White Paper 1.0
Application of Network Value of Data
2019-03-05English
introductionApplication of Data Network ValueYBC YBC is launched by the YBCHAIN Foundation in Singapore and
organized jointly by the professional global block chain technology team.
YBC Certificate is a cloud data service system based on Block Chain 3.0
technology. In order to solve some prominent problems in AI and big data
application, it includes property, perfectional function , system
expansibility, supervisory auditing, ease of use, etc. YBC Block Chain 3.0
adopts the latest layered architecture designation, standardized data
protocol, IPFS network protocol, etc. A series of innovative technology
schemes, such as dual consensus algorithm, distributed storage
technology, flexible multi-level use strategy and so on, focus on creating
cloud sharing community scenarios. The data application ecology
established by YBC will realize greater application value of block chains.
catalog
introduction——————————————————————————02
Chapter 1: YBC Certificate Block Chain 3.0 Scheme —————————08
1.1design goal———————————————————————08
1.1.1Supporting millions of users—————————————10
1.1.2free to use ————————————————————10
1.1.3Easy upgrade and troubleshooting——————————10
1.1.4Low latency————————————————————10
1.1.5Serial performance—————————————————11
1.1.6Parallel performance————————————————11
1.2Design principles ————————————————————11
1.2.1Compatibility design————————————————11
1.2.2Modular design idea————————————————12
1.2.3Security policy ——————————————————13
1.2.4Easy-to-use strategy————————————————15
1.3Mission of Yuntong Pass—————————————————16
Chapter 2: Realization Scheme of Yuntong Verification———————17
2.1consensus algorithm———————————————————17
2.2account ————————————————————————19
2.3Deterministic parallel execution of applications ———————19
2.4.1Scripts and virtual machines———————————————20
2.4.2Messages for schema definition: ——————————20
2.4.3Schema Definition Database:————————————20
2.4.4 Separates authentication from applications: —————20
2.4.5 Virtual Machine Independent Architecture: ——————21
2.4.6Wren: ——————————————————————21
2.4.7Web assembly(WASM): ——————————————21
2.4.8Ethernet virtual machine(EVM):———————————22
2.5.1 Cross link communication ———————————————22
2.5.2 Cross-Chain Communication Delay: —————————22
2.5.3 Completion proof: ————————————————23
Chapter Three 3: Technological Innovation of YBC Certificate ————23
3.1 Defects of Intelligent Contract 2.0 ——————————24
3.2 Transaction Model Based on AI Artificial Intelligenc———26
(1)Implementation of Intelligent Contract 2.0————————26
(2)Safety Intelligent Contract Execution Based on AI Assistance
-———————————————————————————————28
(3)Security Intelligent Contract Based on AI Script Model ——-30
(4)Trusteeship transaction based on AI--——————————31
(5)Multi-way matchmaking transaction based on AI—————31
3.3 Basic Implementation of Safety and Intelligence Contract——--32
3.4 Security Intelligence Contracts Support Digital Assets-————33
Chapter IV: Technical characteristics-———————————————34
4.1High property--—————————————————————34
4.2 High security -—————————————————————35
4.3 Efficient operation-———————————————————35
Chapter Five: Characteristic Functions-——————————————35
5.1 Open Accessibility-———————————————————35
5.2 Checking mechanism--—————————————————36
5.3 Asset Circulation and Management--———————————37
5.4 Graphene Technology and Virtual Machine Realization Contract
———————————————————————————————37
Chapter 6: Core Innovation of YBC Certificate--——————————37
6.1 decentralized apply(DAPP)————————————————38
6.2 Deployment of 51 supernodes-——————————————38
6.3 Support from multiple industries(Industryoriented)--————38
6.4 Profit model-——————————————————————39
Chapter 7: Application and Development-—————————————40
7.1 AI Application Platform of Artificial Intelligence-———————40
7.1.1 YBC token + Credit Reporting Area--—————————40
7.1.2 YBC certificate + Data Sharing————————————41
7.1.3 YBC certificate + Internet of Things——————————41
7.2Intelligent medical treatment-———————————————42
7.3 AI Intelligent aviation-——————————————————43
Chapter 8: Achieving Development Planning————————————44
Chapter 9: Economic Ecology of YBC Section Chain—————————45
9.1The Usage and Value of Chain Currency in YBC Certificate Block
—-——————————————————————————————45
9.2 Issuance plan————--—————————————————45
9.2.1 Total issue amount--————————————————45
9.2.2 detailed rules and regulations of resealsing——————46
9.2.3 Distribution plan--———————————————————46
Chapter 10: YBC Founding Team---————————————————46
10.1 Originating institution:-————————————-————46
10.2 Foundation organizational structure:--——————————47
10.3 Technical team:--———————————————————47
10.4 Investment Cooperation Institutions (ranked in all order)-——52
Chapter 11: Disclaimer————————————————————-—53
Chapter 12: Risk Tips——————————————————————54
Chapter 1: YBC Certificate Block Chain 3.0
Scheme
i.i design goals
Since the opening of the Bitcoin code in 2009, there have been many
Altcoin and other block chain projects in the community. The meaningful
Altcoin project has become a test field for block chain technology (except
for some meaningless Altcoin). It has some certain reference significances
to the development and maturity of technology (such as NameCoin, etc.),
in addition to some projects that extend the boundaries of block chain
technology from different perspectives, such as ColorCoin protocol,
NXTCoin, Ripple and Stellar, BitShare, Dash, Maidsafe. , Factom, etc. Later,
there was the Ethereum project dedicated to becoming a universal smart
contract platform and decentralized application platform. countless
developers and community members have participated in and witnessed
the rapid development of block chain technology, but the block chain
industry facing many challenges both from a technical perspective or an
industrial application perspective.
The birth of block chain marks a beginning that humanity enable to
build a truly trustworthy Internet. The essence of block chain is a
distributed database that records all transactions or digital events. It can
also be thought of as a public account book that can be accessed and
recorded by all visitors. Block chain can establish reliable trust between
peers to peers in the network, so that the the interference will be removed
from the transfer process of intermediary, not only discloses information
but also protects privacy. It not only makes codetermination and protects
individual rights, but the internal mechanism improves the efficiency of
value interaction and reduces the cost has broad application prospects.
There are plenty of opportunities in this disruptive technology, and a
revolution triggered by the technology has just begun. Block chain
technology is currently divided into public block chains, Consortium block
chains, and Fully-private block chains. The main application direction of
the public chain is Bitcoin, Ethereum, Hyperledger and most of the
competition coins. As long as there is a computer connected to the
Internet,everybody,will be accessible to it. BTC, ETH, public chain, and
Ulord are all the members of the public chains. It provides a content
distribution public chain based on block chain technology. It provides a
complete ecosystem for content distribution by carrying out some
creative work.. People can create a variety of content-based decentralized
applications here, such as video, music, pictures, text, code, anime material,
and more. BTC, ETH, public chain.Ulord are a peer-to-peer value-transfer
public chain. By building a block chain underlying architecture and digital
resource distribution protocol, third-party developers are supported to
build their own applications on the top of open source protocols. With
other industry partners work together to form a complete ecosystem of
block chain technologies and applications.
Now, the mechanism and operational efficiency of ETF are difficult to
support a massive decentralization business application ecology, which is
the shortcoming of ETF in its early designation. However, in view of the
current economic value, ETF has realized the application of ICO, which
enables all kinds of block chains to start related ecological construction
quickly. However, as the expectation of achieve better development and
providing better services, block chain technology still faces the following
problems:
1 Lack of new type of smart contract platform. Currently, the existing
smart contract platform is mainly based on Proof of Work (PoW), and the
consensus mechanism of Proof of Work (PoW) is hard to applied in the
industry.
2. Compatibility between different block chain technologies, for
example, it is incompatible between the Bitcoin ecosystem based on the
UTXO model and the Ethereum ecosystem based on the Account model.
3. The low speed of transaction and the poor user experience.
4. The biggest limitation of block chain applications is latency and
data throughput.
5. The existing block chain system has great closeness.
At present, most of the triggering conditions of smart contracts come
from the block chain system itself. There are few triggering conditions
come from outside world and lack of interaction with real world.
