Blockchain Technology

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/96

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:34 PM on 12/10/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

97 Terms

1
New cards

Blockchain

A database in the form of a distributed ledger that uses cryptography to secure any kind of information

2
New cards

Centralized Ledgers

Ledgers managed by a single trusted authority.

3
New cards

Distributed Ledgers

Ledgers without a central authority, using consensus because as transactions are added, they are verified using a consensus protocol such as Proof of Work

4
New cards

Consensus Protocols

Methods for achieving agreement about the state of data in the ledger. The consensus protocol runs each time a new transaction is added.

5
New cards

Proof of Work

The original consensus approach but requires an intensive energy and competition among miners.

6
New cards

Proof of Stake

Validators are selected randomly to confirm transactions and validate block information, consuming far less energy.

7
New cards

Hash

Mathematical function condensing data into fixed size and length

8
New cards

Immutable

Unchangeable nature of data in blockchain.

9
New cards

Non-Fungible Token (NFT)

Unique digital identifier certifying ownership of digital files - artworks, photos, videos and audio.

10
New cards

Fungible Assets

Assets that are interchangeable and identical.

11
New cards

Digital Twin

Digital representation/ version of a physical artwork - high-resolution photograph or scan that is then minted as an NFT on a blockchain platform

12
New cards

Ledger

A record of transactions in blockchain.

13
New cards

Robotic Process Automation (RPA)

Technology for automating repetitive tasks.

14
New cards

Artificial Intelligence (AI)

Simulation of human intelligence in machines.

15
New cards

Data Analytics

Process of analyzing data to extract insights.

16
New cards

Data Visualization

Graphical representation of data for easier understanding.

17
New cards

Internet of Things (IoT)

Network of interconnected devices communicating data.

18
New cards

App Design

Process of creating user-friendly applications.

19
New cards

Enterprise IT

Information technology solutions for business operations.

20
New cards

Big Data

Large volumes of data analyzed for patterns.

21
New cards

Cybersecurity

Protection of systems from digital attacks.

22
New cards

Blockchain Applications

Software built on blockchain for various uses.

23
New cards

Hyperledger Fabric

Permissioned blockchain created by the Hyperledger Consortium to help develop DLT for a variety of business applications.

24
New cards

NFT

Non-fungible token representing unique digital assets.

25
New cards

Unique Identifiers

Tags like QR codes linking art to NFTs, providing a way to verify the connection between the physical piece and its digital counterpart.

26
New cards

Smart Contracts

Automated agreements detailing ownership and royalties - processes such as pmts, order fulfillment, and inventory management, reducing the need for intermediaries and speeding up transactions

27
New cards

Unlockable Content

Additional benefits provided with certain NFTs - certificate of authenticity/ claim code through each transaction.

28
New cards

Third-Party Verification

Authentication services linking art and NFTs.

29
New cards

Public Blockchain

Open ledger accessible to anyone for transactions.

30
New cards

Permissioned Blockchain

Blockchain controlled by a central authority with restricted access

31
New cards

Supply Chain Challenges

Issues in traditional supply chains like inefficiency.

32
New cards

End-to-End Visibility

Complete tracking of products throughout the supply chain.

33
New cards

Auditability

Immutable transaction records for verification purposes.

34
New cards

Cost Savings

Reduced expenses from eliminating intermediaries.

35
New cards

Controlled Access

Limited blockchain access to authorized participants.

36
New cards

Data Security

Protection against unauthorized access in blockchains.

37
New cards

Governance

Rules controlling participant actions in the network.

38
New cards

Customizable Permissions

Tailored access levels for different blockchain users.

39
New cards

IBM Food Trust

Blockchain platform enhancing food supply chain transparency.

40
New cards

End-to-End Traceability

Tracking food products from origin to consumer.

41
New cards

Food Safety

Improved safety through transparent supply chain records.

42
New cards

Reduced Food Waste

Optimized inventory management minimizing waste.

43
New cards

Consumer Trust

Increased confidence through accessible product information.

44
New cards

Regulatory Compliance

Meeting legal requirements with verifiable records.

