whitepaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/ybc-en.pdf · introduction...

54
White Paper 1.0 Application of Network Value of Data 2019-03-05 English

Upload: others

Post on 18-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

White Paper 1.0

Application of Network Value of Data

2019-03-05English

Page 2: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

introductionApplication of Data Network ValueYBC YBC is launched by the YBCHAIN Foundation in Singapore and

organized jointly by the professional global block chain technology team.

YBC Certificate is a cloud data service system based on Block Chain 3.0

technology. In order to solve some prominent problems in AI and big data

application, it includes property, perfectional function , system

expansibility, supervisory auditing, ease of use, etc. YBC Block Chain 3.0

adopts the latest layered architecture designation, standardized data

protocol, IPFS network protocol, etc. A series of innovative technology

schemes, such as dual consensus algorithm, distributed storage

technology, flexible multi-level use strategy and so on, focus on creating

cloud sharing community scenarios. The data application ecology

established by YBC will realize greater application value of block chains.

Page 3: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

catalog

introduction——————————————————————————02

Chapter 1: YBC Certificate Block Chain 3.0 Scheme —————————08

1.1design goal———————————————————————08

1.1.1Supporting millions of users—————————————10

1.1.2free to use ————————————————————10

1.1.3Easy upgrade and troubleshooting——————————10

1.1.4Low latency————————————————————10

1.1.5Serial performance—————————————————11

1.1.6Parallel performance————————————————11

1.2Design principles ————————————————————11

1.2.1Compatibility design————————————————11

1.2.2Modular design idea————————————————12

1.2.3Security policy ——————————————————13

1.2.4Easy-to-use strategy————————————————15

1.3Mission of Yuntong Pass—————————————————16

Chapter 2: Realization Scheme of Yuntong Verification———————17

Page 4: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

2.1consensus algorithm———————————————————17

2.2account ————————————————————————19

2.3Deterministic parallel execution of applications ———————19

2.4.1Scripts and virtual machines———————————————20

2.4.2Messages for schema definition: ——————————20

2.4.3Schema Definition Database:————————————20

2.4.4 Separates authentication from applications: —————20

2.4.5 Virtual Machine Independent Architecture: ——————21

2.4.6Wren: ——————————————————————21

2.4.7Web assembly(WASM): ——————————————21

2.4.8Ethernet virtual machine(EVM):———————————22

2.5.1 Cross link communication ———————————————22

2.5.2 Cross-Chain Communication Delay: —————————22

2.5.3 Completion proof: ————————————————23

Chapter Three 3: Technological Innovation of YBC Certificate ————23

3.1 Defects of Intelligent Contract 2.0 ——————————24

3.2 Transaction Model Based on AI Artificial Intelligenc———26

Page 5: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

(1)Implementation of Intelligent Contract 2.0————————26

(2)Safety Intelligent Contract Execution Based on AI Assistance

-———————————————————————————————28

(3)Security Intelligent Contract Based on AI Script Model ——-30

(4)Trusteeship transaction based on AI--——————————31

(5)Multi-way matchmaking transaction based on AI—————31

3.3 Basic Implementation of Safety and Intelligence Contract——--32

3.4 Security Intelligence Contracts Support Digital Assets-————33

Chapter IV: Technical characteristics-———————————————34

4.1High property--—————————————————————34

4.2 High security -—————————————————————35

4.3 Efficient operation-———————————————————35

Chapter Five: Characteristic Functions-——————————————35

5.1 Open Accessibility-———————————————————35

5.2 Checking mechanism--—————————————————36

5.3 Asset Circulation and Management--———————————37

5.4 Graphene Technology and Virtual Machine Realization Contract

———————————————————————————————37

Chapter 6: Core Innovation of YBC Certificate--——————————37

Page 6: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

6.1 decentralized apply(DAPP)————————————————38

6.2 Deployment of 51 supernodes-——————————————38

6.3 Support from multiple industries(Industryoriented)--————38

6.4 Profit model-——————————————————————39

Chapter 7: Application and Development-—————————————40

7.1 AI Application Platform of Artificial Intelligence-———————40

7.1.1 YBC token + Credit Reporting Area--—————————40

7.1.2 YBC certificate + Data Sharing————————————41

7.1.3 YBC certificate + Internet of Things——————————41

7.2Intelligent medical treatment-———————————————42

7.3 AI Intelligent aviation-——————————————————43

Chapter 8: Achieving Development Planning————————————44

Chapter 9: Economic Ecology of YBC Section Chain—————————45

9.1The Usage and Value of Chain Currency in YBC Certificate Block

—-——————————————————————————————45

9.2 Issuance plan————--—————————————————45

9.2.1 Total issue amount--————————————————45

9.2.2 detailed rules and regulations of resealsing——————46

Page 7: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

9.2.3 Distribution plan--———————————————————46

Chapter 10: YBC Founding Team---————————————————46

10.1 Originating institution:-————————————-————46

10.2 Foundation organizational structure:--——————————47

10.3 Technical team:--———————————————————47

10.4 Investment Cooperation Institutions (ranked in all order)-——52

Chapter 11: Disclaimer————————————————————-—53

Chapter 12: Risk Tips——————————————————————54

Page 8: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

Chapter 1: YBC Certificate Block Chain 3.0

Scheme

i.i design goals

Since the opening of the Bitcoin code in 2009, there have been many

Altcoin and other block chain projects in the community. The meaningful

Altcoin project has become a test field for block chain technology (except

for some meaningless Altcoin). It has some certain reference significances

to the development and maturity of technology (such as NameCoin, etc.),

in addition to some projects that extend the boundaries of block chain

technology from different perspectives, such as ColorCoin protocol,

NXTCoin, Ripple and Stellar, BitShare, Dash, Maidsafe. , Factom, etc. Later,

there was the Ethereum project dedicated to becoming a universal smart

contract platform and decentralized application platform. countless

developers and community members have participated in and witnessed

the rapid development of block chain technology, but the block chain

industry facing many challenges both from a technical perspective or an

industrial application perspective.

The birth of block chain marks a beginning that humanity enable to

build a truly trustworthy Internet. The essence of block chain is a

distributed database that records all transactions or digital events. It can

also be thought of as a public account book that can be accessed and

recorded by all visitors. Block chain can establish reliable trust between

peers to peers in the network, so that the the interference will be removed

from the transfer process of intermediary, not only discloses information

but also protects privacy. It not only makes codetermination and protects

individual rights, but the internal mechanism improves the efficiency of

value interaction and reduces the cost has broad application prospects.

There are plenty of opportunities in this disruptive technology, and a

revolution triggered by the technology has just begun. Block chain

technology is currently divided into public block chains, Consortium block

chains, and Fully-private block chains. The main application direction of

the public chain is Bitcoin, Ethereum, Hyperledger and most of the

competition coins. As long as there is a computer connected to the

Page 9: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

Internet,everybody,will be accessible to it. BTC, ETH, public chain, and

Ulord are all the members of the public chains. It provides a content

distribution public chain based on block chain technology. It provides a

complete ecosystem for content distribution by carrying out some

creative work.. People can create a variety of content-based decentralized

applications here, such as video, music, pictures, text, code, anime material,

and more. BTC, ETH, public chain.Ulord are a peer-to-peer value-transfer

public chain. By building a block chain underlying architecture and digital

resource distribution protocol, third-party developers are supported to

build their own applications on the top of open source protocols. With

other industry partners work together to form a complete ecosystem of

block chain technologies and applications.

Now, the mechanism and operational efficiency of ETF are difficult to

support a massive decentralization business application ecology, which is

the shortcoming of ETF in its early designation. However, in view of the

current economic value, ETF has realized the application of ICO, which

enables all kinds of block chains to start related ecological construction

quickly. However, as the expectation of achieve better development and

providing better services, block chain technology still faces the following

problems:

1 Lack of new type of smart contract platform. Currently, the existing

smart contract platform is mainly based on Proof of Work (PoW), and the

consensus mechanism of Proof of Work (PoW) is hard to applied in the

industry.

2. Compatibility between different block chain technologies, for

example, it is incompatible between the Bitcoin ecosystem based on the

UTXO model and the Ethereum ecosystem based on the Account model.

3. The low speed of transaction and the poor user experience.

4. The biggest limitation of block chain applications is latency and

data throughput.

5. The existing block chain system has great closeness.

At present, most of the triggering conditions of smart contracts come

from the block chain system itself. There are few triggering conditions

come from outside world and lack of interaction with real world.

