems.
5.4 Relational database vs non-relational database
At present, most blockchain systems choose to use a simpler non-relational database to store data,
such as Berkeley db, Leveldb, etc. These databases generally provide some simple data structures, such as
Btree, containshtable, Queue, etc. SQL is not supported for data manipulation. Although these databases
are sufficient for general electronic money systems, they are not enough for application platforms, especially
for finance, banking, and e-commerce.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 45
Currently mainstream storage systems use relational databases because relational data contains several
advantages:
Ø Transaction processing
Ø Data update overhead is very small
Ø Can perform complex queries such as Join
Sqlite selected by IPVC public chain is a lightweight and lightweight embedded relational database with a
capacity of up to 4T.
Node unreliable assumptions:
Based on a loose network organization, single points of failure and nodes are allowed to be unavailable
for a certain period of time. However, the entire network still needs to have strong robustness (Robust).
Ownership and privacy: The data owner contains data ownership and full access, and the data is encrypted and private. Other
roles can access and use data after the owner contains authorized it.
Quantitative contribution: The contribution of all parties involved in the agreement should have corresponding quantitative criteria
and contributions that can be observed. For example, POT, POS, and POW are used as quantitative proofs
of storage space and storage time.
Final state consistency: Allow data objects to be in different states on different nodes, but their final state can quickly converge to
achieve network-wide consistency.
Monitorable and recoverable: It can detect the availability of the entire network, the state of the entire network of data objects, and
autonomously repair it according to the corresponding strategy.
Auditable and regulated: A certain degree of supervision and auditing can be carried out in certain specific areas or scenarios,
provided that the data owner is aware of and willing to store data under such a regulatory framework.
Consistent final state
Monitorable recoverable
Auditable and supervised
Node unreliable hypothesis
Ownership and privacy
Quantitative contribution value
IPVC
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 46
5.5 IPVC multi-dimensional public chain technology architecture
5.5.1 IPVC underlying SDK
The main chain of the IPVC public chain is mainly responsible for data transfer between the
infrastructure and applications, and can also be used for asset routing. The SDK is used to build specific
applications.
1. ORM supports object-relational mapping to organize business data, support index configuration, and
perform complex queries through JSON syntax.
2. Two-way peg cross-chain protocol supports bidirectional anchoring cross-chain protocol.
3.Immutable ledger built-in ledger creation function, developers and users only need to call the contract, all
call operations and status will be automatically written to not falsify the ledger.
IPVC The bottom layer of the multi-dimensional public chain provides a complete distributed ledger system, including a complete intelligent contract system and security system. At the same time, the IPVC public chain abstracts the underlying complex technical system and heterogeneous systems, implements distributed entity management and multidimensional authentication protocols that are compatible with various major protocols and cryptographic standards, and supports various types of heterogeneous blockchains. Cross-chain and cross-system interaction mapping with traditional information systems. The IPVC public chain also provides technical systems such as secure data storage, heterogeneous smart contracts, hardware key management, and encrypted data analysis. The entire network as an application platform can support the construction of various application services, especially decentralized applications. On this basis, the IPVC public chain provides a series of application frameworks, including distributed data exchange protocols, distributed process management protocols, etc., and further supports the implementation of various upper-layer applications through common APIs, SDKs, and various application functional components.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 47
4. Lower level interfaces allow developers to use more underlying interfaces to give the highest level of
control over the system, for example, handlers and filters for each lifecycle event. If the public-chain system
is like a motherboard, this layer acts like a BIOS (Basic Input Output System) and is a layer between the
hardware layer and the logic layer.
5. Middle level interfaces The middle level interface enables more complex functions, allowing developers to
use more graphical interface-based friendly interfaces for more complex functions, such as writing a native
JavaScript-based container. This layer acts like MS-DOS (Basic Operating System) and belongs to the basic
logic layer.
6.Advanced Contract interfaces Advanced intelligence contract layer, which supports the use of JavaScript
as a native language, developers can use a large number of third-party components to freely combine to
develop DAPP for large-scale commercial applications. Compared with the Ethereum Solidity language, the
hierarchical method is more conducive to the realization of the hierarchical efficiency source call of the
resource layer, and effectively solves the data expansion and inefficiency of the Ethereum system.
7.Customize fee definitions developers can set different fees for each transaction or contract, and even set
the cross-chain asset token as a fee, not limited to the Token of the IPVC multi-dimensional incentive layer.
8.Transaction privacy can choose transaction privacy features.
9. SmartDB cache is automatically synchronized with persistent storage, which can greatly improve write
performance.
5.6 Distributed Trust Transfer of IPVC Public Chain
In the IPVC public chain, in addition to supporting the traditional single trust source mechanism, it also
supports a more decentralized distributed community trust system.
And support distributed trust delivery system. Its implementation is as follows:
1 Group trust: The community trust model is a very effective trust system. Personal endorsements form
community trust certifications in specific areas through endorsements in multiple communities.
01
03
Group trust
statement
02
04
Trust anchor
Trust delivery
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 48
2 Trust Anchor: Trust anchors are usually government units, enterprises, non-profit organizations, and social
celebrities who have been certified by real names and have certain credibility or prestige in society. The
entity that contains been endorsed by the trusted anchor automatically gains the trust of the trust anchor.
The higher the trustworthiness of the trust anchor itself, the higher the trustworthiness of this network entity.
3 Statement: A statement is a trust carrier for community trust. In the IPVC public chain system, a statement
is a declarative description of an identity subject to itself or to another subject, and is a carrier for passing
trust. When an identity subject needs to publish some credible information, it only needs to issue a statement.
4 Trust Delivery: The trust delivery mechanism is the implementation of trust usage in the IPVC public chain.
The acquisition of specific types of identity entities through various types and sources can form multi-
dimensional identity portraits on the one hand, and form a personal trust ecology from their own on the other
hand. In a specific demand, through the presentation of the statement, and the provision of the data record,
the trust can be transmitted, on the one hand, showing the credible trust certification to others, and on the
other hand, through the multiple use of the trust data, forming multiple approvals, Further increased the
credibility.
5.7 Overall architecture Referring to the public chain design principles of various successful models, the overall architecture of
the IPVC public chain is divided into three levels: the bottom layer is the self-developed SQl platform, which
provides the function of the blockchain basic service for the upper application scenarios through the interface
of SQL and API.
Application service layer( IPVC Application)
Cross-border payment, etc.
Platform product service layer
( IPVC Platform)Underlying platform
( IPVC SQL)
User Management:Account management, rights management, key management, etc.
Basic services:Interface adaptation, consensus management, network communication, etc.
Smart contract:Contract registration, contract execution, contract triggering, etc.
Operational monitoring:Configuration, monitoring, alarming, publishing, etc.
Shared ledgerPrivilege account
Secured TransactionsDigital assets
Basic frame diagram
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 49
The middle layer is the platform product service layer is IPVC Platform, and the high-availability and scalable blockchain application base platform products are built on the underlying ( IPVC SQL), including shared accounts, accounts, secured transactions, distributed databases, and numbers. The direction of diversified digital assets such as confirmation of rights and digital deposits, and integration of basic product functions in the relevant industry chain. The application service layer ( IPVC Application) provides trusted, secure and fast blockchain applications to the final audience, and will work with industry partners to help developers implement diversified DAPP application functions.