A series of innovations have been made in block chain technology and
concepts based on the challenges of the current block chain industry, :
including a consensus mechanism based on the Byzantine consensus
mechanism and the DPOS consensus mechanism,the concept and
implementation of the block chain master contract. The separation of
trading books and smart contract books,all those above makes Cloud Pass
a bridge between the block chain world and real business world.
1.1.1 Support for millions of users
Applications such as Ebay, Uber, AirBnB and Facebook require block
chain technology that can handle millions of active users. In some cases,
applications may not work properly, and P is not a large number of users,
so it is critical that a platform can handle a large number of users .
1.1.2 free to use
Sometimes application developers need to provide free services to
users; Block chain are likely to receive more attention since platforms that
can be used for free. With enough user scale, developers and businesses
have chance to create corresponding profit models.
1.1.3 easy upgrade and troubleshooting
Block chain-based applications need to be able to support software
upgrades as they perform functional iterations. All software can be
affected by bugs. The underlying platform of a block chain needs to be
able to fix bugs.
1.1.4 low latency
Timely feedback is the foundation of a good user experience. If the
delay time exceeds a few seconds, it will greatly affect the user experience
and seriously reduce the competitiveness of the program.
1.1.5 serial performance
Some applications must ordered JII page of command execution, so
they cannot be implemented with parallel algorithms. such as exchanges
often need to handle a large number of serial operations, so a successful
block chain architecture requires strong serial performance.
1.1.6 parallel performance
Large-scale applications require a workload between multiple CPUs
and computers.
1.2 Design Principles
The fourth generation block chain of Yuntong is committed to providing
enterprise-level block chain infrastructure, industry solutions, and secure,
reliable and flexible block chain cloud services.
1.2.1 Compatibility design
1) Compatibility with Bitcoin networks and Ethereum networks
Ecosystem of Bitcoin network is currently the largest ecosystem of
block chain technology. Based on the network effect and the Matthew
Effect, there is a reason we can believe that the Bitcoin ecosystem will be
further expanding and improving which means higher code maturity and
more developers. We try to maintain compatibility of the Bitcoin system at
the beginning of the design, , such as using UTXO's trading model and the
same transaction data structure which also provides technical possibilities
for leveraging Bitcoin's BIP protocol. Therefore, it is compatible with most
BIP protocols, such as lighting network and side chain and drive chain and
Zcash protocol based on zero-knowledge proof.
For the first time, Ethereum transformed the concept of smart
contracts from theory to reality, which expanding the boundaries of block
chain technology. There are many places need to improve in Ethereum
Virtual Machine (EVM)(example:Transaction-ordering
Dependenceattack/Timestamp) Dependence Attack/Mishandled
Exceptions, etc. /), but EVM is the only one tested so far Smart contract
virtual machines, so it is very important to maintain EVM compatibility, so
the public-chain virtual machines will maintain EVM compatibility, and all
smart contracts developed on the Ethereum platform can also run on the
platform.
2) backward compatibility on itself (Downward Compatibility)
Software backward compatibility is a very important issue as well. It
will bring a lot of convenience to users for files created with the old
version and smart contracts will continue to run on the new version
without user forced upgrades. Because of the special nature and one-time
deployment of smart contracts, if backward compatibility is unaccessible,
it will bring great problems to the smart contracts that have already been
executed,also cause the software to be iterated and upgraded later, and
EVM 2.0 and The problem that EVM1.0 is incompatible,all that above is
also a problem designers of the software need to pay attention to.
1.2.2 Modular design ideas
Modular design is in favor of softwares` development and
maintenance, so in the public chain, we are divided into the following
three modules:
1) Public Chain Tech: Public Chain Core, Public Chain VM, Public Chain
Identity, Public Chain Oraclean Data Feed, Public Chain Storage, etc.
2) User Module Public Chain UI: Public Chain IDE, Public Chain Mobile,
Public Chain Web, Public Chain Node, etc.
3) Business Path Module: Public Chain Busin Public Chain: Public Chain
Finance, Public Chain Legalandrisk, Public Chain Industry, Public Chain
Competitor, etc.
1.2.3 Security tactics
1) Reliability of the technology used in the platform
Phase one is dedicated to providing an intelligent contract platform
for POS mechanisms that are highly available and compatible with UTXO
models for different industries. UTXO model is a very core part of Bitcoin
network. The code in UTXO model has a high maturity and compatibility. It
can not only absorb other developers and existing development tools of
Bitcoin ecosystem, but have better security.
As for consensus protocol, DPOS consensus mechanism is adopted in
public chains,a certain number of nodes are selected by all the token
holders of the chain, and then the nodes cooperate and take turns to
account.In the DPOS model of public chain, all the holders of token can
vote for 48 block producers (witnesses) according to the number of public
chains they hold 1:1. Then, the producers of these 48 blocks cooperate
with each other and take turns to keep accounts in a certain order. Block
spacing is 3 seconds for a large block. In addition, the producers of these
48 blocks need to provide the computing and network resources also
(including CPU, memory, storage capacity, etc.) needed by the full chain of
public chains. If one of the blocks is suspended cause of reason such as
disconnection, then a jump block will occur and the next accounting node
will keep up with it. Such a mechanism ensures that even if only one node
is working at last, the whole system can still work, and then continue to
select new nodes to ensure stable operation. If bifurcation occurs in the
process, DPOS still adopts the longest chain principle, and stipulates that
each node cannot block on two chains at the same time (otherwise, the
node will be judged to be illegal and disqualified), which makes it possible
to retain only one chain after the bifurcation occurs, when the total height
of more than half of the witness nodes is reached.
Besides, there is an irreversibility principle under DPOS. A block will
enters an irreversible state once a block is followed by more than 2/3 of
the total number of witnesses, which is tantamount to confirming the
position of the block in the main chain, then it can no longer roll back to
the block before the block for division, otherwise it will be considered
illegal. Because each node participates in one chain at the same time, only
one irreversible block may exist in the same height block, which ensures
the security of the block and prevents malicious attacks and malicious
bifurcation. Generally speaking, in the model of generating nodes in 48
blocks, the time for 33 blocks (33/48 > 2/3) to enter the irreversible state
(i.e. 100% security of transactions) is 45 seconds.
Therefore, the advantages of DPOS are:
1. Consuming less power in POW mode.
2, the node changed from competition to collaboration, there are only
51 nodes, which makes it easier to reach a consensus and conducive to
improving the performance of the main chain (TPS).
3. Hard forks are not generated because nodes follow the longest
chain principle and each node cannot participate in both chains at the
same time. Therefore, after the fork is generated, up to more than half of
the total number of witness nodes, only one chain is retained. Every major
system upgrade will not lead to hard forks, just need to upgrade all
witness nodes at the same time.
4. It is more secure. It is necessary to control more than 2/3 nodes to
make the wrong block irreversible.
5. the speed for confirm is very fast.
Regarding the virtual machine part of the smart contract, EVM is
currently supported in the test network. EVM is also the only smart
contract virtual machine that has been tested so far. The later focus on: 1)
developing a more rigorous smart contract programming language; 2)
supporting EVM 2.0 (Wasm); 3) developing the ability of porting it on
other virtual machine platforms (LLVM, Lua, NodeJS).
2) Security strategy for the release of public chain platforms
The public-chain platform will undergo a series of rigorous tests
before be released, including software functional test, P2P network
performance test, potential attack vector test, reliability test, security
auditing and code review, Alpha version test, Bata version test, Complete
software test process to control software quality.
1.2.4 Usability strategy
For the ease use of the node, we will provide two or three different
operating modes for the user's "wallet", including Simple Mode, Prof
national mode, Expert Mode, and different U corresponding to different
user operating systems and development requirements. . In addition, we
will provide a complete API service that will be based on Standard
JSON-RPC provides remote and local API call services and considers
compatibility between versions. Other, we will also provide public-chain
IDE services to develop and debug related code and services.
Besides, users can visit the DAPP service through a browser (Chrome
or Firefox, etc.), for example, users can enter the gl: //DappName form in
the browser to access the decentralized application in the public chain
system in the public chain. In the system, the decentralized carpooling
service "car is coming", they can visit the corresponding DAPP service by
entering gl://chelaile .
