Block chain and the virtual world

Binding block chain technology, information encryption, time series synchronization mechanisms such as evidence is analyzed, and build a parallel reality in the virtual world principles, to solve the problem of the objective existence of the fragile world can not form a virtual reality, so as to calculation of credit to build logical basis.

Popper's "three worlds" theory

Initially, humans can distinguish the world is the objective world (nature) and the mental world (the world of self).
Our father is a binary view of the world, that "yes" and "no" or "yin" and "yang"; Plato specific division method in the world, the world of ideas and the soul of the world is made.
Popper in "objective knowledge" a book put forward the "three worlds" theory of the division, namely the physical world (referred to as the world 1), the spiritual world (referred to as the World 2) and objective knowledge of the world (referred to as the world 3).

"World 3" is the world's spiritual product of human beings that the world of knowledge, such as knowledge, customs, ideas, language, writing, art, mythology and science, including specific spiritual products, such as tools, equipment, books, merchandise, computer and structures and so on.

"World 2" is the person's mental activity or mental processes, there is no objective or materialized, "World 2" With the passage of time gradually disappear; "World 3" will be the contents of the "World 2" objectified or materialized , a substance present in the vector, not because of the death of the creator (individual) disappear, and the "World 1" belong to objective reality, it is also known as "World 3" as the objective spirit, knowledge of the world.

Because the objective laws of scientific knowledge as a human understanding of the world is real, the law is independent of the real mental activity, that is, "Road", the law can not be created, only to be found.

The importance of the virtual world: Being Digital

Internet has brought to mankind a new way of life, that is, Being Digital (Being Digital).

"World 3" in the spirit of the products are widely affect people's mental state and mental activities, such as literature, film and news.

"World 3" so that the time of human enrichment education longer and longer, even life-long learning, the concept of lifelong education is beginning to flourish.

Today's "World 3" is not only the world of knowledge, but also the world of information, but everyone will be physically isolated from the state, via the Internet link in the "world 3."

"World 2" and "World 3", that is, people's subjective relationship with the world network become so close that we have to think, in the end people are living in the physical world, still live in the online world.

Authenticity depth interact with information and virtual reality

Real and virtual symbiosis mode

A "virtual world" to represent computer and network composed of the real world corresponding to a manual system, another world compared to individuals can perceive the spiritual world.

** narrow sense refers to the virtual world of artificial intelligence, computer graphics, human-computer interface technology, sensor technology and highly parallel computing technology such as real-time integrate an interactive artificial reality generated, is a highly realistic simulation of human "analog world" real-world behavior. ** generalized virtual world content includes not only narrow the virtual world, but also contain one human to exchange information with the development of computer network technology and the corresponding human network actions arising out of the rendering, the new action space knowledge thoughts and emotions It is a dynamic network of social living space. A virtual world is a kind of "artificial reality" or "man-made world."

  1. The virtual world and the real world of human should have strict isomorphism, in reality, the powers, duties and responsibilities, also corresponds to the virtual world powers, duties and responsibilities.
  2. The virtual world is not the world of video games, the rules of the video game development and implementation can not correspond to the real world. (Here I am in doubt, virtual rule not correspond to the real world? I think that obviously can affect the degree of magnitude of value that the virtual world and the real world of contrast, such as issuing a bounty from the virtual world.)
  3. The virtual world and the real world is a parallel interaction. Virtual World substantial reduction in the real world of human learning, communication and transaction costs. Simulation training system so that the cost has dropped significantly, but also to avoid the risk on the real action.

Thinking about how to achieve interoperability of both worlds in order and rules, give full play to the advantages of the real world and the virtual world, and to avoid the negative impact of the loss of two worlds with the chaos caused by, people are intelligent face of the upcoming world to answer The problem.

Social and commercial systems exist in the real world and the virtual world, is already unavoidable fact is, "Live" mode, virtual and real symbiosis between business systems, the need to seek, discover new values ​​support human future in the business world trading mechanism, ideals and norms, and on this basis, to reflect and to build support "symbiotic" approach, technology platform, business models and business ethics.

Proposed logical starting point of credit to support innovation.

The authenticity of network information

The virtual world there are two fundamental issues, namely security issues and authenticity of the information network.

Currently, worms, DoS and other abuse of the Internet is full.

Security is a major outsourcing deal enterprise information security strategy, by 2020, is expected to exceed 25% of companies will protect their IT systems through the cloud, managed security service, or SaaS, cloud security is the next-generation security a top priority.

In the body of free will, improper motive drive, network information dissemination have freedom, timeliness, diversity, cross-cutting and complementary characteristics, it is difficult to build effective supervision and constraints on the authenticity of the information in the online world.

