Must-read丨The latest version of CyberVein technical analysis

Insert picture description here
Insert picture description here

In view of the recent surge in the number of users and attention of CyberVein, the number of people who want to know about the project is increasing, CyberVein hereby releases the latest version of the technology + product overview, so that everyone can learn more about CyberVein's body logic based on this article. We also highly recommend users to pay attention to it. CyberVein's major self-media accounts around the world keep abreast of the latest developments of the project in real time. If you still don’t understand the project, you can add the WeChat account of Miss CV, the official operation account of CyberVein China, for consultation. At the same time, you are also welcome to join the CyberVein community to communicate and learn from many CVT fans.

At the same time, in early 2021, CyberVein also opened a column in the CSDN developer community to expand the developer community. Within 1 month, 4 times ranked first in the blockchain field, 1 time ranked first in the big data field, 2 times ranked first in the field of new technical writers, 1 time ranked first and sixth in the field of artificial intelligence . With the popularity of the DAVE and CROSS concepts, CyberVein has risen from a ranking of 400,000+ to 10,000 in the weekly ranking of the whole network only four weeks after it was launched on CSDN. What is certain is that with the continuous preaching of technology, CyberVein is not only famous in CSDN, but also in more technology circles.

Follow the CSDN column
blog.csdn.net/CyberVein

CyberVein:Build Your City
Insert picture description here

CyberVein is very optimistic about the application potential and prospects of blockchain, artificial intelligence, big data, Internet of Things and other technologies in the field of smart cities. After more than three years of research and development, we have successfully implemented solutions in the fields of smart finance, smart medical, smart transportation, smart security, etc., and have developed an original blockchain underlying public chain and high-quality DApp products.

Before conducting an overview of CyberVein's entire technology and products, in order to help readers understand, it is necessary to briefly introduce DAVE, DAVE Alliance, CROSS and CVT:

1、DAVE

It is mainly composed of PISR database, DAG distributed storage, Citrix distributed computing platform, AI federation learning and decentralized NFT issuance and auction platform CROSS. DAVE can carry out big data processing analysis and quantitative valuation. It has the characteristics of safety, intelligence, and value, and uses CROSS to hedge various financial risks and realize data assetization.

2、DAVE Alliance

DAVE Alliance is not only a technology alliance and industry alliance, but also an ecological alliance, consisting of service providers in four major sectors: database, distributed storage, distributed computing power integration and federated learning. After joining the DAVE Alliance, any traditional and non-traditional institutions will inject fuel into DAVE in their areas of expertise, such as storage, algorithms, computing power, hardware or metadata, etc., to promote the implementation of global smart city construction.

3、CROSS

CROSS was initiated by the CyberVein Foundation. It is the world’s first decentralized NFT issuance & auction platform, and it is also the issuance and trading platform with the most diverse types of NFTs. Currently, the main types of NFTs include digital financial derivatives, training models, digital certificates, Encrypted artwork. The current NFT projects on the market are all To C business, and CROSS has also extended the To B business, which is the first in the industry.

4 、 CVT

CyberVein's dedicated cryptocurrency CVT, in addition to bear the functions of big data transaction fees, exchange credit points and incentives, on CROSS, CVT also serves as a medium for issuing and trading NFTs to realize data assetization. The more data in the CyberVein ecosystem, the greater the contribution, and the more CVTs that need to be pledged. CVTs are used more and more frequently, the ecological circulation is stronger, and their price and value become immeasurable.

1. Technical architecture

Data layer: public chain, alliance chain

Core layer: public chain solutions include CVVM virtual machine, PDP storage integrity certification, zero-knowledge proof, transaction pool, block selection mechanism, confidential algorithm module; alliance chain solutions: contribution value algorithm, CVT pledge pool, data encryption Module, ABCI interface module, zero-knowledge proof, cross-chain module

Network layer: P2P network, HTTP service GIN, JSON-RPC, gRPC

Consensus layer: The public chain uses the PoC contribution value certification mechanism, and the alliance chain uses the PBFT Byzantine fault-tolerant algorithm

Incentive layer: The public chain is mainly block-packed transaction GAS, and the alliance chain is mainly based on data contribution value

Tool layer: data oracle machine, smart contract, IPFS service, blockchain browser

Application layer: Decentralized NFT platform CROSS, Citrix distributed computing platform, CyberVein wallet and other DApps

2. Technology + Product Description

1. Data layer: public chain + alliance chain
CyberVein smart city ecology will be composed of a public chain based on POC consensus and countless PBFT consensus alliance chains. Every consortium chain based on the PISR database is a node that participates in the POC consensus. Every consortium chain based on the PISR database is a node that participates in the POC consensus. The alliance members in the DAVE Alliance are also composed of node alliance chains on the public chain. However, members of the DAVE Alliance must be nodes on the public chain, and nodes on the public chain are not necessarily members of the DAVE Alliance.
Insert picture description here
Figure 1: The relationship between the public chain and the alliance chain

About the alliance chain
The alliance members in the DAVE Alliance are also composed of a node alliance chain on the public chain. Access to the database requires the alliance node to vote for confirmation, and to ensure that the database operation is on the chain to ensure that other members in the alliance can see the database operation. The alliance chain uses the PBFT practical Byzantine fault tolerance mechanism for consensus, and uses CyberVein's PISR database for data storage.