5.7.1 IPVC SQL underlying platform User Management:Responsible for the identity information management of all participants, including maintaining public and private key generation, key storage management, and user identity and address correspondence maintenance, and supervising and auditing certain real-identity transactions under authorization. For the application of financial transactions such as digital assets, it also provides rules for risk control to ensure system transaction security. Basic services:The basic service is deployed on all nodes to verify the validity of the business request and to record the valid request and record it on the storage. For a new service request, the basic service first parses the interface, authenticates the process, and then registers and encrypts the transaction or contract through the consensus algorithm, and then stores it completely and consistently on the shared ledger. The consensus mechanism is adaptive, and contains high concurrency in the normal case of network and nodes, and is highly fault-tolerant in the case of network anomalies or node spoofing. Smart contract:Responsible for the registration of the contract and the triggering and execution of the contract. The user defines the contract logic through a programming language. After publishing to the top, according to the logic of the contract terms, the user's signature or other events trigger the execution, and complete the logic of the contract such as transaction settlement. Operational monitoring: Responsible for deployment, configuration modification, contract setting, and real-time status visualization output during product release, such as alarms, transaction volume, network conditions, and node health status.
5.7.2 Platform Product Service Layer IPVC Platform The platform product service layer abstracts a variety of typical applications, providing the basic capabilities and implementation framework for a typical application. Users can build DAPP based on these basic functions, superimpose the unique characteristics of the industry chain business, and easily realize business logic. Users can quickly migrate DAPPs to existing services to meet the needs of new scenarios. They can also use the non-tamperable and non-repudiation features of public-chain systems to solve problems that were difficult to solve before and build new business scenarios. Digital assets:According to the analysis of digital assets such as virtual assets and commercial papers, it is not difficult to find that asset chaining is a key link. To this end, the "asset gateway" protocol was introduced to assist users in the conversion of assets under the chain to assets on the chain. After the assets are chained, the transfer, split, cash withdrawal and other authority operations will be strictly controlled by the account public and private key system. All operations will have signature verification, and both sides will leave traces and cannot be erased. In addition, the application of smart sidechains enables the problem of privilege leveling calls and the identification of digital assets. In this way, a double insurance is superimposed on the user's digital assets. For example, an asset with a valid period, such as a commercial paper, can provide the ability to automatically liquidate at maturity, including asset issuance, asset transfer, asset withdrawal, asset liquidation, and asset inquiries. Data service:The distributed data access service of the IPVC public chain expansion layer is the direction of future big data and cloud computing services. In the Internet age, data is the first means of production, and people as data productivity do not enjoy the data dividends they deserve. The emergence of blockchain distributed cloud storage technology contains broken this situation. The technology contains higher security and lower operation and maintenance costs. The most important thing is that people can truly have the ultimate benefits and authority for the data they create. The era of big data will enter the era of “determination of power” from the “monopoly era” of giants.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 50
Forensic service: For the application scenarios such as intellectual property rights, policy preservation (certificate of rights), personal and corporate qualification certificates, fully exploit the ability to be erased and publicized, so that organizations and individuals can use copyright information and insurance materials through simple interfaces or DAPP clients. Qualification certificates, etc. are posted to the trusted blockchain, allowing all billing nodes to testify for themselves. In addition, based on the self-built platform, the user's rights protection will be more convenient, and the evidence confirmation is more authoritative. Such as ownership registration, ownership cancellation, infringement evidence entry, etc. Shared ledger: The reconciliation between financial institutions is basically carried out on a daily basis. The reconciliation method is basically a mutual reciprocal statement, which compares the transaction flow between the two parties. This brings a certain delay to the final transaction confirmation and fund transfer. Some business scenarios that require real-time payment must even be carried out by the business operator. Naturally sharing the books, so that the reconciliation does not have to be sent in the next day, but can be carried out at any time. Both parties can complete the reconciliation by simply connecting the reconciliation logic to the chain. Basically, on-time transaction confirmation and fund transfer can be achieved, and neither party can be denied. Especially for the long-term capital chain, the business involving more links contains a competitive advantage. At the same time, the regulator can also participate in the shared ledger record. Sharing economy:A key factor in the long-term sharing economy is the establishment of a trust mechanism between supply and demand sides, ensuring the smooth implementation of sharing behavior, and providing a way to achieve it from a technical perspective. The endorsement of technical guarantee capability enables multiple participants who are difficult to achieve mutual trust to establish credibility, no need for intermediate institutions or service platforms to build a strong internal audit process, rigorous and complicated accounting backup system, and coordination with regulatory agencies. With the extra facilities, you can achieve the same effect. This saves a lot of cost and makes sharing more efficient and feasible.
5.7.3 Application Service Layer IPVC Application The Application Services Layer ( IPVC Application) provides the use of solution-based application services to end users. In the solution, the application service layer will try its best to provide users with various scenarios, and will provide users with trusted, secure and convenient areas in digital digital bills, enterprise clearing, enterprise incubation, distributed cloud storage, and other new digital business scenarios. Blockchain service. Based on the principle of open sharing, we will work together with various industry partners to explore more intelligent sidechain application scenarios, open up the underlying ( IPVC SQL) and platform application layer ( IPVC Platform) capabilities, jointly develop new application services, and maintain together. New ecology.
5.8 IPVC SQL underlying structure5.8.1 Basic servicesThe basic service module consists of four parts: interface adaptation, consensus management, network communication and distributed data storage:
consensusmanagem
ent
datastorage
The internet
communication
interfaceadaptatio
n
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 51
5.8.1.1 Interface Adaptation For user-friendly, low-cost access, IPVC SQL provides SQL and API interfaces to the application layer. The API interface supports both synchronous and asynchronous modes. After the interface adaptation layer parses the service request, after the authentication and signature verification, the service request is recorded to the account book through the consensus algorithm. As an client of the consensus management module, the interface adaptation module also participates in consensus management. The interface adaptation module is mainly responsible for the summary and consistency judgment of the results returned by each consensus node. In addition, when the "improved Bft-Raft" consensus algorithm with independent intellectual property rights is used, the interface adaptation module also receives the election switching request from the service side, and the interface adaptation module summarizes the election switching request. When the switching condition is met, the consensus management module is notified to re-elect.
5.8.1.2 Consensus mechanism The multidimensional consensus mechanism is the core technology point of IPVC . In a multi-party participating node under a preset rule, the process of agreeing on data, behavior, or process through interaction between nodes is called consensus. The consensus mechanism refers to the algorithms, protocols, and rules that define the consensus process.
The consensus mechanism is divided into two categories according to the consensus process.:
The first category is a consensus with consistent probability, which is finally confirmed in engineering;
the second category is absolute consensus and then consensus, and consensus is confirmed. A second type
of consensus mechanism is provided to support both adaptive and user-specified configurations.