YBC is an ultra-high property system for DApp. After the cloud
becomes the main chain, there will be more applications on it. More
applications on the YBC network, more values on YBC's main network
resources, the specific application areas include: AI artificial intelligence,
Internet of Things, credit, data sharing, resource sharing, finance,
education, medical, logistics supply chain, communications, social welfare,
sharing economy, big data, voting, auditing, auction And lottery tickets,
etc. Yuntong Securities is developed based on the DPOS + POW
consensus mechanism, but it is not a smart contract on ETH, but an
independent underlying public chain, using graphene technology and
virtual machines to achieve contracts, and for the first time using secure
multiparty computing and Threshold key sharing technology enables
secure cross-chain transactions.
1.3 The mission of Yuntong
YBC's vision is to create a bottom-level public chain that enables
cross-chain transactions. Based on block chain technology, YBC has
successfully developed a smart contract consisting of distributed ledgers
and distributed computers, which makes digital currency more
transparent, and its ecology is suitable for most application scenarios.
As a platform that can be used globally, the block chain technology of
YBC allows consumers to trade without facing excessive transaction costs
or transactions in different consumer needs and application
scenarios,without waiting for long time,which increase consumer
enthusiasm for using Cloud Pass.
YBC can change people's lifestyle. It becomes a safe, transparent and
convenient mechanism in the mutual agreement, which reduces the risk
and cumbersomeness of transactions and makes the transaction activity
more rapid and simple. The autonomous contract of Yuntong Card
provides new opportunities for many application scenarios, provides
people more convenience and improving their quality of life. Besides,
Yuntong Securities can solve the problem of lack of trust between traders
by provide "complete transparency" . YBC is open and accessible to any
user. Any system based on it is completely transparent. The Yuntong
Securities Account has ability bring significant benefits for building
trust,cause of it does not require a third party, so it cut the associated
costs, eliminates reliance on third party, and makes the transaction open.
Second, Cloud Pass Combining virtuality and reality provides a way to
owingt any asset, they can be tangible or intangible. by this way,
ownership status can be confirmed at any time, at the same time,it is able
to fully compatible with the trading mechanism.Figure 1 Real name
mechanism on the chain
Chapter 2: YBC Implementation Plan
2.1 Consensus algorithm
YBS adopts the DPOS consensus mechanism, and instead, the holders
of all the tokens of the chain elect a certain number of nodes to cooperate
and record in turn. In the DPOS mode of Yuntong, all holders of Yuntong
card tokens can acquire votes as the same as the number of Yuntong
cards they hold, and be elected by 51 block producers (witnesses). Then,
the 51 block producers cooperate will accounting in a certain order. The
block interval is 3 seconds for
a large block. In addition, the 51 block producers will keep accounts, and
providing computing and network resources (including CPU, memory,
storage capacity, etc.) required by the entire cloud pass. If one of the
blocks is paused cause of a network disconnection or what else, the next
accounting node will continue to keep track of the previous node. This
mechanism guarantees that even if there is only one node keep working,
the entire system can still work to select new nodes to ensure stable
operation. If a fork occurs in the process, DPOS still adopts the longest
chain principle, and it is agreed that each node cannot be out of the two
chains at the same time (otherwise the node will be judged to be a
violation and disqualified), which makes the fork generated, after up to
half of the total number of witness nodes, only one chain will be retained.
Moreover, there is an irreversible principle in DPOS. Once a block is
followed by a block which get get more than 2/3 of the total number of
witnesses, the block will enters an irreversible state, which is equivalent to
confirming that the block is a block in the main chain. The status will be
considered as violate if it rolled back to the block before the block to
divide . Because each node participates in at most one chain at the same
time, it is only possible that there can be only one irreversible block in the
same height block, which ensures the security of the block and prevents
malicious attacks and malicious forks. normally, in the model of 51
block-generating nodes, the time of 33 blocks (33/51>2/3) enter the
irreversible state (that is, the transaction is 100% safe) is 45 seconds.
Therefore, the advantages of DPOS are:
1. Consuming less power in POW mode.
2, the node changed from competition to collaboration, there are only
51 nodes, which makes it easier to reach a consensus and conducive to
improving the performance of the main chain (TPS).
3. Hard forks are not generated because nodes follow the longest
chain principle and each node cannot participate in both chains at the
same time. Therefore, after the fork is generated, up to more than half of
the total number of witness nodes, only one chain is retained. Every major
system upgrade will not lead to hard forks, just need to upgrade all
witness nodes at the same time.
4. It is more secure. It is necessary to control more than 2/3 nodes to
make the wrong block irreversible.
5. the speed for confirm is very fast.
In addition, YBC also upgraded the DPOS consensus mechanism, not
just DPOS consensus also for DPOS + POW consensus mechanism. For
achieving the performance of second-level confirmation, based on the
DPOS mentioned above, YBC has made some improvements already. For
improving the speed of block identification, YBC has added the Byzantine
fault tolerance mechanism (POW) and irreversible state card and
proposed the concept of community block. YBC certificate produce a large
block every 3 seconds, and now the Yuntong passes team has proposed a
plan to continue to divide the blocks of 3 seconds into several pieces with
intervals of 0.5 seconds without switching accounting rights. Once each
piece comes out, it will broadcasts immediately. The design will make
blocks more quickly confirmed while minimizing the bifurcation effect
caused by network latency.
YBC card introduces POW mechanism: whenever a community block
is broadcast in the block chain network, the rest of the nodes will
immediately confirm the block. Blocks confirmed by the other 2/3 nodes
will enter an irreversible state. With the consensus mechanism, the time of
security confirmation is.5s (block interval) +0.3s (block propagation delay)
<1s, which achieves second-level confirmation performance.If the block
interval divided in more pieces, the time required of confirmation will be
approximately as same as the network delay of block propagation, or even
less than 0.5 seconds,in theory.
Unless more than two-thirds of the nodes are controlled, malicious
blocks cannot get into the irreversible state. It is specifically mentioned
here,if malicious nodes already controlled more than 1/2 but less than 2/3
of the nodes,it will not get into irreversible state, so that other observer
nodes and witness nodes get enough time to vote out malicious nodes.
Therefore, this mode also greatly improves security.
2.2 Account
YBC allows the use of a unique readable name of 2 to 32 characters in
length to enable reference to the account. This name is chosen by the
creator of the account. All accounts must be filled with the minimum
account balance at the time of creation to cover the cost of storing
account data. The account name also supports namespaces, so the owner
of the account @domain is the only user who can create the account
@user.domain.
In the case of decentralization, the application developer will pay the
nominal cost of creating the account to register the new user.Companies
often spent a lot of money for get customer in the form of advertising and
free services. In contrast, the cost of creating a new block chain account is
negligible. Fortunately, there is no need to create an account for a user
who is already registered by another application.
2.3 Deterministic parallel execution of the applicationThe block chain consensus depends on deterministic (reproducible)
behavior. This means that all parallel executions will not work properly
with primitives of mutex or other locks. Without locks, there must be some
way to ensure that all accounts can only read and write their own private
databases. This also means that each account processes its messages
sequentially, and parallelism is determined at the account level.
In DAPP software, the block generator is used to deliver messages to
separate threads so they can evaluated in parallel. The status of account
only depends on the message delivered to it. The schedule is the output of
the block generator and will be executed deterministically, but the process
of generating the schedule does not have to be deterministic. That means
the block generator can utilize parallel algorithms to schedule
transactions.
Parallel execution means that when a script generates a new message,
it will be sent in the next cycle instead of send itself immediately. The
reason why it will not be sent immediately is the receiver may voluntarily
modify itself state in another thread.
2.4.1 Scripts and virtual machines
The operating system of YBC will served as a platform for passing
authenticated information between accounts at first. The implementation
of the scripting language and virtual machine will be independent from
the certificate operating system. Any development language or virtual
machine and sandbox with sufficient performance can be integrated with
YBC.
2.4.2 Messages defined by the schemaAll messages sent between accounts are defined by a pattern of the block
chain consensus state, which allows seamless conversion of messages
between binary and JSON formats.
2.4.3 Database of model definition:
Similar schema definitions are used for database state, which ensures
that all applications store data in one format, with human readability of
JSON, and efficient storage and operability in binary format.
2.4.4:Separating authentication from applications
For maximize parallel computing and minimize the computational
task of regenerating the application state from the program log, the YBC
operating system divides the verification logic into three parts: 1) the
confirmation message is consistent internally; 2) Confirm that all
preconditions are valid; 3) modify the application state. The internal
consistency of the verification message is read-only and does not require
access to the blockchain state, which means it can maximize parallel
operations to execute.