Regarding
transactions in public chains, transactions in public chains are more about handling asset transfers and proof of contributions between public chain nodes. In order to take out block rights in the public chain, verify the validity of encrypted data based on zero-knowledge proofs, which can be sufficient Prove that you are the legal owner of a certain right, without leaking relevant information, and maintain the stability of the entire ecosystem.

Regarding the
credibility of cross-chain data is an important part of the implementation of blockchain technology, CyberVein can intelligently and format data from the traditional Internet side and put it on the chain, so that the data can interact more efficiently and generate value. The key to digital assets. After the value is played out, these data will return to the ecology of the data itself, forming a complete closed loop. The more companies and individuals that contribute data, the more data that can be applied and processed, and the more demand there will be. Among them, data interaction requires a more direct cross-chain experience, and public chains and alliance chains also require cross-chain technology.

CyberVein cooperates with the ChainLink cross-chain team to use cross-chain technology in data interaction to build a bridge between offline data and on-chain communication, to solve the problem of data islands in smart cities, and to connect smart cities and smart cities. . DAVE Alliance members can connect to any API, whether it is a blockchain, enterprise system, Web API, or Internet of Things devices. They can trade and record asset ownership without any on-chain transactions. This method is great for database expansion and reduction on the chain. Transaction costs are very effective.
Insert picture description here
Figure 2: Shown is a consortium chain composed of three nodes A, B, and C

2. Consensus layer: PoC+PBFT
POC (Proof of Contribution) means proof of contribution value, which stipulates that when each contributor has the same hashing power, the accounting rights are determined by the proportion of contribution holdings and contribute to the ecology. The more resources, the more opportunities to obtain more block manufacturing rights. Because there is no mining in the public chain, the transaction fees generated by all transactions in the block will become the incentive for the block producer.

The PISR database carries all the data encryption, storage, query, exchange and use. The calculation of the data contribution value requires real-time feedback. Therefore, the PBFT (Practical Byzantine Fault Tolerance) mechanism is selected to provide such high concurrency and strong immediacy. Transactions to achieve consensus. At the same time, the essence of the alliance is that the member nodes have a certain degree of trust with each other, so the Byzantine fault tolerance mechanism is also very suitable in the scene.

All
members who join the data contribution value need to access the PISR database, and access to the database requires other alliance nodes to vote and confirm, and to ensure that the database operation is on the chain, to ensure that other members can see the database operation, and create more by calling and evaluating the data and the database The value of data.

The PISR database will also calculate the user's data contribution value based on indicators such as the volume of the data and the number of runs of the encryption algorithm. The contribution value of the data here is equivalent to the user’s estimate of the value of their data, because in the calculation process of the encryption algorithm, the user will consume a lot of irreversible resources, and the resource consumption that the user is willing to bear for the data reflects the importance and value of the data from the side. . The expansion of the alliance chain means that more and more nodes recognize the value of data, and the contribution of data to the ecology will continue to increase.

Since the contribution value of a single block is generated by the node, the contribution value of the node can be used to control the block generation right, etc. In order to prevent malicious behavior, CyberVein introduced the solution of pledge + contribution value to determine the block right in the PoC consensus mechanism. In this mechanism, it is not only the contribution value of the data that affects the right to block production, but the amount of CVT pledge will also become an important factor affecting the right to block production.

CVT pledge amount
When nodes need to pledge to compete for block production, nodes will be more inclined to jointly maintain the value of CVT so as to reduce the motivation for evil. In this process, the accumulated contribution value of the ABC alliance's CVT pledge amount and data contribution value will be calculated to determine who has the right to produce blocks.

The introduction of pledged CVT in the consensus mechanism is a stable business model that promotes the development of decentralized ecology. It does not require users to configure expensive hardware. Only the amount and duration of mortgage can promote the common growth of CVT value and ecology, and accelerate the completion of the project ecology. The closed loop. Staking CVT will also help ensure network security and the rights of ecological participants, further increase the stickiness of CVT and community users, and allow the CVT ecology to cycle virtuously.
Insert picture description here
Figure 3: The ABC alliance will also compete with alliances such as the X alliance, the Y alliance, and the Z alliance for the right to produce blocks.