A series of innovations have been made in block chain technology and

Page 10: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

concepts based on the challenges of the current block chain industry, :

including a consensus mechanism based on the Byzantine consensus

mechanism and the DPOS consensus mechanism,the concept and

implementation of the block chain master contract. The separation of

trading books and smart contract books,all those above makes Cloud Pass

a bridge between the block chain world and real business world.

1.1.1 Support for millions of users

Applications such as Ebay, Uber, AirBnB and Facebook require block

chain technology that can handle millions of active users. In some cases,

applications may not work properly, and P is not a large number of users,

so it is critical that a platform can handle a large number of users .

1.1.2 free to use

Sometimes application developers need to provide free services to

users; Block chain are likely to receive more attention since platforms that

can be used for free. With enough user scale, developers and businesses

have chance to create corresponding profit models.

1.1.3 easy upgrade and troubleshooting

Block chain-based applications need to be able to support software

upgrades as they perform functional iterations. All software can be

affected by bugs. The underlying platform of a block chain needs to be

able to fix bugs.

1.1.4 low latency

Timely feedback is the foundation of a good user experience. If the

delay time exceeds a few seconds, it will greatly affect the user experience

and seriously reduce the competitiveness of the program.

1.1.5 serial performance

Some applications must ordered JII page of command execution, so

they cannot be implemented with parallel algorithms. such as exchanges

often need to handle a large number of serial operations, so a successful

block chain architecture requires strong serial performance.

1.1.6 parallel performance

Large-scale applications require a workload between multiple CPUs

and computers.

Page 11: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

1.2 Design Principles

The fourth generation block chain of Yuntong is committed to providing

enterprise-level block chain infrastructure, industry solutions, and secure,

reliable and flexible block chain cloud services.

1.2.1 Compatibility design

1) Compatibility with Bitcoin networks and Ethereum networks

Ecosystem of Bitcoin network is currently the largest ecosystem of

block chain technology. Based on the network effect and the Matthew

Effect, there is a reason we can believe that the Bitcoin ecosystem will be

further expanding and improving which means higher code maturity and

more developers. We try to maintain compatibility of the Bitcoin system at

the beginning of the design, , such as using UTXO's trading model and the

same transaction data structure which also provides technical possibilities

for leveraging Bitcoin's BIP protocol. Therefore, it is compatible with most

BIP protocols, such as lighting network and side chain and drive chain and

Zcash protocol based on zero-knowledge proof.

For the first time, Ethereum transformed the concept of smart

contracts from theory to reality, which expanding the boundaries of block

chain technology. There are many places need to improve in Ethereum

Virtual Machine (EVM)(example:Transaction-ordering

Dependenceattack/Timestamp) Dependence Attack/Mishandled

Exceptions, etc. /), but EVM is the only one tested so far Smart contract

virtual machines, so it is very important to maintain EVM compatibility, so

the public-chain virtual machines will maintain EVM compatibility, and all

smart contracts developed on the Ethereum platform can also run on the

platform.

2) backward compatibility on itself (Downward Compatibility)

Page 12: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

Software backward compatibility is a very important issue as well. It

will bring a lot of convenience to users for files created with the old

version and smart contracts will continue to run on the new version

without user forced upgrades. Because of the special nature and one-time

deployment of smart contracts, if backward compatibility is unaccessible,

it will bring great problems to the smart contracts that have already been

executed,also cause the software to be iterated and upgraded later, and

EVM 2.0 and The problem that EVM1.0 is incompatible,all that above is

also a problem designers of the software need to pay attention to.

1.2.2 Modular design ideas

Modular design is in favor of softwares` development and

maintenance, so in the public chain, we are divided into the following

three modules:

1) Public Chain Tech: Public Chain Core, Public Chain VM, Public Chain

Identity, Public Chain Oraclean Data Feed, Public Chain Storage, etc.

2) User Module Public Chain UI: Public Chain IDE, Public Chain Mobile,

Public Chain Web, Public Chain Node, etc.

3) Business Path Module: Public Chain Busin Public Chain: Public Chain

Finance, Public Chain Legalandrisk, Public Chain Industry, Public Chain

Competitor, etc.

1.2.3 Security tactics

1) Reliability of the technology used in the platform

Phase one is dedicated to providing an intelligent contract platform

for POS mechanisms that are highly available and compatible with UTXO

models for different industries. UTXO model is a very core part of Bitcoin

network. The code in UTXO model has a high maturity and compatibility. It

can not only absorb other developers and existing development tools of

Bitcoin ecosystem, but have better security.

Page 13: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

As for consensus protocol, DPOS consensus mechanism is adopted in

public chains,a certain number of nodes are selected by all the token

holders of the chain, and then the nodes cooperate and take turns to

account.In the DPOS model of public chain, all the holders of token can

vote for 48 block producers (witnesses) according to the number of public

chains they hold 1:1. Then, the producers of these 48 blocks cooperate

with each other and take turns to keep accounts in a certain order. Block

spacing is 3 seconds for a large block. In addition, the producers of these

48 blocks need to provide the computing and network resources also

(including CPU, memory, storage capacity, etc.) needed by the full chain of

public chains. If one of the blocks is suspended cause of reason such as

disconnection, then a jump block will occur and the next accounting node

will keep up with it. Such a mechanism ensures that even if only one node

is working at last, the whole system can still work, and then continue to

select new nodes to ensure stable operation. If bifurcation occurs in the

process, DPOS still adopts the longest chain principle, and stipulates that

each node cannot block on two chains at the same time (otherwise, the

node will be judged to be illegal and disqualified), which makes it possible

to retain only one chain after the bifurcation occurs, when the total height

of more than half of the witness nodes is reached.

Besides, there is an irreversibility principle under DPOS. A block will

enters an irreversible state once a block is followed by more than 2/3 of

the total number of witnesses, which is tantamount to confirming the

position of the block in the main chain, then it can no longer roll back to

the block before the block for division, otherwise it will be considered

illegal. Because each node participates in one chain at the same time, only

one irreversible block may exist in the same height block, which ensures

the security of the block and prevents malicious attacks and malicious

bifurcation. Generally speaking, in the model of generating nodes in 48

blocks, the time for 33 blocks (33/48 > 2/3) to enter the irreversible state

(i.e. 100% security of transactions) is 45 seconds.

Therefore, the advantages of DPOS are:

1. Consuming less power in POW mode.

Page 14: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

2, the node changed from competition to collaboration, there are only

51 nodes, which makes it easier to reach a consensus and conducive to

improving the performance of the main chain (TPS).

3. Hard forks are not generated because nodes follow the longest

chain principle and each node cannot participate in both chains at the

same time. Therefore, after the fork is generated, up to more than half of

the total number of witness nodes, only one chain is retained. Every major

system upgrade will not lead to hard forks, just need to upgrade all

witness nodes at the same time.

4. It is more secure. It is necessary to control more than 2/3 nodes to

make the wrong block irreversible.

5. the speed for confirm is very fast.

Regarding the virtual machine part of the smart contract, EVM is

currently supported in the test network. EVM is also the only smart

contract virtual machine that has been tested so far. The later focus on: 1)

developing a more rigorous smart contract programming language; 2)

supporting EVM 2.0 (Wasm); 3) developing the ability of porting it on

other virtual machine platforms (LLVM, Lua, NodeJS).

2) Security strategy for the release of public chain platforms

The public-chain platform will undergo a series of rigorous tests

before be released, including software functional test, P2P network

performance test, potential attack vector test, reliability test, security

auditing and code review, Alpha version test, Bata version test, Complete

software test process to control software quality.

1.2.4 Usability strategy

For the ease use of the node, we will provide two or three different

operating modes for the user's "wallet", including Simple Mode, Prof

national mode, Expert Mode, and different U corresponding to different

user operating systems and development requirements. . In addition, we

will provide a complete API service that will be based on Standard

JSON-RPC provides remote and local API call services and considers

compatibility between versions. Other, we will also provide public-chain

IDE services to develop and debug related code and services.

Page 15: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

Besides, users can visit the DAPP service through a browser (Chrome

or Firefox, etc.), for example, users can enter the gl: //DappName form in

the browser to access the decentralized application in the public chain

system in the public chain. In the system, the decentralized carpooling

service "car is coming", they can visit the corresponding DAPP service by

entering gl://chelaile .