The adaptive mode is an "improved Raft" algorithm with automatic consensus, high efficiency, fraud
prevention, and independent intellectual property rights when the network is in good condition and contains
no fraudulent nodes. When the fraud node or the faulty node exceeds the threshold, it automatically switches
to A more rigorous "improved Bft-Raft" algorithm with independent intellectual property rights. The user-
specified configuration mode means that the user directly configures a fixed consensus mechanism for
consensus management.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 52
5.8.2 Multidimensional excitation layer The IPVC multi-dimensional public chain allocates diversified excitation layers of different algorithms according to different business structures, and is divided into DPOS+BFT+Zero—Knowledge Proof layer, data excitation layer and POC space certification layer. IPVC - DPOS resonant source excitation layer The IPVC native excitation layer adopts the DPOS+BFT optimal algorithm mechanism. All those with a Token number greater than or equal to 1 IPVC have the right to become a super node. The election of the super node is completed in the voting system, and any node with more than 1% of the votes can participate in the "super node organization". The election process is similar to the election of the board of directors by the shareholders' meeting, instead of the shareholders meeting to make daily operational decisions. After authorizing the board, decisions will be more efficient. The rule of DPOS is that the longest chain wins, where each "super node" takes turns to sign the block. If a super node misses the opportunity to sign a block, it will automatically vote for the other nodes. Members who eventually miss the signing opportunity will be disqualified and other nodes will be able to join. These super nodes will receive a block reward.
IPDA - Extended Data Link Incentive Layer The application of distributed database technology represented by IPFS and distributed encryption deduplication technology is imminent. Compared with traditional centralized data storage services, distributed digital technology contains the advantages of security and low cost, and the hardware and software layer builders participating in the distributed network can obtain the benefits of data system distribution for a long time. The extended data link layer of the IPVC public chain system uses the exclusive developed Distributed Encryption Reduplication technology to achieve secure storage of multiple data volumes in a limited storage space. The data copy adopts the N-M+1 copy method. When a data node of a complete fragment database is in a damaged or inactive state, it automatically searches for a better node request service, and the new data node that receives the response automatically provides data. The storage service, the new node automatically obtains the corresponding data points reward of the incentive layer. As a result, at least one complete copy of the data exists in the chain to ensure the integrity and security of the fragmented data.
IPOC - Space Certification Layer PoSpace uses a "quality function" solution to verify the user's storage space and in some way determine the winner of the mining competition. A more reasonable approach would be that miners with more storage space are more likely to win in mining competitions. This is achieved by designing a "quality function". The "quality function" needs to maintain a certain degree of randomness, while at the same time, according to the size of the contribution space to distinguish the probability of each miner winning. Therefore, a simplified approach is to deal with the challenger's challenge. The containsh value (a string of numbers) fed back by the miner is directly used as a random quantity, and the number of digits is increased or decreased according to the space occupied by the miners. For example, if the total size of the space stored by the miner is N, then the containsh value is squared N times to obtain the mass function. In this way, the larger the space stored by the miner, the smaller the value of the mass function. For example, it can be specified that a miner with the smallest mass function wins in a single mining competition.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 53
5.8.2.1 Network communication
The network communication module is responsible for message data transmission between nodes and
on the service side. A dynamically self-organizing network that can be multiplexed and connected for sharing.
It can be compatible with existing security facilities such as firewalls and proxy servers, providing peer-to-
peer networking and secure and reliable data transmission.
5.8.2.2 Record storage
Record storage can support the storage of a variety of media, storage media can be a database, file
system, or cloud storage media, such as cloud DB, cloud KV and so on. Record storage uses a blockchain
structure, any tampering with historical data can be found by self-checking, and alarms and automatic
corrections.
Block body Block body Block body
All transaction information in this block
All transaction information in this block
All transaction information in this block
Block height: 390608 Block height: 390609 Block height: 390610
Head containsh: 00000000005e1e25
Head containsh: 0000000000f2f1d
Head containsh: 000000000000c8ae5
Parent containsh: 000000000079fe4d
Parent containsh: 0000000000fe1e25
Parent containsh: 00000000003f2f1d
Merkle Root: 2el1abce579e12a Merkle root: c59e2d8242ef1c Merkle root: c8572f19112456d
Difficulty: 93440670796.32380676
Difficulty: 93448670796.32300676
Difficulty: 93448670796.32380676
Ncnce : 2181060512 Monce:4005489007 Wance:1779633802
u IPVC Multidimensional public chain
IPVC AVATAR
- 54
5.8.3 Decentralized cloud storage based on public chain systems
In order to facilitate the transmission, the file is divided into multiple blocks, and each block is
containshed to obtain a unique ID, which is convenient for identification and deduplication in the distributed
network. Considering the transmission efficiency, the same block may have multiple copies, which are
stored on different network nodes. Content addressing mode: Each block contains a unique ID, and only the
corresponding block can be obtained according to the ID of the node.
According to the data structure organization form of the database, it is generally divided into Key-Value
type and relation type. Among them, Key-Value type database contains a simple data structure organization
structure, high read and write performance, can support massive concurrent read and write requests, and
contains strong scalability, simple operation interface, and supports some basic reading, writing, modification,
and deletion. Other features, but does not support complex SQL features and transactionality. The relational
database uses a relational model to organize data, supports various SQL functions, is highly functional,
supports transactionality, contains general read and write performance, and is weak in scalability.
According to the deployment form of the database, it is generally divided into two types: single type and
distributed type. Among them, the stand-alone database guarantees strong consistency and good availability.
Distributed databases follow a distributed architecture in physical deployment, providing high concurrent read
and write performance and fault tolerance, strong availability and partition fault tolerance, but the data
consistency of the distributed architecture is weak due to the need for data synchronization. Can only
guarantee final consistency.
IPVC multi-dimensional public chain selection of Sqlite is a lightweight and lightweight embedded
relational database with a maximum capacity of 4T. Data files can be shared freely between different endian
machines, especially for SQL. Developers offer great convenience.
IPVC SQL
IPVC systemchainThe storage technology adopts a composite scheme, combined with the distributed
logbook technology DSN scheme of distributed chain storage and the advantages of YottaChain distributed
encryption deduplication technology, combining three data logical structures Merkle and DAG (directed
acyclic graph) Satisfy content addressing, the ID of the containsh value can be used to uniquely identify the
tamper-resistant content of a single data block, and it is convenient to check the containsh value to confirm
whether the data contains been tampered with. Since the data block containshes with the same content are
the same, it is convenient to remove duplicate data to save storage space.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 55
5.8.4 Decentralized encryption to re-book this technology The IPDA data link layer uses Distributed Encryption Reduplication (hereinafter referred to as DER) to be suitable for persistent storage services. The data source is used to encrypt files and upload them. When the files start to enter the DSN network, they are encrypted. Except for the data Owner or its licensor, no one can decrypt it.
