Welcome to Francis Academic Press

International Journal of New Developments in Engineering and Society, 2019, 3(1); doi: 10.25236/IJNDES.19101.

Research on Development Method of Application System based on Blockchain

Author(s)

Rong Wang

Corresponding Author:
Rong Wang​
Affiliation(s)

School of Network Security and Informatization, Weinan Normal University, Weinan, China

Abstract

The blockchain was first used as the underlying “book“ recording technology for bitcoin, which originated in 2009. After several years of development and improvement, it has gradually become a new type of distributed, decentralized, and trusted technology solution. Especially in the past two years, the blockchain has gradually separated from Bitcoin, and has become a hot spot for technological innovation. It has created a new data distributed storage technology, which has guided changes in system and programming concepts and may subvert the present. The organizational model of the business community. The characteristics of the blockchain are analyzed from the technical and application levels, and the classification of the blockchain is given. The design requirements of the blockchain are mined, and the application requirements of the blockchain consistency and scalability are analyzed in depth. The application system development method of blockchain and blockchain modeling are studied. The double-chain design model of account blockchain (abbreviated as ABC) and trading blockchain (TBC) is proposed. The contract is deeply analyzed, and the application principle of parallel execution model of chain code is put forward. Finally, the application technology of blockchain is summarized and forecasted.

Keywords

Blockchain, Application System, Develop Method

Cite This Paper

Rong Wang. Research on Development Method of Application System based on Blockchain.  International Journal of New Developments in Engineering and Society (2019) Vol.3, Num.1: 1-7.

References

[1] Qing Sihan(2015). Critical Infrastructure Security Protection. Information Network Security, No.2, PP.  1-6
[2] Wang Hongkai, Wang Zhiqiang, Gong Xiaogang(2014). Discussion on Mobile Internet Security Problems and Protective Measures. Information Network Security, No.9, PP. 207-210.
[3] Wang Xueqiang, Lei Lingguang, Wang Yuewu(2014). Research on Mobile Internet Security Threats. Information Network Security, No. 9, PP.  30-33.
[4] Yu Lian, Deng Enyan(2017). Blockchain Technology. Chinese Computer Society Newsletter, 2017,Vol. 13, No.5, PP. 10-15.
[5] Cai Weide, Zhao Wei, Zhang Chi, Yu Lian(2016). Discussion on the British Central Bank Digital Currency RSCoin. Electronic Finance, 2016, No.10, PP.  78-81.