YBC is an ultra-high property system for DApp. After the cloud

becomes the main chain, there will be more applications on it. More

applications on the YBC network, more values on YBC's main network

resources, the specific application areas include: AI artificial intelligence,

Internet of Things, credit, data sharing, resource sharing, finance,

education, medical, logistics supply chain, communications, social welfare,

sharing economy, big data, voting, auditing, auction And lottery tickets,

etc. Yuntong Securities is developed based on the DPOS + POW

consensus mechanism, but it is not a smart contract on ETH, but an

independent underlying public chain, using graphene technology and

virtual machines to achieve contracts, and for the first time using secure

multiparty computing and Threshold key sharing technology enables

secure cross-chain transactions.

1.3 The mission of Yuntong

YBC's vision is to create a bottom-level public chain that enables

cross-chain transactions. Based on block chain technology, YBC has

successfully developed a smart contract consisting of distributed ledgers

and distributed computers, which makes digital currency more

transparent, and its ecology is suitable for most application scenarios.

As a platform that can be used globally, the block chain technology of

YBC allows consumers to trade without facing excessive transaction costs

or transactions in different consumer needs and application

scenarios,without waiting for long time,which increase consumer

enthusiasm for using Cloud Pass.

Page 16: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

YBC can change people's lifestyle. It becomes a safe, transparent and

convenient mechanism in the mutual agreement, which reduces the risk

and cumbersomeness of transactions and makes the transaction activity

more rapid and simple. The autonomous contract of Yuntong Card

provides new opportunities for many application scenarios, provides

people more convenience and improving their quality of life. Besides,

Yuntong Securities can solve the problem of lack of trust between traders

by provide "complete transparency" . YBC is open and accessible to any

user. Any system based on it is completely transparent. The Yuntong

Securities Account has ability bring significant benefits for building

trust,cause of it does not require a third party, so it cut the associated

costs, eliminates reliance on third party, and makes the transaction open.

Second, Cloud Pass Combining virtuality and reality provides a way to

owingt any asset, they can be tangible or intangible. by this way,

ownership status can be confirmed at any time, at the same time,it is able

to fully compatible with the trading mechanism.Figure 1 Real name

mechanism on the chain

Chapter 2: YBC Implementation Plan

2.1 Consensus algorithm

YBS adopts the DPOS consensus mechanism, and instead, the holders

of all the tokens of the chain elect a certain number of nodes to cooperate

and record in turn. In the DPOS mode of Yuntong, all holders of Yuntong

card tokens can acquire votes as the same as the number of Yuntong

cards they hold, and be elected by 51 block producers (witnesses). Then,

Page 17: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

the 51 block producers cooperate will accounting in a certain order. The

block interval is 3 seconds for

a large block. In addition, the 51 block producers will keep accounts, and

providing computing and network resources (including CPU, memory,

storage capacity, etc.) required by the entire cloud pass. If one of the

blocks is paused cause of a network disconnection or what else, the next

accounting node will continue to keep track of the previous node. This

mechanism guarantees that even if there is only one node keep working,

the entire system can still work to select new nodes to ensure stable

operation. If a fork occurs in the process, DPOS still adopts the longest

chain principle, and it is agreed that each node cannot be out of the two

chains at the same time (otherwise the node will be judged to be a

violation and disqualified), which makes the fork generated, after up to

half of the total number of witness nodes, only one chain will be retained.

Moreover, there is an irreversible principle in DPOS. Once a block is

followed by a block which get get more than 2/3 of the total number of

witnesses, the block will enters an irreversible state, which is equivalent to

confirming that the block is a block in the main chain. The status will be

considered as violate if it rolled back to the block before the block to

divide . Because each node participates in at most one chain at the same

time, it is only possible that there can be only one irreversible block in the

same height block, which ensures the security of the block and prevents

malicious attacks and malicious forks. normally, in the model of 51

block-generating nodes, the time of 33 blocks (33/51>2/3) enter the

irreversible state (that is, the transaction is 100% safe) is 45 seconds.

Therefore, the advantages of DPOS are:

1. Consuming less power in POW mode.

2, the node changed from competition to collaboration, there are only

51 nodes, which makes it easier to reach a consensus and conducive to

improving the performance of the main chain (TPS).

3. Hard forks are not generated because nodes follow the longest

chain principle and each node cannot participate in both chains at the

same time. Therefore, after the fork is generated, up to more than half of

the total number of witness nodes, only one chain is retained. Every major

system upgrade will not lead to hard forks, just need to upgrade all

Page 18: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

witness nodes at the same time.

4. It is more secure. It is necessary to control more than 2/3 nodes to

make the wrong block irreversible.

5. the speed for confirm is very fast.

In addition, YBC also upgraded the DPOS consensus mechanism, not

just DPOS consensus also for DPOS + POW consensus mechanism. For

achieving the performance of second-level confirmation, based on the

DPOS mentioned above, YBC has made some improvements already. For

improving the speed of block identification, YBC has added the Byzantine

fault tolerance mechanism (POW) and irreversible state card and

proposed the concept of community block. YBC certificate produce a large

block every 3 seconds, and now the Yuntong passes team has proposed a

plan to continue to divide the blocks of 3 seconds into several pieces with

intervals of 0.5 seconds without switching accounting rights. Once each

piece comes out, it will broadcasts immediately. The design will make

blocks more quickly confirmed while minimizing the bifurcation effect

caused by network latency.

YBC card introduces POW mechanism: whenever a community block

is broadcast in the block chain network, the rest of the nodes will

immediately confirm the block. Blocks confirmed by the other 2/3 nodes

will enter an irreversible state. With the consensus mechanism, the time of

security confirmation is.5s (block interval) +0.3s (block propagation delay)

<1s, which achieves second-level confirmation performance.If the block

interval divided in more pieces, the time required of confirmation will be

approximately as same as the network delay of block propagation, or even

less than 0.5 seconds,in theory.

Unless more than two-thirds of the nodes are controlled, malicious

blocks cannot get into the irreversible state. It is specifically mentioned

here,if malicious nodes already controlled more than 1/2 but less than 2/3

of the nodes,it will not get into irreversible state, so that other observer

nodes and witness nodes get enough time to vote out malicious nodes.

Therefore, this mode also greatly improves security.

Page 19: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

2.2 Account

YBC allows the use of a unique readable name of 2 to 32 characters in

length to enable reference to the account. This name is chosen by the

creator of the account. All accounts must be filled with the minimum

account balance at the time of creation to cover the cost of storing

account data. The account name also supports namespaces, so the owner

of the account @domain is the only user who can create the account

@user.domain.

In the case of decentralization, the application developer will pay the

nominal cost of creating the account to register the new user.Companies

often spent a lot of money for get customer in the form of advertising and

free services. In contrast, the cost of creating a new block chain account is

negligible. Fortunately, there is no need to create an account for a user

who is already registered by another application.

2.3 Deterministic parallel execution of the applicationThe block chain consensus depends on deterministic (reproducible)

behavior. This means that all parallel executions will not work properly

with primitives of mutex or other locks. Without locks, there must be some

way to ensure that all accounts can only read and write their own private

databases. This also means that each account processes its messages

sequentially, and parallelism is determined at the account level.

In DAPP software, the block generator is used to deliver messages to

separate threads so they can evaluated in parallel. The status of account

only depends on the message delivered to it. The schedule is the output of

the block generator and will be executed deterministically, but the process

of generating the schedule does not have to be deterministic. That means

the block generator can utilize parallel algorithms to schedule

transactions.

Parallel execution means that when a script generates a new message,

it will be sent in the next cycle instead of send itself immediately. The

reason why it will not be sent immediately is the receiver may voluntarily

modify itself state in another thread.

2.4.1 Scripts and virtual machines

The operating system of YBC will served as a platform for passing

Page 20: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

authenticated information between accounts at first. The implementation

of the scripting language and virtual machine will be independent from

the certificate operating system. Any development language or virtual

machine and sandbox with sufficient performance can be integrated with

YBC.

2.4.2 Messages defined by the schemaAll messages sent between accounts are defined by a pattern of the block

chain consensus state, which allows seamless conversion of messages

between binary and JSON formats.

2.4.3 Database of model definition:

Similar schema definitions are used for database state, which ensures

that all applications store data in one format, with human readability of

JSON, and efficient storage and operability in binary format.

2.4.4:Separating authentication from applications

For maximize parallel computing and minimize the computational

task of regenerating the application state from the program log, the YBC

operating system divides the verification logic into three parts: 1) the

confirmation message is consistent internally; 2) Confirm that all

preconditions are valid; 3) modify the application state. The internal

consistency of the verification message is read-only and does not require

access to the blockchain state, which means it can maximize parallel

operations to execute.

