Blockchain Technology

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 96

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

97 Terms

1

Blockchain

A database in the form of a distributed ledger that uses cryptography to secure any kind of information

New cards
2

Centralized Ledgers

Ledgers managed by a single trusted authority.

New cards
3

Distributed Ledgers

Ledgers without a central authority, using consensus because as transactions are added, they are verified using a consensus protocol such as Proof of Work

New cards
4

Consensus Protocols

Methods for achieving agreement about the state of data in the ledger. The consensus protocol runs each time a new transaction is added.

New cards
5

Proof of Work

The original consensus approach but requires an intensive energy and competition among miners.

New cards
6

Proof of Stake

Validators are selected randomly to confirm transactions and validate block information, consuming far less energy.

New cards
7

Hash

Mathematical function condensing data into fixed size and length

New cards
8

Immutable

Unchangeable nature of data in blockchain.

New cards
9

Non-Fungible Token (NFT)

Unique digital identifier certifying ownership of digital files - artworks, photos, videos and audio.

New cards
10

Fungible Assets

Assets that are interchangeable and identical.

New cards
11

Digital Twin

Digital representation/ version of a physical artwork - high-resolution photograph or scan that is then minted as an NFT on a blockchain platform

New cards
12

Ledger

A record of transactions in blockchain.

New cards
13

Robotic Process Automation (RPA)

Technology for automating repetitive tasks.

New cards
14

Artificial Intelligence (AI)

Simulation of human intelligence in machines.

New cards
15

Data Analytics

Process of analyzing data to extract insights.

New cards
16

Data Visualization

Graphical representation of data for easier understanding.

New cards
17

Internet of Things (IoT)

Network of interconnected devices communicating data.

New cards
18

App Design

Process of creating user-friendly applications.

New cards
19

Enterprise IT

Information technology solutions for business operations.

New cards
20

Big Data

Large volumes of data analyzed for patterns.

New cards
21

Cybersecurity

Protection of systems from digital attacks.

New cards
22

Blockchain Applications

Software built on blockchain for various uses.

New cards
23

Hyperledger Fabric

Permissioned blockchain created by the Hyperledger Consortium to help develop DLT for a variety of business applications.

New cards
24

NFT

Non-fungible token representing unique digital assets.

New cards
25

Unique Identifiers

Tags like QR codes linking art to NFTs, providing a way to verify the connection between the physical piece and its digital counterpart.

New cards
26

Smart Contracts

Automated agreements detailing ownership and royalties - processes such as pmts, order fulfillment, and inventory management, reducing the need for intermediaries and speeding up transactions

New cards
27

Unlockable Content

Additional benefits provided with certain NFTs - certificate of authenticity/ claim code through each transaction.

New cards
28

Third-Party Verification

Authentication services linking art and NFTs.

New cards
29

Public Blockchain

Open ledger accessible to anyone for transactions.

New cards
30

Permissioned Blockchain

Blockchain controlled by a central authority with restricted access

New cards
31

Supply Chain Challenges

Issues in traditional supply chains like inefficiency.

New cards
32

End-to-End Visibility

Complete tracking of products throughout the supply chain.

New cards
33

Auditability

Immutable transaction records for verification purposes.

New cards
34

Cost Savings

Reduced expenses from eliminating intermediaries.

New cards
35

Controlled Access

Limited blockchain access to authorized participants.

New cards
36

Data Security

Protection against unauthorized access in blockchains.

New cards
37

Governance

Rules controlling participant actions in the network.

New cards
38

Customizable Permissions

Tailored access levels for different blockchain users.

New cards
39

IBM Food Trust

Blockchain platform enhancing food supply chain transparency.

New cards
40

End-to-End Traceability

Tracking food products from origin to consumer.

New cards
41

Food Safety

Improved safety through transparent supply chain records.

New cards
42

Reduced Food Waste

Optimized inventory management minimizing waste.

New cards
43

Consumer Trust

Increased confidence through accessible product information.

New cards
44

Regulatory Compliance

Meeting legal requirements with verifiable records.

New cards
45

Pharmaceutical Supply Chain

Tracking drug production to prevent counterfeiting.

New cards
46

Temperature Assurance Packaging

Packaging ensuring safe temperature for pharmaceuticals.

New cards
47

Collaboration

Secure data sharing among supply chain participants.

New cards
48

Counterfeiting Prevention

Transparent records prevent counterfeit drugs.

New cards
49

Operational Efficiency

Automation reduces delays and errors.

New cards
50

Farm Data Recording

Farmers log growth, fertilizer, and harvest details.