In the online world, the dissemination of information from space, cost constraints, in a very short period of time, the information can spread to a very wide number of groups.

In business, false information on the network is purely the use of information asymmetry to trick counterparties to obtain unethical or even illegal benefits, such as fake e-commerce, online fraud.

Credit mechanism under the block chain architecture

Transaction-core business systems, the two companies must identify key information in the case of opponents is true and credible, it may further negotiations on the elements of the transaction, trading conditions, the transaction system is highly deterministic systems.

When information is missing or can not prove the authenticity of the authenticity of the information, it means there is a risk transaction, or abort the transaction, or the need to improve the level of credit transactions, such as the use of insurance, guarantees, bonds, collateral and other means (by letter), so that a substantial increase in transaction costs, and transaction efficiency decreased significantly.

Relationship information and risk

2009, the risk is defined as the "impact of uncertainty on objectives": 73 Risk management terminology standards ISO of ISO Guide in. In the business world, information can reduce uncertainty is to reduce trading strategies, deal-making mistakes, that effective control of risks.

False information and wrong information, as well as the direct cause of the delay of information (information lag in decision-making), etc., will seriously affect the transaction process and transaction goals (profit target), leading to commercial risk. The only way to reduce uncertainty is to find ways to get more information, and this information is true, timely and critical. For example, a customer's payment delay, there is a full pay in the future, the disposal of assets pledged to prosecute recovery of bad debts and other possible, but if at this time to get state financial information, customer and other customers to explain, you can roughly determine the to the event, and can take appropriate measures to minimize the loss.

Economics tells us to pay the cost of access to information, but restricted by the limitations of humanity itself, access to information, there is an upper limit ability to process information. Information asymmetry is an objective of the norm, so humans will always be bounded rationality.

"Principal - agent" theory, access to information and more party called proxy party, the other opposing party to be commissioned by introducing ** "incentive compatibility" mechanism, the asymmetric information problem into institutional arrangements and mechanism design problems. ** system designed to make the behavior of the Agent pursue personal interests, coinciding with the value of the Principal of the goal of maximizing consistent, Agent voluntary act in accordance with the mechanism designer desired strategy, the institutional arrangements is the "incentive compatibility" . For example, give customers more time to repay the line of credit is beneficial to both institutional arrangements.

Real information and that can not be tampered with

Real world time is irreversible, irreversible real world, information on the incident response has not tamper resistance.

** virtual world and the real world is isomorphic (my own point of view: there is clearly a heterogeneous, virtual world will produce information), which is based is to obtain factual information from the real world, performed in the same order and rules in the virtual world preservation and dissemination. ** If the information of the virtual world can be arbitrarily tampered with, it becomes a chaotic state does not make sense.

Block chain technology features include distributed storage, time series, the whole chain consensus and intelligent agreement, the original source digital currency can be traced back / digital assets, to prove its authenticity; all transactions go through the whole network verification, to ensure the uniqueness of the transaction. Block chain to deliberately wasting storage space, fully redundant, to achieve characteristics without the need to participate in mediation to form a continuous record.

  1. Increments of time always positive.
  2. Reality chronological occurrence, evolution.

** The information referred to here can not be tampered with, it is used to describe the information recorded event has occurred, rather than the creation of subjective information. ** For example, evidence of the accident scene photos, information commercial contract has been signed, such as payment information to the other party, once the facts have occurred can not be modified, otherwise it will cause great confusion. The creation of the subjective information, such as after writing an article and published, can still be repeatedly modified.

In reality, there are also information recording events of the case mistakes occur, such as delivery errors occur, errors and other entry documents. Dealing with such erroneous information, the information can not directly modify already existing, and to make use of a single, correct way to increase information, that is, to change the behavior itself is a message, and appended to the original information to ensure the authenticity of .

Credit Building mechanisms

Cryptographic algorithm information is the cornerstone of the world proudly established.

Block chain technology is the use of block data structure chain to validate and store the data , the use of distributed nodes consensus algorithm to generate and update data , use patterns of cryptography to ensure secure data transfer and access , using intelligent automated script code composed by the to program and manipulate data contract of a new distributed computing paradigm and infrastructure.

It is thought by block chain technology isomorphic logic to encrypt (can not be altered), the timestamp mechanism (sequential) to form a virtual world of information, so that the virtual world has the structure and content reflect the reality of the event.

Distributed database is the physical carrier block chain, block chain is a logical transaction support . Block chain is the only subject of the entire network transaction data. Block chain only to add invalid for the other operations.

Guess you like

Origin blog.csdn.net/weixin_41845533/article/details/90415331