79
IPVC AVATAR - 1 - VALUE INTERNET STANDARD PROTOCOL BASED ON THE Big Calculation ERA White Paper Avatar kindling Plan Intelligent Property Value Chain IPVC

IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 1 -

VALUE INTERNET STANDARD PROTOCOL BASED ON THE Big Calculation ERA

White Paper

Avatar kindling Plan

Intelligent Property Value Chain

IPVC

Page 2: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 2 -

CONTENTS

01 Project Introduction

02 Project Introductionu Project Descriptionu Project conceptu Solutionu LOGO meaning

03 Big Calculation Era

Page 3: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 2 -

06 IPVC Business Ecology

04 IPVC Value confirmation agreement

u IPVC 's basic hardware chain layeru IPVC distributed management systemu Innovative application of IPVC - distributed programming catu Resonance source communityu IPVC multi-dimensional public chain technology framework

05 IPVC Business model

07 Token Issue

08 Disclaimer

CONTENTS

Page 4: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 3 -

LIFE AND INTEREST, SPIRIT, ETERNAL LIFE

LIVE FOR EVER AND EVER

Page 5: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 5 -

Introduction

IPVC

IPVC

Page 6: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 6 -

In Indian mythology, AVATAR refers to the cloak of material in existence in the world, in order to

participate in the creation of the Creator. In the language of Buddhism, Avatar refers to the Buddha

nature in human nature; in the language of God and Christianity, Avatar is the divinity in human nature.

If you do not use any religious language to explain Avatar, it means: a person who lives in complete

awareness; a person who deliberately, intentionally, and deliberately lives; a person who gets rid of

mental disorders and beliefs; how to achieve a discovery One's own dreams and the mission of life; one

who thinks about new possibilities and achievements; one who gets spiritual awakening.

Jobs once said: You can't see the future from this point; only when you look back, you will find the

relationship between them. So, believe that these points will be connected sooner or later. You must trust

something – intuition, destiny, life, and karma.

The principle of positive and negative forces is the outer garment of matter. In the language of

Buddhism, no matter how the universe is disillusioned, the karma is always sustainable, just like the

financial accounting book. The power of nature is like the stylus judge, the world law is just like this.

Joseph Li said: With the understanding of a devout Catholic who contains been engaged in computer

algorithm research for 20 years, blockchain technology does not exist in the dimension of world law. It

comes from the awakening of divinity.

From the day of the creation of the world block, it is like the light of the divine light buried in the earth,

when the species of life breaks through the Earth, it can resist any attack - an encryption algorithm that is

strong enough or even impossible to crack.

The sequence of cell genes in the division of life, the data is permanently recorded in the roots of the

huge tree of life, just as the irreversible karma hovered over the valley of Shiva, the eternal block book

system.

The species of life unleashes the energy tree of the power of the wild, the forest grows and thrives,

and the unique way of life reproduction - blockchain fork mechanism.

The emergence of intelligent life is a chance of great probability. The tree of wisdom--the birth of

intelligent contract is the inevitable life of the blockchain. The species of life in different blocks are derived

to the roots, and the wisdom of humanity shines.

AVATAR is the tree of eternal.

Page 7: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR Humanity following the agricultural era and the industrial ageAnd the Internet ageAfter that, I am about

to enterThe era of Big Calculation. The digitization of resources and the use of blockchain technology to form

digital assets are the only way for the digital economy in the era of Big Calculation. However, as the digital

economy and value Internet, only blockchain technologyInsufficient in fact, in addition to technology, the

blockchain contains brought us the ideas of distributed economy and economics, and it contains been

produced under the influence of this idea.Distributed chain storage, Smart Token and other protocols and

technologies, furtherMake up for the limitations of the blockchainSex.

In the era of Big Calculation, the individual's power will be fully exerted, distributed organizations and

distributed commerce will emerge, and finally realize the digital ecology with distributed collaboration as the

main form.

The Resonance Community calls this digital ecology the AVATAR system - "Digital Heaven and Earth":

a digital asset created by distributed, accurate big data technology that shares the value of creating value -

"Digital Earth" The Smart Token is used as an incentive mechanism for all relevant large-scale ecological

organizations--"Vatican Heaven"; distributed collaboration, the distributed organization ecology of the

intelligent network---"human network".

The distributed collaboration of digital forms contains rarely been realized since the concept was

proposed. The fundamental reason is mainly due to the lack of content-oriented communication and the

directed communication of resources, which contains caused the inefficiency of ineffective information in the

network world to become the norm, and the waste of a large amount of excess resources in the real world.

This makes the digital economy specific business level, especially the transaction, cooperation and other

aspects still rely too much on human participation.,Seriously hindered the development of the digital

economy.

In this regard, the top blockchain geeks and experts from the resonance source community have

developed the IPVC protocol, the value Internet protocol for the era of Big Calculation, to effectively solve

these problems, enabling content to be distributed, resources to be communicated, and distributed.

Collaboration contains been effectively implemented, leading the evolution of the digital economy to the

general economy.

- 7 -

Page 8: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 8 -

Project Introduction

IPVC

IPVC

Page 9: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 9 -

The fourth industrial revolution essentially opened the chapter of the digital economy in the era of Big

Calculation. Intellectual elements and real economy industrial resources are digitized and displayed in IP

form to form IP value chain (Intellectual Property Value)Chain) is the foundation of the digital economy.

The intellectual element and the real economy industrial resources are digitized and displayed in the

form of IP to form the IP value chain, which is the foundation of the digital economy. The digitization of

intellectual assets such as IP intellectual property is the core value asset of the era of Big Calculation.

After the agricultural economy and industrial economy, the digital economy contains also been widely

recognized by the society. The digitization of user resources, the digitization of industrial resources, the

digitization of content dissemination, the digitization of brand communication, and the network red V and

C can all be attributed to IP, and will also become the core assets of the digital economy.

The use of blockchain technology to reconstruct digital assets into digital assets is the only way for

the digital economy in the era of Big Calculation. However, as a digital economy and value Internet, only

blockchain technology is not enough. In addition to technology, the blockchain brings us the ideas of

distributed economy and generalized economy. Under the influence of this idea, it contains Protocols and

technologies such as distributed chain storage further compensate for the limitations of the blockchain.

The blockchain mainly realizes value exchange through features such as tamper resistance and double-

flower protection, while distributed chain storage realizes distributed storage through features such as

content addressing. At the same time, in the digital economy of the era of Big Calculation, the individual's

strength will be fully exerted, distributed organizations and distributed commerce will emerge, and finally

realize the digital ecology with distributed collaboration as the main form.

Among them, the “Digital Earth” composed of accurate big data (person, organization,

product/service) is used as the digital asset in which the value can be shared, and the series of related

certificates is used as the incentive mechanism for each relevant size and ecology. The technology of

identification proves the right to form a digital ecology of “Heaven and Earth”. (Day: a hybrid incentive

mechanism for machine consensus and humanity consensus; land: Digital Earth based on affirmative

data DNA, ecological digital assets; people: distributed collaboration, human networking).

The distributed collaboration of digital forms contains rarely been realized since the concept was

proposed. The fundamental reason is mainly due to the lack of content-oriented communication and the

directed communication of resources, which contains caused the inefficiency of ineffective information in

the network world to become the norm, and the waste of a large amount of excess resources in the real

world. This makes the digital economy still rely too much on people's participation in specific business

aspects, especially in transactions and cooperation.

u One: Project Introduction

Page 10: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

the aboveThe phenomenon contains seriously hampered the development of the digital economy.In

case the solution is not implemented,It is difficult to fundamentally reduce costs and improve efficiency. In

this regard, the Resonance Community contains proposed IPVC (IP Value Chain) and IPVC protocols to

solve the current problems, while international blockchains and big data experts from the United States,

Taiwan and other places have further proposed large calculations based on the former two. As the

cornerstone of the overall solution, the content can be targeted, the resources can be communicated, the

deep learning API interface to achieve adaptive, evolving smart contracts can be effectively realized for

distributed collaboration.

More important according to the role of IPThe characteristics of the digital economy in the era of Big

Calculation,C2B's large-scale personalized customization becomes inevitable。 Resonance source team

willIP value chain upgrade to value chain, to create key components of large computing technology: new

blockchain value chain, neural network engine, artificial intelligence, deep learning and new distributed data

perpetual technology. Finally, the IP node is the coreUsing new blockchain technology to build“Content /

Resources /Trustworthy/intelligent/Value communication“Trusted network system——IP Value Chain

( IPVC )。

Resonance source community will buildPeople networking with people as the main node,This is IPVC

Infrastructure。 The human IP node will be the digital avatar (Avatar) of the corresponding spiritual tree. The

static description data, relationship data, behavior data, reputation data, credit data and its subsidiary

resources of the node are stored in the distributed network in the form of data DNA ( Such as distributed

chain storage), and further asset storage in the blockchain to form a trusted digital asset. People based on

their relationshipThe degree of trust in the periphery naturally forms a chain of trust relationships.Tracing and

confirming rights through blockchain and Smart Token technology, under the premise of protecting the rights

of personal digital assets and ensuring the privacy rights in the relationship network,Communicate and

communicate within a chain of trust relationshipsTo form a credibleHuman network。

this willCan give full play to the important role and subjective initiative of the digital economy in the era of

Big Calculation, help them findPersonality endowmentBlooming lifePromote the digital economy, digital

ecologyAnd digital societyEvolution and development.- 10

u Second: The Project Vision

u Third: The Solution

Page 11: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 11

1. IPVC is built on the core of consumers and consumers, so that the network's native support is people-

centered, organization-centered, product/service-centric, content/resource-centric, called IP, itself. Model-

based, object-oriented; rather than device-centric, object-centric static ID clustering;

2. Applications built on IPVC are easy to connect digital demand, trading power, productivity, and

production materials in a flexible production relationship to adapt to changing needs and patterns;

3, IPVC can fully exert the individual value of people, easily build a distributed trusted collaborative

network, and release the dividend of intellectual assets;

4. IPVC can support the formation of high quality and accurate big data.

5. IPVC , as the basic network of the digital economy in the era of Big Calculation, itself needs to design

the corresponding logical layer protocol, so that the applications based on it can effectively coordinate

and share resources/assets/data;

6, IPVC can easily implement different types of incentives;

7. IPVC can realize privacy grading and digital asset identification based on different circle groups.

Using the digital neural network model based on blockchain technology and the privacy security

model to construct the IP value chain ( IPVC ), the real world is isomorphic into the digital world, and the

node-to-node relationship is highly summarized—the real-world trusted digital mapping . Digital nodes

can be divided into three categories: people, organizations, products/services, using multidimensional

arrays to represent dynamic scores such as credibility/digital value, and distributed chain storage.(such

as IPFS、Yotta)To store related resources. Different nodes have different trust relationships and

different trust levels, which constitute a trust relationship chain and different privacy levels. Different

privacy levels have different content levels and value levels. The privacy security model can effectively

address content resource communication requirements and Conflicting privacy requirements. The digital

mapping model is like a real-time, multi-wall and channel set up in a specific use room to isolate multi-

dimensional space.