45
New cards

Pharmaceutical Supply Chain

Tracking drug production to prevent counterfeiting.

46
New cards

Temperature Assurance Packaging

Packaging ensuring safe temperature for pharmaceuticals.

47
New cards

Collaboration

Secure data sharing among supply chain participants.

48
New cards

Counterfeiting Prevention

Transparent records prevent counterfeit drugs.

49
New cards

Operational Efficiency

Automation reduces delays and errors.

50
New cards

Farm Data Recording

Farmers log growth, fertilizer, and harvest details.

51
New cards

Coffee Processing Data

Includes processing methods and fermentation details.

52
New cards

Manufacturer Information

Records packaging and production details.

53
New cards

Government Certification

Tracks certificate numbers and issue dates.

54
New cards

Retailer Data

Logs arrival dates, product types, and transactions.

55
New cards

End Consumer Access

Consumers view traceability via web/mobile apps.

56
New cards

TradeLens

Blockchain project for global shipping revolution.

57
New cards

Everledger

Tracks diamond provenance for ethical sourcing.

58
New cards

Aura Blockchain Consortium

Permissioned Blockchain that is secured by ConsenSys Technology that provides a secure and transparent way to track luxury goods for authenticity and sustainability.

59
New cards

Digital Product Passport

Provides product authenticity and lifecycle info.

60
New cards

NFC Chips

Enable contactless communication for product tracking.

61
New cards

UHF RFID

Types of radio technology for tracking goods over distances.

62
New cards

Stakeholders

Participants motivated by shared interests in blockchain.

63
New cards

Traceability Benefits

Proof of authenticity and responsible sourcing.

64
New cards

Transaction Fee History

Records fees associated with blockchain transactions.

65
New cards

Energy Usage Risks

High energy consumption in proof-of-work systems.

66
New cards

Collusion Risk

51% attack can manipulate blockchain ledgers.

67
New cards

Permanence of Transactions

Difficult to correct errors in immutable ledgers.

68
New cards

Transparency Issues

Anonymity can facilitate illicit activities.

69
New cards

Regulatory Concerns

Uncertainty about blockchain technology regulations.

70
New cards

FTX Bankruptcy

Highlighted failures in corporate controls and transparency.

71
New cards

Blockchain Job Opportunities

Non-technical roles needed for strategic guidance.

72
New cards

Public vs Permissioned Blockchains

Choice depends on intended application.

73
New cards

Blockchain and IoT

Synergistic potential in supply chain applications.

74
New cards

What Proofs are needed in Public Blockchains?

Proof of Work and Proof of State

75
New cards

What proof is needed in Permissioned Blockchains?

Consensus Protocol - Reached through various planned processes involving a pre-selected set of validators - consumes far less energy.

76
New cards

How does Blockchain Technology Work?

  1. A user requests for a transaction

  2. The transaction is broadcasted to a peer to peer (P2P) network that consists of Computers (nodes)

  3. The Network of Nodes uses known algorithms to validate the transaction & Users’ status

  4. A verified transaction can involve Cryptocurrency, Contracts, Records, or other information

  5. The transaction is combined with other transactions and after verification, it creates a new Block of data for the ledger

  6. The new Block is added to the existing Blockchain which is added to existing blockchain which is permanent and unalterable.

  7. The transaction gets verified & executed.

77
New cards

When is it useful to use a Blockchain

  1. The need to share data

  2. Multiple Writers

  3. Absence of Trust

  4. Transaction based interaction

  5. Disintermediation creates value

78
New cards

Proof of Authority

Proof of Authority (PoA) is a blockchain consensus mechanism where a small group of trusted and verified entities (validators) are given the authority to validate transactions and create new blocks in permissioned blockchains

79
New cards

Common use of NFTs

Recording ownership of unique digital assets such as artworks, music, videos, and collectibles. NFTs serve as proof of authenticity and ownership on the blockchain, allowing creators to monetize their work. They can also include royalties for future sales, ensuring that artists receive compensation over time.

80
New cards

Consideration for Public Blockchain

Popular for Public Use where transparency and immutability are priority

81
New cards

Consideration for Permissioned Blockchain

Popular for enterprise, consortium, and supply chain use where privacy and efficiency is a priority

82
New cards

Control for Public Blockchain

Decentralized where no central authority controls the network.