Validation preconditions (such as demand balancing) are also
read-only, so you can also benefit from parallel operations. Write access is
only required if the application state is modified, and needs to process
each application in order. Authentication is a read-only process that
verifies that a message can be implemented, actually,it is the application
doing the work. Real-time calculations need to be implemented, but it is
no longer need to perform an authentication operation once the
transaction is included in the block chain .
2.4.5 Independent Architecture of Virtual Machine:
The purpose of YBC operating system software to support multiple
virtual machines and to continuously add new virtual machines as needed
over time. For this reason, this article does not discuss any details of
particular language or virtual machine, but even so, there are currently
three virtual machines are evaluating to access to YBC system.
2.4.6 Wren :
Wren(http://wren.io) is a small,rapid, category-based programming
language. Wren's developers described it as "like a small tak file loaded
into a lua-sized package, plus a little Erlang feature, and then included in a
familiar, modern syntax. It is because of its short, easy-to-document and
understandable code base. It also has very good performance and can be
easily embedded in C++ applications.
2.4.7 Web assembly(WASM):
WASM is an emerging web standard used to building
high-performance web applications, it can be clearly defined and
sandboxed with a small amount of adaptation. The benefits of WASM are
widely supported in the industry, so you can develop smart contracts in
familiar languages, such as C or C++.
ESCs have begun adapting to WASM to provide the appropriate
sandbox and use the Ethereum WASM definition
(https://github.com/ewasm/design). This method is easily adapted for
cloud pass system software integration.
2.4.8 Ethernet virtual machine(EVM):
This virtual machine has been used in most existing smart contracts
and can be used on YBC certificate system block chain. It is conceivable
that EVM contracts can be run in the internal sandbox on the operating
system, interact with other applications by only a little adaptation.
2.5.1 communication across chain
The operating system is aimed at facilitate cross-chain interaction
between block chains by simplifying message presence and message
sequence proofing. These are combined with application architecture
design around information transfer, while hiding the details of cross-chain
interaction and validation which avoiding disclosure to application
developers.
2.5.2 Cross-Chain Communication Delay:
When communicating with other block chain, miners must wait for
other block chains to confirm irreversibly before accepting them as valid
inputs. Using the YBC system software, with a time-out certificate of
probation and 48 miners, it only takes about 45 seconds to confirm. If a
miner on a chain does not waiting for a transaction never turned up
confirmed, looks like an exchange accepts a deposit and then revokes the
operation, this will affect the validity of the chain consensus.
2.5.3 certificate of completion:
When using Merkel's proof of external block chains, there is a huge
difference between knowing that all transactions processed are valid and
knowing whether any transactions have been ignored. It is impossible to
prove that all recent transactions are known, but it is possible to prove
that there is no missing data between historical transactions. Cloud pass
operating system achieves this function by assigning a sequential
identification number to each incoming account. Users can use these
labels to prove that all messages to this account have been processed and
processed sequentially.
Chapter3: Technology Innovation of
YBCBased on the weaknesses of existing trading contracts including hard
in developing, unstructured coding, and owning no security review
mechanism, YBC has designed new generations based on artificial
intelligence and secure trusted execution mechanism and based on AI
virtual machine. Security smart contract. On the basis of supporting the
principle of non-discrimination, users can use AI model as a basic
guarantee to achieve more secure, reliable and more flexible transactions.
Security intelligence contract can be defined as: event-driven, capable
of reviewing through certificate AI, supporting AI hosting and adjudication,
maintaining work state, running on a replicated, shared account
(TheReplicated, Shared Ledger), and it maintains assets on a ledger which
supports external data through the interface mode and trusted gateway
specified by YBC certificate. It can be considered as a smart contract which
truly realizing intelligent finance with a legal framework.
With the guidance principles of "independent innovation, safe and
efficient, open sharing", the overall structure of the certification block
chain is divided into three layers: the bottom layer of the block platform
which was the independently developed by YBC. It provides basic service
for the upper application scenarios through the interface of SQL and API.
The core is aimed at build a leading enterprise-level block chain platform.
In the middle is the platform product service layer, which builds
high-availability and scalable block chain application infrastructure
platform products on the bottom layer, including shared accounts,
forensic services, sharing economy, and pass-through, and integrates
related fields. The basic product function helps enterprise quickly build an
upper block chain application scenario. The application service layer
provides trusted, secure and fast block chain applications to terminal users.
In the future, YBC will cooperate with industry partners and their
technology suppliers ,explore the development direction of the industry
block chain jointly promote the application of block chain.
The overall frame structure is as follows:
Currently,traditional smart contract trading in a barbaric growth
phase, each transaction similar to a "jungle adventure." At present, there
are many smart contract projects based on Ethereum, and most famous
ones are Augur, TheDAO, Digix, FirstBlood and so on. It is easy to find that
these traditional smart contracts are very complicated and cumbersome
therefore, weaken to logical loophole. For example, in TheDAO smart
contract, it need to take very cumbersome steps to avoid "most cases of
looting a small number of shackles “; if the experience user is insufficient,
such events are very easy to happen. The essence of such a phenomenon
is that the block chain is designed in the environment of not have a
centralized ruling body, which makes it impossible to implement the
mechanism of "post-argument and arbitration", it means when errors
occurring, it cannot be rectified.
For example, in a block chain, if currency is senting to an address, this
operation cannot be revoke. Therefore, when the counterparty sends the
currency to a wrong address, the corresponding loss will not be recovered.
Similarly, phishing transactions on Internet can also occur in the block
chain. Fraud parties can implement loopholes in the contract by
3.1 Defects of Smart Contract 2.0
embedding specific traps or wallet addresses in the contract. Such
transactions are also not enforceable. In addition, when there is a loophole
in the contract, for example, if the current transaction is executed but
forgot to revoke the transaction wallet, the monetary will not be
transferred to the specified wallet. In real life, the above transactions can
be revoked through a centralized system. If in a decentralized system,the
transaction party takes risks at its own according to the traditional
contract method.
There is a possibility that the user made a human errors in the process
of writing the contract. Common human errors include: oolong finger
operations in stock market trading; wrong quoting methods in foreign
exchange trading: for example, the USD/RMB quoted as RMB/USD. These
above transactions will inevitably lead to serious losses.
Therefore, it is extremely necessary to carry out compatibility
modification on existing smart contracts and realize intelligent analysis
and defect prevention of the logical behavior of contracts by the
implement of some mechanism, and minimize the probability of
vulnerability ultimately.
YBC’s security intelligence contract is dedicated to solving the above
problems which can only be solved with traditional centralized
transactions. Based on the principle of non-discrimination, the security
intelligence contract introduces the AI model, automatically judges the
rationality of the transaction model, and automatically sniffs the
transaction loopholes to realize the civilization of contract transactions.
Moreover, through the built-in AI trading model, with user's permission,
the unreasonable transaction will be automatically rejected, and the
transaction legislation of YBC Securities will be realized. However, if the
user abandons the AI protection voluntarily, the transaction can also be
completed, but the consequences will be borne by users.
The Security Intelligence Contract adding the following functions
comparing with smart contract 2.0: using AI to determine the risk of
trading data and possible loopholes; proposing changes and
recommending the creation of new trading contracts; AI system guarantee
for financial derivatives trading; user contracts Automatic replenishment
of various boundary conditions in execution; AI security custody of user
contracts, mainly used for futures and long-term financial derivatives
transactions.
Others, YBC's contractual tools can providing the following types of
functions: providing users with various high-level transaction models,
which have passed AI security review; for user contracts, trading
vulnerability sniffing and prompting;Perform a machine code level
security review of the trading contract provided by the trading object to
confirm the trading risk.
In fact, YBC's security intelligence contract can forecast the purpose of
the contract participants, forecast the risks, and examine and verify before
carry out the contract to protect transaction security. Compared with the
traditional smart contract, YBC provides users sufficient security
protection during the execution of the contract; while after the
implementation it will analyze the contract execution process and results
through the AI model and submit the quality assessment which is used to
promote safety optimization and transaction quality improvement.
In addition, the current Smart Contract 2.0 has a critical fault: the
ability of block chain running DApp applications is very limited, and it is
impossible to realize AI capabilities such as semantic understanding of
artificial intelligence, multi-layer neural networks, and machine learning.
