Blockchain Data Authorization and Tokenization Learning
Glossary
Term Definition Blockchain is a decentralized distributed ledger technology with the characteristics of decentralization, openness, transparency, tamper-proof, trustworthiness, etc. Smart contracts are deployed on the blockchain and automatically execute the terms of the agreement. Data Authorization Data owners grant data users the right to access and use their data. Data users are entities that need to access and use data. Data owners are entities that own and control data. Target data Data that data users want to access and use. Transaction Units of data broadcasted in the blockchain network and recorded on the blockchain. Transaction log Records of events and data related to transactions. Authorization request transaction Transaction in which data users request data authorization from data owners. Authorization confirmation transaction Transaction in which data owners confirm data users' authorization requests. Data acquisition transaction Transaction in which data users obtain target data. Encryption The process of converting data into an unreadable format to protect its confidentiality. Trusted Execution Environment (TEE) Hardware components that provide a secure execution environment. Off-chain refers to data storage and processing outside the blockchain network. Hash Algorithms that map data of arbitrary length to fixed-length data. Tokens represent digital representations of physical or digital assets on a distributed ledger network. Token templates are templates that define a set of properties and control functions associated with a specific type of asset. Fungible tokens are tokens that are interchangeable with other tokens of the same type, for example, tokens representing currency or stocks. Non-fungible tokens are tokens that have a unique identifier and are not interchangeable with other tokens, for example, tokens representing a piece of art or a collectible. Distributed Ledger Technology (DLT) is a database technology that shares, replicates, and synchronizes transaction data among multiple participants.
Short answer questions
Please explain how blockchain nodes provide blockchain-based data authorization.
Blockchain nodes receive data acquisition transactions submitted by data users, verify whether the data user has been authorized, and if authorized, execute smart contracts to provide the target data or the calculation results after performing predetermined operations based on the target data to the data user.
, How do data owners authorize data users to access their data?
Data owners can authorize in two ways: long-term authorization and temporary authorization. Long-term authorization is to add the data user to the list of authorized parties, and the data user can request to obtain data at any time. Temporary authorization is the data owner authorizing the current operation of the data user, and the authorization expires after the current data acquisition transaction is completed.
How to handle target data with different privacy levels?
For data with low privacy levels, it can be directly provided to data users. For data with high privacy levels, a predetermined operation needs to be performed first, and then the operation results are provided to data users to ensure that data with high privacy levels are not leaked.
What data storage methods are mentioned?
The patent mentions two data storage methods: storage in a database associated with a blockchain node, and storage through an off-chain channel.
What is a ledger-independent token service?
A ledger-independent token service is a software service that allows users to create, trade, and manage tokens across multiple different distributed ledger networks/platforms in a universal manner.
What two types of token templates are described in?
Two types of token templates are described in the patent: service-defined token templates and user-defined token templates.
Please explain the role of the proxy layer mentioned in.
The proxy layer is an abstraction layer that allows token services to interact with different types of distributed ledger networks. Each DLT agent contains logic for communicating with a specific type of DLT.
What token control functions are described in?
Control functions include, but are not limited to: creating tokens on a distributed ledger network, transferring from a sender to a receiver, minting tokens, destroying tokens, querying metadata about tokens, etc.
What is an Electronic Document of Title (EDT)?
An Electronic Document of Title (EDT) is a digital record representing the ownership of goods, such as an electronic bill of lading.
What is the purpose of the Shared Buffer Server (SBS) mentioned?
The Shared Buffer Server (SBS) is used to maintain a personalized list of Signed Random Addresses (SRA) for each authenticated holding node, thereby enhancing the anonymity of the chain of title.