5.8.4.1 Encryption DSN scheme protocol: The processing behavior before the Put data randomly generates the storage key (Stk) of the file, encrypts the file by storing the key Stk, thereby generating an encrypted file, encrypting the storage key by encrypting the public key, and separately calculating the data plaintext. The containsh value and the containsh value of the ciphertext, and then the ciphertext, the encrypted storage key, the plaintext containsh, and the ciphertext containsh are saved.1. Containsh(Data)→Hdata calculates the plaintext containsh;2. RandomSym()→Stk randomly generates a symmetric key as the storage key of the file;3. Enc(Stk, Data)→EncData encrypts the file with the storage key;4. Containsh (EncData) → Henc calculates ciphertext containsh;5. Enc(Spub, Stk) → EncStk encrypts the storage key with the user's encrypted public key;6. PutStatic (EncData) stores the encrypted data into the persistent static storage;7. PutPri (Hdata, Henc, EncStk) The encrypted storage key, ciphertext containsh, is stored in the user permission list and recorded under the plaintext containsh. When the data is acquired, the corresponding ciphertext containsh is extracted from the plaintext containsh, and the ciphertext and the encrypted storage key are retrieved from the persistent static storage by the ciphertext containsh, and the encrypted storage key is encrypted by the user's encrypted private key. The decryption is performed to obtain a storage key, and the encrypted data is decrypted by the storage key to obtain a plaintext of the data.1.GetPri(Hdata)→Henc, EncStk obtains the ciphertext containsh and the encrypted storage key from the permission list through the plaintext containsh;2.GetStatic(Henc)→EncData Use ciphertext containsh to retrieve ciphertext from persistent static storage;3.Dec(Sprv, EncStk)→Stk decrypts the encrypted storage key with the user encrypted private key to obtain the storage key;4.Dec(Stk, EncData)→Data decryption to obtain file data optimization DSN scheme effectively guarantees data security.
Safety: Only in the ciphertext outside the data source, only the user's encrypted private key can be used to obtain the plaintext of the data. The user only needs to keep his own encrypted private key without worrying about the data being compromised. Integrity:containsh corresponding data D, there will be no D1 obtained by Get(containsh), where D1≠D. Data recoverability:Put successful data D, there must be a successful Get request to get the data. Disadvantage:The traditional encryption DSN scheme protocol solution does not solve the problem of data deduplication. If the server side wants zero-knowledge encryption, the duplicate data can only be saved repeatedly because the same data becomes inconsistent after passing the traditional encryption method. This is why large cloud storage service providers do not provide zero-knowledge encrypted storage, and distributed chain storage does not provide encryption mechanisms for this purpose.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 56
5.8.4.2 IPDA static encryption storage solution
IPDA's expansion of the data chain layer provides a relatively special mechanism to prevent duplicate data while
ensuring the same security, breaking the industry's "common knowledge" and achieving both fish and bear's paw. In
addition to the hierarchical list of user rights, the mechanism also needs to maintain global metadata, record the
correspondence between plaintext containsh and ciphertext containsh, and first detect whether there is the same
containsh value data when writing salt data. If there is no such item, storage.
From the original H(p) to H(p+salt), the containsh function H changes, and the salt used for each containsh
calculation is random. If the H value changes, the existing rainbow table data is completely unusable and must be
regenerated for a specific H, which increases the difficulty of cracking.
1. containsh(Data)→Hdata calculates the plaintext containsh;
2. If CheckDup(Hdata) = TRUE goto Step 12 If the same data already exists, go to step 12.
3. RandomSym()→Stk randomly generates a symmetric key as the storage key of the file;
4. Enc(Stk, Data)→EncData encrypts the file with the storage key;
5. containsh (EncData) → Henc Calculate ciphertext containsh;
6. GenKey(Data)→Sdata generates a symmetric key based on the plaintext data;
7.String Input With Salt = inputStr + salt / / Enter the salt, add the salt with the data, then calculate the containsh value.
Because plaintext containsh is a public value, without salt, it leads to low security, and users who do not have data
plaintext can also obtain the key. To ensure consistency, salt values can be generated by a fixed algorithm. For example,
first make the first containsh as the salt value, add the salt and then calculate the second containsh as the symmetric key.
Two Hah can use different algorithms to improve the security again.
8. Enc(Hdata, Stk) → EncStk’ Encrypts the storage key with a symmetric key generated in plain text. This is a key step in
the principle of de-empcontainsis after data encryption. The plaintext is used as the key, the key is encrypted as plaintext,
and the inverse symmetric association of the metadata is generated to join the global metadata list.
9. PutStatic (EncData) stores the encrypted data into persistent static storage;
10. PutMeta (Hdata, Henv, EncStk) records the ciphertext containsh and plaintext encrypted storage keys in the global
metadata table and records them under the plaintext containsh.
11. Goto 15;
12. GetMeta(Hdata) →Henv, EncStk’ extract the ciphertext and plaintext encrypted storage key from the global metadata
table;
13. GenKey(Data)→Sdata generates a symmetric key from the data plaintext using the same algorithm;
14. Dec(Sdata, EncStk') → Stk decrypts the storage key with the symmetric key;
15. Enc(Spub, Stk) → EncStk encrypts the storage key with the user's encrypted public key;
16. PutPri (Hdata, EncStk) Stores the encryption key encrypted by the encryption key into the user permission list and
records it under the plaintext containsh.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 57
5.8.4.3 IPDA method for decrypting static data In the Get data, the corresponding ciphertext containsh is taken from the plaintext containsh from the global metadata table, the ciphertext is retrieved from the persistent static memory through the ciphertext containsh, and the encrypted storage key is taken out from the permission list. The encrypted private key of the user decrypts the encrypted storage key to obtain a storage key, and then decrypts the encrypted data with the storage key to obtain data plaintext.1. GetMeta(Hdata)→Henc obtains the ciphertext containsh from the global metadata table through the plaintext containsh;2. GetPri(Hdata)→EncStk obtains the storage key encrypted by the encrypted public key from the permission list through the plaintext containsh;3. GetStatic(Henc)→EncData uses the ciphertext containsh to retrieve the ciphertext from the persistent static storage;4.Dec(Sprv, EncStk)→Stk decrypts the storage key encrypted by the user encryption public key with the user's encrypted private key to obtain the storage key;5.Dec(Stk, EncData)→Data decrypts to obtain file data. The IPDA optimized DSN solution not only effectively guarantees the security of the data, but also implements encryption deduplication. In order to better achieve the deduplication effect, the data can be divided into fixed lengths, and each block is de-duplicated separately. The above scheme is only used to store static data. 5.8.4.4 IPDA Encrypted Dynamic Data Scheme When storing dynamic data, not only the ID that does not change with the content is used instead of containsh as the identifier of the data, but also the user is given the verification of the write permission to prevent the data from being overwritten by others. The creation process is as follows: 1. RandomAsym()→Swpub, Swprv randomly generates an asymmetric key as a write permission key;2. Create (Swpub) → ID Create dynamic data, obtain a unique ID, and record the write permission public key corresponding to the ID;3. RandomSym()→Stk randomly generates a symmetric key as a storage key;4. Enc(Spub, Stk) → EncStk encrypts the storage key with the user's encrypted public key;5. PutPri (ID, EncStk) The storage key encrypted by the encrypted public key is stored in the user permission list and recorded under the ID item;The process of writing data each time is as follows:1. GetPri(ID)→EncStk retrieves the encrypted key from the user permission table after encrypting the public key;2. Dec(Sprv, EncStk)→Stk decrypts the storage key encrypted by the user's encrypted public key with the user's encrypted private key to obtain the storage key;3. Enc(Stk, Data)→EncData encrypts the file with the storage key;4. containsh (EncData) → Henc calculates ciphertext containsh;5. Enc(Swprv, Henc) → EncHenc signs the ciphertext containsh with the write permission public key of the ID;6. PutDyn (ID, EncData, EncHenc) Writes the encrypted dynamic data, with the signature data representing the write authorization.Nodes that store fragments of dynamic data need to verify write permissions before writing dynamic data:1. GetKey(ID) → Swpub takes the write permission public key corresponding to the ID;2. Containsh (EncData) → Henc calculates ciphertext containsh;3. If Dec(Swpub, EncHenc)= Henc Write(EncData) If the signature verification is passed, the read flow of writing data dynamic data is as follows:
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 58
1. GetPri(ID)→EncStk obtains the storage key encrypted by the encrypted public key corresponding to the ID
from the permission list;
2. GetDyn (ID)→EncData reads the ciphertext from the dynamic data storage area with the ID;
3. Dec(Sprv, EncStk)→Stk decrypts the storage key encrypted by the user's encrypted public key with the
user's encrypted private key, thereby obtaining the storage key;
4. Dec (Stk, EncData) → Data decryption to obtain file data;
5.8.4.5 IPDA Encrypted Dynamic Data Scheme
Unified redundancy is used, and any data is automatically encoded into N fragments. As long as there
are any M fragments, the data can be recovered, and then the N fragments are stored in N storage nodes,
and each node stores a fragment. In this way, as long as N-M+1 nodes fail at the same time, the data
integrity is not lost.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 59
Through the KAD algorithm, distributed chain storage distributes data blocks of different IDs to network nodes that are close to each other to achieve distributed storage. When obtaining files through IPDA, you only need to download the block data from the corresponding network nodes according to each block ID according to the ID of each block, and finally verify whether the data is complete and finally complete the stitching. When any node fails, the IPDA system will immediately select another node to reconstruct the data of the failed node. Only need to rebuild the first failed node before the completion of the other NM nodes will also fail, ensuring that the data will never be Lost. Each node monitors and verifies each other. Any node can be quickly discovered once it fails. When reconstructing the data of a failed node, the most efficient nodes are selected and segmented. Multiple nodes optimize the reconstruction data to speed up the reconstruction. speed. For example, 1000 file fragments are stored on the failed node. It takes an average of 0.5 seconds to reconstruct a fragment. The system preferably contains 100 nodes involved in the reconstruction. Each node only needs to reconstruct 10 fragments, and the reconstruction can be completed in an average of 5 seconds. As long as the other N-M nodes of the same file do not expire at the same time within 5 seconds, the file data will not be lost. The redundancy of DER technology is good and the geographical location is scattered. Don't worry about the damage of the hard disk and the operation and maintenance of the individual nodes. In August 2018, Tencent Cloud lost user data due to operation and maintenance errors. Lightning weather (September 2018 caused lightning strikes in some areas) Azure cloud services are down for more than 20 hours), power outages, fiber breaks, earthquakes, fires, and other force majeure causes data loss. Because nodes are scattered and redundant, and are not afraid of DDOS attacks, the cost of IPDA storage is much lower than that of centralized storage. The reasons are: IPDA adopts the most mature distributed encryption and de-duplication (DER) technology in the data storage industry, which can safely implement data deduplication, and reduce the hard disk space occupied by the same data by 5-10 times. Most storage nodes have few Storage equipment, no special refrigeration system (one-third or even half of the data center power consumption), natural ventilation can be used to dissipate heat, CapEx and OpEx are greatly reduced, domestic storage miners need no additional bandwidth, no need to pay rent Cost, household electricity is also lower than industrial electricity. Most of the IPDA storage nodes do not need professional operation and maintenance, each node is automatically running and other nodes will be automatically repaired if there is an unexpected failure, which saves expensive operation and maintenance costs. IPDA's large number of storage nodes use idle hard disk space, which is sunk cost, and the marginal cost is close to zero. The IPDA data link layer is supported by the storage industry leader team, which provides technical support for the centralized storage binary, including but not Limited to block storage, NAS storage and object storage, enabling centralized storage-based applications without re-development, no need to change source code, no recompilation, seamless migration directly using IPDA encryption to re-storage services. As a result, existing centralized storage applications can be upgraded through the IPDA data link layer business ecosystem, and the storage market scale is more than $100 billion per year. A distributed ledger is a database that is shared, replicated, and synchronized between network members. A distributed ledger records transactions between network participants, such as the exchange of assets or data. Participants in the IPDA data chain layer constrain and negotiate updates to records in the reconciliation book based on consensus principles, without the involvement of intermediate-tier third-party arbitration institutions (such as financial institutions or bill exchanges). Each record in the distributed ledger contains a timestamp and a unique cryptographic signature, which makes the ledger an auditable history of all transactions in the network. One implementation of distributed ledger technology is the open source Hyperledger Fabric blockchain.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 60
The following aspects of the IPVC public chain further expand the use of distributed ledger technology:1.Real name registration and identification: Entity identity registration and identification is an important basic module. The IPVC public chain contains designed a multi-faceted, multi-level registration, authentication and authorization system for participants and related resources. The entity identity and authorization module is designed to provide a multi-level identity authentication and authorization system. By flexible configuration and integration of its own authorization service or third-party authentication mechanism (such as CA authentication), it is also possible to conduct community-based implementation of various types of account ontology. Endorsement of certification, and integration of different auditing mechanisms according to business scenarios, systemic identity authentication and authorization for blockchain participating nodes and participants. 2.Data directory: Using distributed ledger technology, directory registration can be performed on the provided data categories, and the matching between the unique identification of the data (ONT Data ID) and the data resource acquisition address (Data URI) can be matched to the required data and passed. The comparison of ONT Data ID data deposits determines the effective credibility of the data.3.Data exchange: Using distributed ledger technology, it can realize the data exchange framework based on entities (people, things, equipment, content...), revitalize personal data assets, make data flowable, and use standardized protocol design to support data creation, discovery, and Authorization and transaction, help users to fine-grain the data control, to meet the user's own privacy needs while seeking the benefits of data reuse.4.Process synergy: Process collaboration (distributed transactions) using distributed ledger technology, entity cross-chain and cross-system privacy, and specif ic cross-chain protocols. That is, mult ip le steps of the process/transaction are distributed on different blockchains or systems to ensure the identity privacy of different entities in different systems and blockchains, and to ensure the consistency of the entire transaction. 5.Behavioral Deposit and Smart Contract: Through the use of distributed ledgers, more than just providing data deposits, but also through the support of smart contracts, different businesses can carry out more business flows to support the deposit. That is, each time data request, data matching, data process expansion and innovation, in the business process coordination, control and exchange, etc., the establishment of the transfer and the use of data are recorded in the ledger, forming a data-specific technology. Trust mechanism. The record of the process ensures that the data is safe, reliable and not leaked.