Validation preconditions (such as demand balancing) are also

read-only, so you can also benefit from parallel operations. Write access is

only required if the application state is modified, and needs to process

each application in order. Authentication is a read-only process that

verifies that a message can be implemented, actually,it is the application

doing the work. Real-time calculations need to be implemented, but it is

no longer need to perform an authentication operation once the

transaction is included in the block chain .

Page 21: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

2.4.5 Independent Architecture of Virtual Machine:

The purpose of YBC operating system software to support multiple

virtual machines and to continuously add new virtual machines as needed

over time. For this reason, this article does not discuss any details of

particular language or virtual machine, but even so, there are currently

three virtual machines are evaluating to access to YBC system.

2.4.6 Wren :

Wren(http://wren.io) is a small,rapid, category-based programming

language. Wren's developers described it as "like a small tak file loaded

into a lua-sized package, plus a little Erlang feature, and then included in a

familiar, modern syntax. It is because of its short, easy-to-document and

understandable code base. It also has very good performance and can be

easily embedded in C++ applications.

2.4.7 Web assembly(WASM):

WASM is an emerging web standard used to building

high-performance web applications, it can be clearly defined and

sandboxed with a small amount of adaptation. The benefits of WASM are

widely supported in the industry, so you can develop smart contracts in

familiar languages, such as C or C++.

ESCs have begun adapting to WASM to provide the appropriate

sandbox and use the Ethereum WASM definition

(https://github.com/ewasm/design). This method is easily adapted for

cloud pass system software integration.

2.4.8 Ethernet virtual machine(EVM):

This virtual machine has been used in most existing smart contracts

and can be used on YBC certificate system block chain. It is conceivable

that EVM contracts can be run in the internal sandbox on the operating

system, interact with other applications by only a little adaptation.

2.5.1 communication across chain

The operating system is aimed at facilitate cross-chain interaction

between block chains by simplifying message presence and message

sequence proofing. These are combined with application architecture

design around information transfer, while hiding the details of cross-chain

interaction and validation which avoiding disclosure to application

developers.

Page 22: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

2.5.2 Cross-Chain Communication Delay:

When communicating with other block chain, miners must wait for

other block chains to confirm irreversibly before accepting them as valid

inputs. Using the YBC system software, with a time-out certificate of

probation and 48 miners, it only takes about 45 seconds to confirm. If a

miner on a chain does not waiting for a transaction never turned up

confirmed, looks like an exchange accepts a deposit and then revokes the

operation, this will affect the validity of the chain consensus.

2.5.3 certificate of completion:

When using Merkel's proof of external block chains, there is a huge

difference between knowing that all transactions processed are valid and

knowing whether any transactions have been ignored. It is impossible to

prove that all recent transactions are known, but it is possible to prove

that there is no missing data between historical transactions. Cloud pass

operating system achieves this function by assigning a sequential

identification number to each incoming account. Users can use these

labels to prove that all messages to this account have been processed and

processed sequentially.

Page 23: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

Chapter3: Technology Innovation of

YBCBased on the weaknesses of existing trading contracts including hard

in developing, unstructured coding, and owning no security review

mechanism, YBC has designed new generations based on artificial

intelligence and secure trusted execution mechanism and based on AI

virtual machine. Security smart contract. On the basis of supporting the

principle of non-discrimination, users can use AI model as a basic

guarantee to achieve more secure, reliable and more flexible transactions.

Security intelligence contract can be defined as: event-driven, capable

of reviewing through certificate AI, supporting AI hosting and adjudication,

maintaining work state, running on a replicated, shared account

(TheReplicated, Shared Ledger), and it maintains assets on a ledger which

supports external data through the interface mode and trusted gateway

specified by YBC certificate. It can be considered as a smart contract which

truly realizing intelligent finance with a legal framework.

With the guidance principles of "independent innovation, safe and

efficient, open sharing", the overall structure of the certification block

chain is divided into three layers: the bottom layer of the block platform

which was the independently developed by YBC. It provides basic service

for the upper application scenarios through the interface of SQL and API.

The core is aimed at build a leading enterprise-level block chain platform.

In the middle is the platform product service layer, which builds

high-availability and scalable block chain application infrastructure

platform products on the bottom layer, including shared accounts,

forensic services, sharing economy, and pass-through, and integrates

related fields. The basic product function helps enterprise quickly build an

upper block chain application scenario. The application service layer

provides trusted, secure and fast block chain applications to terminal users.

In the future, YBC will cooperate with industry partners and their

technology suppliers ,explore the development direction of the industry

block chain jointly promote the application of block chain.

The overall frame structure is as follows:

Page 24: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

Currently,traditional smart contract trading in a barbaric growth

phase, each transaction similar to a "jungle adventure." At present, there

are many smart contract projects based on Ethereum, and most famous

ones are Augur, TheDAO, Digix, FirstBlood and so on. It is easy to find that

these traditional smart contracts are very complicated and cumbersome

therefore, weaken to logical loophole. For example, in TheDAO smart

contract, it need to take very cumbersome steps to avoid "most cases of

looting a small number of shackles “; if the experience user is insufficient,

such events are very easy to happen. The essence of such a phenomenon

is that the block chain is designed in the environment of not have a

centralized ruling body, which makes it impossible to implement the

mechanism of "post-argument and arbitration", it means when errors

occurring, it cannot be rectified.

For example, in a block chain, if currency is senting to an address, this

operation cannot be revoke. Therefore, when the counterparty sends the

currency to a wrong address, the corresponding loss will not be recovered.

Similarly, phishing transactions on Internet can also occur in the block

chain. Fraud parties can implement loopholes in the contract by

3.1 Defects of Smart Contract 2.0

Page 25: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

embedding specific traps or wallet addresses in the contract. Such

transactions are also not enforceable. In addition, when there is a loophole

in the contract, for example, if the current transaction is executed but

forgot to revoke the transaction wallet, the monetary will not be

transferred to the specified wallet. In real life, the above transactions can

be revoked through a centralized system. If in a decentralized system,the

transaction party takes risks at its own according to the traditional

contract method.

There is a possibility that the user made a human errors in the process

of writing the contract. Common human errors include: oolong finger

operations in stock market trading; wrong quoting methods in foreign

exchange trading: for example, the USD/RMB quoted as RMB/USD. These

above transactions will inevitably lead to serious losses.

Therefore, it is extremely necessary to carry out compatibility

modification on existing smart contracts and realize intelligent analysis

and defect prevention of the logical behavior of contracts by the

implement of some mechanism, and minimize the probability of

vulnerability ultimately.

YBC’s security intelligence contract is dedicated to solving the above

problems which can only be solved with traditional centralized

transactions. Based on the principle of non-discrimination, the security

intelligence contract introduces the AI model, automatically judges the

rationality of the transaction model, and automatically sniffs the

transaction loopholes to realize the civilization of contract transactions.

Moreover, through the built-in AI trading model, with user's permission,

the unreasonable transaction will be automatically rejected, and the

transaction legislation of YBC Securities will be realized. However, if the

user abandons the AI protection voluntarily, the transaction can also be

completed, but the consequences will be borne by users.

The Security Intelligence Contract adding the following functions

comparing with smart contract 2.0: using AI to determine the risk of

trading data and possible loopholes; proposing changes and

recommending the creation of new trading contracts; AI system guarantee

for financial derivatives trading; user contracts Automatic replenishment

of various boundary conditions in execution; AI security custody of user

Page 26: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

contracts, mainly used for futures and long-term financial derivatives

transactions.

Others, YBC's contractual tools can providing the following types of

functions: providing users with various high-level transaction models,

which have passed AI security review; for user contracts, trading

vulnerability sniffing and prompting;Perform a machine code level

security review of the trading contract provided by the trading object to

confirm the trading risk.

In fact, YBC's security intelligence contract can forecast the purpose of

the contract participants, forecast the risks, and examine and verify before

carry out the contract to protect transaction security. Compared with the

traditional smart contract, YBC provides users sufficient security

protection during the execution of the contract; while after the

implementation it will analyze the contract execution process and results

through the AI model and submit the quality assessment which is used to

promote safety optimization and transaction quality improvement.

In addition, the current Smart Contract 2.0 has a critical fault: the

ability of block chain running DApp applications is very limited, and it is

impossible to realize AI capabilities such as semantic understanding of

artificial intelligence, multi-layer neural networks, and machine learning.