Each node of YBC Card supports AI virtual machine natively, which can
support traditional DApp applications which will directly realize advanced
AI functions such as artificial intelligence-based semantic understanding
and RNN/DNN-based neural network. The overall computing power is
strong which makes it able to support a large number of DApps running
concurrently.
The Security Intelligence contract is backward compatible with traditional
Smart Contract 2.0, supports script-based and support-based AI-assisted
transactions and AI-managed transactions also.
3.2 A Transaction Model Based on AI Artificial Intelligence
(1)Implementation of Intelligent Contract 2.0
The nodes on the Cloud Pass perform this type of contract in
compatible form through the AI virtual machine. Smart Contract 2.0
processing as follows:
First of all, multi-users participate in the development of smart
contracts, it is contract drafting phase:
The contract executor (user) registers as a user of the block chain
which will return a pair of public and private keys; the public key acts as
the account address of the user on the block chain, and the private key
acts is the only key to the account. Two or more users design a contract
which through the programmatic terms, determine the relevant
commitments, which include the rights and obligations of both parties;
these rights are electronically, programming machine language;
Participants are signed with their respective private keys to ensure the
validity of the contract; the smart contract will be uploaded to the block
chain network based on the contents. Second, when the user submits the
smart contract to the block chain, it will enter the validity verification
phase.
This phase will complete the following phase:
The contract expands across the block chain network through P2P,
and each node will receive it; the verification node in the block chain will
receive the contract first and store it in memory, waiting for a new round.
The consensus time triggers the consensus and processing of the contract.
When the consensus time reached, the verification node will package
all the contracts saved in recent time period into a contract set, calculate
the hash value of the contract set, and finally assemble the hash value of
the contract set into a block structure that spreads to the entire network.
After receiving the block other verification nodes will take out the hash of
the contract set contained in it and compare it with the set of contracts
saved by itself. At the same time, send a collection to themselves and
other verification nodes; after multiple rounds of transmission and
comparison all verification nodes eventually agree on the latest contract
set within the specified time.
The recent contract set will be spread to the whole network in the
form of a block. Each block contains the following information: the hash
value of the current block and previous block, the time stamp when the
consensus reached, and other description information. At the same time,
the most important information of the block chain is a set of contracts that
have been agreed upon; Nodes which receive the contract set will verify
each contract, before written into the block chain it will be verified. The
content is mainly whether the private key signature of the contract
participant matches the account.
Finally, with the block chain was written to the verified contract, the
automated execution of the smart contract will be initiated.Including the
following steps:
The smart contract checks the automaton status periodically,
traverses the state machine, transaction, and trigger conditions contained
in each contract one by one,pushing the conditionally satisfied transaction
to the queue which was waiting for the consensus,does not satisfied
transaction will continue to be stored in the block chain.
The transactions that enter the recent round of verification will spread
to each verification node. As same as the normal block chain transactions,
the verified node first performs signature verification to ensure the validity
of the transaction.they will enter the consensus set. After most of the
verification nodes reach a consensus, the transaction will successfully
execute and notify the user.
After the transaction executed successfully, the status of the smart
contract will judge the status of the contract. When all the transactions in
the contract are executed in sequence, the status machine marks the
status of the contract of completed and removes from the latest block.
otherwise it will be marked , continue to be saved in the latest block until
the next round of processing is completed, all transaction and state
processing is automatically completed by the intelligent contract system
built into the bottom of the block chain which was transparent and can
not be tampered.
(2)Safety intelligent contract execution based on AI
In response to various shortcomings of Smart Contract 2.0, YBC
adopts an AI-assisted contract execution mechanism. The contract
execution process is not only automated, but also truly intelligent:
a. While the contract drafting, both parties participating in the
contract will censor the contract is defective and modify it according to
the results of the examination to automatically generate the rights of both
parties censor the contract's security AI model and the smart contract
security assistant software provided by YBC. The code for “right"and"
obligations” until the contract meet the security review specifications.
b. In the validity verification stage, since the contract requires
consensus confirmation on the whole network; the external conditions of
the contract may change at this time, so the AI virtual machine of each
verification node will additionally censor the contract in addition to
confirming the consistency of the contract signature. Meet the
requirements and ensure that the various enforcement terms and
conditions are complete and enforceable. If the contractor pays an
additional fee, the check node can initiate additional conditional review
and pre-execution functions, dynamically sniffing various vulnerabilities in
the contract. After the validity of the contract verified it will be written into
the block chain and enter the automatic execution phase.
c. While the automatic execution phase of the contract, various
unforeseen futures cause various shortcoming appear. At this time, the AI
virtual machine node executing the contract can pass the AI automatic
judgment mechanism and based on the rules of the certificate. It will make
up for the vulnerabilities that occur ensure the smooth execution of the
contract. moreover, when the parties are in conflict and the smart contract
cannot executed normally, the AI virtual machine will provide solutions by
the built-in AI model and assist in solving the problem.
When the smart contract is executed, the smart tools attached to the
certificate will analyze the intermediate steps of the contract and the
corresponding transaction processing and status. Users can summarize
and optimize the results of the contract execution submit them through
nodes. If each node of the block obtains consensus on the model, the
model will be written into the block and released as a user model to enrich
the contract model library of the cloud pass.
For behaviors such as "fishing scam deception" during the contract
execution phase will be solved in two ways:
a. By AI training, obtain model of fraudulent behaviors, and identify
the behavior in the process of forming a consensus, thereby rejecting
contract execution.
b. For phishing scam behavior, the fraudulent party provides the AI
model which conducts the behavior model and the wallet address will be
mark on the fraud signal, and builds a system of credit evaluation.
Subsequent AI will automatically discriminate this behavioral feature to
preventing it happening again.
For behaviors such as the inability to transfer funds during the
contract execution phase, after the contract has been suspended for a
certain period of time, the verification node performs an AI review,
determines the enforceability of the contract, and advances the execution
of the contract through the built-in AI model rules. Such contract
execution based on AI judgment needs to be completed through the
network-wide AI consensus.
(3)Security Intelligent Contract Based on AI Script Model
Smart Contract 2.0 is actually a state machine that supports byte opcodes
which requires users to describe the parameter details of the transaction
model and the execution process, that is prone to problems. Even if a
variety of high-level languages are developed in the future by compiling
to form the corresponding bytecode, users still need to write the relevant
model description. Various vulnerabilities often occur cause of the
inaccuracy and incompleteness made by the user's manual description
model. In the process of intelligent contract execution, even if users find
such a loophole, they can do nothing to appeal it. YBC solves this problem
by introducing the AI decision model and supporting the newest model. If
the vulnerability can be avoided directly, it will be more friendly to
users.YBC solves this problem by introducing a smart contract based on
the AI script model.
When users are ready to launch a security intelligence contract, it will
match the smart contracts and tasks which need to be released by the
model of YBC .If there is no model matched completely, AI will completes
the base match the model combination, and the remaining parts are glued
by the users` script.
AI virtual machine will analyze the user contract after the user submits a
smart contract based on the AI script model, AI is executed according to
the definition of the certificate when the part that invokes the smart
contract base model library directly ,for the script part, it is executed after
the security review by the interpreter. All behaviors need to be identified
by AI to confirm the rules of conduct and prevent malicious attacks. The
advantage of this implementation is that the user does not need to pay
attention to the description of the model, but focuses on the purpose of
the model, thus simplifying development.
Since the intelligent contract based on the AI script model requires a
large number of basic security models, YBC will initially have a partial
transaction model built make users to actively submit the secure
transaction model to improve the entire model library. After each
individual user submits a model that is assigned to the Cloud Pass
currency reward by Royality+Option to encourage users to actively
publish models designed by themselves.
(4)AI-based escrow transactions
Smart Contract 2.0 relies heavily on the quality of the information
which sent to it. In general, Smart Contract 2.0 helps solve problems
through various choices and branches. In essence, it is a kind of "prophecy
machine", obviously,it will inevitably lead to some problems that the
"prophecy machine" cannot solve, for instance,the disappearance of
information sources or a new and better ones, or the condition is changed.
The fundamental cause of above phenomenon is that Smart Contract 2.0
cannot foresee the future. Therefore, the security intelligence contract has
designed an AI-based managed transaction, artificial intelligence will be
executed according to the user's target requirements through training
models and function constraints. Finally,implement tract code.