Natural people, organizations, and products/services can apply for isomorphic digital mapping of IP

nodes in the digital world and are assigned unique node IDs. Each node contains its own knowledge

traceability map and corresponding semantic descriptions according to the different identities given by the

network in the ancillary content and resources.

u The Role of The IPVC Value Chain Solution:

Page 12: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 12

u Four: LOGO Curtural Innovation Back Earth

In Indian mythology, AVATAR refers to the force of the heart to voluntarily put on the coat of matter,

creating the world in the name of karma. In Buddhism, Avatar refers to the Buddha nature in human

nature; in the theory of God and Christianity, Avatar is the divinity in human nature.

The law of the world is a common cause, just like the community of destiny. Valuable lotus eight

petals, rounds of reincarnation, manas of the seventh consciousness, end of eighth consciousness

cosmic truth. The six foundations are the source of life, the end of the seven consciousness is the eye of

wisdom, and the eighth consciousness of Arayah is the power of the spirit. The combination of triple purity

means detaching of the three divisions of the universe. Curse wheels means eight kinds of

consciousness are eternal

The tree of the spirit is the meditation of the enlightened,eighth consciousness“Alaya”means the awakening is complete and the sacred ones.

The tree of life is in the shape of a lotus .It means the “God came to earth”.The source of everything buried in the soil.

The tree of wisdom is the shape of the cross and infinity, symbolizing all over the world is “Wisdom access”Even endless。

Tree of Spiritual

Tree of Life

Tree of wisdom

Page 13: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 13

Big Calculation Era

IPVC

IPVC

Page 14: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 14

1.1 Trends of the times Big calculation is the inevitable result of the times

The concept of Big Calculation was proposed by technology executives such as Microsoft and Google

in 2012.。 The emergence of cloud computing, machine intelligence and big data contains greatly

expanded the application of computingDemand, large and complex data processing requires a large

number of core large-scale workloads, usually in the hundreds or thousands of cores. The emergence of

blockchain technology is the beginning of the calculation of qualitative changes, so that computing contains

the ability to redefine value, determine value and transfer value. At the same time, intelligentBusiness

development, internet of thingsLarge-scale application、Big data and cloud storageAppeared

untilBlockchain revolutionBorn. The inevitable result of the development of the era of computers and the

Internet---big calculations came into being.

1.1.1 Development needs

Wide range of applications

Big Calculation is the one-stop solution for the future intelligent digital economy (Intelligent Digital

Economy One Stop Solution). Its emergence is based on the following major application claims:Image

rendering, fluid dynamics, financial risk modeling, oil exploration, drug design, and engineering stress

analysis。

1.1.2 Typical features of large computing applications

1、Distributed operation:Work can be split into discrete tasks that can run simultaneously across

multiple cores;

2、Low cost and energy consumption: Large calculations receive limited work tasks, receive input,

perform processing operations, and then generate output. The running time of the entire application (from

minutes to days) is limited. The common pattern is to suddenly provision a large number of cores, and the

number of cores is reduced to zero after the application is completed. At the same time, the application

does not need to run around the clock, which greatly saves energy consumption;

4,、intelligent result exchange: For some applications, tasks are independent and can run in parallel. In

other cases, tasks are tightly coupled, which means they must interact or exchange intermediate results;

5、The calculation is controllable: to use different sizes of calculations according to the workload.

1.1.3 The advantages of big calculations:

1、High performance with "easy parallel" processing;

2、Can use hundreds or thousands of computer cores to solve large problems faster;

3、Access to high-performance dedicated hardware through a dedicated network;

4、The amount of calculation can be pre-configured according to the needs of the work.

1、Big Calculation Era

Page 15: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

1.1.4 Great Significance

"Big Calculation" is based on the value blockchain Internet, using smart value computing applications

in value demand areas, integrating IoT and big data, creating new value, providing users with unlimited

computing power and unlimited computing resources. Free-transaction, self-operating and automatically

expanding decentralized value application services.

The birth of Big Calculation can solve the bottlenecks and limitations of data integration, technology

convergence and value exchange, so that all current Internet data and technology applications can be

upgraded to higher dimensions, improve efficiency and reduce costs. All unnecessary production links,

management links, distribution links, transportation links, and rooms are central nodes in the middle of

compression. The use of intelligent algorithms can save a lot of time cost of value exchange. By means of

blockchain, the terminal equipment, network bandwidth, computing resources, data islands, technical

barriers and intelligent algorithms on the Internet are integrated into the large computing ecosystem to

empower the intelligent digital economy industry chain and reconstruct existing ones. Economic structure

and structure.

1.1.5 Companies in the era of Big Calculation

Decision layer: Business Intelligence Big Data

Management: Business Intelligence Algorithm

Executive layer: robot or AI artificial intelligence

Page 16: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 16

Before the advent of Big Calculation, the human network was constantly proposed by different people

from all walks of life. However, because the economic, social, digital/model, and technology/protocols were

not effectively integrated, it was difficult to reach a general consensus and ultimately could not be realized.

In this regard, we use the neuron integrity value chain model and privacy security model to construct

the IP value chain (IPV).C), more universal than the human network. IPVC forms a chain of trust

relationships between trusted IP nodes, and the content and resources are directed to secure flow

(propagation and communication) within the chain of trust relationships, and further complete distributed

collaboration and corresponding value exchange.

The neuron integrity value chain model synthesizes the real world into a digital world, with a high

degree of generalization of the relationship between nodes and nodes. The nodes are divided into three

categories: person, organization, and product/service. The multi-dimensional array is used to represent the

two types of dynamic evaluation points of integrity/value, and the distributed chain storage protocol is used

to store related resources. The nodes have different trust relationships and different trust levels, which

constitute a trust relationship chain and different privacy levels. Different content levels and value levels of

different privacy levels are also different. This privacy security model effectively solves the content

resource dissemination. The problem of conflicting needs and privacy needs. In real life, we can assume

that a specific use room contains multiple doors to isolate multiple spaces.

Everyone, organization, and product/service can apply for a homogeneous IP node in the digital world

and be given a unique node ID. Each efficient node contains its own knowledge map semantic description

in the subsidiary content and resources according to the different identity of the node (divided into four

categories: content supply and demand and resource supply and demand).

Each IP node functions as a cloud server node, a cloud relay node, and a cloud storage node. The

cloud storage node uses distributed chain storage to store content and resources in a distributed manner.

The cloud servo service provides information synchronization between IP nodes and various types of

terminals and APP/DAPP applications of the corresponding owners. The cloud servo service

communicates with the cloud relay service. The communication and communication between the IP nodes

are completed, and the user sends a demand propagation instruction to the cloud servo node through the

DAPP, and the cloud servo node is directionally propagated to the target cloud servo node according to the

required knowledge map, and only the cloud servo node using the same knowledge map template and

matching the supply and demand is used. In order to receive the demand and provide related resources,

the cloud relay node in the trust relationship chain needs to trust the pre-relay node at the same time and

“willing” to relay to ensure the spread of demand. It should be noted here that the relay of the relay node

may be performed according to a prior setting or may be performed by the user after the DAPP operation

corresponding to the node.

1.2 People In The Era of Big Calculation

Page 17: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 17

The above services implement the partial proxy function of the IP node to the affiliation (or organization), which combines new productivity, production materials, and production relationships. Through the targeted dissemination of content and the directed communication of resources, the digital form of distributed collaboration is completed, making full use of the resources of each node's affiliation/organization, reducing human intervention and participation, reducing costs and improving efficiency. In the digital economy of the intellectual age, the new productivity is AI and HI (human intelligence HI, far from being fully utilized), the new production data is big data, and the new production relationship is blockchain. In IPVC , the IPCP protocol is used to complete the identity management of the IP node, the IP node's propagation communication and the IP node's resource matching function, and the IP node and its subsidiary resources are stored based on the distributed chain storage protocol, and the IP node is completed based on the cross-chain protocol. Exchange of digital assets. The IPVC protocol, distributed chain storage, and cross-chain protocols form the basic protocol of IPVC and become the basis for realizing the digital economy to build a digital ecosystem.

productive forces

Production materials

Relations of production

Economic characteristics

Intellectual age

HI (senior, expert, think tank, intellectual property)

Project digitization

Distributed collaboration

High risk, high return, future revenue capital / talent / resources jointly

driven

Digital economy

AI/HI collaboration tool

Accurate big data, data

assets

Blockchain, pass model

Driving one, two, three production into

the real economy

IPVC implemen

tation

IP node-associated application

(human or AI driver)

Content and resources

attached to the IP node

IP node trust relationship

chain

Linking demand, trading power,

productivity, and production materials

with flexible production

relationships

TakePractical example: Networking the entrepreneurial network of 4,000 mentors and their

counseling entrepreneurs in YBC, the largest entrepreneurial support organization in China. Entrepreneur,

entrepreneurship projects, entrepreneurial resources, mentor resources, mentor resources, mentoring

service resources, and mentoring industry resources are digitized according to the above methods, and

the entrepreneurial knowledge map is defined. On this basis, the aspects of Haier’s foreign exchange

for five years are combined. Forming a sea-breaking chain——The new collaborative innovation

ecosystem and the truly co-founded platform create a multi-layered eco-tool from Idea to IPO.

1.3 New Productivity In The Era of Big Calculation

Page 18: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 18

IPVC IPVC Value Confirmation Ggreement

Page 19: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 19

In the era of Big Calculation, IPVC A basic protocol is needed to quantify and validate the value of data between IP nodes for accurate transmission and communication. The protocol is based on defining identity relationships and descriptive resources, and implementing content and resources through incentive layers and smart contracts. Securely directed propagation within the value relationship chain, ie IPVC (Intellectual PropertyValue Confirmation) agreement. The emergence of the IPVC protocol enables various IP nodes, terminals, and APP/DAPP to openly collaborate, share data, and distribute digital assets. At the same time, it reduces human participation and intervention in the process to achieve (semi) automated operation.