New cards
51

Coffee Processing Data

Includes processing methods and fermentation details.

New cards
52

Manufacturer Information

Records packaging and production details.

New cards
53

Government Certification

Tracks certificate numbers and issue dates.

New cards
54

Retailer Data

Logs arrival dates, product types, and transactions.

New cards
55

End Consumer Access

Consumers view traceability via web/mobile apps.

New cards
56

TradeLens

Blockchain project for global shipping revolution.

New cards
57

Everledger

Tracks diamond provenance for ethical sourcing.

New cards
58

Aura Blockchain Consortium

Permissioned Blockchain that is secured by ConsenSys Technology that provides a secure and transparent way to track luxury goods for authenticity and sustainability.

New cards
59

Digital Product Passport

Provides product authenticity and lifecycle info.

New cards
60

NFC Chips

Enable contactless communication for product tracking.

New cards
61

UHF RFID

Types of radio technology for tracking goods over distances.

New cards
62

Stakeholders

Participants motivated by shared interests in blockchain.

New cards
63

Traceability Benefits

Proof of authenticity and responsible sourcing.

New cards
64

Transaction Fee History

Records fees associated with blockchain transactions.

New cards
65

Energy Usage Risks

High energy consumption in proof-of-work systems.

New cards
66

Collusion Risk

51% attack can manipulate blockchain ledgers.

New cards
67

Permanence of Transactions

Difficult to correct errors in immutable ledgers.

New cards
68

Transparency Issues

Anonymity can facilitate illicit activities.

New cards
69

Regulatory Concerns

Uncertainty about blockchain technology regulations.

New cards
70

FTX Bankruptcy

Highlighted failures in corporate controls and transparency.

New cards
71

Blockchain Job Opportunities

Non-technical roles needed for strategic guidance.

New cards
72

Public vs Permissioned Blockchains

Choice depends on intended application.

New cards
73

Blockchain and IoT

Synergistic potential in supply chain applications.

New cards
74

What Proofs are needed in Public Blockchains?

Proof of Work and Proof of State

New cards
75

What proof is needed in Permissioned Blockchains?

Consensus Protocol - Reached through various planned processes involving a pre-selected set of validators - consumes far less energy.

New cards
76

How does Blockchain Technology Work?

  1. A user requests for a transaction

  2. The transaction is broadcasted to a peer to peer (P2P) network that consists of Computers (nodes)

  3. The Network of Nodes uses known algorithms to validate the transaction & Users’ status

  4. A verified transaction can involve Cryptocurrency, Contracts, Records, or other information

  5. The transaction is combined with other transactions and after verification, it creates a new Block of data for the ledger

  6. The new Block is added to the existing Blockchain which is added to existing blockchain which is permanent and unalterable.

  7. The transaction gets verified & executed.

New cards
77

When is it useful to use a Blockchain

  1. The need to share data

  2. Multiple Writers

  3. Absence of Trust

  4. Transaction based interaction

  5. Disintermediation creates value

New cards
78

Proof of Authority

Proof of Authority (PoA) is a blockchain consensus mechanism where a small group of trusted and verified entities (validators) are given the authority to validate transactions and create new blocks in permissioned blockchains

New cards
79

Common use of NFTs

Recording ownership of unique digital assets such as artworks, music, videos, and collectibles. NFTs serve as proof of authenticity and ownership on the blockchain, allowing creators to monetize their work. They can also include royalties for future sales, ensuring that artists receive compensation over time.

New cards
80

Consideration for Public Blockchain

Popular for Public Use where transparency and immutability are priority

New cards
81

Consideration for Permissioned Blockchain

Popular for enterprise, consortium, and supply chain use where privacy and efficiency is a priority

New cards
82

Control for Public Blockchain

Decentralized where no central authority controls the network.

New cards
83

Authority

A company or group of companies acting together (consortium)

New cards
84

Immutability/ Security for Public Blockchain

Strong Immutability designed to be highly immutable. Once data is added to the blockchain, it is extremely difficult to alter because it would require a consensus from a majority (51%) of network participants.

New cards
85

Immutability/ Security for Permissioned Blockchain

Controlled Immutability where the level of immutability can be controlled by the organization/ consortium managing the blockchain — authorized participants might have the ability to modify or delete data if necessary

New cards
86

Transparency vs. Data Privacy for Public Blockchain

Full Transparency/Low Privacy where all transactions are visible to anyone

New cards
87

Transparency vs. Data Privacy for Permissioned Blockchain

Controlled Transparency & Privacy where only authorized participants can view and verify transactions. The level of transparency can be tailored to meet the needs of the organization - certain data might be visible only to specific participants, while other data might be accessible to a broader group. In a supply chain blockchain, only the companies involved in the supply chain might have access to the transaction details, while the public might only see aggregated data.