Each node of YBC Card supports AI virtual machine natively, which can

support traditional DApp applications which will directly realize advanced

AI functions such as artificial intelligence-based semantic understanding

and RNN/DNN-based neural network. The overall computing power is

strong which makes it able to support a large number of DApps running

concurrently.

The Security Intelligence contract is backward compatible with traditional

Smart Contract 2.0, supports script-based and support-based AI-assisted

transactions and AI-managed transactions also.

3.2 A Transaction Model Based on AI Artificial Intelligence

(1)Implementation of Intelligent Contract 2.0

The nodes on the Cloud Pass perform this type of contract in

compatible form through the AI virtual machine. Smart Contract 2.0

processing as follows:

First of all, multi-users participate in the development of smart

Page 27: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

contracts, it is contract drafting phase:

The contract executor (user) registers as a user of the block chain

which will return a pair of public and private keys; the public key acts as

the account address of the user on the block chain, and the private key

acts is the only key to the account. Two or more users design a contract

which through the programmatic terms, determine the relevant

commitments, which include the rights and obligations of both parties;

these rights are electronically, programming machine language;

Participants are signed with their respective private keys to ensure the

validity of the contract; the smart contract will be uploaded to the block

chain network based on the contents. Second, when the user submits the

smart contract to the block chain, it will enter the validity verification

phase.

This phase will complete the following phase:

The contract expands across the block chain network through P2P,

and each node will receive it; the verification node in the block chain will

receive the contract first and store it in memory, waiting for a new round.

The consensus time triggers the consensus and processing of the contract.

When the consensus time reached, the verification node will package

all the contracts saved in recent time period into a contract set, calculate

the hash value of the contract set, and finally assemble the hash value of

the contract set into a block structure that spreads to the entire network.

After receiving the block other verification nodes will take out the hash of

the contract set contained in it and compare it with the set of contracts

saved by itself. At the same time, send a collection to themselves and

other verification nodes; after multiple rounds of transmission and

comparison all verification nodes eventually agree on the latest contract

set within the specified time.

The recent contract set will be spread to the whole network in the

form of a block. Each block contains the following information: the hash

value of the current block and previous block, the time stamp when the

consensus reached, and other description information. At the same time,

the most important information of the block chain is a set of contracts that

have been agreed upon; Nodes which receive the contract set will verify

each contract, before written into the block chain it will be verified. The

Page 28: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

content is mainly whether the private key signature of the contract

participant matches the account.

Finally, with the block chain was written to the verified contract, the

automated execution of the smart contract will be initiated.Including the

following steps:

The smart contract checks the automaton status periodically,

traverses the state machine, transaction, and trigger conditions contained

in each contract one by one,pushing the conditionally satisfied transaction

to the queue which was waiting for the consensus,does not satisfied

transaction will continue to be stored in the block chain.

The transactions that enter the recent round of verification will spread

to each verification node. As same as the normal block chain transactions,

the verified node first performs signature verification to ensure the validity

of the transaction.they will enter the consensus set. After most of the

verification nodes reach a consensus, the transaction will successfully

execute and notify the user.

After the transaction executed successfully, the status of the smart

contract will judge the status of the contract. When all the transactions in

the contract are executed in sequence, the status machine marks the

status of the contract of completed and removes from the latest block.

otherwise it will be marked , continue to be saved in the latest block until

the next round of processing is completed, all transaction and state

processing is automatically completed by the intelligent contract system

built into the bottom of the block chain which was transparent and can

not be tampered.

(2)Safety intelligent contract execution based on AI

In response to various shortcomings of Smart Contract 2.0, YBC

adopts an AI-assisted contract execution mechanism. The contract

execution process is not only automated, but also truly intelligent:

a. While the contract drafting, both parties participating in the

contract will censor the contract is defective and modify it according to

the results of the examination to automatically generate the rights of both

parties censor the contract's security AI model and the smart contract

security assistant software provided by YBC. The code for “right"and"

obligations” until the contract meet the security review specifications.

Page 29: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

b. In the validity verification stage, since the contract requires

consensus confirmation on the whole network; the external conditions of

the contract may change at this time, so the AI virtual machine of each

verification node will additionally censor the contract in addition to

confirming the consistency of the contract signature. Meet the

requirements and ensure that the various enforcement terms and

conditions are complete and enforceable. If the contractor pays an

additional fee, the check node can initiate additional conditional review

and pre-execution functions, dynamically sniffing various vulnerabilities in

the contract. After the validity of the contract verified it will be written into

the block chain and enter the automatic execution phase.

c. While the automatic execution phase of the contract, various

unforeseen futures cause various shortcoming appear. At this time, the AI

virtual machine node executing the contract can pass the AI automatic

judgment mechanism and based on the rules of the certificate. It will make

up for the vulnerabilities that occur ensure the smooth execution of the

contract. moreover, when the parties are in conflict and the smart contract

cannot executed normally, the AI virtual machine will provide solutions by

the built-in AI model and assist in solving the problem.

When the smart contract is executed, the smart tools attached to the

certificate will analyze the intermediate steps of the contract and the

corresponding transaction processing and status. Users can summarize

and optimize the results of the contract execution submit them through

nodes. If each node of the block obtains consensus on the model, the

model will be written into the block and released as a user model to enrich

the contract model library of the cloud pass.

For behaviors such as "fishing scam deception" during the contract

execution phase will be solved in two ways:

a. By AI training, obtain model of fraudulent behaviors, and identify

the behavior in the process of forming a consensus, thereby rejecting

contract execution.

b. For phishing scam behavior, the fraudulent party provides the AI

model which conducts the behavior model and the wallet address will be

mark on the fraud signal, and builds a system of credit evaluation.

Subsequent AI will automatically discriminate this behavioral feature to

Page 30: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

preventing it happening again.

For behaviors such as the inability to transfer funds during the

contract execution phase, after the contract has been suspended for a

certain period of time, the verification node performs an AI review,

determines the enforceability of the contract, and advances the execution

of the contract through the built-in AI model rules. Such contract

execution based on AI judgment needs to be completed through the

network-wide AI consensus.

(3)Security Intelligent Contract Based on AI Script Model

Smart Contract 2.0 is actually a state machine that supports byte opcodes

which requires users to describe the parameter details of the transaction

model and the execution process, that is prone to problems. Even if a

variety of high-level languages are developed in the future by compiling

to form the corresponding bytecode, users still need to write the relevant

model description. Various vulnerabilities often occur cause of the

inaccuracy and incompleteness made by the user's manual description

model. In the process of intelligent contract execution, even if users find

such a loophole, they can do nothing to appeal it. YBC solves this problem

by introducing the AI decision model and supporting the newest model. If

the vulnerability can be avoided directly, it will be more friendly to

users.YBC solves this problem by introducing a smart contract based on

the AI script model.

When users are ready to launch a security intelligence contract, it will

match the smart contracts and tasks which need to be released by the

model of YBC .If there is no model matched completely, AI will completes

the base match the model combination, and the remaining parts are glued

by the users` script.

AI virtual machine will analyze the user contract after the user submits a

smart contract based on the AI script model, AI is executed according to

the definition of the certificate when the part that invokes the smart

contract base model library directly ,for the script part, it is executed after

the security review by the interpreter. All behaviors need to be identified

by AI to confirm the rules of conduct and prevent malicious attacks. The

advantage of this implementation is that the user does not need to pay

attention to the description of the model, but focuses on the purpose of

Page 31: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

the model, thus simplifying development.

Since the intelligent contract based on the AI script model requires a

large number of basic security models, YBC will initially have a partial

transaction model built make users to actively submit the secure

transaction model to improve the entire model library. After each

individual user submits a model that is assigned to the Cloud Pass

currency reward by Royality+Option to encourage users to actively

publish models designed by themselves.

(4)AI-based escrow transactions

Smart Contract 2.0 relies heavily on the quality of the information

which sent to it. In general, Smart Contract 2.0 helps solve problems

through various choices and branches. In essence, it is a kind of "prophecy

machine", obviously,it will inevitably lead to some problems that the

"prophecy machine" cannot solve, for instance,the disappearance of

information sources or a new and better ones, or the condition is changed.

The fundamental cause of above phenomenon is that Smart Contract 2.0

cannot foresee the future. Therefore, the security intelligence contract has

designed an AI-based managed transaction, artificial intelligence will be

executed according to the user's target requirements through training

models and function constraints. Finally,implement tract code.

When using the managed user transaction, only the objectives and

requirements, and implementation details and transaction code and

process execution middle, all of this,completed by AI.