When using the managed user transaction, only the objectives and
requirements, and implementation details and transaction code and
process execution middle, all of this,completed by AI.
(5)AI-based multi-channel matching transaction
Traditional intelligent contracts usually need strict matching in order
to complete transactions. Normally, they can not split bills or support
multi-party transactions. There are many limitations. For example, users A,
B, C have serial trading contracts.
Therefore, users often implement a similar demolition of single and
multi-party transaction activity through the center of the exchange, even a
simple transaction also completed through an exchange. But usually it
requires users to exchange legal tender or tokens to recharge a bank
account or block the transaction chain address, and then users use the
Exchange virtual IOU billing address. The implementation of the contract
is based on actual user transactions IOU basis. Users need to exchange
currency into law apply IOU exchange or block chain tokens, and passed,
in order to complete the transaction. In the course of the transaction, the
ability of the exchange to hold assets for the user is the greatest risk to the
user,at the same time, the user is also exposed to other risks arising from
the business ethics of the exchange operator.
For the above transaction model, YBC Securities established an
intelligent contract matching system based on AI. The verification node
scans and analyzes of contracts sent by the user while verifying the
contract set, and determines various transaction loops; during the
execution process, dynamic matching is performed to find the largest
transaction loop and find the lowest transaction cost, as an end, achieving
multiple orders for multiple counterparties to avoid the drawbacks of
centralized trading.
3.3 Basic implementation of the security intelligence contract
Because the core idea of a security intelligence contract is to complete
the contract censor and ensure contract execution by establishing various
AI models. Therefore, how to glue these basic AI models to form the most
suitable model for users is the focus of Cloud Pass's consideration of
programming languages.
Currently, YBC uses Lua as the default programming language used
by security intelligence contracts. Lua is a lightweight and exquisite
scripting language that meets Turing's requirements. It is written in
standard C and is open source code. It is designed to be embedded in
applications to provide flexible extension and customization for
applications.
The core and features of Lua include:
Lightweight: It is written in standard C language and is open source
code. It is only a hundred K after compilation which can be easily
embedded in other programs.
Scalable: Lua provides a very easy-to-use extension interface and
mechanism. various AI models and functions of Cloud Pass are designed
to be easily called by Lua.
Other features: supporting procedure-oriented programming and
functional programming;
Management of automated memory: provide only a general type of
table which can realize array, hash table, collection, object; language
built-in pattern matching; closure; function can also be seen as a value;
provide multi-threading (collaborative process, not the thread supported
by the operating system); through closure and table can easily support
object-oriented programming. Some key mechanisms are needed, such as
data abstraction, virtual functions, inheritance and overloading.
Therefore, YBC designed a set of script interpreters that support Lua
and the compiler's AI virtual machine to perform the interpretation of
Lua's bytecode. The AI virtual machine will add Lua's AI model calling
interface. In the operation of the smart contract or the block
synchronization verification in the cloud pass, the node will take out the
corresponding contract bytecode from the block, and execute the
corresponding code by using the AI virtual machine, and call the AI model
through the parameter, thereby Get the result of running the contract
bytecode. The execution results of the AI virtual machine and related
context state changes will be used by the block chain. It should be noted
that since Cloud Pass provides backward compatibility with Smart
Contract 2.0, Smart Contract 2.0 will be simulated in a byte interpreter
mode via the AI virtual machine on the node of YBC certificate.
3.4 Security Intelligence Contracts support for digital assets
The vast majority of block chain applications are built around digital assets,
and users often willing to create their own asset types and use smart
contracts to control their distribution and trading logic. However, in
traditional block chain design, each digital asset needs to develop a smart
contract-based business process, which is extremely inefficient and
error-prone.
In the security intelligence contract, YBC Securities use AI technology to
create a large number of digital asset-based trading models and business
processes. They only need to call the corresponding certificate contract
interface to generate a complete digital asset system when any user
creates their own digital assets, ; The corresponding digital asset trading
logic can be developed by users or through various AI models generated
by YBC Securities,which can also directly inherit the digital asset model
features that defined by YBC.
With ensuring safety of YBC, YBC Card can easily create user-defined
digital assets, which means the arrival of "financial" era of YBC Card. Under
the premise of AI censorship, each user can sell one of their attributes in
the form of tokens according to the contract, and secure and reliable
transactions in ilLb. For example, an entrepreneur sells his or her own ideas
in the form of tokens at ilLb, and at the same time, manages and realizes
various ownership transactions in a smart contract manner, thereby
obtaining sufficient support; while users who purchase entrepreneurial
ideas will enjoy the corresponding rights. Digital assets created by users
can only be online assets, and they cannot interact with offline assets and
behaviors through traditional smart contracts. YBC introduces AI judgment
mechanism and trusted gateway equipment to realize online and offline
communication and interaction.
Chapter 4: Technical Features
4.1highpropertyPromote the circulation of big data values. "Circulation" makes big
data play more values. Similar to the block chain application of asset
transaction management system, it can circulate purification and
contribution big data as digital assets, realize the application and
realization of big data in a wider range of fields, and give full play to it. The
economic value of big data. Based on the decentralized cloud pass block
chain, which can break the data barrier between users, so that user data
will get the most value.
4.2 High security
User privacy is more secure. YBC has a unique privacy protection and
encryption contract. By secure multi-party computing, the original data of
privacy can be completing isolated and accessed, enabling fast and secure
data sharing services. The personal purification contribution data is stored
by the block chain encryption method, identity verification, authorization
mechanism and other technologies, and the user's original data cannot be
accessed by any user or individual. Data can be opened to a limited extent
only if the user agrees to authorize it. Under the cryptographic differential
privacy encryption, the application can perform big data research on some
of the user's data, but cannot analyze personal data, and can't check, copy,
or tamper with the data.
4.3 Efficient operation
The self-built certificate has efficient operation efficiency by avoiding
the threat of low performance and uncontrollable system security in the
development of Ethereum. YBC uses a three-tier data architecture of
development service layer, user service layer and block chain bottom-layer
service to solve various obstacles that block chain technology may face in
the process of application landing, which is used to meet various
requirements of commercial applications. Including: establishing a
practical regulatory audit mechanism; purifying the protect privacy;
stabilizing, efficient and reliable; building a platform for data sharing for
purification.
Chapter Five5: Characteristic Functions5.1 Open Accessibility
YBC is a public chain which opens to everyone. Anyone can send
transactions and get valid confirmation. The consensus process
determines which blocks can be added to the block chain and the current
status. Once public chains are published and run, program developers
have no right to interfere users,block chains can protect users who use in
the block chains. Anyone with adequate technical ability can access it, as
long as there is a computer that can connect to Internet, it can meet the
access conditions without too much restriction on the nodes. There is no
access threshold. Though it is a major problem for capacity and
performance improvement, public participation greatly enhances the
transparency and trust of the block chain.
5.2 Checking mechanism
In order to facilitate data validation, most of the data in the block
chain of YBC are stored by the form of Merkle tree. Merkle tree, in general,
is a formation of hashing store large amounts of data. Merkle trees have
the general structural characteristics of trees. Merkle tree can be a binary
tree or a multi-tree. The leaf node value stores data, while the non-leaf
node value is the hash value of all the node combinations under the node.
The data structure of Merkle tree provides a checking mechanism,
which we call Merkle Proof, when the correctness of a node hash is verified,
all branches under the node are correct. Merkle proves that a large number
of aggregated data can be validated by validating a little data. Block chain
is the process of using this technology to realize the rapid verification of
transactions in a block. Merkle tree is an important data structure for fast
checking of block chains. Merkle tree is a very good data structure for
verifying information in "list" format. Essentially, it is a series of connected
data blocks. It is also feasible for a transaction tree, because once the tree
has been established, it does not matter how long it takes to edit the tree.
For a transaction tree, it only needs to be generated once and saved into
blocks. The status information is stored in the form of key-value pairs, with
the address of the account as the key value, while the account statements,
balances, random numbers and other data under the account are stored as
the value. Whenever a transaction is executed or an account is operated,
the state tree needs to be queried and modified, frequently added or
deleted, and the state tree needs the ability of fast query and fast
calculation of root hash. In view of this situation, YBC proposes MPT
(Merkle Patricia Tree) data structure, which combines Merkle tree with
dictionary tree, improves the search efficiency and can quickly calculate
the root hash value. The tree is divided into four types of nodes: empty
node, leaf node, extended node and branch node.