2.1 Semantics, knowledge map, authority relationship chain and governance mechanism Semantics, knowledge maps, privilege relationship chains, and governance mechanisms are the foundation of the IPVC protocol, and are related to organizational consensus, supply and demand matching, and privilege levels. The IPVC protocol borrows the existing achievements of the current knowledge map and applies the new blockchain technology to promote the standardization and continuous evolution of the knowledge map templates of people and organizations. Simultaneously, IPVC Defined a supply and demand map template, creating a new blockchain multiple confirmation mechanism, let IPVC Users are willing to participate in and improve the knowledge map of their respective fields and obtain corresponding data value rewards. The knowledge maps involved in the IPVC protocol and the IPVC value chain include: Chinese and English basic knowledge maps, domain knowledge maps, identity and relationship knowledge maps, supply and demand description knowledge maps, and knowledge map trees (knowledge maps of knowledge map templates).

2.2 Protocol implementation This protocol family includes the identity relationship layer, the resource description layer, the authority relationship and the governance mechanism layer, and the communication communication layer. The identity relationship layer and the resource description layer are the basis of the communication and communication layer.2.2.1 Identity relationship layerl ID and identity, registration ID, acquisition ID, definition of the same ID, different identity, identity in

the knowledge map defined by the system, can be inherited;l Identity and resources, resource types are related to identity, that is, resources are related to identity

and domain knowledge maps;l Identity and relationship, the same identity can have multiple relationships with different people;l Privacy security, relying on a particular relationship with identity and others is accompanied by a

trust relationship, and multiple levels of resource outlines can be set for resources of the corresponding identity. This involves relationship and privacy, relationship privacy and resource dissemination, and dissemination of relays;

l Synchronization, involves synchronization with the application, synchronization with the device, synchronization with the service node (AI proxy, knowledge map service node);

l Node supply and demand, describing the supply and demand knowledge map of the resource to which the node belongs;

2 IPVC Value Confirmation Agreement

Page 20: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 20

2.2.2 The resource description layer(Requires a domain-specific knowledge map service node to provide services, not within the IPVC protocol standard, to fully enjoy the existing knowledge map results and retain flexibility and scalability)l Resource storage and extraction, complete data storage and extraction of resources through

distributed chain storage;l Resource summary and privacy level, complete multi-level resource summary through a specific

domain knowledge map service node according to different privacy levels;l The resource knowledge map tree management forms a knowledge map for the knowledge map

template involved in the entire IPVC , and forms a special ID number or containsh value of the knowledge map template;

l Resource matching management, for the supply and demand of two nodes, the resources are matched by the same knowledge map template, and the corresponding values are returned;

2.2.3 Authority relationship and governance mechanism layer(Level of application blockchain grading technology)l Linear permission rule 1: The parent rights management sub-rights, the power to unconditionally

reclaim sub-rights;l Linear permission rule 2: The child applies for digital permission to the parent, and the parent

custom permission uses the scope;l Parallel permission rules: brother and brother subcontract different permissions, have full authority

through certain mechanisms;l Adaptive governance mechanism 1: There is no arbitrary account usage authority within a certain

period of time in the authority system, and the system will freeze all account permissions in the system in batches;

l Adaptive Governance Mechanism 2: A frozen account requires a certain incentive layer fee to be reactivated;

l Adaptive Governance Mechanism 3: Sub-rights can restrict parent authority by voting.

2.2.4 Communication layerThe sending node sends a certain data resource request to the directional node. After the relay node that is valid in the trust relationship chain propagates multiple times, a receiving node receives the request. After N times of communication, it determines that the data can be supplied and sent. The order message is acknowledged or rejected by the sending node.Task node type:A. Sending node: sending corresponding content, data and resources within the chain of trust

relationships, including supply, demand and corresponding permission mechanisms;B. Orientation node, receiving node: receiving corresponding content, data and resources within the

trust relationship, including supply, demand and corresponding permission mechanism;C. Relay node: Forwards the corresponding content, data and resources within the trust relationship

chain, including the supply, demand and corresponding permission mechanism; including the definition of the preceding node and subsequent nodes and the propagation rules;

u Value Chain Agreement in The Era of Big Calculation

Page 21: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 21

2.3 Task definition

A. Propagation task definition: The sending node specific identity sends a resource requirement to the

directional node, and carries the knowledge map ID of the corresponding requirement;

B. Relay task definition: After receiving the information of the previous node, the relay node

determines the process of the propagation policy according to the rules and permission rules;

C. The definition of the communication task: the sending node sends a certain resource request to the

directional node, carries the knowledge map ID of the corresponding demand, and the receiving

node feeds back its related resources to the sending node (AI/HI) to interact with it;

DReceiving task definition: After receiving the information, the directional node confirms that the task can

be received through the resource matching function of the resource description layer, and sends an

acknowledgement action to the sending node in the name of the receiving node;

ISRecognizing the task definition: After receiving the receiving task of the receiving node, the sending

node performs judgment (AI/HI) to send the acknowledgement action;

FRejecting the task definition: After receiving the receiving task of the receiving node, the sending node

performs a judgment (AI/HI) to send a reject action;

The IPVC value chain and IPVC protocol are important network foundations for large computing,

returning humans from device-based networks (PC Internet, mobile Internet, and various Internet of

Things) to the original, ie user-based human network, based on supply and demand IP. The value chain

(ie, IPVC , which includes the human network and networking with the corresponding organizations,

products/services), enables distributed collaboration of distributed organizations, distributed businesses,

and individuals to be realized, which will release huge individual energy, especially It is an individual's

relationship assets and intellectual assets, which produce nuclear fission and fusion effects through the

butterfly effect.

In addition, the value of the human network in project incubation. Further development, the open-loop

collaborative innovation ecosystem and the corresponding value closed loop will be born, and finally form

a credible digital ecology.

u Value Chain Agreement in The Era of Big Calculation

Page 22: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 22

IPVC Business Model IPVC

Page 23: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 23

Intelligent Property Value Chain ( IPVC ) is also known as the intelligent intellectual property value chain.

Its business system consists of four basic systems: the basic hardware chain layer, the distributed

management system, the chain application matrix, and the IP intelligent business platform.

3.1 IPVC basic hardware chain layer The hardware chain layer is the infrastructure of the IPVC development business ecosystem. The chain

layer system is further divided into the Chain Hardware Cloud System and the Basic Chain Control System.

3.1.1 Hardware Distributed Cloud System (CHCS)

CHCS is the survival soil for IPVC big data and distributed Big Calculation. It is suitable for different

hardware manufacturers, B-end services and home market. The hardware cloud is composed of the

following three types of benchmark products:

1. Hardware cloud base station (super node)

The hardware cloud base station is the abbreviation of large-scale distributed cloud storage service

center. The base station-level chip matrix facility and the 10 Gigabit network environment ensure extremely

high data throughput and achieve high performance of distributed chain storage systems to meet large-scale

commercial applications. High TPS requirements for applications.

2. High-end distributed cloud server (high-end node)

High-end distributed cloud servers are targeted at cloud data service centers of SMEs and educational

institutions. High-end hardware devices and Gigabit network environments ensure high throughput and meet

the business needs of SMEs.

3. Household distributed cloud intelligent terminal (flow node)

The home distributed cloud intelligent terminal can carry, support and build various IPVC -based DAPP

application matrices and smart devices, and is the basic product for realizing the IPVC distributed global

intelligent cloud network.

3.1.2 Underlying Chain Control System (BCCS)

BCCS is a supporting control system for the Chain Cloud Storage System (DCCS), which consists of the

following three systems:

3.1.3 User Management System

The IPVC user login must provide the blockchain wallet address private key or mnemonic, and can also

be combined with identity and multiple authentication to enjoy more IPVC business functions.

3.1.4 Chain Hardware Cloud System

IPVC uses the exclusive development of Chain Eternity Permanent Encryption Reduplication, with the

latest features such as classification and encryption chain storage and encryption deduplication.

3.1.5 Authoration Scheduling System

The IPVC scheduling system is used to manage the privilege grading and data resource scheduling of

different users, and can realize the reasonable allocation of data confirmation and incentive layers. It is the

basis of distributed governance and chain application matrix.

3 IPVC Business Model

Page 24: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 24

3.1.6 Advantages of IPVC basic hardware chain layer

1. The chain cloud storage system is based on the same hardware, compared with centralized cloud

systems, such as Microsoft Cloud, Google Cloud and Alibaba Cloud, based on the high security and

adaptive management of the blockchain system itself. The operation and maintenance cost is less than 1/3

of the traditional cloud;

2. Compared with the traditional cloud data resource monopoly, the unique incentive layer mechanism of

the blockchain system enables all developers, system vendors, B-ends and even individuals involved in the

construction of distributed cloud infrastructure to have a long-term value data production project. In the

middle, obtain the certificate value of the same value as its own contribution; with the continuous

accumulation and sharing of high-quality data resources, the value of the system itself will continue to grow.

In fact, the IPVC distributed cloud itself is a benign development of the sharing economy system.

3.2 IPVC distributed management system The DAO (Decentralized Autonomous Organization), also known as a distributed autonomous

organization, can be viewed as a company operating without any human intervention and handing over all

forms of control to the distributed governance charter, which is overseas and geeks. The circle is more

popular, operating under a set of non-destructible business rules, and its absolute credibility and execution

make it invaluable.

3.2.1 Distributed contract

Distributed Argeement is the core business of DAO organization execution rules, and is built on the

contract layer of the public chain system. In fact, as long as the smart contract does not suffer from attacks

that call most nodes during the execution time of the rule, its business logic must not be destroyed, which

means that the rule attacker (hacker) is paying far more than the value of the rule. There is also no

guarantee of a very small success rate.

3.2.2 Trusted Bylaws

Trustworthy Charter is a method for DAO organizations to implement an organizational (company)

system on a blockchain system. Based on the continuous development and maturity of smart contract

programming technology, organizations (companies) can make powerful based on public chain systems.

Execution and operation.

The intelligent "chaining" of rules is the key to truly implementing decentralized applications (DAPP).