3. Application layer:
The barriers of various departments in DAVE+CROSS cities are very high. Some barriers are due to data security considerations, which makes data fusion face obstacles. DAVE allows data to be integrated and integrated-PISR database to achieve data management , DAG storage chain realizes data storage, AI federation learning realizes data feasibility study, and Citrix distributed computing power realizes data feasibility study, forming a flexible data sharing standard specification. In addition to making data available and invisible, data can be provided only once , Thus balancing the balance of data security and data interaction. If data holders and producers want to conduct global big data business, they can realize the value of data through CROSS.

Insert picture description here

Figure 4: The flow of data from PISR data to CROSS platform

CyberVein uses DAVE and CROSS to solve the problem of data credibility, and has tested and successfully run it in the B-end. Among them are the Dubai Government Expo Central Pavilion, Zhejiang University Run Run Shaw Hospital, Zhoukou City Port Government Agricultural Alliance Chain, Jiangsu Nice JieAn defense system and other cases, and have carried out pilot operations in more than 30 cities, is expected to have a wider range of landing in the second half of 2021.

Landing case one

Take CyberVein and Jiangsu Nesgen's joint research and development of the security database alliance chain as an example to explain in detail. The security PISR database alliance decision is made by voting by the DAVE Alliance. If you want to read the data in the PISR database, you need to get more than two-thirds of the members' votes, and the members can access all the metadata in the alliance without data leakage. In this area, it can effectively prevent members from doing evil costs and is the first step to ensure data credibility.

The PoC is fully used in the PISR database, and each data encryption action will be recorded as one of the data contribution standards. The DAVE Alliance members need to install the PISR database afterwards. If the member wants to obtain the data, they can send it to CyberVein in the form of "transaction". The main network submits a request to inform all alliances, and at the same time pay the CVT equal to "α" to complete the transaction. The value of α depends on the length of time between this application and the previous application. In addition, the AI ​​training model, metadata, big data set and other resources in the alliance are uploaded to the PISR database by the big data provider to check the resource quality assessment, and these data are backed up on the DAG storage chain. Use PDP mechanism to verify data integrity.

Metadata can be used freely in the security database alliance. A security company can use an oracle to link research data to CROSS to issue NFTs, and use federated learning to train machine learning models through Citrix distributed computing power. All operations are completed in the form of "transactions", and each data encryption action will be recorded as a data contribution, which is accumulated as D points. However, it is not enough to have D points. The contribution value of the alliance chain must be determined in conjunction with the CVT pledge value. The CVT pledge value will be determined by the number of CVT pledges jointly pledged by the alliance chain, and accumulated as C points. The alliance plays the role of "government" and actively participates in the process of packaging and uploading transaction information in the "transaction pool" to the main network. The successfully packaged entity will successfully create a new block and get a reward of CVT with a value of σ. The probability of success depends on the number of C points + D points.

Landing case two

In the case of data financial derivatives, CyberVein relies on third-party insurance as a sales intermediary to help Hong Kong AIA AIA obtain a large number of compliant legal data sources through the use of DAVE, and use distributed computing power platforms and AI federal learning technology to launch a more reasonable insurance model , And introduced the CROSS platform in the form of NFT, launched the CAT catastrophe insurance bond NFT, and formed the industry's first NFT Insurance policy.

Any company that is willing and needs to realize the value of data can use CROSS to turn data assets into indexes, funds, trusts, guarantees, options, financing and other financial derivatives to be purchased and invested. NFT insurance policies are only a form of data assets, and more derivatives can be traded in CROSS in the future.

Insert picture description here

Figure 5: Hong Kong AIA's NFT Insurance policy

Thanks to the rich data resources of DAVE and DAVE Alliance, providing transaction behavior, data information and other information, any information required by buyers and sellers on CROSS can be easily grasped, and the data processed by CyberVein will be traded in two forms: For traditional data transactions, it can be done directly on DAVE; CROSS, as a tool for processing big data in the CyberVein smart city ecosystem, can further conduct data transactions and diversify the value of digital assets and develop long-term.

Welcome everyone to join and follow CyberVein's other self-media social platforms to get the latest developments!
Official Weibo
weibo.com/CyberVein
official CSDN
blog.csdn.net/CyberVein
official GitHub
https://github.com/CyberVein-official
official telegram group
t.me/CyberVeinCommunity
official twitter
twitter.com/cyberveingroup
latest news
twitter. com/CyberVeinGroup/status/1359037533032570884
twitter.com/CyberVeinGroup/status/1358963898284531712

Guess you like

Origin blog.csdn.net/CyberVein/article/details/113776817