Beruflich Dokumente
Kultur Dokumente
Preface................................................................................................................................................. 3
1 Times call...............................................................................................................................5
2 Technological superiority................................................................................................14
development of everything.
“Couplet ".We will spare no effort to invest a lot of human and material
Finally, we sincerely thank the users of ESC chain for their valuable
ecosystem.
1 Times call
mode.
technology, you will find that we can connect more and more things.
to the single function of IOT devices and the lack of the ability to
any damage may affect the distributed and scattered IOT devices
t solutions are very expensive, and they need to deal with a wide
business model.
services), 51.3% of people said that they wanted to improve the first
future, there are two new concepts: one is named data networking; the
other is SCN.
what can be done after access to the network, that is, the demand leap
from the connectivity of the network to the service of the network, but
what we use to connect to the network - the role of the network lies in
information transmission, the information age for us, the most important
is data.
In the blockchain environment, people can conduct transactions
solve the problem of trust and rights in the virtual world of the Internet.
Figure 1.3 list of new
opportunities of
Internet of things
ecosystem, each sub chain can accurately store its own data and
data, and no longer need to consider the source, security and access
to it, which not only solves the inherent pain point of the Internet of
channel of data are not the most concerned place for the general
Chang, because it involves the value of data.If you want data to flow,
of the traditional Internet of things game rules. The missing links of point-
2 Technological superiority
are not only the combination of hardware and software, but also the
ESC chain has its own main chain (Master chain), and it is also
extending and developing around the master chain. We not only have
our own browser, client, management tools, etc., but also have our own
For the Internet of things or ecological network, and for all available,
perceived and processed data, ESC chain mainly does two things: the first
There are six layers: extension layer, service layer and application layer
is written by people, can be tampered with by people, and the data can
ensure that the data can not be tampered with, open and transparent,
but the existing application scheme, lack of hardware support, can not
guarantee that the data source is real and reliable.One of the major
ensure that the data is real and reliable from the beginning.
method based on hash signature, which can ensure that the reader can
read and write RFID chip with correct access pass, and provide certain
and RFID chip is realized, so as to ensure the read and writeThe operation
suitable for all industries that apply RFID technology and have security
requirements.
1At the reader writer end, with the help of hash calculation, the data
can not be tampered, and the integrity and accuracy of the data
can be ensured.
3. when signing, the signed data includes the time stamp and the read-
in the reading and writing end of RFID system, which makes the
reduces the coupling degree, and has both security and certain
control functions.
and signed the fingerprint.After the above processing, the main control
same time uploads the assembled original data to the centralized server.
operation to learn and identify specific source data, which can be used
ensure the authenticity and reliability of data from the source has a great
The core processing chip of the all node device is a powerful SOC chip,
perception layer data, and the data is cached in the SRAM&DDR memory
packet, then calls the block chain Hash and the data signature module to
drive the original data, and carries out hash operation and signature
communication module.
Figure 2.4 structure diagram of core processing module of mobile all node device
interface, etc., can also be plug and play based on user needs.
Figure 2.5 plug and play compatible interface
application development.
Standards include: 5g, Nb IOT, Lora, ZigBee, PLC Internet of things and
fields build their own data ecology around their own data, or build their
own blockchain architecture, even the chain adopts different structures and
and storage of data between different blockchains (sub chains).In this way,
we can not only connect different data sources, but also realize a wide
contract. However, in order to achieve data flow and value transfer, ESC
POW and POS are for the ESC master (Master) chain. Both ways are to
prevent the master chain block from being
Unique and secure, because POW provides reliable data protection
through computing power, but 51% of potential attacks are hidden
Therefore, using POS as a balanced consensus to reduce the waste of
computing power can also reduce the attack by 51%, which enables
algorithm.
can quickly find the data we need, and quickly verify the
Only in this way can we realize multi link connection and data fusion;
connected
Access to the network, access to the network and what protocol to use
for communication, etc., but consider what data is needed for
the value blockchain ecosystem facing data: data storage and query
index,
Based on the user's request to give accurate data, not without
filtering to give all the relevant data directly, effectively assign the data
complex business logic and application in the real world can be easily
contracts in both the ESC main chain and the sub chain (Alliance chain).
data?Gas consumption?