(5)AI-based multi-channel matching transaction

Traditional intelligent contracts usually need strict matching in order

to complete transactions. Normally, they can not split bills or support

multi-party transactions. There are many limitations. For example, users A,

B, C have serial trading contracts.

Therefore, users often implement a similar demolition of single and

multi-party transaction activity through the center of the exchange, even a

simple transaction also completed through an exchange. But usually it

requires users to exchange legal tender or tokens to recharge a bank

account or block the transaction chain address, and then users use the

Exchange virtual IOU billing address. The implementation of the contract

is based on actual user transactions IOU basis. Users need to exchange

Page 32: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

currency into law apply IOU exchange or block chain tokens, and passed,

in order to complete the transaction. In the course of the transaction, the

ability of the exchange to hold assets for the user is the greatest risk to the

user,at the same time, the user is also exposed to other risks arising from

the business ethics of the exchange operator.

For the above transaction model, YBC Securities established an

intelligent contract matching system based on AI. The verification node

scans and analyzes of contracts sent by the user while verifying the

contract set, and determines various transaction loops; during the

execution process, dynamic matching is performed to find the largest

transaction loop and find the lowest transaction cost, as an end, achieving

multiple orders for multiple counterparties to avoid the drawbacks of

centralized trading.

3.3 Basic implementation of the security intelligence contract

Because the core idea of a security intelligence contract is to complete

the contract censor and ensure contract execution by establishing various

AI models. Therefore, how to glue these basic AI models to form the most

suitable model for users is the focus of Cloud Pass's consideration of

programming languages.

Currently, YBC uses Lua as the default programming language used

by security intelligence contracts. Lua is a lightweight and exquisite

scripting language that meets Turing's requirements. It is written in

standard C and is open source code. It is designed to be embedded in

applications to provide flexible extension and customization for

applications.

The core and features of Lua include:

Lightweight: It is written in standard C language and is open source

code. It is only a hundred K after compilation which can be easily

embedded in other programs.

Scalable: Lua provides a very easy-to-use extension interface and

mechanism. various AI models and functions of Cloud Pass are designed

to be easily called by Lua.

Other features: supporting procedure-oriented programming and

functional programming;

Management of automated memory: provide only a general type of

Page 33: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

table which can realize array, hash table, collection, object; language

built-in pattern matching; closure; function can also be seen as a value;

provide multi-threading (collaborative process, not the thread supported

by the operating system); through closure and table can easily support

object-oriented programming. Some key mechanisms are needed, such as

data abstraction, virtual functions, inheritance and overloading.

Therefore, YBC designed a set of script interpreters that support Lua

and the compiler's AI virtual machine to perform the interpretation of

Lua's bytecode. The AI virtual machine will add Lua's AI model calling

interface. In the operation of the smart contract or the block

synchronization verification in the cloud pass, the node will take out the

corresponding contract bytecode from the block, and execute the

corresponding code by using the AI virtual machine, and call the AI model

through the parameter, thereby Get the result of running the contract

bytecode. The execution results of the AI virtual machine and related

context state changes will be used by the block chain. It should be noted

that since Cloud Pass provides backward compatibility with Smart

Contract 2.0, Smart Contract 2.0 will be simulated in a byte interpreter

mode via the AI virtual machine on the node of YBC certificate.

3.4 Security Intelligence Contracts support for digital assets

The vast majority of block chain applications are built around digital assets,

and users often willing to create their own asset types and use smart

contracts to control their distribution and trading logic. However, in

traditional block chain design, each digital asset needs to develop a smart

contract-based business process, which is extremely inefficient and

error-prone.

In the security intelligence contract, YBC Securities use AI technology to

create a large number of digital asset-based trading models and business

processes. They only need to call the corresponding certificate contract

interface to generate a complete digital asset system when any user

creates their own digital assets, ; The corresponding digital asset trading

logic can be developed by users or through various AI models generated

by YBC Securities,which can also directly inherit the digital asset model

features that defined by YBC.

Page 34: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

With ensuring safety of YBC, YBC Card can easily create user-defined

digital assets, which means the arrival of "financial" era of YBC Card. Under

the premise of AI censorship, each user can sell one of their attributes in

the form of tokens according to the contract, and secure and reliable

transactions in ilLb. For example, an entrepreneur sells his or her own ideas

in the form of tokens at ilLb, and at the same time, manages and realizes

various ownership transactions in a smart contract manner, thereby

obtaining sufficient support; while users who purchase entrepreneurial

ideas will enjoy the corresponding rights. Digital assets created by users

can only be online assets, and they cannot interact with offline assets and

behaviors through traditional smart contracts. YBC introduces AI judgment

mechanism and trusted gateway equipment to realize online and offline

communication and interaction.

Chapter 4: Technical Features

4.1highpropertyPromote the circulation of big data values. "Circulation" makes big

data play more values. Similar to the block chain application of asset

transaction management system, it can circulate purification and

contribution big data as digital assets, realize the application and

realization of big data in a wider range of fields, and give full play to it. The

economic value of big data. Based on the decentralized cloud pass block

chain, which can break the data barrier between users, so that user data

will get the most value.

4.2 High security

User privacy is more secure. YBC has a unique privacy protection and

encryption contract. By secure multi-party computing, the original data of

privacy can be completing isolated and accessed, enabling fast and secure

data sharing services. The personal purification contribution data is stored

by the block chain encryption method, identity verification, authorization

mechanism and other technologies, and the user's original data cannot be

accessed by any user or individual. Data can be opened to a limited extent

only if the user agrees to authorize it. Under the cryptographic differential

privacy encryption, the application can perform big data research on some

Page 35: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

of the user's data, but cannot analyze personal data, and can't check, copy,

or tamper with the data.

4.3 Efficient operation

The self-built certificate has efficient operation efficiency by avoiding

the threat of low performance and uncontrollable system security in the

development of Ethereum. YBC uses a three-tier data architecture of

development service layer, user service layer and block chain bottom-layer

service to solve various obstacles that block chain technology may face in

the process of application landing, which is used to meet various

requirements of commercial applications. Including: establishing a

practical regulatory audit mechanism; purifying the protect privacy;

stabilizing, efficient and reliable; building a platform for data sharing for

purification.

Chapter Five5: Characteristic Functions5.1 Open Accessibility

YBC is a public chain which opens to everyone. Anyone can send

transactions and get valid confirmation. The consensus process

determines which blocks can be added to the block chain and the current

status. Once public chains are published and run, program developers

have no right to interfere users,block chains can protect users who use in

the block chains. Anyone with adequate technical ability can access it, as

long as there is a computer that can connect to Internet, it can meet the

access conditions without too much restriction on the nodes. There is no

access threshold. Though it is a major problem for capacity and

performance improvement, public participation greatly enhances the

transparency and trust of the block chain.

5.2 Checking mechanism

In order to facilitate data validation, most of the data in the block

chain of YBC are stored by the form of Merkle tree. Merkle tree, in general,

is a formation of hashing store large amounts of data. Merkle trees have

the general structural characteristics of trees. Merkle tree can be a binary

Page 36: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

tree or a multi-tree. The leaf node value stores data, while the non-leaf

node value is the hash value of all the node combinations under the node.

The data structure of Merkle tree provides a checking mechanism,

which we call Merkle Proof, when the correctness of a node hash is verified,

all branches under the node are correct. Merkle proves that a large number

of aggregated data can be validated by validating a little data. Block chain

is the process of using this technology to realize the rapid verification of

transactions in a block. Merkle tree is an important data structure for fast

checking of block chains. Merkle tree is a very good data structure for

verifying information in "list" format. Essentially, it is a series of connected

data blocks. It is also feasible for a transaction tree, because once the tree

has been established, it does not matter how long it takes to edit the tree.

For a transaction tree, it only needs to be generated once and saved into

blocks. The status information is stored in the form of key-value pairs, with

the address of the account as the key value, while the account statements,

balances, random numbers and other data under the account are stored as

the value. Whenever a transaction is executed or an account is operated,

the state tree needs to be queried and modified, frequently added or

deleted, and the state tree needs the ability of fast query and fast

calculation of root hash. In view of this situation, YBC proposes MPT

(Merkle Patricia Tree) data structure, which combines Merkle tree with

dictionary tree, improves the search efficiency and can quickly calculate

the root hash value. The tree is divided into four types of nodes: empty

node, leaf node, extended node and branch node.