Blockchain B System BCross-chain
GatewayDistributed database
Blockchain A System A
Blockchain C System C
IPVC IPDA
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 61
Distributed data exchange systemThe IPVC public chain provides a range of underlying functional and protocol support for distributed data exchange.1 Distributed Data Exchange Protocol: Compatible to support multiple different types of global data exchange protocols to support different business scenario requirements, while combining data exchange protocols with distributed ledgers to form a distributed data exchange process and providing a series of data and privacy-protected cryptography Component support.2 data authorization mechanism: In the data exchange system, data privacy protection and data leakage prevention are always the focus. In the trust ecology established by the network, an authorization mechanism is designed, that is, any transaction involving data related to the data subject, and the data stakeholders (single or multiparty) need to be notified to conduct the authorized transaction. 3 Copyright protection of data: According to the digital characteristics of data, it provides data deposit and lifecycle management functions, and designs the life cycle traceability mechanism of related data. First of all, the realization of digital identity for each piece of data, in order to track the entire process of its registration, request, authorization, transaction, etc.; second, the copyright protection of data, the transaction of data assets are recorded in the distributed ledger . 4 Distributed storage of data: Provides a distributed data storage layer that supports data exchange and supports various data applications.
5 Cryptography Technology and Data Protection Components Ontology Crypto Package (OCP):
Provides a series of cryptography and data security component support in multi-dimensional entity
authentication, distributed data exchange, distributed process protocols, etc., including data encryption
transmission, key sharing protocol, multi-party key management, ring signature component , blind
signature component, threshold sharing mechanism. In the identity and data verification process, zero-
knowledge proof and homomorphic encryption scheme are provided. In the data collaborative application
process, both parties provide calculations and further explore multi-party technical solutions in the future.
In addition, for specific scenarios, specific security components are provided, and upper-level application
implementers are supported to build applicable security application protocols based on security
components.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 62
5.8.4.6 Distributed Cloud Storage Database Distributed Chain Storage The DSN of a distributed storage network is the total storage and self-coordination provided by multiple independent storage providers to provide data storage and data retrieval to clients. Coordination agreements are decentralized and do not require trusted parties. The safe operation of the system is achieved by a protocol that coordinates and verifies the operations performed by the individual parties. DSNS can adopt different coordination strategies, including Byzantine, Gossip, or CRDT. Avoid management errors and storage failures, ensuring data integrity and recyclability. Use clone proof and space-time mechanism to ensure the uniqueness and consistency of data, user and time. I clone proof Cloning proves that the prover makes a valid prover convince the user that there is a different copy of a certain data, and this data contains a unique dedicated physical storage, when the user needs to extract the data, through verification, at any node A unique physical copy of the data can be found.II time and space certificate Storage certification refers to whether the user contains the inspection data storage service provider stored storage outsourcing data, and the introduction of space and time certification effectively prevents the user from repeatedly checking the data storage situation caused by the system bottleneck. The user can check if the certifier contains stored his outsourced data for a period of time, recursively executing the execution to generate a short proof to confirm the time. III Practical Cloning Proof Construction The installer algorithm creates a copy by generating a certificate through a stamp operation. The prover generates a copy and outputs it to the validator. This proof algorithm generates a proof of storage of the copy and is therefore subject to random verification. Validation of the proof of storage is verified by an algorithm that verifies the Merkel root of the given copy and the containsh of the original data. These certificates can be verified by nodes in a distributed system that maintain a ledger or are interested in specific data. IV Practical time and space proof construction The algorithm proves that a replica of the spatio-temporal proof is generated, the prover accepts the random request from the random verification and generates a clone proof sequence column, using one proof output as a specified amount of iteration of the other input.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 63
5.8.5 Hybrid Cloud Storage Solution Based on Smart Sidechain Looking at the history of science and technology, there will be four periods in the emergence of any new technology: technology development period, technology testing period, technology dividend period and market dividend period. At present, the most complete distributed chain storage system with the most technical architecture is in the early stage of the technical testing period, which means that the public cloud solution of distributed cloud storage is far from the Earth, and it is more talked about the dividend period, the landing of the public chain DSN distributed storage technology. Long and tortuous. Today is the era of central cloud storage giants. After years of development and accumulation, central cloud storage technology contains incomparable advantages in terms of performance, response speed, application layer and market share. In contrast, although the public-chain DSN distributed storage solution contains many benefits such as digital incentives, good privacy, high security, and low operation and maintenance costs, there are some pain points that are currently difficult to solve: 1. The existing public-chain DSN distributed storage technology route is completely different from the traditional central cloud storage, and the current application is difficult to land; 2. The market share of centralized cloud storage is extremely high, and the DSN distributed storage market contains not yet formed; 3. The existing public chain system TPS contains low performance and cannot meet large-scale commercial applications. With the continuous development and advancement of DSN distributed storage technology, the transformation of centralized cloud storage technology is an inevitable trend. Technology transformation means the emergence of the storage industry chain, which is clearly in the midst of a huge vacuum between the centralized cloud and the scattered cloud storage market. Combining the technical advantages of intelligent sidechains, the following feasible hybrid cloud storage solutions are formed: 1. Perform traditional encryption and block processing on popular centralized data services, cut into copyright data and content data, encrypt the copyright data with smart sidechain technology, and confirm the rights of data sovereign owners. Correlation is strongly anchored; 2. The encryption method of content data is traditional, such as WinRAR or ZIP method, using centralized cloud storage, such as Amazon cloud; 3. Set the IP in the form of contract nesting Multiple value chain The digital pass incentive mechanism provides a corresponding digital certificate for users who adopt a hybrid cloud storage solution.
The advantages of intelligent side chain hybrid solutions:1. Rapidly realize the application landing, and solve the painful point of the existing DSN distributed storage technology;2. The fragmentation data security is comparable to the DSN distributed storage scheme, and the digital weighting method is superior to the public chain single encryption method;3. A small part of the data is on the chain, the content data adopts the traditional solution, avoids the shortcomings of the current TPS performance of the public chain system, and contains the advantage of the existing central data system, filling the vacuum period of the data industry;4. Enlarge the role of the IPDA incentive layer. The larger the data transaction volume, the more transaction levels, and the more rewards are obtained;The diversified rules of intelligent sidechains have stronger market adaptability and enter the technology dividend period before the public-chain DSN distributed storage scheme falls.
Number owner
Data asset package
Smart SidechainIncentives
Data buyer Big data market
u IPVC Multidimensional Public Chain
Copyright data
contentdata
IPVC AVATAR
- 64
5.8.6 IPOC and IPDA double layer data incentive mechanism The IPVC cloud miner is a distributed cloud storage server matrix and decentralized cloud storage network traffic nodes, mainly used for decentralized cloud storage of educational resource pools and other industry data. The node device optimizes the data service operation model according to different business logics and response services, and stimulates multiple incentive layer protocols, allowing users to participate in the construction of the IPVC industry chain layer ecosystem while enjoying IPVC 、IPOC and IPDA multi-digital pass revenue. IPOC digital certificate can be obtained through all large-capacity network terminal devices that meet the requirements of IoT standards and sensor data. The data transmission type is a space network container that meets the specific encryption protocol chain and belongs to the IPVC public chain. POC (Proof on Space) is adopted. Spatial proof algorithm. The IPDA data link layer is shared with the IPOC node layer interface, and different hierarchical API interfaces are adapted according to the actual needs of the data service. The ESR (Efficiency Source Resonance) efficiency resonance source algorithm is adopted for the extended big data chain layer of the IPVC public chain.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 65
5.8.7 User Management User management mainly addresses the mapping of user identity to address, the confidentiality of user
privacy, and the traceability of regulatory auditing. From the business scenario, some application scenarios
require anonymity and transaction irrelevance, such as mainstream digital assets; some scenarios do not
require anonymity and irrelevance, such as source tracking. To take into account these two scenarios, key
management requires strong adaptability and compatibility. The IPVC public chain system provides users
with a variety of flexible and freely configurable configurations.