contract. Centering on business event driven as the origin, we try our best
logic and reduce the amount of calculation and fuel consumption, and
In fact, many operations (such as writing data to the ESC main chain
block) are not suitable for direct execution on the main chain
The contract supports the event at the language level, and can directly
notify the interested parties to handle the expected event when it occurs,
function index, we can quickly query, call or inherit and reuse these
Accessibility:The flow of data also has its value,., its value is that
its usability can only realize its real value if more people can access
data, data service.The question here is, what is the data used for?How to
chain is built, it can quickly realize the interface and function of linking the
ESC main chain, and realize the ability of derivation and expansion of the
2.5.1 Fabrictype
Fabric smart contract is called chain code, which is divided into system
chain code and user chain code.System chain code is used to realize system
level functions, and user chain code is used to realize user application
account book are separated. When upgrading the chain code, it does
not need to migrate the account book data to the new chain code, which
truly realizes the separation of logic and data. At the same time, the
chain code supports the programming of go, Java, node.js and other
(fabric sub chain type) data through the interaction between GPRC and
peer node.
2.5.2 Ethereumtype
API and start calling its Web3 serviceAt present, many basic chains use
The choices and trade-offs made after different purposes mean that our
ESC chain smart contract library will continue to
Only when multiple chains are connected effectively can they form a
of public chain.The public chain can carry countless sub chains through
the hierarchical structure. Under this theory, it is assumed that when the
"data value machine" like an aircraft carrier becomes larger and larger,
the data must seek its standardization in the circulation.On the basis of
this criterion, "chain group" will come into being.Different "chain groups"
can realize the secondary transmission and integration of data value, and
the cross chain will realize the exchange and query more efficiently.
Figure 2.9 chain group view
ESC chain is the first public chain in the industry that advocates and
queried, etc.Yes
large ecosystem of ESC chain, thus enriching the ecological order of the
Data, audio and video data, location information data, etc. are
automatically collected, processed and linked.
sensors, intelligent terminals, food traceability sub chain, cross chain nodes,
linked through the intelligent terminal equipment to ensure that the data
can not be tampered, and consumers can easily check the relevant data
system, the clothing traceability and fidelity system includes RFID tag,
RFID intelligent reader, clothing sub chain, cross chain node, data
data flow of production, logistics, storage, sales and other links, and
ensure the authenticity of the data, and ensure that every garment can be
traced. It can not only simplify the process, reduce the cost of enterprises,
but also ensure the interests of consumers. Consumers can easily check
sustainable development.
Based on its own advantages, ESC chain will provide a new generation
of intelligent sensor core based on sensor technology in cooperation
Chip, module and system solutions, etc., provide strong technical support
3.4 Consultant
into ZTE, Huawei and other blocks at home and abroadThe chain
talent team joined in, aiming to become the leading blockchain consulting
Provide technical
KEDD clothing Tracing the
development and
origin of
consulting services:
advanced
sub chain building
clothing
and DAPP
development
Provide program
Brazil productoragro Agriculture food
consulting
traceability
service and
technical
support
service
Provide program
Yandeh, Brazil Auto Auto parts
consulting
parts tracking
service and
technical
support service
new stage.
path of ESC chain is mainly divided into five steps.The first step is to
realize the application of pass.In 2018, the ESC chain built, deployed and
launched the master chain. At the same time, it also developed and
launched the client application of the ESC chain. The nodes in the ESC
chain can exchange certificates with each other and participate in the
focus on the landing of art collection chain and the up chain transmission
industry; ESC chain will be connected to sub chains in more fields and
The third step is to realize the circulation of data value.The ESC chain is
about to complete and deploy a cross chain architecture. The sub chain is
connected with the master chain, and the data on the sub chain can be
uploaded to the master chain. The pass of the sub chain is exchanged with
the pass of the ESC chain through the cross chain mechanism, and can be
further exchanged with the pass of other sub chains.Value circulates in the
chain.
of the cross chain structure, the parent chain and the sub chain are
services to various industries. At the same time, nodes in a sub chain can
query data or use services in other sub chains only by using certificates in
steps are realized, the business ecology of ESC chain is composed of sub
chain and parent chain, and sub chain and sub chain.
Figure 4.1 development roadmap of ESC chain
5 ESC Chain Foundation
community maintenance.
once every four years, and the members are generally persons with