Logically, it can be seen as the "two in one" of the contract layer and the application layer. In fact, this is

another manifestation of the company's (organization) charter system in blockchain technology. The

difference is that the traditional company charter is based on the logic of the rule, and the rule chaining is

based on the consensus logic of the blockchain.

u IPVC Business Model

Page 25: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 25

In terms of execution, the rule based on the law depends on whether the natural person or organization is “obeying the law”, while the chain-based logic enforces the unconditional enforcement of the rules. That is to say, the former depends on the subjective initiative of the natural person, and the latter depends on the objective existence of the trusted mechanism. In terms of cost, those who subjectively violate the law are subject to due punishment. Defenders need real evidence, lawyers, and a lot of time, and there is a high risk of losing the law due to imperfections in the current regulations and other uncontrollable factors. . Based on the basic elements of the blockchain system: traceability and time stamping, the evidence of violations is conclusive, and the cost of evidence collection is extremely low; based on the data security and intelligent rules of the contract layer, the offenders will be based on the blockchain-based automatic law enforcement system. Get the punishment you deserve. The data is distributed to the trusted nodes in the block network. All transaction processes are confirmed and executed according to the intelligent rules according to the consensus reached in advance, and there is almost no possibility of human interference. Obviously, the chain-based intelligent charter system contains the unparalleled advantages of the traditional organizational system, and its characteristics can be briefly described as: code is the law.

3.2.3 IPVC 'S "trisomic" intelligent charter The Trusted Smart Charter is the basis for the DAO organization's strong enforcement rules, and the equity certification is the DAO organization's equity allocation optimization. In the current blockchain system, Token's Chinese title "tokens" is actually a pseudo-concept, which is actually more appropriate for the "digital equity" of DAO organizations. Looking at the blockchain or the closing of the stock market, the vast majority of organizations or companies Contains serious problems in governance. The reasonable equity distribution system is the basis for the company to become bigger and stronger, and its significance is not described here. Regardless of the size, the chain-based DAO organization can have both a credible charter and an intelligent pass-through equity allocation system, which is enforced on the basis of credible rules and constraints, greatly improving the DAO organization's own advantages and limits. From the point of view of chain business logic, the combination of credible charter and equity pass-through is the “three-in-one” of the incentive layer, contract layer and application layer, which can give full play to the advantages of blockchain technology.

Contract layer/Contract Layer

Application layer/Application Layer

Business element

Business element

Trusted mechanism

Powerful execution

Effective governance

Multiple application

Authority scheduling

Traffic flow

u IPVC Business Model

Page 26: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 26

In summary, the distributed governance system is a magic weapon for DAO organizations to achieve

benign operation and high execution. IPVC contains established a reasonable DAO organization intelligent

pass-through governance mechanism - "trisomic intelligent charter", and in the blockchain system Strong

execution is a reliable guarantee for establishing high trust within the organization and between

organizations and performing business efficiently and reasonably.

3.3 IPVC innovation application - distributed programming cat Graphical programming is the current trend and trend, especially in the children's programming

education market, which contains gained popularity around the world. However, there is currently

no landing application that can be combined with the blockchain ecology and the education

industry chain. The distributed programming cat developed by the IPVC team contains made up for

this gap.

Programming cat product innovation:

1 Renovate existing Arduino robots and Scratch graphical programming software to anchor Token

and works, knowledge and Token binding value;

2 A large number of high-quality or ordinary works and a different number of Token anchors, to

achieve circulation in the secondary game program market;

3 Buyers and sellers can even anchor gizmos and procedures with the corresponding number of

Tokens for circulation on a global scale;

4 At the same time of Coder's assetization, it introduces new products such as big data, distributed

security, AI robots, and deep learning, and then creates a new educational ecology in the chain: the

global DIY era.

Contract layer/Contract Layer

Application layer/Application Layer

Business element

Business element

Trusted mechanism

Powerful execution

Effective governance

Multiple application

Authority scheduling

Traffic flow

Incentive layer/Actuator Layer Business element

Cloud hub

Data determination

Pass through

u IPVC Business Model

Page 27: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 27

3.4 IPVC 'S Intelligent IP Business Platform The physical layer of the intelligent IP (intellectual property) commercial platform consists of three

systems: IP digital asset registration and confirmation platform, intellectual property data trading platform and

data resource storage platform.

At present, the IP market contains been over-interpreted, resulting in a variety of chaos, including:

messy licensing, content homogeneity, pricing system disorder and transaction opacity. Throughout the

above situation, after the deposition of a large number of academic creation practices and commercial

transactions, the blockchain + IP industry is integrated into the intelligent business landscape of the IP

industry chain.

Its content includes: IP copyright protection, content-based education product sales, digital advertising

precision delivery and industrial IP cross-border and integration.

The Expert Advisor Market Consists of Four Levels:Level 1: Knowledge copyright protection deposit and IP confirmation

Level 2: IP-derived Expert Advisors

Level 3: IP equity split

Level 4: IP Rights Sharing

3.4.1 Copyright Rotection Based on the blockchain technology, the decentralized copyright protection platform can digitize the

works of educators and original authors, and maintain data retention.

Traditional copyright deposit method: an original method to protect its own intellectual property rights.

The postal express mail is used to send the printed copy of the work to itself. After receiving it, it will not be

opened, and the time on the postmark will be used to prove that it already owns the work. The drawbacks of

this are obvious, that is, the postmark can be fraudulent; it is difficult to prove that the envelope contains

never been opened; only part of the physical copyright can be accessed. Therefore, the deposit of copyright

contains always been the pain point of the entertainment industry. However, from this original method of

deposit, we can still learn from its basic principles and necessary elements, that is, the need for reliable

storage, proof of tampering, privacy protection of content, and time stamp. Through the traceability,

distributed, non-tamperable characteristics of the blockchain itself, as well as the technical characteristics of

containsh algorithm, asymmetric encryption and timestamp, we can easily realize the deposit of the user's

digital IP assets.

Such as copyright disputes:

In the first step, the trading platform will provide evidence of complete legal action and time stamps for the

original author.

In the second step, the outcome of litigation disputes will have an impact on personal credit. This credit will

be gradually opened up with a credit information platform like Sesame Credit, with a view to jointly promoting

the establishment of a new social credit system.

u IPVC Business Model

Page 28: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 28

3.4.2 IPVC 's new O2O advantage

The traditional "three difficulties" of O2O:

It is difficult to conduct on-line diversion; IP homogenization is serious; incremental conversion under the line

is difficult.

Advantages of the new O2O:

1. Apply intelligent charter technology to anchor the rights and flows;

2. Change the way IP knows the right to confirm, and encourage originality and sharing through the equity

incentive system;

3, through the IPVC DAPP tool flow, to ensure the high efficiency of offline drainage conversion.

3.4.6 IP copyright extension transaction

The type of product tradable is theoretically infinitely subdivided over time. For the moment, it mainly

includes: IP creation, online education, offline lectures, and knowledge competitions. It is not difficult to see

that these large blocks can be split twice, such as IP creation including narrative, application, description and

so on. Among them, the IP value produced by the literary creation in the narrative is the largest.

In the era of traffic economy, online education is realized, including the landing event itself (education

lecture hall, exchange meeting, live competition, etc.), including second-degree communication based on the

scene, including live broadcast and VR live broadcast. Such things can radiate hundreds of people and even

single scenes to everyone. As a result, IP copyrights are likely to be deeply realized.

Based on this class, we found that the content of IP in the ubiquitous entertainment industry is deeply

overlapping. Such as literary creation IP,TianYa's novel creation The Legend of the Sword and the

Chivalrous Man, selling the copyright of its derivative TV drama to South Korea’s A party, shot out Fairy

sword5 as TV drama, at the same time will Fairy sword3 as The film adaptation rights were sold to the

Chinese party B. Party B sold the concert copyright of the movie of the same name to the Chinese C party

for the need of its own box office sales. In order to ease the pressure on the box office of the concert, Party

C sold the live broadcast of the concert to the live broadcast video website D. The copyright was sold to the

E party. Due to the need for self-realization, the D party sold part of the live broadcast to the online title, and

the other part was sold to the company's content purccontainse party F and party G. At last,The author of the

fairy swordIt is very likely that I saw the movie concert on the LED screen of the airline.

By analogy, the derivation of IP must be the process of re-creation.

u IPVC Business Model

Page 29: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 29

3.4.3 Intellectual property rights and multi-layered income Using intelligent pass and contract nesting technology, multi-level management and privilege grading of

IP products and intellectual property rights, complete ownership of copyright owners on sidechain Smart

Token, ensuring legal income of intellectual property owners, and passing Chain incentives reward original

creators and knowledge IP reprocessors. The principle is to encourage original creators and intellectual

reworkers, each transaction can generate incentive income for the original and the previous batch of IP

reprocessers.

Example: The third-tier premium yield can generate additional benefits for the second-tier reworker and the

first-tier creator.

3.4.3 Intellectual IP and Intelligent Rule Anchoring Schematic

Contract nesting

digital signature

IP data assetsTwo-way anchoring

IP data increment

digital signature

Known production three times IP data increment

Mixed

Reed

Floor

CAN POC

CAN POC

CAN POC digital signature

Known production N development IP data increment

rights and interestsAnchored

Intellectual propertyConfirmation

Equity transfer

Equity transfer

Payment pass

CAN POC

Intellectual property transferEquity transfer

Three levels of separation

Payment pass

Intellectual property transfer

Smart Token Smart charter

Intellectual originator

Secondary development of intellectual property

Intellectual Property IP Reprocessing Chained Incentive Mechanism

Knowledge IP creator

Equity and Smart Token binding

Knowing property ownership buyer

+ 10 + 1 +1 + 10 + 1+ 10

First layer incentiveSecond layer incentiveMulti-layer incentive

u IPVC Business Model

Development

Pass gain

Page 30: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 30

3.4.5 Content-based IP product sales and intellectual property trading platform The blockchain-based de-intermediation IP intellectual property trading platform will bring users peer-to-

peer media data content and eliminate the operating costs and share of the centralized platform. Content

creators and users can maximize their content. reward.

There are usually two types of IP transactions. First, in the process of trading this type of IP, traders

have low influence due to short creation cycle. Usually sell your own IP products directly for liquidation. In

this case, the buyer and the seller basically only follow one decision condition: the price is higher. In such

cases, buyers and sellers only need the most basic anonymous transactions.