From the perspective of user access, one is the original system transformation access, there is a key
security management system with high security level, such as institutional clearing, bank factoring, etc., and
the other is new application scenario access or The original system contains not yet perfected the key
management system. In order to inherit the key security management system with high security level and
retain the usage habits of the original users, the IPVC public chain system provides four key modes:
traditional key system integration, intelligent side chain permission grading, full hosting and partial hosting. .
Traditional key system integration: Applicable to users with high security level of the original private
key system, such as financial institutions, bank U shields, electronic signatures, etc. For such users, only the
private key system of the original user needs to be associated with the user address.
Intelligent side chain privilege ratingApplicable to users who have requirements for application
scenarios such as company management, community governance, and equity allocation, the user can be
classified and confirmed by the private key authorization method.
Partial hosting: A part of the main body of the access service contains a higher security level key
system or multiple technologies interworking scenarios. In the case of partial hosting, the multi-party address
association and consistency of participation are guaranteed.
Fully managed: Suitable for new access scenarios and scenes with high Internet habits. The original
system of user name and password is associated with the secure key generation and management system
to isolate the user information from the address and protect the privacy of the user.
For the fully managed mode, the VES user management system consists of four parts: account
management, key management, rights management and risk control audit.
User Management
account registrationAccount login
Account cancellation
Key generationKey association
Key safeKey signature chain
Key signature chainPrivilege ratingAccess control
User associationAudit controlWind control management
A P INTOA c c o u n t m a n a g e m e n t
a u t h o r i t ym a n a g e m e n t
K e y m a n a g e m e n t
W i n d c o n t r o l a u d i t
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 66
5.8.7.1 Account Management
Account management is responsible for user account management, including account registration, login,
logout, and account and key irrelevance processing. When the account is registered, the identity information
such as the user name and password that the original user is accustomed to is mapped to the address. After
the account is logged in, relevant business requests can be sent. In the scenario where the transaction is
highly confidential, the user can use the address irrelevance processing to make the different transaction
behaviors of the same user have no relevance in the block record storage, thereby improving user security
and transaction confidentiality.
5.8.7.2 Key Management
In the fully managed mode, the key management system is responsible for the association of the user
key with the account, key security management, and loss recovery. The user key is generated on the client,
and the user can choose to save the key in the key safe or entrust the account to the associated account, so
that the key is lost and retrieved. In order to ensure the reliability of the relationship between the user
account and the key, the key management system of the IPVC public chain uses the multi-node chain
storage for the signature of the association relationship.
5.8.7.3 Authority Management
The rights management module is responsible for the control and management of user accounts, key
systems, node joins and exits, and data access. Including audit permissions, account delegation permissions,
node consensus permissions, and user data access permissions. Auditing authority is to provide auditing
functions for the regulatory authorities, and to strictly control the access rights and data scope. Users who
are not related to transactions on the shared ledger can be associated with users.
The account delegation authority is used to control the access control of the user account delegation
relationship, the consensus authority performs the consensus authority management on the participating or
newly joined nodes, and the access authority is used to manage the client's data query authority on the IPVC
public chain.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 67
5.8.7.4 Wind Control Audit
The wind control module is responsible for risk control of the trading behavior of digital asset classes in
the chain. The IPVC public chain provides a risk control expert model system. By analyzing and capturing
the deep relationship between massive data, the risk control rules are adaptively adjusted, and risks and
management are discovered in time. Wind control and control risks to prevent problems before they happen.
The audit module provides auditing capabilities for the auditing organization, and through strict authority
control management, ensures that the auditing function can only be used by the auditing organization.
5.8.8 Smart Contract
The blockchain contract section includes both standard contracts and business-customized contracts.
Standard contracts include asset consistency check, automatic transaction matching, multi-party
confirmation transfer, and automatic clearing of contracts, which are relatively simple contracts. They are
built-in contracts and can be directly linked to the IPVC public chain. User-customized smart contracts
include the ability to modify configurations and add other business logic through contract templates, as well
as support for more complex user-programmed contracts that run in relatively independent environments.
Smart contracts include four parts: contract registration, triggering, execution, and cancellation.
Contract inspection consensus processing
Contract rollover
Contract cancellationContract registration
Timed trigger
Practice triggering contract trigger
Contract trigger
Construction mirror state consensus
Code execution error rollback
Contract execution
Contract generation
registration consensus
security check contract
storage
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 68
Contract registration
Contract registration is the process of storing the consensus on the chain after the user contains written
the contract security check.
Ø Contract trigger
Contract triggering is the process of triggering contract execution through external conditions after
contract registration, supporting timing triggers, event triggers, trade triggers, and other contract triggers.
Timed triggering is the process of automatically triggering a contract call after the node triggers the time
consensus after the time preset in the contract is met. Events, transactions, and other contract calls are
triggered by a new request consensus process.
Ø Contract execution
Contract execution is the complete process of running contract code in a separate environment,
including a contract construction environment, code execution, consensus on state changes in the execution
code, and consensus exception handling.
Ø Contract cancellation
Contract cancellation is the process of dumping, cleaning, and cleaning up contracts that have been
executed, expired, or changed in business requirements. The process of cleaning up and cleaning up
requires multiple nodes to complete.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 69
5.8.9 Operational Monitoring
In order to quickly access and access the system, the system can quickly and accurately identify the
running status of the system and meet other operation and maintenance requirements during operation,
such as storage account expansion and program upgrade. Provides a complete, fast, and visual operation
monitoring system. Operation monitoring mainly includes configuration, monitoring, alarm, release, and
service analysis.
5.8.9.1 Configuration
Responsible for processing the relevant configuration of the network node, such as the selection of the
consensus algorithm, the adaptive threshold, the storage method of the storage book, the network routing
mode, etc., the configuration itself can be issued as a transaction in the form of a transaction, and then
agreed upon by the consensus algorithm. Effective.
5.8.9.2 Monitoring
Responsible for collecting state data running in the system and visualizing it. The status data in the
system includes the system's access volume, time-consuming, node health status, and comparison of the
underlying machine resources (CPU, memory, hard disk) usage status, etc. Through visual monitoring, the
status of the entire chain system can be known in real time.
5.8.9.3 Warning
The IPVC public chain notifies the relevant personnel through SMS, telephone, WeChat, email, etc. in
the serious situation of the system, such as fraudulent nodes, account tampering, machine failure, etc., in
order to deal with it in time.