5.3 Asset Circulation and Management

Digital asset is blood of YBC. It provides power for all parts of the

ecology. Digital assets are the basis for the operation of the system,which

is the guarantee for normal operation. Both the computing power and the

application layer need to be supported by digital assets. Digital assets is

necessary if users want to use the application. Only when every parts help

each other and work together can YBC showing energetic and vital.

Page 37: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

5.4 Graphene technology and virtual machine implementation

contract

Graphene is a blockchain toolkit developed by the BitShares team

cryptonomex, written in C++, and Dan Larimer is the founder of

Cryptonomex. The concurrency is relatively strong. The BTS and STEEM

based on the graphene bottom layer can achieve an average confirmed

speed of 1.5S and the measured data throughput of 3300 TPS under

limited conditions. The EOS can achieve millions of TPS through parallel

chain, and parallel. The local chain can even reach the confirmation speed

of milliseconds.

The YBC virtual machine is the operating environment of the smart

contract in the cloud pass. The smart contract can be compared to the

JAVA program. The JAVA program executes the code interpretation byte

through the JAVA virtual machine (JVM). The smart contract of the cloud

pass is interpreted by the cloud pass virtual machine into bytecode for

execution. The EVM is encapsulated in a sandbox, meaning that code

running inside the EVM cannot touch the network, file system, other

processes, or even intelligence.

Chapter 6: Core Innovations of YBC

Securities6.1Decentralized application(DAPP )

YBC system committed to support decentralized applications from a

technical perspective, especially through the introduction of mobile-side

strategy to productize different DAPP ideas, so that ordinary Internet

users can truly feel the value brought by block chain technology.

For DAPP applications in different industries,which bring block chain

technology to more users and industries. For example, decentralized

socialization, decentralized storage and decentralized domain name

services, decentralized computing services, etc., through the introduction

of incentives, will deepen the use of the concept of shared economy,

change the existing APP market and business model.

Page 38: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

Block chain technology is used to build decentralized applications for

infrastructure. Simplify the preparation of developers through the design

of the perfect certificate of API and the distribution of Docker, so that

developers can quickly started the corresponding development work. It

will also encourage developers to develop high-quality DAPP through

Token within YBC.

6.2 Deploy 51 super nodes

In the consensus mechanism, YBC securities pioneered the hybrid

DpoS+PoW mechanism which consisted by miners, notaries and

guarantors, and deployed 51 super nodes. It does not rely on computing

power, energy saving and environmental protection, the time for block

confirmation is greatly shortened, and the participation verification is

greatly reduced. With all that make accounting nodes can reach the

second level of consensus verification. The consensus mechanism has

natural advantages. After the introduction of notaries and guarantors, the

stability and security of the system have been further improved, which

makes it a major breakthrough in the world.

The TOKEN is produced by mining. In the future, standard nodes will

be deployed in the super nodes. After the nodes be launched, the standard

node voting method and standard node voting requirements will be

announced.

6.3 Support from multiple industries(Industryoriented)

In the token system, through the introduction of different consensus

mechanisms and the need for supervision, industries` developing needs

can be meet. For example, in the token system, the consensus mechanism

based on the integration of Proofo Ting ime and Raft protocol can meet

the requirements of block chain speed and capacity in the trusted network,

through the main control contract based on block chain technology and

Oracle. And the introduction of DataFeeds can also introduce more offline

factors. It can meet the needs of financial industry through the design of

Identity and Privacy.

With the token system, multiple industries will be supported: medical,

aerospace, financial, Internet of Things, supply chain, social and gaming,

charity, digital assets and equity. In addition, cloud-certified smart

Page 39: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

contracts and master contracts can support more complex business logic

through Turing's complete programming language,which will support

more industries. For more information on certification and industry

support, please refer to the further YBC application white paper.

6.4 Profit model

YBC Securities builds a unique token system, rationally avoids taxes,

building a management system with a real and effective big data system,

and digs into more development possibilities for the ultimately needs of

users, forming a"customer-product"community ecosystem. The

application of YBC mainly includes global terminal consumers, application

suppliers, merchants, mobile operators, equipment providers, system

integrators, financial institutions, etc. The overall volume of global

transactions is large, but there is no formation to solve this problem. The

organizational structure of the order to cope with the operating costs

generated by the third-party platform still requires consumers to pay for

this, which restricts the rapid development of the platform. Therefore, YBC

was designed to solve this problem by issuing tokens. The generation of

tokens reflects the concept of decentralization. Anyone can use the

computer to participate in currency issuance, just as anyone in the gold

standard can rush for gold. The decentralization avoids the control of the

entire distribution system by a single person or individual organization. As

a payment tool, a prominent feature of tokens is to protect the privacy of

both parties. In addition, the payment of tokens is very convenient and fast,

and the cost is low. Through the form of tokens, YBC reduces the handling

fees generated by the platform borrowing by third parties, which truly

forms a shared platform, effectively docks consumers and commercial

applications, makes a relatively fair trading environment and convenience

for buyers and sellers. Realize the pipeline, establish platform reputation

among three parties, enhance its trust in platform, promote resource

transformation provide convenience to the management of platform, and

transfer development funds from two directions of “open source and

“throttle”.

Page 40: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

Figure 2 YBC Economic Model

Chapter 7: Application and

Development7.1 AI Artificial intelligence application platform

7.1.1 YBC token + Credit Information Field

The model of YBC used in field of credit information is to build a new

block chain eco-platform. All information subjects, information demand

side, information providers, credit bureaus, and credit bureau supervisors

all become nodes on the block chain platform, but the role of platform is

different. For platform construction, the first is that the information subject

includes enterprises and individuals, and has different business rules. For

the enterprise entity, the information generated on the block chain

includes information related to the information that cannot be provided

externally in connection with trade secrets and laws and regulations. The

relevant information records and publications are public which makes it do

not need the enterprise `s authorization.Personal information is more

stringent. Except for information that can be directly disclosed by laws and

regulations, all generated information is encrypted and can only be

processed by obtaining a personal authorization key. Second, the records

of the distributed ledger must be authorized. The account is recorded by

Page 41: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

the information subject, the information provider related to the

information subject,user, and the licensed credit bureau, not all nodes of

the entire network can record. Third, the generation of credit records

mainly relies on smart contract technology and government departments

with authoritative publishing capabilities. For example, the online lending

platform and the lender signed a smart contract. If the consumer fulfills the

contract on time, it will automatically generate performance information in

the block chain; if the obligation is not fulfilled according to the contract, a

breach of contract information will be automatically generated to the

relevant on the block chain of the main body.The master of this account

includes the information subject, the online loan platform, and the

authorized credit reporting agency. If other credit bureaus or information

demand side need to obtain relevant information, they need to be

authorized by the information subject.

7.1.2 Cloud Pass + Data Sharing

As an innovative decentralized infrastructure and distributed

computing paradigm, block chain was first used in the data encryption

currency system represented by Bitcoin. The core functions of the

generalized block chain technology include the using of encrypted chain

block structure for data verification and storage, the use of distributed

node consensus algorithms for data generation and update, and the use of

automated script code to program and manipulate data. The application

areas of the current block chain can be summarized as digital currency,

financial transactions, data storage, data authentication, asset

management, etc., which can realize the identification, authorization and

real-time monitoring of intangible assets such as data property rights.The

object of data sharing can be summarized as the original basic data and

various data sets that reflect the nature, characteristics, and changing laws

of the objective world acquired in activities such as business, technology,

consumption, or other means. The process of the data flow through the

beginning and end of the shared activity can usually be abstracted into the

exchange process of the data assets. Therefore, the object composition of

data sharing has a higher degree of fit with the application object of the

block chain asset management scenario.

7.1.3 Yuntong Card + Internet of Things

Page 42: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

The Internet of Things (IoT) is simply the Internet between things and

things. It is a network that connects various IoT terminals. According to

IBM's prediction, by 2020, there will be more than 20 billion IoT terminals

worldwide. . There are many Internet of Things communication protocols

in China, and with the intervention of the three major operators, the

Internet of Things has entered a period of rapid development. The Internet

of Things is the perfect application scenario for block chain technology.

Block chain technology can be used to realize a management and service

system that does not require central server management and does not

need to distinguish between vendors. In this system, vendors can perform

peer-to-peer management of the plant equipment, while at the consumer

and network level, there is no need to care about the difference between

vendors. Only the device can successfully obtain the network access right

according to the unified access protocol.

