Unit Ii
Unit Ii
Identity Management
Blockchain technology can improve identity management by reducing fraud, increasing security, and
improving privacy.
Use cases for blockchain in identity management include digital identity, KYC/ AML( Anti-Money
Laundering) compliance, and secure authentication.
Several blockchain projects are focused on identity management, including Civic, uPort, and SelfKey.
Voting Systems
Blockchain technology can improve voting systems by increasing transparency, reducing fraud, and
improving accuracy.
Use cases for blockchain in voting systems include online voting, secure and anonymous voting, and
election auditing.
Several blockchain projects are focused on voting systems, including Follow My Vote, Agora, and Horizon
State.
DIGITAL IDENTITY VERIFICATION
Identity verification is the concept of proving that an identity is a real one. It’s about proving a person is
who they say they are and that it’s a real person behind the actions. In most places around the world, identity
verification uses data such as name, DOB and address to prove an identity is real.
Digital identity verification is the process of proving that an identity is real without ever having to meet
someone face-to-face. It confirms that a person is who they say they are and that the personal information
they have provided isn’t fake or stolen (identity fraud). Digital identity verification also helps ensure that it
is actually a person behind the screen and not fake identities — now much more easily created with the rise
of criminal technology.
Digital Identity Verification works by comparing the data that a person sends ( e.g., document such as a
passport or biometric data such as a picture of their face ) against a verified data set which can include
government records, credit references or even mobile data.
Digital identity verification speeds up the verification process, which is necessary for the fast pace of a
digital world in which the majority of our transactions take place online.
Customers nowadays expect and demand to be able to sign up for a product or service quickly and start
using it immediately. Delivering a smooth customer experience, however, has to be balanced with a secure
identity verification process that ensures a business is safeguarded and individuals are protected from
identity fraud. With so much of life now online, there is more data than ever before that can be misused if
not protected, so the identity verification process is crucial.
bob
Later, for real-time digital identity verification, “Logging in with Bitcoin” means that a Bithandle is already
connected to a Bitcoin address, which securely facilitates ecommerce without the user having to register an
account and provide personal identity and financial details.
Bithandle thus helps streamline user interactions with websites in several ways.
1. First, websites do not have to maintain user account registries (“honeypot” risks for hacking).
2. Second, every user “Logging in with Bitcoin” is automatically enabled for one-click ecommerce
purchases.
3. Third, the Bithandle service can provide real-time blockchain lookups to confirm user digital identity
at any future time on demand — for example, to reauthorize a user for subsequent purchases.
BLOCKCHAIN NEUTRALITY
Cryptography experts and blockchain developers and architects point out the importance of designing the
blockchain industry with some of the same principles that have become baked into the Internet structure
over time, like neutrality.
In the case of the Internet, net neutrality is the principle that Internet service providers should enable access
to all content and applications regardless of the source and without favoring or blocking particular products
or websites.
The concept is similar for cryptocurrencies.
Bitcoin neutrality means the ability for all persons everywhere to be able to easily adopt Bitcoin. This
means that anyone can start using Bitcoin, in any and every culture, language, religion, and geography,
political system, and economic regime.
For example, the Islamic Bank of Bitcoin is investigating ways to conduct Sharia-compliant banking with
Bitcoin.
A key point of Bitcoin neutrality is that the real target market for whom Bitcoin could be most useful is the
“unbanked,” individuals who do not have access to traditional banking services for any number of reasons,
estimated at 53 percent of the worldwide population.
Bitcoin neutrality means access for the unbanked and underbanked, which requires Bitcoin solutions that
apply in all low-tech environments, with features like SMS payment, paper wallets, and batched blockchain
transactions.
Having neutrality-oriented, easy-to-use solutions for Bitcoin could trigger extremely fast uptake in
underbanked markets.
There are different SMS Bitcoin wallets and delivery mechanisms (like 37Coins96 and Coinapult, and
projects like Kipochi97 that are integrated with commonly used emerging-markets mobile finance platforms
like M-Pesa.
Digital Divide of Bitcoin
The term digital divide has typically referred to the gap between those who have access to certain
technologies and those who do not. In the case of cryptocurrencies, if they are applied with the principles of
neutrality, everyone worldwide might start to have access. Thus, alternative currencies could be a helpful
tool for bridging the digital divide.