The second is medium-sized or large-scale IP. The author is largely concerned with the consideration of

his own reputation and the quality of his works. The bidding of the highest bidder is not the only condition.

The author usually conducts actual investigations on the qualifications of the seller, the ability to adapt, the

company or personal reputation. Such large-scale IP sales require more repeated exchanges and

confirmation of anchors between online and offline buyers and sellers.

The trading model of IP IP trading platform created by IPVC follows the following process:

1.Copyright Protection2.Transparent market3.Reduce the cost4.Smart contract

next levelcycle

platformpurpose

next levelcycleEntertainment IP

IPType split seller

Secondary element

Event Movie literatureon siteeducation

Professional skills, art, academic education, short

film...

Knowledge contestphysical education......

Seller sets intrinsic properties

Stage playLive houseCommunication festival

1.Cycle2.Types of3.Price4.Purccontainsing resource5.Prepaid6......

1,Budget range2.Seller qualification3.means of transaction4.......

1,title2.broadcast3.Reporting with other credit platforms

END

Punishment mechanism

Private transactions

Real name transaction(Large IP) Unnamed transaction

(Small and medium IP)

END

FALSE TRUE END

witnessInitiate witness

Seller(maximum part)

Platform fee(very small part)

Buyer sets intrinsic properties

Initiating a request

transaction match

Seller(maximum part)

Platform fee(very small part)

unfinishedtransaction

Seal the dealboth sidesDeclining credit

platformprovideMatch line

Third party involvement Increased

creditworthiness between the two parties

Transaction amount

carry out

Transaction amount

u IPVC Business Model

Page 31: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 31

3.4.6 IP Sharing

Every IP fan should hold this IP, just like a product shareholder. When IP values are distributed among

the various holders in a fragmented manner, we can tailor smart contracts to individual requirements and

intelligently share a premium IP copyright. The quality of the IP should be tested by the market, not by any IP

holder or resource monopoly. Once the direction of distributed development is determined, the trend of IP

resource centralization will be effectively curbed.

When a literary creation, the author indicates that the purpose of writing is to allow more people to

accept the enlightenment of the content rather than profit, then the IP source can be shared without the

authorization of the source author and the IPVC autonomous committee (refer to the current copyright open

Some IPs, such as the four major books).

u IPVC Business Model

Page 32: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 32

3.4.7 Autonomous Commission of IP Intellectual Property Trading Platform

Generation of the IPVC Autonomous Commission:

The Autonomous Commission will be elected by all members of the IPVC community in accordance with the

DPOS mechanism.

IPVC Autonomous Commission ruling mechanism:

(1) The members of the autonomous committee that are elected for each vote will vote on an asset-based

transaction; when 10% of the members of the self-governing committee believe that the IP contains

fraudulent activities such as plagiarism, the IP's request for shelves is rejected;

(2) The members of the autonomous committee participating in the voting will receive the fee for the IP on

the basis of the contribution;

(3) The members of the autonomous committee that participated in the voting cannot participate in the next

election, but the right to participate in the voting election guarantees the decentralization of rights.

3.5 IPVC Talent Value Resource Market Through distributed big data technology, real-time collection of recruitment demand data of various

industry companies, creating a model of the pass-through economy, encouraging industry practitioners to

share and upload their own social media, resumes, job search needs and other data, and through

decentralized encryption storage The way to return the data to the user. For industry executives and industry

veterans, the IPVC platform will motivate users to upload resume data, and build anonymous trading spaces

through smart contracts and encryption technologies to facilitate data exchange between headhunters or HR.

u IPVC Business Model

Page 33: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 33

4.1 Resonance Source Community Introduction Resonance Source Community (RSC) in 2017 by International Computer Experts within the United Nations Blockchain TechnologyGeeksThe established programmer distributed organization (Coder DAO) aims to deepen the blockchain technology and popularize technology while targeting the Github open resonance source community, setting up a global programmer community based on the public chain system to implement open source code blocks. Chain assetization, creating a blockchain digital world that belongs to the programmer. Science and technology are the primary productive forces, and outstanding talents are the first resources. Based on the spirit of the DAO organization contract, the backbone of the resonance source community technology contains a long-term consensus on the blockchain dimension, deep understanding of the blockchain technology, and the development of the public chain, consensus algorithm mechanism and sidechain application. Major breakthroughs have been made in technology and other aspects.

4.1.1 Resonance source community historical mission Most programmers belong to the "both physically and mentally exploited class" crushed by the company and the boss. They do the hardest work, but often do not receive fair and just rewards or evaluations. A considerable number of older programmers have been ruthlessly dismissed by commercial companies due to declining energy, not being promoted or transformed in time. New companies often rely on their age to be more efficient than young programmers, making it difficult to find the right job. This is the universal status quo that contains been ruthlessly sung as a “code farmer sweatshop”. The programmer community contains created tremendous value for the society. The entire Internet age was created by the youth, wisdom and blood of the programmers, but most of the treatment and real value have not been truly fulfilled. Based on this situation, the resonance source community will re-polist the value consensus tool flow in the blockchain era, develop a distributed collaboration system for programmers based on the public chain system, and redefine the reality and potential value of the programmer community - liberating "code farmers" .

4.1.2 Resonance source community organization form Resonance source community core personnelInternationalizedSenior hardware and software development experts, functional departments are divided into open source (closed source) development project team,Business resourcesThe department, while the operations marketing department is composed of marketers who understand technology.

4 Resonance Source Community

Ministry of Education and

Resources

Development project team

Resonance source

community

Development project team

Founding

Core layer

Partnership

Executive layer

Page 34: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 34

5.1 Introduction to IPVC Public Chain System:

The public chain system is based on the generally accepted value consensus mechanism and is the

best digital carrier for value addition. The public chain system adopting the first consensus mechanism can

often achieve success, such as: BTC, the first POW workload proof mechanism; ETH first intelligent contract

chain layer; EOS, BTS first DPOS voting authorization mechanism; IPFS pioneered distributed data

excitation layer; VDS initiative Resonance V pool financial mode; thus the importance of the first launch

mechanism.

IPVC parallel public chain system innovation multi-dimensional incentive layer, innovatively DPOS,

BFT,POWThe consensus mechanism is ingeniously integrated, and the IPVC project matrix is empowered

according to technical characteristics.

5.2 IPVC public chain technical characteristics

A blockchain is a string of data blocks generated by cryptographic methods. Each block contains

information about several network transactions for verifying the validity of its information (anti-counterfeiting)

and generating the next block. The user is a public account book that records all transaction records and can

be understood as a distributed database for developers. The blockchain database is characterized by

decentralization, openness, autonomy, and non-tamperability. Blockchain is closely related to decentralized

applications, and is ideal for providing storage functions for decentralized applications (DAPP).

5.2.1 Consensus mechanism

The IPVC multi-dimensional public chain is derived from the research results of the large computing

founding team and the resonance source community, and creatively proposes the DPOS+BFT+Zero—

Knowledge Proof optimal algorithm, the multi-chain heterogeneous value data excitation layer and the space

inventory proof POC (Proof on Space) consensus mechanism, according to Technology type and application

scenario characteristics to achieve the ultimate form of blockchain technology in the era of large computing.

5.2.2 Public chain architecture

5.2.2.1 Basic Data Layer / Base Data Layer

The distributed key is used to store the private key owner signature and the basic data in the underlying

chain. When the user uploads the basic data, the system automatically stamps the time stamp. It is the

lowest-level structure and is the core value carrier of the IPVC multi-dimensional public chain.

5 IPVC Multidimensional Public Chain

Page 35: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 35

5.2.2.2 Network Layer / Network Layer The P2P protocol (P2P Protocol) supports data transmission and exchange of nodes in a blockchain network. It is a communication guarantee for data distribution or consensus mechanism. VES supports multiple P2P protocols, communication mechanisms, and serialization mechanisms. Use flexible protocols. In terms of communication security, it supports flexible communication protocols such as WSS (Secure Websockets), HTTPS, TLS, etc., and extends the OAuth-certified integration on the external service interface of the platform application.

5.2.2.3 Consensus Layer/Consensus Layer This layer contains a consensus algorithm and a consensus mechanism, which enables highly decentralized nodes to efficiently agree on the validity of block data in a decentralized blockchain network. It is one of the core technologies of the blockchain and also a community. An effective mechanism for governance.The IPVC public chain will adopt the 1+N composite public chain structure to meet the high concurrency and high interaction requirements of the DAPP application matrix in the 5G+ era. With the hybrid node network and the hybrid consensus mechanism in the round robin, the final achievable capacity expansion effect will be better than the lightning network. The bottom layer of the public chain adopts the multi-chain structure of the Token chain + hybrid data link. The Token chain is based on the DPOS+BFT optimal algorithm, the multi-chain heterogeneous value data excitation layer and the space inventory proof PO.S(Proof on Space) and the public chain established by the importance proof mechanism. The data chain consensus layer is a transaction main chain composed of N different types of consensus mechanisms divided according to the autonomous domain technology, belonging to the 1+N type multi-chain structure. It perfectly solves the problem of performance and expansion of the public chain system. The Token chain and the multi-dimensional data chain are processed according to different divisions and types of business logic and data storage, and communication interactions are implemented between the SEC gateways. The 1+N multi-chain structure changes the technical bottleneck and impossible triangle defect of the traditional blockchain single-chain structure, greatly improves the transaction confirmation speed, greatly reduces the resource occupation of the public account book, and the large-scale transaction demand in the 5G era. Perfect match.

5.2.2.4 Expanding the Data Layer / Expanding Data Layer This layer uses extended chain storage techniques, such as distributed encryption deduplication, to store private key owner signatures and underlying data on the extension chain. When users upload large data, they automatically search for nodes in the chained data storage network to form a new peer-to-peer transmission network, which ensures data security on the basis of ensuring data integrity, thereby further improving the security of storage and access.