New cards
88

Participant Privacy - Public Blockchain

High – participants are anonymous, using a generic ID

New cards
89

Participant Privacy - Permissioned Blockchain

Low – participants are permissioned and more likely to be known

New cards
90

Efficiency - Public Blockchain

Low efficiency where consensus validation  can consume lots of energy (especially for proof of work) and take several or more minutes.

New cards
91

Efficiency - Permissioned Blockchain

High efficiency where participant-agreed-to validation approaches can reduce energy and time requirements

New cards
92

Use Cases - Public Blockchain

Applications where trade on a public blockchain platforms ensures a wide audience, market liquidity, and greater trust e.g., Cryptocurrency and publicly traded NFTs (i.e., most NFTs)

New cards
93

Use Cases - Permissioned Blockchain

Applications where all or some data must be kept private (accessible by only authorized parties) for competitive or regulatory reasons e.g., Supply Chain, Healthcare/HIPPA, Government, and certain banking applications.

New cards
94

How does NFTs ensure authenticity and traceability of physical artwork? (6 reasons)

  1. Digital Representation

  2. Unique Identifiers

  3. Smart Contracts

  4. Unlockable Content

  5. Third-Party Verification

New cards
95

Conventional Supply Chain Challenges

Typically designed for information exchange & visibility between two parties vs. all parties. This approach:

  • introduces blind spots for all parties

  • creates inefficiencies

  • Is error-prone

  • Is non-secure platform

New cards
96

Supply Chain Benefits - Blockchain General Benefits

  1. Efficiency and Automation:

  • Smart Contracts: Automate processes such as payments, order fulfillment, and inventory management, reducing the need for intermediaries and speeding up transactions.

  • Streamlined Operations: By providing a single source of truth, permissioned blockchains reduce the likelihood of errors and discrepancies, leading to more efficient operations.

  1. Improved Traceability and Transparency:

  • End-to-End Visibility: Track products from origin to destination, ensuring that all steps in the supply chain are visible and verifiable by authorized participants.

  • Auditability: Maintain an immutable record of all transactions, making it easier to audit and verify the supply chain processes.

  1. Cost Savings:

  • Reduced Intermediaries: Lower transaction costs by eliminating the need for intermediaries.

  • Efficient Inventory Management: Better visibility and traceability can lead to more efficient inventory management, reducing waste and overstocking.

New cards
97

Supply Chain Benefits - Permissioned Blockchain Specific Benefits

  1. Privacy and Confidentiality:

  • Controlled Access: Only authorized participants can access the blockchain, ensuring that sensitive information, such as pricing and supplier details, remains confidential.

  • Data Security: Permissioned blockchains provide a secure environment where data is protected from unauthorized access and tampering.

  1. Enhanced Control:

  • Governance: Organizations can establish governance rules to control who can join the network and what actions they can perform. This ensures that only trusted parties are involved.

  • Customizable Permissions: Different levels of access can be granted to different participants, allowing for tailored data visibility and interaction.

New cards

Explore top notes

note Note
studied byStudied by 1 person
62 days ago
5.0(1)
note Note
studied byStudied by 8 people
749 days ago
5.0(1)
note Note
studied byStudied by 4 people
837 days ago
5.0(1)
note Note
studied byStudied by 517 people
167 days ago
4.5(2)
note Note
studied byStudied by 55 people
707 days ago
5.0(1)
note Note
studied byStudied by 17 people
938 days ago
5.0(1)
note Note
studied byStudied by 2466 people
702 days ago
5.0(7)

Explore top flashcards

flashcards Flashcard (78)
studied byStudied by 23 people
292 days ago
5.0(1)
flashcards Flashcard (21)
studied byStudied by 210 people
679 days ago
5.0(4)
flashcards Flashcard (81)
studied byStudied by 78 people
550 days ago
5.0(2)
flashcards Flashcard (34)
studied byStudied by 58 people
562 days ago
5.0(2)
flashcards Flashcard (33)
studied byStudied by 13 people
839 days ago
5.0(2)
flashcards Flashcard (104)
studied byStudied by 8 people
33 days ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 21 people
847 days ago
5.0(1)
flashcards Flashcard (70)
studied byStudied by 248 people
44 days ago
5.0(1)
robot