However, there is another tier of digital divide beyond access: know-how. A new digital divide could arise
(and arguably already has in some sense) between those who know how to operate securely on the Internet
and those who do not. The principles of neutrality should be extended such that appropriate mainstream
tools make it possible for anyone to operate anonymously (or rather pseudonymously), privately, and
securely in all of their web-based interactions and transactions.
DIGITAL ART
Blockchain Attestation Services (Notary, Intellectual Property Protection)
The term digital art in the blockchain industry is to refer to using the blockchain to register any form of IP
(entirely digital or representing something in the physical world) or conduct attestation services more
generally, such as contract notarization.
The term digital art is also used in the blockchain industry to mean online graphics, images photographs, or
digitally created artworks that are digital assets, and thus IP to protect.
Attestation Services:
Attestation services (declaring something to be true, such as asset ownership) are referred to as digital art.
Attestation services relies on the blockchain functionality of hashing and timestamping.
Hashing and Timestamping:
Hashing is running a computing algorithm over any content file (a document, a genome file, a GIF file, a
video, etc.), the result of which is a compressed string of alphanumeric characters that cannot be
backcomputed into the original content.
The hash represents the exact content of original file. Anytime the content needs to be reconfirmed, the same
hash algorithm is run over the file, and the hash signature will be the same if the file has not changed.
The hash is included as text in a blockchain transaction, which thus provides the secure timestamping
function, when a specific attestation transaction occurred. Via the hash, the original file content has
essentially been encoded into the blockchain.
Blockchain attestation services more generally comprise all manner of services related to document filing,
storage, and registry; notary services (validation); and IP protection.
Blockchain has the ability to use cryptographic hashes as a permanent and public way to record and store
information, and also to find it later with a block explorer. The core functionality is the ability to verify a
digital asset via a public general ledger.
There are several blockchain-based attestation services in different stages of development or proof of
concept, such as Proof of Existence, Virtual Notary, Bitnotar, Chronobit, and Pavilion.io.
Proof of Existence: Pv-bpc
One of the first services to offer blockchain attestation is Proof of Existence.
Proof of Existence demonstrates document ownership without revealing the information it contains, and it
provides proof that a document was authored at a particular time. With this tool, the blockchain can be used
to prove the existence and exact contents of a document or other digital asset at a certain time.
Attorneys, clients, and public administrators could use the Proof of Existence blockchain functionality to
prove the existence of many documents including wills, deeds, powers of attorney, health caredirectives,
promissory notes, the satisfaction of a promissory note, and so on without disclosing the contents of the
document.
Two other blockchain timestamp projects are Bitnotar and Chronobit. Two other virtual notary projects
are Blocksign and btcluck.
A similar blockchain-based project for contract signing is Pavilion.io, which provides the service much
cheaper than Adobe EchoSign or DocuSign; contracts are free to send and only one mBTC to sign.
Monegraph:
One digital-art protection project built and intended as a proof of concept using the blockchain ledger
Bitcoin is Monegraph,
Using this (currently free) application, individuals can facilitate the monetization of their online graphics —
digital media they have already created and posted on the Web — by registering their assets. Just as Bitcoin
verifies currency ownership, Monegraph verifies property ownership;
This an example of the smart property application of the blockchain. Monegraph could be a complementary
service or feature for stock photo image and graphic repository websites like Shutterstock or Getty Images,
possibly adding future functionality related to image use enforcement and tracking.
Working of Monegraph:
Monegraph works in a two-step process using Twitter, Namecoin, and Monegraph. Namecoin is used
because it is an altcoin that can be used to verify DNS registrations in an automated, decentralized way; any
similar DNS confirmation service could be used.
1. To stake the claim, the user goes to http://www.monegraph.com/, gives it permission to sign into Twitter
account (via the standardized Twitter API OAuth token),
2. supply the URL of the graphic, upon which Monegraph automatically tweets a link to that image in the
correct format.
3. To record the title, after Monegraph tweets the link to the image, it provides a block of code for the user
to copy and paste into the Namecoin client.
4. The user initiates a new transaction in the Namecoin wallet and adds the block of code as the key and
value in the Namecoin transaction (you can see the transaction here: http://bit.ly/monegraph_verification).
5. Only one copy of a digital image can ever have a valid Monegraph signature. Monegraph images are just
ordinary image files, so they can be duplicated and distributed like any other images, but only the original
file will pass validation against the Monegraph system.
Ascribe:
A related digital art and copyright protection project is Ascribe, which is aimed at providing an underlying
infrastructure for IP registry.
