Blockchain-Based Information Management Study Guide
Key Glossary
Term Definitions Blockchain A growing list of records (called blocks) that are linked and secured using cryptography. Block A single record in a blockchain that contains a timestamp, transaction data, and a hash of the previous block. Transaction An operation that transfers value or data on a blockchain network. Smart Contract A program stored on a blockchain that automatically executes when predefined conditions are met. Cryptography The process of converting data into an incomprehensible code that cannot be read without a decryption key. Decryption Key A key used to convert encrypted data back to its original form. Blockchain Node A participant in a blockchain network that maintains a copy of the blockchain and verifies transactions. Distributed Ledger A database that is shared and synchronized between multiple participants (nodes). Ethereum A decentralized blockchain platform that supports smart contracts and decentralized applications (DApps). Solidity The programming language used to write Ethereum smart contracts. Short Answer Questions
Explain the basic structure of a blockchain.
Blockchain is a chained data structure consisting of multiple blocks. Each block contains transaction data, a timestamp, and a hash of the previous block. This structure makes blockchain tamper-proof and transparent.
What role do smart contracts play in blockchain-based information management?
Smart contracts allow users to define conditions for access and use of their information. These conditions are encoded into smart contracts stored on the blockchain, ensuring that information can only be accessed and used when the predefined conditions are met.
What problem does the invention described in the US20220171876A1 patent application attempt to solve?
The invention seeks to address the lack of control and transparency in the management and sharing of personal information. It leverages blockchain technology to enable users to control who can access their information and how their information is used.
According to the US20220171876A1 patent application, how do users control access to their information?
Users can control access by setting conditions for access to their information, such as setting a limit on the number of queries, geographic location, or time.
How does the "point system" mentioned in the patent application work?
The point system is used to track and limit access to user information. Users are assigned a certain number of "points" for their information, and each request for access consumes a certain number of points. When the points are exhausted, access is blocked.
What is the purpose of the prediction engine described in US20220171876A1?
The prediction engine identifies suspicious activity by analyzing user data and request patterns. It can help the system adjust access controls to prevent unauthorized access to information.
Explain the difference between an information pool system and an accountability system.
An information pool system allows users to aggregate and manage their information, while an accountability system is responsible for executing smart contracts and tracking access to information.
What role does the user interface play in this system?
The user interface provides a platform for users to interact with the system. Users can set access conditions, monitor access requests, and manage their information through the user interface.
Why is it safer to store sensitive information on a blockchain than in a traditional database?
The decentralized and tamper-proof nature of blockchain makes it safer than traditional databases. Data stored on a blockchain is distributed and cannot be changed without changing all subsequent blocks, reducing the risk of data breaches and tampering.
List two real-world scenarios where this information management system can be used.
Medical record sharing: Patients can use this system to control access to their medical records, allowing access only to authorized healthcare providers.
Authentication: The system can be used to create secure digital identities, and users can control what information is shared with verifiers.