The encryption algorithm and consensus mechanism of YBC Securities

determine that the hacker cannot illegally control the transactions of the

IoT device, and the controller of the device cannot be obtained. Cloud

Pass's asymmetric encryption of transactions allows only users with private

keys to obtain private information about the device. Using the DPoS

consensus algorithm in block chain technology, zero-cost, real-time

peer-to-peer transactions can be effectively implemented.

7.2 Smart medicalToday, patient data security is being challenged. In the era of smart

healthcare, the emergence of block chain technology models may well address

these issues.

First, the block chain protects the privacy of user data in the medical

network. In the past, central server were able to use intranet data and

spread without authorization. The block chain could avoid this situation

because the it is not centralized and all transmitted data has undergone

strict encryption processing.

Second, the block chain can iPs illegal medical network nodes. There

are many sensors in the hospital, some are wireless networking. In the

past if there are criminals putting sensors in the hospital, automatic

access is difficult to identify. The server of the block chain has certain

recognition capabilities. When the server finds a Trojan attack, it will

actively notify the NMS to close the gateway directly connected to the

sensor infected with the Trojan, thus ensuring data security.

Moreover, information is stored permanently after entering the block

chain. Each event and operation has a timestamp which cannot be changed

Page 43: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

afterwards. A single node can not modify the block chain. Therefore, the

block chain can ensuring secure communication between nodes stable and

reliable. It is worth noting that the block chain solves the problem of

too high cost of the hospital central database effectively. At present,

all data streams of the hospital medical network are collected into a single

central control system, with more and more data the cost is too high to

afford. The block chain does not use the architecture of a central server

and there is no pressure on the central control system.However, when

there are too many nodes in the hospital medical network, it is a challenge

for cost if each node use the central serve function of the block. A

compromise between central control and full distribution control is

proposed,the nodes of the medical network are divided into two layers,

and the small number of nodes which in the upper layer work in a block

chain manner.

In addition, block chains can provide trust and billing mechanisms for

different owners, making it possible to share personal data between

healthcare providers, patients and healthcare offers. This is mainly due to

the data encryption technology of the block chain and the P2P

internetwork, which solves the problem of trust and even pays for the

settlement of data values based on data transactions.

7.3 AI Intelligent Aviation

AI artificial intelligence can provide precision service to airlines, and

by deep "understanding "a huge amount of data, predict how much food

and beverages are needed on different flights so as to minimize waste, and

improve the passenger experience."

Artificial intelligence can help airlines integrate different data and

implement more complex settings to ensure personalized service and

increase passenger loyalty. For example, extract data from airline websites,

Navitaire reservation systems, call centers, and mobile sites to create a

single, holistic view of each customer and communicate with them on the

most appropriate pipeline in real time.

Page 44: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

Figure 3 Cloud Passage Platform Architecture

Chapter 8: Achieving DevelopmentPlanning

The core of this project lies in the integration of YBC system and block

chain technology. Therefore, the focus of preliminary work is publishing

white papers, initiate early investment and realizing the construction of

YBC in the end. At the same time, block chain and digital encryption will be

started synchronously.

Once the platform set up and the funds are raised, the platform must

be oriented to users, developing the application and finally exert its value.

Therefore, it is necessary to promote the platform. In addition, we can use

Baidu's promotion and Weibo promotion to expand the influence of YBC

token, aiming to create a fair and transparent platform.

YBC will build a multi-language platform to collaborate globally and

create a trading platform where will enable global users active here.

Therefore, YBC system will contact more overseas block chain exchanges,

actively promote overseas online projects, enhance the international

influence of YBC system. After the exchange be launched, the token team

and the board of directors will continue to develop the block chain

technology in a sustained manner while maintaining the harmonious

Page 45: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

development of the block trading business.

Chapter 9: YBC system Block ChainEconomic Ecology9.1 The usage and value of the YBC block currency

The token currency is based on block chain technology, and all data

point transactions are recorded by the block chain to achieve fairness,

openness and transparency of the entire trading system. In the past few

years, the development of digital currency represented by bitcoin,

confirmed the value of block chain technology and encrypted digital

currency by facts, enabling the economy of the cloud-based token

currency to be realized.

The usage and value of the token currency:

1. Scarcity: Since YBC`s token can introduce various applications, the

number of users are about millions or more. The distribution of tokens will

proceed quickly,with the difficulty of mining increases, the pipeline for free

access to tokens will be reduced which prompting users to trade through

the secondary market.

2. Circulation: The introduction of millions of users and the

mainstream of various consumer scenarios (games, e-commerce,

advertising, e-books, rewards, etc.) will greatly enhance the circulation of

tokens. YBC Securities will also log in to various major exchanges at home

and abroad to further enhance liquidity.

3. Appreciation brought by system development: The market value of

digital currency will be in direct relationship with the development of its

cloud pass system. After various applications enter the cloud pass block

chain, the market value of the cloud pass block block currency Will

continue to improve.

9.2 Release plan

9.2.1 Total amount of token

9.2.1.1 constant release: 21,000,000 pieces (50 million)

9.2.1.1 access route

(1) Acquisition of mining methods;

Page 46: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

(2) node contribution acquisition;

(3) Sharing contribution acquisition;

9.2.2 regulations

The cloud pass certificate TOKEN is produced by mining, using the

workload proof mechanism to mine, and issuing the mechanism of

DPOW+POS mining.

9.2.3 distribution plan

(1) Management Foundation (locked warehouse): 5°%

(2) Technical and operational team (locked warehouse): 5°%

(3) Super node (locked warehouse): 5°%

(4) Mining machine output: 85%

The token release project of the lockout will be opened after 400 days

of operation. The specific release plan is subject to the White Paper of the

Foundation announcement or version 2.0.

Chapter 10: YBC Certification Founding

Team10.1 Initiating agency:

Founded in Singapore in February 2019, the full name is called YBCOIN

FOUNDATION LTD. It is a non-profit organization dedicated to block chain

development and block chain technology innovating. It is designed to be

promoted through scientific, rational and effective management

mechanisms. It also maintains YBC ecological construction and YBC

healthy development, provides suitable protection and equal rights for

YBC card holders and members, and builds effective communication

channels between YBC members, communities, nodes and other different

roles. The Foundation is committed to popularizing block chain knowledge,

block chain technology research and innovation, and promoting the global

industrialization of cloud-passenger block chain technology.

Page 47: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

0.2 Foundation organization structure:

10.3 technical team:

YBC is a global cross-connect projec composed of top experts from all

over the world and is a senior developer of block chains in various

countries and regions.

Page 48: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore
Page 49: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore
Page 50: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore
Page 51: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore
Page 52: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

10.4Investment cooperation institutions (in no particular order):

(1) IDG Capital partners

(2) redpoint ventures

(3) Ktb netwwork

(4) GGV Capital Xfund

(5) CCASH

Page 53: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

Chapter 11: DisclaimerThis white paper is only intended to convey the purpose of the

information and does not constitute any investment advice, investment

intention or instructed investment. This white paper does not constitute or

be construed as any purchase or sale, or any invitation to buy or sell, any

form of securities, nor is it a contract or commitment of any kind.

YBC clearly stated that the relevant intention users clearly understand

the risks of the platform. Once the project participants participate in the

investment, they understand and accept the risk of the project and are

willing to bear all the corresponding results or consequences. Participants

in the cloud pass must carefully read the White Paper of Cloud Pass to fully

understand the technical characteristics of YBC and the risk-return

characteristics of sales, and fully consider their risk tolerance, rational

judgment, and prudent decision-making. Indicates that you understand

and accept the risks of the project and are willing to bear all the

corresponding results or consequences.

Page 54: WhitePaper - ybcimgimg.test.upcdn.netybcimgimg.test.upcdn.net/YBC-EN.pdf · introduction Application of Data Network Value YBC YBC is launched by the YBCHAIN Foundation in Singapore

Chapter 12: Risk TipsThe net value of this digital asset project will fluctuate due to factors

such as market fluctuations, and the raiser must bear the corresponding

risk of raising. The risks raised in this digital asset project include: systemic

risks arising from the impact of the overall political, economic, and social

environmental factors on the digital asset market.

The Foundation is committed to managing and using this digital asset

in good faith, diligence and diligence. However, the fundraiser's

participation in the project is not the same as depositing funds in a bank or

other deposit-taking financial institution. The Foundation does not

guarantee profit. The minimum return is not guaranteed. Investment is

risky and investors should read this white paper when they raise this

project.

The Foundation reminds the fundraiser of the “self-financing”

principle. After the decision to make a fund raising, the fundraiser is

responsible for the risk caused by the operation of the project and the

change in net value of the project.