5.2.2.5 Mixed excitation layer / Actuator Layer The IPVC multi-dimensional public chain system consists of three layers of excitation and mixing, and can be expanded according to technical characteristics. According to the consensus mechanism of different functional characteristics, it is divided into DPOS+BFT+Zero—Knowledge Proof layer, data excitation layer and POC space layer. The three provide customers with a variety of services, and at the same time transform different types of digital certificates into a diversified data and algorithm market, the market runs on the block with local agreement certificate, by providing customers with multi-function node protocol, Node miners of different types of equipment make a profit.

u IPVC Multidimensional Public Chain

Page 36: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 36

5.2.2.6 Hierarchical Smart Contract Layer / Any Contract Layer

The hierarchical intelligent contract layer of IPVC multi-dimensional public chain is divided into IBIOS layer, IBCS

layer and IVP layer according to functions. It can run various scripts, codes, algorithm mechanisms and smart contracts

whose functions are restricted by hierarchy, among which IVP The layer is compatible with the Ethereum's Solidity

bottom layer. Embedding code into a multi-level blockchain or pass, to achieve customizable smart contracts, to achieve

certain constraints, without the need to be automatically executed by a third party, is the basis for blockchain

decentralized trust. 5.2.2.7 Application Layer / Application Layer

The application layer of the IPVC multi-dimensional blockchain encapsulates various application scenarios and cases,

similar to applications on computer operating systems, portals on Internet browsers, search engines, exchanges, malls,

or apps on mobile phones. The blockchain technology application is deployed on public networks such as Ethereum and

EOS and landed in real life scenarios. Future programmable finance and programmable societies will also be built on the

application layer.

5.2.2.8 Value Confirmation Protocol Layer / Cross Link Protocol Layer

The value confirmation protocol layer of the IPVC multi-dimensional public chain system is combined with intelligent

side chain technology, containsh locking technology and distributed private key control technology development. The use

of multi-party computing and threshold key sharing schemes, combined with Smart Token and multi-party authentication

path, can achieve distributed computing and more practical functions. (See Chapter 4 for details)

5.3 IPVC public chain integrated application The IPVC public chain is responsible for data sharing and asset routing between infrastructure and applications. The

SDK is responsible for building specific applications.

Application Management:

The DAPP application needs to register the meta information to the main chain before the release. The information

includes the name, description, initial witness, and related configuration information required for asset routing. The user

can browse and retrieve the decentralized application through the module. , traceability, download and access.

Asset routing:

Assets registered on the IPVC backbone can be interoperable (cross-chain) with each application. Although the

applications are isolated, the value routing can be achieved through the asset routing function of the backbone.

Certified Digital Asset Management:

Any account can register and issue several assets based on the underlying smart contract, and the issuer can

configure various assets, such as access control lists.

Non-performing assets can be functionally restricted through the DPOS authorized voting consensus mechanism,

and reactivation requires a number of miners' fees.

Trustee management:

The trustee is also called a witness. Each account with a digital equity credit in the IPVC main chain can be

registered as a trustee. The top trustee contains the opportunity to become the system's bookkeeper. The bookkeeper

contains forge (or called digging). The power of mining, bookkeeping, and submission of blocks, and obtaining certain

digital certificate awards, the trustee can increase the ranking by obtaining the votes of the number owner, and each

number of rights holders can vote for any trustee.

u IPVC Multidimensional Public Chain

Page 37: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 37

Account Management: The IPVC public chain uses the account model. Each private key corresponds to an account. The account stores basic information such as the user's wallet address, public key, and nickname, as well as other configuration or statistical information. Each application chain uses the same account model. There are currently four different types of applications in the account, and the account owner can use the corresponding functions according to the requirements of the registration function.5.3.1 Side chain structure of IPVC main chainSidechain (SideChain)

Pegged Sidechains, which enable the transfer of digital assets across multiple blockchains, which means users can access new ones with their existing assets and existing applications. The cryptocurrency system. The sidechain is a special blockchain that uses "SPV wedge" technology to transfer assets to and from other blockchains, allowing users to use existing cryptocurrency systems with existing assets. People no longer have to worry that the incentive layer Token is difficult to adopt innovation and adapt to new demands. Just create a side chain and then connect to the original system. By inheriting and reusing the original blockchain, it also avoids the liquidity shortage of the new currency. And issues such as market volatility. And because the side chain is an independent, relatively isolated system, the serious problems in the side chain only affect the side chain itself, which greatly reduces system risk and cost.

Side chain origin: The side chain (SideChains) does not specifically refer to a blockchain, but refers to all blockchains that follow the sidechain protocol. The term is relative to the native backbone.The side chain protocol means: A protocol that allows the main chain Token to safely move from the native backbone to other blockchains, and safely return to the native backbone from other blockchains. Obviously, all existing blockchains, such as Ethereum, can be sidechains as long as they conform to the sidechain protocol. The sidechain protocol is of great significance. It means that the native Token can not only be circulated in the native blockchain, but also can be circulated in other different types of blockchains. Its application scope and application prospects will be more extensive; creative people will Various applications have been developed to allow the sidechain protocol to interface with the native backbone, making the status based on the native chain more robust.

u IPVC Multidimensional Public Chain

Page 38: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 38

Wedge side chain protocol:

The purpose of the sidechain protocol is to implement Two-Way Peg, so that the native Token can be

rotated in the main chain and the side chain (Figure).

Main chain and side chain diagram

Two-way anchoring is divided into the following stages:

Send a locked transaction and lock the bitcoin on the main chain.

Operated by the native certificate holder, a special transaction is sent to lock the token on the blockchain.

Two-way anchoring diagram

u IPVC Multidimensional Public Chain

Page 39: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 39

Wedge side chain protocol:

Ø Waiting for a confirmation period

The role of the confirmation period is to wait for the locked transaction to be confirmed by more blocks,

preventing counterfeit lock transactions and denial of service attacks. The typical wait time is 1-2 days.

Ø Redeem the original Token on the side chain

At the end of the validation period, the user creates a transaction on the sidechain to spend the output of

the locked transaction and provides an SPV workload proof that is output to the address on the sidechain.

The transaction is called a redemption transaction and the SPV workload certification is a proof of the

workload of the redemption transaction block.

Ø Waiting for a competition period

The role of the competition period is to prevent double flowers. During this period (1) the redemption

transaction will not be packaged into the block. (2) The new bitcoin transferred to the side chain cannot be

used. (3) If there is a work permit with a larger workload, that is, the redemption transaction includes The

more difficult SPV proof of the Bitcoin main chain, the last redemption transaction will be replaced.

The role of the side chain:

Sidechains allow blockchains to achieve better performance and privacy protection. They can also scale

to support a variety of assets, such as stocks, bonds, real-world or virtual world currencies, as well as smart

contracts, security processing, and real-world property registration. The side chains can also have other side

chains for micropayments. They can be used for experiments with pre-release versions of future sidechains,

or for experiments with bitcoin test versions.

u IPVC Multidimensional Public Chain

Page 40: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 40

5.3.2 Technical Status: Complete Script VS Side Chain One of the highlights of the design of the large public chain system is the scripting engine. Based on a

complete scripting engine, not only can the ordinary transfer function be realized, but also smart contract

applications such as multi-party signature, mortgage guarantee, and gaming games. However, due to

security and the difficulty of implementation at that time, the script system of the first-generation blockchain

system was designed to be relatively simple and limited. For example, it does not support loops, script length

is limited, and only supports several standards. Type of transaction.

Ethereumto representThe second generation blockchain system is an example. Its biggest feature is to

build an extended intelligent contract layer, which greatly improves the function of the script engine. It adds

new commands such as reading blockchain, billing, and jump, and also releases Stack memory, function call

depth, and script length limits. Its scripting language is basically complete with Turing. With such a script,

developers can implement almost any function that can be expressed mathematically.

Since Ethereum, extended scripts have become a popular way to implement decentralized development

platforms, but a big disadvantage of this approach is that the application code itself and the data generated

by the application are in the same blockchain, resulting in The rapid expansion of the blockchain. Ethereum

tried to delay this expansion by optimizing and compressing the block and the transaction itself, and it was

just a way to cure the problem.

In addition, the script-based applications share the same book, and parameters such as block generation

time cannot be customized, which undoubtedly limits the personalization of the application.

The sidechain mechanism is scalable through another dimension, each running on a different distributed

node network with separate audiences, investors, and development teams. This natural sharding solution not

only solves the problem of blockchain expansion, but also contains a personalized set of books for each

application. The consensus mechanism, block parameters, and transaction types can all be customized. We

believe that sidechains are a lower cost, more flexible, and easier to use solution than full trading scripts.

u IPVC Multidimensional Public Chain

Ledger 1 Ledger 2

Sender Market maker Recever

Page 41: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 41

5.3.3 Status of Chains: Analysis of "Currency" and "Shares" If the primary token access method of the public chain system, “mining”, is regarded as the “currency”

issuance system of the digital kingdom, then the sidechain token issued based on the smart contract is the

digital equity of the digital kingdom “company”.

At present, the block chain is the most common side chain of Ethereum. Sidechain Token's smart

contracts generally have only six common functions: trading, authorized address usage, authorized address

transactions, viewing authorized quantities, viewing token balances, and viewing token information. The flaw

is obvious, the ordinary Token does not have any governance functions.

In the stock market, the final guarantee for investors is the regulatory authorities. If legal or natural

persons violate the law and discipline, their stocks will be frozen. Even if the heads of listed companies hang

the "Sword of Damocles", the stock market is still in turmoil.

In the currency circle, the final guarantee of the currency is the “conscience” of the project party and the

exchange. Based on the anonymity of the wallet private key and the imperfect legal system, the violation of

laws and regulations is difficult to be confirmed, the lack of relevant institutional supervision, the ordinary

Token without governance function can not be frozen, and it is quite difficult for private investors and even

the currency to defend their rights. It can be seen that the reason for the niche of the currency circle is, in the

final analysis, the problem of many project organizations' own governance. The more critical issue is that

even if community governance reaches a high level, there is no emergency mechanism, and there is no

corresponding technical means and regulatory agencies to carry out the final guarantee.

5.3.4 Technology breakthrough: multi-layer authorized smart contract Taking the Ethereum smart contract system as an example, its drawback is that the function is not

graded. The POW consensus mechanism of the distributed node causes its TPS performance to be low, the

blockchain data chain layer expands too fast, and some function calls are also likely to cause network

congestion. The intelligent contract layer of the IPVC public chain is divided into IBIOS layer, IBCS layer and

IVP layer by restricting and grading different functions. There are various scripts, code, algorithmic

mechanisms, and smart contracts on which functions can be restricted by grading.