83
New cards

Authority

A company or group of companies acting together (consortium)

84
New cards

Immutability/ Security for Public Blockchain

Strong Immutability designed to be highly immutable. Once data is added to the blockchain, it is extremely difficult to alter because it would require a consensus from a majority (51%) of network participants.

85
New cards

Immutability/ Security for Permissioned Blockchain

Controlled Immutability where the level of immutability can be controlled by the organization/ consortium managing the blockchain — authorized participants might have the ability to modify or delete data if necessary

86
New cards

Transparency vs. Data Privacy for Public Blockchain

Full Transparency/Low Privacy where all transactions are visible to anyone

87
New cards

Transparency vs. Data Privacy for Permissioned Blockchain

Controlled Transparency & Privacy where only authorized participants can view and verify transactions. The level of transparency can be tailored to meet the needs of the organization - certain data might be visible only to specific participants, while other data might be accessible to a broader group. In a supply chain blockchain, only the companies involved in the supply chain might have access to the transaction details, while the public might only see aggregated data.

88
New cards

Participant Privacy - Public Blockchain

High – participants are anonymous, using a generic ID

89
New cards

Participant Privacy - Permissioned Blockchain

Low – participants are permissioned and more likely to be known

90
New cards

Efficiency - Public Blockchain

Low efficiency where consensus validation  can consume lots of energy (especially for proof of work) and take several or more minutes.

91
New cards

Efficiency - Permissioned Blockchain

High efficiency where participant-agreed-to validation approaches can reduce energy and time requirements

92
New cards

Use Cases - Public Blockchain

Applications where trade on a public blockchain platforms ensures a wide audience, market liquidity, and greater trust e.g., Cryptocurrency and publicly traded NFTs (i.e., most NFTs)

93
New cards

Use Cases - Permissioned Blockchain

Applications where all or some data must be kept private (accessible by only authorized parties) for competitive or regulatory reasons e.g., Supply Chain, Healthcare/HIPPA, Government, and certain banking applications.

94
New cards

How does NFTs ensure authenticity and traceability of physical artwork? (6 reasons)

  1. Digital Representation

  2. Unique Identifiers

  3. Smart Contracts

  4. Unlockable Content

  5. Third-Party Verification

95
New cards

Conventional Supply Chain Challenges

Typically designed for information exchange & visibility between two parties vs. all parties. This approach:

  • introduces blind spots for all parties

  • creates inefficiencies

  • Is error-prone

  • Is non-secure platform

96
New cards

Supply Chain Benefits - Blockchain General Benefits

  1. Efficiency and Automation:

  • Smart Contracts: Automate processes such as payments, order fulfillment, and inventory management, reducing the need for intermediaries and speeding up transactions.

  • Streamlined Operations: By providing a single source of truth, permissioned blockchains reduce the likelihood of errors and discrepancies, leading to more efficient operations.

  1. Improved Traceability and Transparency:

  • End-to-End Visibility: Track products from origin to destination, ensuring that all steps in the supply chain are visible and verifiable by authorized participants.

  • Auditability: Maintain an immutable record of all transactions, making it easier to audit and verify the supply chain processes.

  1. Cost Savings:

  • Reduced Intermediaries: Lower transaction costs by eliminating the need for intermediaries.

  • Efficient Inventory Management: Better visibility and traceability can lead to more efficient inventory management, reducing waste and overstocking.

97
New cards

Supply Chain Benefits - Permissioned Blockchain Specific Benefits

  1. Privacy and Confidentiality:

  • Controlled Access: Only authorized participants can access the blockchain, ensuring that sensitive information, such as pricing and supplier details, remains confidential.

  • Data Security: Permissioned blockchains provide a secure environment where data is protected from unauthorized access and tampering.

  1. Enhanced Control:

  • Governance: Organizations can establish governance rules to control who can join the network and what actions they can perform. This ensures that only trusted parties are involved.

  • Customizable Permissions: Different levels of access can be granted to different participants, allowing for tailored data visibility and interaction.