The company is building an “ownership layer” for digital property in the form of a service to register and
transfer copyright. Although existing copyright law offers creators protection against infringement and the
right to commercialize, there is no simple, global interface to register, license, and transfer copyright.
Working of Ascribe:
1. The Ascribe service registers a digital work with the service hashes and timestamping it onto the
blockchain. An earlier step in the registration process uses machine learning to detect and resolve any prior-
art challenges.
2. Ownership rights can then be transferred, which enables secondary markets for digital IP.
The service handles digital fine art, photos, logos, music, books, blog posts, tweets, 3D CAD files, and
more. Users need no prior knowledge of the intricacies of the blockchain, copyright law, or machine
learning to benefit from the service.
The bulk of Ascribe’s users are marketplaces and white-label web services that use Ascribe in the
background, though individual users can use the site directly, as well.
Blockchain environments are continually evolving with new technologies, consensus algorithms, scalability
solutions, and advancements in decentralized finance (DeFi), non-fungible tokens (NFTs), and other use
cases beyond cryptocurrencies. They aim to address challenges such as scalability, interoperability, and
sustainability while exploring new applications across industries beyond finance, including supply chain,
healthcare, and voting systems, among others.
skate child field bachelor pelican office clock possible amused order globe receive
Click on 3 horizontal lines on left side
Click on Open Chrome Web Store. In search the store type metamask wallet and click on it. The following
will get displayed.
then it will reveal and when you click on next, it will ask to confirm recovery phrase
Now your wallet is created successfully
Smart Contracts
Blockchain Coding Environment:
Smart Contract:
In 1996, Nick Szabo described a smart contract as “ a set of promises specified in
digital form including protocols within which the parties perform on these promises.”
Smart contracts are the self-executing programs that are stored on Blockchain and run
when predefined conditions are met.
Smart contracts automatically execute transactions if certain conditions are met
without requiring the help of a third party to manage or approve the transaction.
For example, there is a deal that is made with two friends Alice and Bob. Alice lend
1000rs from Bob and has promised to return in the next month. They have created a
smart contract to automate the return of the payment. So, the next month, 1000rs will
be automatically get deducted from the Alice account and it will be paid to Bob. None
of them have to interfere in the returning process. It will be done automatically.
Let us consider another scenario, in which Dave is the owner of the car and he wants
to sell it. So, he creates a smart contract. With his private key, he signs and deploy it in
the network which is broad caste d to every peer in the network.
Then this car along with the key will be put in the smart garage. The details will be
shared with the network, where every peer in the network will know that the owner is
Dave.
Now Claire login to the system with her private key. She accesses the smart contract to
pay the money. Now the money will be received by the signified person of the
contract, the owner name will be changed from Dave to Claire and is broadcasted to
the network, so that every node will know the current owner is Claire.
Working of Smart Contracts:
This is test network. Check the port in RPC Server configuration., which is usually
7545.
click on it to open. Once opened, click on down arrow symbol beside ethereum
mainnet.
Click on Add network
Import an account from Ganache and make transactions between Account1 and
Account2:
Go to Ganache and copy the private key of account to import
Now click on send to make transactions and then transfer between my accounts
click on Account1
Enter the amount to be transferred
you can see here, account1 is debited by 10 ETH and balance is 90ETH.
Let’s add variables inside our contract. Solidity’s Data Types can be found here. Here,
we are using string to store the message in the Smart Contract.
To declare a variable in Solidity, we first write the data type and then the variable
name. Optionally, we can add an access modifier such as private and public before the
variable name.
Create a function
To create a function, the structure of functions in solidity is
function <<functionName>>(<<parameterName>> <<parameterType>>)
<<functionType>> returns(<<returnType>>) {
}
Then we can click on the Ethereum logo to view the Deploy and Run Transactions
Tab. In this tab, we can choose the environment where our smart contract will be
deployed, Use the generated accounts which contain test Ethers, Set the gas limit for
transactions, Set the amount of ether to be transferred for the transaction, Set the
contract to be used, and then click on Deploy button.
After the contract is deployed. We can interact with the contract in the Deployed
Contracts Section.
Now enter a input string and click on takeInput button. And then click on giveOutput
button to see the output.
On clicking transaction
Click on Contract Creation
Block will be holding transaction data which is in encrypted form. To connect with
contract, we need and contract address.