IBIOS layer This layer is an abbreviation of ( IPVC Basic Intput/Output System), which satisfies the basic input and

output interrupt function and is divided into three parts. The first part is the self-test and initialization of the

operating environment. It is mainly responsible for calling related hardware facilities, including detection,

initialization and booting of the hardware. The second part is program service processing, mainly for simple

application services, mainly with input and output devices. Related, such as reading disk data for output to

other actual or virtual devices; the third part is to respond to interrupt processing, mainly to separately handle

the output requirements of simple programs, IBIOS service functions are implemented by calling the interrupt

service program. Calling this layer requires installing and setting up a PC, a flat-end blockchain client, or

installing a blockchain browser, a VMware virtual machine plug-in, and a certain amount of ViAssets digital

asset credits.

u IPVC Multidimensional Public Chain

Page 42: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 42

IBCS layer

This layer is a shorthand for ( IPVC Base Calling System), which satisfies various types of reference

library calls and database directory operation commands, file operation commands, and other extended

function commands. Using the underlying Source Customization (SCOM) developed by the Resonance

Source Community, a hierarchical custom smart contract can be implemented, which can be automatically

executed without a third party if certain constraints are met. The perfection of its function is similar to the

underlying layer of Solidity of Ethereum. The difference is that the function package, relational library and

application data package after program compilation output are divided into different data link layers. The

function integration package and relational library belong to the basic data layer/ Base Data Layer,

application data package belongs to the extended data layer / Expanding Data Layer. The hierarchical

processing method is used to solve the problem that the blockchain data packet is too large, and the network

transmission efficiency is greatly improved.

The complete call of this layer function must meet one of two conditions: the blockchain address in this

area contains a certain number of IPDA data passes and the IBCS chain layer for permanent pledge; this

layer introduces DPOS voting governance rules, and no corresponding IPDA data points can be used.

Authorized voting rules, which get full functionality by getting 51% of the votes of active nodes.

The complete invocation of this layer function is the basic condition for issuing sidechains, and the single-

block chain wallet account can only issue sidechain passes every 24 hours. The new pass will not be

certified by the system or the total liquidity will be frozen within 90 days. The thawing will require a certain

amount of ViSource digital certificate.

An important feature of the IBCS layer is the ability to reward a certain number of ViSource digital passes,

distributing subtask packages to different programmer block addresses for distributed collaboration. Within a

predetermined period of time, after the development team contains made a POV value consensus based on

the completion of the task, each address will receive a reward for the corresponding ViSource digital

certificate.

Source factory

POV valueConsensus mechanism

Gained income after performance, otherwise there is only minimum guarantee

Development team

Point reward Work

quantification

Development task package

u IPVC Multidimensional Public Chain

Digital integration

Intelligentrule

Page 43: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 43

IVP layer

This layer is a shorthand for ( IPVC Visual Packaging). This layer is a source code template library for

complex functions. It can be used as a credit template by the source community review committee. It can

also be signed and approved by other programmers. After passing the review, the source provider is

approved. And the auditor can get the corresponding ViSource data integration incentive, call the source

library to write a program to pay a certain number of ViSource points.

The DVP layer's functional properties are connected to distributed programming cats. It is a user-friendly

graphical editing interface that meets the needs of programmers and even beginners and children to edit

decentralized applications (DAPP).

5.3.4 Technical breakthrough: Smart Token

Smart Token is organized by programmers Resonance Source community (RSC) The blockchain project

team contains been successfully developed through multi-contract nesting technology. In addition to the six

basic functions of the ordinary Token, it contains powerful governance functions, and can realize the project

and Token according to the customization requirements of the project or community governance. Distributed

governance."

The Smart Token realizes the "three-in-one" of the chain system. Through code writing, the contract

layer, the incentive layer and the application layer of the blockchain extension chain layer are organically

linked, and the consensus layer function of the public chain system is legally called. Can fully utilize the true

energy of blockchain technology. Before the smart charter DAPP is not perfect, the Smart Token can

achieve realistic application.

One of the principles of the "three-in-one" of the Smart Token is to write code at the contract level of the

public chain, call the inner logic mechanism from the bottom of the consensus, and assign "advanced

administrative authority" or "hierarchical management authority" to some specific addresses. Gain control

over the application and functionality of the newly issued Token. That is, regardless of the Token at any

address, the above editable permissions other than Token ownership can be obtained.

In this way, Token's ownership, control and functional rights belong to different address holders in the

chain system, and the “three powers separation” of the blockchain layer is completely realized, and the

Token holders can supervise each other. And constraints, easy to govern; at the same time, management

authority can be transferred to another holding address under certain conditions (such as DPOS mechanism),

achieving a democratic consensus system based on the side chain system.

5.3.5 Technical advantages: Advanced functions of Smart Token

1. After the contract address is added, the airdrop (on/off): after adding the Token contract address, there is

a custom (N) token;

2. batch airdrop: batch transfer from the super-privilege address according to the rule lock bin release, only

the super-privilege address can be operated;

u IPVC Multidimensional Public Chain

Page 44: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 44

3. Tokens that are dropped to different wallet addresses can be released according to the custom lock rules;

4. custom smart lock bin: N (custom) start Token, set the rules for each Token own address, the release

amount per release and the total number of days released can be defined according to the project party;

5. Conflicts and priority rules between different functions: Priority is set for the last time. The function of

changing the wallet address of the Token can be changed and the lock release mode can be changed.

6. advanced batch processing: advanced smart contract can manage the different rules of the bulk wallet

address, common with Imtoken and other decentralized type of wallet, to achieve different lock, freeze,

custom release and other rules;

7. Transfer and hierarchical management of Token management authority;

8.data confirmation and source code anti-plagiarism technology.

The advantages of multi-contract Smart Token for ordinary side chain Token:

1. No need to centralize the wallet, the Smart Token can realize the function of the central wallet such as

Token lock, release, interest and even freeze;

2. 100% implement the certificate management according to the project and the chain contract of the DAO

organization, completely avoiding the human factors leading to the failure of the certificate management, and

bringing the real application of the blockchain technology to the project governance;

3. In the normal case of the public chain system, the Smart Token is based on the function of the chain will

never expire, and will not be like the central wallet, such as loopholes, bugs and even crashes, project

running, etc.;

4. Using smart contract nesting technology, Smart Token will evolve into a smart charter DAPP to achieve

more powerful functions and assist DAO organizations and companies to achieve efficient governance of

organizations, equity and systems.

5.4 Relational database vs non-relational database

At present, most blockchain systems choose to use a simpler non-relational database to store data,

such as Berkeley db, Leveldb, etc. These databases generally provide some simple data structures, such as

Btree, containshtable, Queue, etc. SQL is not supported for data manipulation. Although these databases

are sufficient for general electronic money systems, they are not enough for application platforms, especially

for finance, banking, and e-commerce.

u IPVC Multidimensional Public Chain

Page 45: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 45

Currently mainstream storage systems use relational databases because relational data contains several

advantages:

Ø Transaction processing

Ø Data update overhead is very small

Ø Can perform complex queries such as Join

Sqlite selected by IPVC public chain is a lightweight and lightweight embedded relational database with a

capacity of up to 4T.

Node unreliable assumptions:

Based on a loose network organization, single points of failure and nodes are allowed to be unavailable

for a certain period of time. However, the entire network still needs to have strong robustness (Robust).

Ownership and privacy: The data owner contains data ownership and full access, and the data is encrypted and private. Other

roles can access and use data after the owner contains authorized it.

Quantitative contribution: The contribution of all parties involved in the agreement should have corresponding quantitative criteria

and contributions that can be observed. For example, POT, POS, and POW are used as quantitative proofs

of storage space and storage time.

Final state consistency: Allow data objects to be in different states on different nodes, but their final state can quickly converge to

achieve network-wide consistency.

Monitorable and recoverable: It can detect the availability of the entire network, the state of the entire network of data objects, and

autonomously repair it according to the corresponding strategy.

Auditable and regulated: A certain degree of supervision and auditing can be carried out in certain specific areas or scenarios,

provided that the data owner is aware of and willing to store data under such a regulatory framework.

Consistent final state

Monitorable recoverable

Auditable and supervised

Node unreliable hypothesis

Ownership and privacy

Quantitative contribution value

IPVC

u IPVC Multidimensional Public Chain

Page 46: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 46

5.5 IPVC multi-dimensional public chain technology architecture

5.5.1 IPVC underlying SDK

The main chain of the IPVC public chain is mainly responsible for data transfer between the

infrastructure and applications, and can also be used for asset routing. The SDK is used to build specific

applications.

1. ORM supports object-relational mapping to organize business data, support index configuration, and

perform complex queries through JSON syntax.

2. Two-way peg cross-chain protocol supports bidirectional anchoring cross-chain protocol.

3.Immutable ledger built-in ledger creation function, developers and users only need to call the contract, all

call operations and status will be automatically written to not falsify the ledger.

IPVC The bottom layer of the multi-dimensional public chain provides a complete distributed ledger system, including a complete intelligent contract system and security system. At the same time, the IPVC public chain abstracts the underlying complex technical system and heterogeneous systems, implements distributed entity management and multidimensional authentication protocols that are compatible with various major protocols and cryptographic standards, and supports various types of heterogeneous blockchains. Cross-chain and cross-system interaction mapping with traditional information systems. The IPVC public chain also provides technical systems such as secure data storage, heterogeneous smart contracts, hardware key management, and encrypted data analysis. The entire network as an application platform can support the construction of various application services, especially decentralized applications. On this basis, the IPVC public chain provides a series of application frameworks, including distributed data exchange protocols, distributed process management protocols, etc., and further supports the implementation of various upper-layer applications through common APIs, SDKs, and various application functional components.

u IPVC Multidimensional Public Chain

Page 47: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 47

4. Lower level interfaces allow developers to use more underlying interfaces to give the highest level of

control over the system, for example, handlers and filters for each lifecycle event. If the public-chain system

is like a motherboard, this layer acts like a BIOS (Basic Input Output System) and is a layer between the

hardware layer and the logic layer.

5. Middle level interfaces The middle level interface enables more complex functions, allowing developers to

use more graphical interface-based friendly interfaces for more complex functions, such as writing a native

JavaScript-based container. This layer acts like MS-DOS (Basic Operating System) and belongs to the basic

logic layer.

6.Advanced Contract interfaces Advanced intelligence contract layer, which supports the use of JavaScript

as a native language, developers can use a large number of third-party components to freely combine to

develop DAPP for large-scale commercial applications. Compared with the Ethereum Solidity language, the

hierarchical method is more conducive to the realization of the hierarchical efficiency source call of the

resource layer, and effectively solves the data expansion and inefficiency of the Ethereum system.