5.3 Asset Circulation and Management
Digital asset is blood of YBC. It provides power for all parts of the
ecology. Digital assets are the basis for the operation of the system,which
is the guarantee for normal operation. Both the computing power and the
application layer need to be supported by digital assets. Digital assets is
necessary if users want to use the application. Only when every parts help
each other and work together can YBC showing energetic and vital.
5.4 Graphene technology and virtual machine implementation
contract
Graphene is a blockchain toolkit developed by the BitShares team
cryptonomex, written in C++, and Dan Larimer is the founder of
Cryptonomex. The concurrency is relatively strong. The BTS and STEEM
based on the graphene bottom layer can achieve an average confirmed
speed of 1.5S and the measured data throughput of 3300 TPS under
limited conditions. The EOS can achieve millions of TPS through parallel
chain, and parallel. The local chain can even reach the confirmation speed
of milliseconds.
The YBC virtual machine is the operating environment of the smart
contract in the cloud pass. The smart contract can be compared to the
JAVA program. The JAVA program executes the code interpretation byte
through the JAVA virtual machine (JVM). The smart contract of the cloud
pass is interpreted by the cloud pass virtual machine into bytecode for
execution. The EVM is encapsulated in a sandbox, meaning that code
running inside the EVM cannot touch the network, file system, other
processes, or even intelligence.
Chapter 6: Core Innovations of YBC
Securities6.1Decentralized application(DAPP )
YBC system committed to support decentralized applications from a
technical perspective, especially through the introduction of mobile-side
strategy to productize different DAPP ideas, so that ordinary Internet
users can truly feel the value brought by block chain technology.
For DAPP applications in different industries,which bring block chain
technology to more users and industries. For example, decentralized
socialization, decentralized storage and decentralized domain name
services, decentralized computing services, etc., through the introduction
of incentives, will deepen the use of the concept of shared economy,
change the existing APP market and business model.
Block chain technology is used to build decentralized applications for
infrastructure. Simplify the preparation of developers through the design
of the perfect certificate of API and the distribution of Docker, so that
developers can quickly started the corresponding development work. It
will also encourage developers to develop high-quality DAPP through
Token within YBC.
6.2 Deploy 51 super nodes
In the consensus mechanism, YBC securities pioneered the hybrid
DpoS+PoW mechanism which consisted by miners, notaries and
guarantors, and deployed 51 super nodes. It does not rely on computing
power, energy saving and environmental protection, the time for block
confirmation is greatly shortened, and the participation verification is
greatly reduced. With all that make accounting nodes can reach the
second level of consensus verification. The consensus mechanism has
natural advantages. After the introduction of notaries and guarantors, the
stability and security of the system have been further improved, which
makes it a major breakthrough in the world.
The TOKEN is produced by mining. In the future, standard nodes will
be deployed in the super nodes. After the nodes be launched, the standard
node voting method and standard node voting requirements will be
announced.
6.3 Support from multiple industries(Industryoriented)
In the token system, through the introduction of different consensus
mechanisms and the need for supervision, industries` developing needs
can be meet. For example, in the token system, the consensus mechanism
based on the integration of Proofo Ting ime and Raft protocol can meet
the requirements of block chain speed and capacity in the trusted network,
through the main control contract based on block chain technology and
Oracle. And the introduction of DataFeeds can also introduce more offline
factors. It can meet the needs of financial industry through the design of
Identity and Privacy.
With the token system, multiple industries will be supported: medical,
aerospace, financial, Internet of Things, supply chain, social and gaming,
charity, digital assets and equity. In addition, cloud-certified smart
contracts and master contracts can support more complex business logic
through Turing's complete programming language,which will support
more industries. For more information on certification and industry
support, please refer to the further YBC application white paper.
6.4 Profit model
YBC Securities builds a unique token system, rationally avoids taxes,
building a management system with a real and effective big data system,
and digs into more development possibilities for the ultimately needs of
users, forming a"customer-product"community ecosystem. The
application of YBC mainly includes global terminal consumers, application
suppliers, merchants, mobile operators, equipment providers, system
integrators, financial institutions, etc. The overall volume of global
transactions is large, but there is no formation to solve this problem. The
organizational structure of the order to cope with the operating costs
generated by the third-party platform still requires consumers to pay for
this, which restricts the rapid development of the platform. Therefore, YBC
was designed to solve this problem by issuing tokens. The generation of
tokens reflects the concept of decentralization. Anyone can use the
computer to participate in currency issuance, just as anyone in the gold
standard can rush for gold. The decentralization avoids the control of the
entire distribution system by a single person or individual organization. As
a payment tool, a prominent feature of tokens is to protect the privacy of
both parties. In addition, the payment of tokens is very convenient and fast,
and the cost is low. Through the form of tokens, YBC reduces the handling
fees generated by the platform borrowing by third parties, which truly
forms a shared platform, effectively docks consumers and commercial
applications, makes a relatively fair trading environment and convenience
for buyers and sellers. Realize the pipeline, establish platform reputation
among three parties, enhance its trust in platform, promote resource
transformation provide convenience to the management of platform, and
transfer development funds from two directions of “open source and
“throttle”.
Figure 2 YBC Economic Model
Chapter 7: Application and
Development7.1 AI Artificial intelligence application platform
7.1.1 YBC token + Credit Information Field
The model of YBC used in field of credit information is to build a new
block chain eco-platform. All information subjects, information demand
side, information providers, credit bureaus, and credit bureau supervisors
all become nodes on the block chain platform, but the role of platform is
different. For platform construction, the first is that the information subject
includes enterprises and individuals, and has different business rules. For
the enterprise entity, the information generated on the block chain
includes information related to the information that cannot be provided
externally in connection with trade secrets and laws and regulations. The
relevant information records and publications are public which makes it do
not need the enterprise `s authorization.Personal information is more
stringent. Except for information that can be directly disclosed by laws and
regulations, all generated information is encrypted and can only be
processed by obtaining a personal authorization key. Second, the records
of the distributed ledger must be authorized. The account is recorded by
the information subject, the information provider related to the
information subject,user, and the licensed credit bureau, not all nodes of
the entire network can record. Third, the generation of credit records
mainly relies on smart contract technology and government departments
with authoritative publishing capabilities. For example, the online lending
platform and the lender signed a smart contract. If the consumer fulfills the
contract on time, it will automatically generate performance information in
the block chain; if the obligation is not fulfilled according to the contract, a
breach of contract information will be automatically generated to the
relevant on the block chain of the main body.The master of this account
includes the information subject, the online loan platform, and the
authorized credit reporting agency. If other credit bureaus or information
demand side need to obtain relevant information, they need to be
authorized by the information subject.
7.1.2 Cloud Pass + Data Sharing
As an innovative decentralized infrastructure and distributed
computing paradigm, block chain was first used in the data encryption
currency system represented by Bitcoin. The core functions of the
generalized block chain technology include the using of encrypted chain
block structure for data verification and storage, the use of distributed
node consensus algorithms for data generation and update, and the use of
automated script code to program and manipulate data. The application
areas of the current block chain can be summarized as digital currency,
financial transactions, data storage, data authentication, asset
management, etc., which can realize the identification, authorization and
real-time monitoring of intangible assets such as data property rights.The
object of data sharing can be summarized as the original basic data and
various data sets that reflect the nature, characteristics, and changing laws
of the objective world acquired in activities such as business, technology,
consumption, or other means. The process of the data flow through the
beginning and end of the shared activity can usually be abstracted into the
exchange process of the data assets. Therefore, the object composition of
data sharing has a higher degree of fit with the application object of the
block chain asset management scenario.
7.1.3 Yuntong Card + Internet of Things
The Internet of Things (IoT) is simply the Internet between things and
things. It is a network that connects various IoT terminals. According to
IBM's prediction, by 2020, there will be more than 20 billion IoT terminals
worldwide. . There are many Internet of Things communication protocols
in China, and with the intervention of the three major operators, the
Internet of Things has entered a period of rapid development. The Internet
of Things is the perfect application scenario for block chain technology.
Block chain technology can be used to realize a management and service
system that does not require central server management and does not
need to distinguish between vendors. In this system, vendors can perform
peer-to-peer management of the plant equipment, while at the consumer
and network level, there is no need to care about the difference between
vendors. Only the device can successfully obtain the network access right
according to the unified access protocol.
