What are the characteristics of Ping An One Account Chain? On blockchain applications

OneConnect, a technology company affiliated to Ping An, officially launched the blockchain solution - OneConnect. According to reports, the solution has three major advantageous technologies. On the FiMAX underlying framework, Sparrow privacy middleware provides guarantee for data privacy security, Core high-performance underlying layer improves throughput, and Concord one-click deployment and management platform optimizes user experience.

As we all know, as an emerging technology, there are still many technical obstacles to the application of blockchain in actual production environments, such as throughput, scalability, authentication mechanism, and privacy. And security, manageability, etc. Among them, the Yilian BaaS platform has proposed its own solutions to three problems: throughput, privacy, and manageability.

Yi Lian Lian can be divided into two layers, the underlying architecture and API, and then upwards to undertake business scenarios. According to Lei Feng.com, the underlying framework of One Account Chain was originally inspired by Hyperledger Fabric. Lu Yifan, Blockchain Product Director of OneConnect Technology Center, was previously the co-founder of Fabric. He told Leifeng.com that during the actual application process, he found that Fabric was not suitable for use in a production environment, and his development concepts with the community gradually emerged. Disagreement.

“The advantage of Fabric is the synchronous transmission of data, and Yi Lian Lian also draws on this, but it does not pay enough attention to privacy issues. Moreover, I think it is almost impossible to share data in practice, so The role of smart contracts is also very limited.”

So, based on learning from Fabric, they modified the underlying framework to fit the actual financial industry and named it FiMAX. "Core may still be somewhat related to it (Fabric), but Sparrow and Concord are brand new."

According to him, FiMAX Sparrow privacy middleware has three main features: authorized encryption and decryption, zero-knowledge Detection library, invisible query.

“As for authorized encryption and decryption, it actually involves the biggest problem in reality-data sharing. Because data has commercial value, no organization is willing to share data, which is very important. It may bring disastrous results. We launched authorized encryption and decryption at the end of 2016. Data participants encrypt the data themselves. After encryption, they can decide who can interpret the data at any time. The data is all passwords. Mobile APP needs to apply to the user when calling permissions such as address book and text messages.

Stealth query means that any operation on the chain will not cause the information on the chain to be leaked in any way.

Lu Yifan also focused on the zero-knowledge detection library, or zero-knowledge proof technology, that is, transaction participants can combine third-party transaction ciphertext without being able to decrypt the ciphertext. Regulatory testing. It is said that it can provide multiple sets of zero-knowledge detection technologies for different scenarios.

In order to understand its privacy protection effect more intuitively, a huge electronic screen was placed at the conference site for demo demonstration. When conducting an asset transaction, only the parties involved in the transaction can see the specific account information and transfer share. If there is a transaction between different institutions, the account information of the other institution cannot be known.

The key effect of FiMAX Core is to increase throughput. It is understood that Yilian adopts GCCA national encryption acceleration technology with independent property rights, which can improve the performance of national encryption by nearly a hundred times in the X86 environment, and is also better than the encryption machine solution. Traditionally, hardware module solutions such as HSM encryption machines are used. It is said that only a 2.1Ghz 8-core CPU can support a transaction throughput of 5,00 transactions per second, and the hardware configuration can be improved to reach a single-chain input level throughput without being affected by cryptographic operations.

Node access and unified and centralized configuration management are the core of efficient network space management. The two major problems of "difficulty in application deployment and difficulty in management" have also become key points that restrict the development of blockchain. “In the process of promoting the application of blockchain in the industry, as the commercial value increases, manufacturers are increasingly paying attention to user experience, including node deployment, management and monitoring, etc.”, Chief Technology Officer and Chief Operating Officer of Financial OneConnect Official Huang Yuxiang said.

FiMAX Concord provides an easy-to-operate and simple interface.

Tools such as one-click deployment and initialization management page reduce the technical threshold for managing nodes. Real-time monitoring windows for multiple key nodes help operation and maintenance personnel accurately monitor network or node abnormalities in real time. In terms of network management, complex operations such as network creation and CA connection can be simplified, and the simplest operation page can be provided to network administrators.