Release 5.8.9.4
The IPVC public chain can be supported by the release module for operations such as initial deployment
of the system, upgrade of the running program, and node expansion during the running process. The
publishing module guarantees the consistency of executable programs of important modules such as
interfaces and consensus algorithms.
5.8.9.5 Business Analysis
Business analysis includes data consistency detection between nodes and multi-dimensional statistics
and analysis of transaction data, which can provide specific authorized users with charts for business
statistics analysis and business development trends.
5.8.9.6 Cloud Adaptation
The cloud adapter provides the interface adaptation of the current mainstream cloud operators, which
makes it easier to deploy on the cloud for maintenance and expansion.
u IPVC Multidimensional Public Chain
IPVC AVATAR
- 70
Business Ecology
IPVC AVATAR
- 71
IPVC protocol
God
Earth Person
The god is the world. Is the law incarnation in the digital world.Is also a chain agreement and incentive mechanism
Human value Is an individual in the intellectual age IP is the core of the era of Big Calculation
The digital worldAccurate big data Constituent“Digital Earth”All landing projects are components
u Digital Ecosystem
IPVC AVATAR
- 72
u Digital Ecosystem
IPVC valueProtocol can be a number (blockchain).God (rules)>>>Earth (data production data)>>>Person (personal network)confirmation.
Will Reconstructing the production relationship in the era of big data is of great significance
B u i l d i n g a t r u s t e d n e t w o r k S y s t e m , m a i n c h a i n a d o p t i o n DPOS+ZKProof+BFT Optimal algorithm,Is the underlying application public chain in the Avatar Ecology.
IPVC
IPVC AVATAR
- 73
u Digital Ecosystem
Internet computing project in the era of Big Calculation,It contains
blockchain, neural network engine, manual
Intelligent deep learning and new distributed data perpetuation
technology will ultimately focus on IP nodes
BIG CALCULATION
IPVC AVATAR
- 74
u Digital Ecosystem
Human network is a blockchain digital network with human IP as a node
Is the core of exploring spiritual eternal life
Personal information by numberStored on a distributed network in the form of DNA
The human network is the basic framework of the era of Big Calculation.
Human network
IPVC AVATAR
- 75
Token Issued
IPVC
IPVC AVATAR
Ecological mining34% IPVC resonance33% DPOS consensus mechanism 33%
- 76
IPVCResonance
33%
Ecological mining
34%
DPOSConsensus mechanism
33%
u Total release ratio allocation:
First, USDT User 1:2 Redeem AVA:1, the total amount of exchange (7 million AVA) is based onThe first release of the IPVC value chain.
2、After the IPVC main chain is online, the user uses AVA private key and import to IPVC wallet client, you can get airdrops immediately IPVC , no time limit for receiving.
Resonance mining Creation fund Community incentives
Distribution plan proportion Quantity
Community miner 70% 147,000,0000
Technical operation 20% 42,000,0000
Foundation 5% 10,500,0000
Partner 5% 10,500,0000
Intelligent Property Value Chain's value data equity certificate is referred to as IPVC , and the number of issues issued is 2.1 billion. Via IPVC value conversion protocol, VPot, IPVC , VAsset, DATN, RSC,Titan Exchange the large-scale digital equity certificate (BCT) according to the ratio of 6:1:1:1:1:1 = 1.
IPVC AVATAR
- 77
The Practical Significance of AVATAR
AVATAR is one part of the IPVC value chain. AVATAR will Use new technology, achievements IPVC
Value Chain Greater value. Zero knowledge proof, smart contract, DPOS+BFT+Zero—Knowledge Proof
encryption deduplication POC such an increase in mechanisms will make IPVC network is easier to use,
efficient, reliable and environmentally friendly, creating a large computing network that is truly suitable for
the future of society.
AVATAR Fire Plan Innovation —— Lay a solid foundation for the construction of a perfect large
computing system in the future, release IPVC the full energy of the value network.
AVATAR Will continue to develop. This allows for a variety of scenarios to be implemented on the chain
by employing all existing platforms and networks. Payment, clearing and settlement, supply chain, billing,
evidence storage, copyright, internet of things and games will be integrated into IPVC In the blockchain.
AVATAR Digital System
Avatar (AVATAR) system —— "Digital Heaven and Earth":
Digital assets created by distributed precision big data technology that can share value-creating value —
"Digital Earth"; use intelligent communication as an incentive mechanism for all relevant-sizedecological
organizations —— "Vanzhongtian"; distributed Collaborative, intelligent networked distributed
organization ecology —— "person network."
Basic Information:
English name:AVATAR
Abbreviation: AVA
Chinese name: Avatar
Total circulation: 2.1Billion AVA
Consensus: Smart token
Privacy protection: zero knowledge proof
Smart Contract: Support
AVA release
total2.1Billion AVA, first round release 7 Million AVA fire, resonance generation 2.1Billion IPVC Token 。
IPVC AVATAR
- 78
Disclaimer
IPVC
IPVC AVATAR
- 79
1. This document is for informational purposes only. The contents of this document are for reference
only and do not constitute IPVC And any investment advice, advice or invitation from the relevant
company.
2. This document should not be construed as a forced participation.
3. Participation in this project means that the participants have reached the age standard and have
complete civil capacity.IPVC The signed contract is true and effective. All participants are voluntarily
signed and signed before the contract is signed.IPVC clear and necessary understanding was made.
4.The IPVC team will continue to make reasonable attempts to ensure that the information in this white
paper is true and accurate. During the development process, the platform may be updated, including
but not limited to platform mechanism, Token and its mechanism, Token allocation, the team will
publish the update by publicizing the announcement or new white paper on the website. Participants
are required to keep the latest white papers in a timely manner and adjust their decisions in a timely
manner based on the updates. IPVC It is expressly stated that it does not assume any loss caused by
the participants' reliance on the contents of this document, the inaccuracy of the information in this
document, and any actions caused by this article.
5. The team will spare no effort to achieve the goals mentioned in the document, but based on the
existence of force majeure, the team can not fully commit.
6. The official Token of this project is an important tool for platform performance, not an investment
product. Having an official Token does not mean granting the owner IPVC All of the platform, control,
decision-making power. Token of this project does not belong to the following categories: a, any kind of
currency; b, securities; c, the legal entity's equity; d, stocks, bonds, notes, warrants, certificates or other
instruments that grant any rights.
7. The value-added of the Token of this project depends on the market rules and the demand after
application, it may not have any value, the team does not promise its value-added, and is not
responsible for the consequences caused by the increase or decrease of value.
8. To the maximum extent permitted by applicable law, damages and risks arising from participation in
the project, including but not limited to direct or indirect personal damage, loss of commercial profits,
loss of commercial information or any other economic loss, The team is not responsible.
9、The IPVC platform complies with all regulations and industry self-regulatory declarations.
Participant participation means that the inspection will be fully accepted and adhered to. At the same
time, all information disclosed by the Participant to complete such an inspection must be complete and
accurate.
10、The IPVC platform clearly communicates the possible risks to the participants. Once the
participants participate in the project, they accept and recognize the terms and conditions in the
detailed rules and accept the potential risks of the platform at their own risk.