The encryption algorithm and consensus mechanism of YBC Securities
determine that the hacker cannot illegally control the transactions of the
IoT device, and the controller of the device cannot be obtained. Cloud
Pass's asymmetric encryption of transactions allows only users with private
keys to obtain private information about the device. Using the DPoS
consensus algorithm in block chain technology, zero-cost, real-time
peer-to-peer transactions can be effectively implemented.
7.2 Smart medicalToday, patient data security is being challenged. In the era of smart
healthcare, the emergence of block chain technology models may well address
these issues.
First, the block chain protects the privacy of user data in the medical
network. In the past, central server were able to use intranet data and
spread without authorization. The block chain could avoid this situation
because the it is not centralized and all transmitted data has undergone
strict encryption processing.
Second, the block chain can iPs illegal medical network nodes. There
are many sensors in the hospital, some are wireless networking. In the
past if there are criminals putting sensors in the hospital, automatic
access is difficult to identify. The server of the block chain has certain
recognition capabilities. When the server finds a Trojan attack, it will
actively notify the NMS to close the gateway directly connected to the
sensor infected with the Trojan, thus ensuring data security.
Moreover, information is stored permanently after entering the block
chain. Each event and operation has a timestamp which cannot be changed
afterwards. A single node can not modify the block chain. Therefore, the
block chain can ensuring secure communication between nodes stable and
reliable. It is worth noting that the block chain solves the problem of
too high cost of the hospital central database effectively. At present,
all data streams of the hospital medical network are collected into a single
central control system, with more and more data the cost is too high to
afford. The block chain does not use the architecture of a central server
and there is no pressure on the central control system.However, when
there are too many nodes in the hospital medical network, it is a challenge
for cost if each node use the central serve function of the block. A
compromise between central control and full distribution control is
proposed,the nodes of the medical network are divided into two layers,
and the small number of nodes which in the upper layer work in a block
chain manner.
In addition, block chains can provide trust and billing mechanisms for
different owners, making it possible to share personal data between
healthcare providers, patients and healthcare offers. This is mainly due to
the data encryption technology of the block chain and the P2P
internetwork, which solves the problem of trust and even pays for the
settlement of data values based on data transactions.
7.3 AI Intelligent Aviation
AI artificial intelligence can provide precision service to airlines, and
by deep "understanding "a huge amount of data, predict how much food
and beverages are needed on different flights so as to minimize waste, and
improve the passenger experience."
Artificial intelligence can help airlines integrate different data and
implement more complex settings to ensure personalized service and
increase passenger loyalty. For example, extract data from airline websites,
Navitaire reservation systems, call centers, and mobile sites to create a
single, holistic view of each customer and communicate with them on the
most appropriate pipeline in real time.
Figure 3 Cloud Passage Platform Architecture
Chapter 8: Achieving DevelopmentPlanning
The core of this project lies in the integration of YBC system and block
chain technology. Therefore, the focus of preliminary work is publishing
white papers, initiate early investment and realizing the construction of
YBC in the end. At the same time, block chain and digital encryption will be
started synchronously.
Once the platform set up and the funds are raised, the platform must
be oriented to users, developing the application and finally exert its value.
Therefore, it is necessary to promote the platform. In addition, we can use
Baidu's promotion and Weibo promotion to expand the influence of YBC
token, aiming to create a fair and transparent platform.
YBC will build a multi-language platform to collaborate globally and
create a trading platform where will enable global users active here.
Therefore, YBC system will contact more overseas block chain exchanges,
actively promote overseas online projects, enhance the international
influence of YBC system. After the exchange be launched, the token team
and the board of directors will continue to develop the block chain
technology in a sustained manner while maintaining the harmonious
development of the block trading business.
Chapter 9: YBC system Block ChainEconomic Ecology9.1 The usage and value of the YBC block currency
The token currency is based on block chain technology, and all data
point transactions are recorded by the block chain to achieve fairness,
openness and transparency of the entire trading system. In the past few
years, the development of digital currency represented by bitcoin,
confirmed the value of block chain technology and encrypted digital
currency by facts, enabling the economy of the cloud-based token
currency to be realized.
The usage and value of the token currency:
1. Scarcity: Since YBC`s token can introduce various applications, the
number of users are about millions or more. The distribution of tokens will
proceed quickly,with the difficulty of mining increases, the pipeline for free
access to tokens will be reduced which prompting users to trade through
the secondary market.
2. Circulation: The introduction of millions of users and the
mainstream of various consumer scenarios (games, e-commerce,
advertising, e-books, rewards, etc.) will greatly enhance the circulation of
tokens. YBC Securities will also log in to various major exchanges at home
and abroad to further enhance liquidity.
3. Appreciation brought by system development: The market value of
digital currency will be in direct relationship with the development of its
cloud pass system. After various applications enter the cloud pass block
chain, the market value of the cloud pass block block currency Will
continue to improve.
9.2 Release plan
9.2.1 Total amount of token
9.2.1.1 constant release: 21,000,000 pieces (50 million)
9.2.1.1 access route
(1) Acquisition of mining methods;
(2) node contribution acquisition;
(3) Sharing contribution acquisition;
9.2.2 regulations
The cloud pass certificate TOKEN is produced by mining, using the
workload proof mechanism to mine, and issuing the mechanism of
DPOW+POS mining.
9.2.3 distribution plan
(1) Management Foundation (locked warehouse): 5°%
(2) Technical and operational team (locked warehouse): 5°%
(3) Super node (locked warehouse): 5°%
(4) Mining machine output: 85%
The token release project of the lockout will be opened after 400 days
of operation. The specific release plan is subject to the White Paper of the
Foundation announcement or version 2.0.
Chapter 10: YBC Certification Founding
Team10.1 Initiating agency:
Founded in Singapore in February 2019, the full name is called YBCOIN
FOUNDATION LTD. It is a non-profit organization dedicated to block chain
development and block chain technology innovating. It is designed to be
promoted through scientific, rational and effective management
mechanisms. It also maintains YBC ecological construction and YBC
healthy development, provides suitable protection and equal rights for
YBC card holders and members, and builds effective communication
channels between YBC members, communities, nodes and other different
roles. The Foundation is committed to popularizing block chain knowledge,
block chain technology research and innovation, and promoting the global
industrialization of cloud-passenger block chain technology.
0.2 Foundation organization structure:
10.3 technical team:
YBC is a global cross-connect projec composed of top experts from all
over the world and is a senior developer of block chains in various
countries and regions.
10.4Investment cooperation institutions (in no particular order):
(1) IDG Capital partners
(2) redpoint ventures
(3) Ktb netwwork
(4) GGV Capital Xfund
(5) CCASH
Chapter 11: DisclaimerThis white paper is only intended to convey the purpose of the
information and does not constitute any investment advice, investment
intention or instructed investment. This white paper does not constitute or
be construed as any purchase or sale, or any invitation to buy or sell, any
form of securities, nor is it a contract or commitment of any kind.
YBC clearly stated that the relevant intention users clearly understand
the risks of the platform. Once the project participants participate in the
investment, they understand and accept the risk of the project and are
willing to bear all the corresponding results or consequences. Participants
in the cloud pass must carefully read the White Paper of Cloud Pass to fully
understand the technical characteristics of YBC and the risk-return
characteristics of sales, and fully consider their risk tolerance, rational
judgment, and prudent decision-making. Indicates that you understand
and accept the risks of the project and are willing to bear all the
corresponding results or consequences.
Chapter 12: Risk TipsThe net value of this digital asset project will fluctuate due to factors
such as market fluctuations, and the raiser must bear the corresponding
risk of raising. The risks raised in this digital asset project include: systemic
risks arising from the impact of the overall political, economic, and social
environmental factors on the digital asset market.
The Foundation is committed to managing and using this digital asset
in good faith, diligence and diligence. However, the fundraiser's
participation in the project is not the same as depositing funds in a bank or
other deposit-taking financial institution. The Foundation does not
guarantee profit. The minimum return is not guaranteed. Investment is
risky and investors should read this white paper when they raise this
project.
The Foundation reminds the fundraiser of the “self-financing”
principle. After the decision to make a fund raising, the fundraiser is
responsible for the risk caused by the operation of the project and the
change in net value of the project.