7.Customize fee definitions developers can set different fees for each transaction or contract, and even set

the cross-chain asset token as a fee, not limited to the Token of the IPVC multi-dimensional incentive layer.

8.Transaction privacy can choose transaction privacy features.

9. SmartDB cache is automatically synchronized with persistent storage, which can greatly improve write

performance.

5.6 Distributed Trust Transfer of IPVC Public Chain

In the IPVC public chain, in addition to supporting the traditional single trust source mechanism, it also

supports a more decentralized distributed community trust system.

And support distributed trust delivery system. Its implementation is as follows:

1 Group trust: The community trust model is a very effective trust system. Personal endorsements form

community trust certifications in specific areas through endorsements in multiple communities.

01

03

Group trust

statement

02

04

Trust anchor

Trust delivery

u IPVC Multidimensional Public Chain

Page 48: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 48

2 Trust Anchor: Trust anchors are usually government units, enterprises, non-profit organizations, and social

celebrities who have been certified by real names and have certain credibility or prestige in society. The

entity that contains been endorsed by the trusted anchor automatically gains the trust of the trust anchor.

The higher the trustworthiness of the trust anchor itself, the higher the trustworthiness of this network entity.

3 Statement: A statement is a trust carrier for community trust. In the IPVC public chain system, a statement

is a declarative description of an identity subject to itself or to another subject, and is a carrier for passing

trust. When an identity subject needs to publish some credible information, it only needs to issue a statement.

4 Trust Delivery: The trust delivery mechanism is the implementation of trust usage in the IPVC public chain.

The acquisition of specific types of identity entities through various types and sources can form multi-

dimensional identity portraits on the one hand, and form a personal trust ecology from their own on the other

hand. In a specific demand, through the presentation of the statement, and the provision of the data record,

the trust can be transmitted, on the one hand, showing the credible trust certification to others, and on the

other hand, through the multiple use of the trust data, forming multiple approvals, Further increased the

credibility.

5.7 Overall architecture Referring to the public chain design principles of various successful models, the overall architecture of

the IPVC public chain is divided into three levels: the bottom layer is the self-developed SQl platform, which

provides the function of the blockchain basic service for the upper application scenarios through the interface

of SQL and API.

Application service layer( IPVC Application)

Cross-border payment, etc.

Platform product service layer

( IPVC Platform)Underlying platform

( IPVC SQL)

User Management:Account management, rights management, key management, etc.

Basic services:Interface adaptation, consensus management, network communication, etc.

Smart contract:Contract registration, contract execution, contract triggering, etc.

Operational monitoring:Configuration, monitoring, alarming, publishing, etc.

Shared ledgerPrivilege account

Secured TransactionsDigital assets

Basic frame diagram

u IPVC Multidimensional Public Chain

Page 49: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 49

The middle layer is the platform product service layer is IPVC Platform, and the high-availability and scalable blockchain application base platform products are built on the underlying ( IPVC SQL), including shared accounts, accounts, secured transactions, distributed databases, and numbers. The direction of diversified digital assets such as confirmation of rights and digital deposits, and integration of basic product functions in the relevant industry chain. The application service layer ( IPVC Application) provides trusted, secure and fast blockchain applications to the final audience, and will work with industry partners to help developers implement diversified DAPP application functions.

5.7.1 IPVC SQL underlying platform User Management:Responsible for the identity information management of all participants, including maintaining public and private key generation, key storage management, and user identity and address correspondence maintenance, and supervising and auditing certain real-identity transactions under authorization. For the application of financial transactions such as digital assets, it also provides rules for risk control to ensure system transaction security. Basic services:The basic service is deployed on all nodes to verify the validity of the business request and to record the valid request and record it on the storage. For a new service request, the basic service first parses the interface, authenticates the process, and then registers and encrypts the transaction or contract through the consensus algorithm, and then stores it completely and consistently on the shared ledger. The consensus mechanism is adaptive, and contains high concurrency in the normal case of network and nodes, and is highly fault-tolerant in the case of network anomalies or node spoofing. Smart contract:Responsible for the registration of the contract and the triggering and execution of the contract. The user defines the contract logic through a programming language. After publishing to the top, according to the logic of the contract terms, the user's signature or other events trigger the execution, and complete the logic of the contract such as transaction settlement. Operational monitoring: Responsible for deployment, configuration modification, contract setting, and real-time status visualization output during product release, such as alarms, transaction volume, network conditions, and node health status.

5.7.2 Platform Product Service Layer IPVC Platform The platform product service layer abstracts a variety of typical applications, providing the basic capabilities and implementation framework for a typical application. Users can build DAPP based on these basic functions, superimpose the unique characteristics of the industry chain business, and easily realize business logic. Users can quickly migrate DAPPs to existing services to meet the needs of new scenarios. They can also use the non-tamperable and non-repudiation features of public-chain systems to solve problems that were difficult to solve before and build new business scenarios. Digital assets:According to the analysis of digital assets such as virtual assets and commercial papers, it is not difficult to find that asset chaining is a key link. To this end, the "asset gateway" protocol was introduced to assist users in the conversion of assets under the chain to assets on the chain. After the assets are chained, the transfer, split, cash withdrawal and other authority operations will be strictly controlled by the account public and private key system. All operations will have signature verification, and both sides will leave traces and cannot be erased. In addition, the application of smart sidechains enables the problem of privilege leveling calls and the identification of digital assets. In this way, a double insurance is superimposed on the user's digital assets. For example, an asset with a valid period, such as a commercial paper, can provide the ability to automatically liquidate at maturity, including asset issuance, asset transfer, asset withdrawal, asset liquidation, and asset inquiries. Data service:The distributed data access service of the IPVC public chain expansion layer is the direction of future big data and cloud computing services. In the Internet age, data is the first means of production, and people as data productivity do not enjoy the data dividends they deserve. The emergence of blockchain distributed cloud storage technology contains broken this situation. The technology contains higher security and lower operation and maintenance costs. The most important thing is that people can truly have the ultimate benefits and authority for the data they create. The era of big data will enter the era of “determination of power” from the “monopoly era” of giants.

u IPVC Multidimensional Public Chain

Page 50: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 50

Forensic service: For the application scenarios such as intellectual property rights, policy preservation (certificate of rights), personal and corporate qualification certificates, fully exploit the ability to be erased and publicized, so that organizations and individuals can use copyright information and insurance materials through simple interfaces or DAPP clients. Qualification certificates, etc. are posted to the trusted blockchain, allowing all billing nodes to testify for themselves. In addition, based on the self-built platform, the user's rights protection will be more convenient, and the evidence confirmation is more authoritative. Such as ownership registration, ownership cancellation, infringement evidence entry, etc. Shared ledger: The reconciliation between financial institutions is basically carried out on a daily basis. The reconciliation method is basically a mutual reciprocal statement, which compares the transaction flow between the two parties. This brings a certain delay to the final transaction confirmation and fund transfer. Some business scenarios that require real-time payment must even be carried out by the business operator. Naturally sharing the books, so that the reconciliation does not have to be sent in the next day, but can be carried out at any time. Both parties can complete the reconciliation by simply connecting the reconciliation logic to the chain. Basically, on-time transaction confirmation and fund transfer can be achieved, and neither party can be denied. Especially for the long-term capital chain, the business involving more links contains a competitive advantage. At the same time, the regulator can also participate in the shared ledger record. Sharing economy:A key factor in the long-term sharing economy is the establishment of a trust mechanism between supply and demand sides, ensuring the smooth implementation of sharing behavior, and providing a way to achieve it from a technical perspective. The endorsement of technical guarantee capability enables multiple participants who are difficult to achieve mutual trust to establish credibility, no need for intermediate institutions or service platforms to build a strong internal audit process, rigorous and complicated accounting backup system, and coordination with regulatory agencies. With the extra facilities, you can achieve the same effect. This saves a lot of cost and makes sharing more efficient and feasible.

5.7.3 Application Service Layer IPVC Application The Application Services Layer ( IPVC Application) provides the use of solution-based application services to end users. In the solution, the application service layer will try its best to provide users with various scenarios, and will provide users with trusted, secure and convenient areas in digital digital bills, enterprise clearing, enterprise incubation, distributed cloud storage, and other new digital business scenarios. Blockchain service. Based on the principle of open sharing, we will work together with various industry partners to explore more intelligent sidechain application scenarios, open up the underlying ( IPVC SQL) and platform application layer ( IPVC Platform) capabilities, jointly develop new application services, and maintain together. New ecology.

5.8 IPVC SQL underlying structure5.8.1 Basic servicesThe basic service module consists of four parts: interface adaptation, consensus management, network communication and distributed data storage:

consensusmanagem

ent

datastorage

The internet

communication

interfaceadaptatio

n

u IPVC Multidimensional Public Chain

Page 51: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 51

5.8.1.1 Interface Adaptation For user-friendly, low-cost access, IPVC SQL provides SQL and API interfaces to the application layer. The API interface supports both synchronous and asynchronous modes. After the interface adaptation layer parses the service request, after the authentication and signature verification, the service request is recorded to the account book through the consensus algorithm. As an client of the consensus management module, the interface adaptation module also participates in consensus management. The interface adaptation module is mainly responsible for the summary and consistency judgment of the results returned by each consensus node. In addition, when the "improved Bft-Raft" consensus algorithm with independent intellectual property rights is used, the interface adaptation module also receives the election switching request from the service side, and the interface adaptation module summarizes the election switching request. When the switching condition is met, the consensus management module is notified to re-elect.

5.8.1.2 Consensus mechanism The multidimensional consensus mechanism is the core technology point of IPVC . In a multi-party participating node under a preset rule, the process of agreeing on data, behavior, or process through interaction between nodes is called consensus. The consensus mechanism refers to the algorithms, protocols, and rules that define the consensus process.

The consensus mechanism is divided into two categories according to the consensus process.:

The first category is a consensus with consistent probability, which is finally confirmed in engineering;

the second category is absolute consensus and then consensus, and consensus is confirmed. A second type

of consensus mechanism is provided to support both adaptive and user-specified configurations.

The adaptive mode is an "improved Raft" algorithm with automatic consensus, high efficiency, fraud

prevention, and independent intellectual property rights when the network is in good condition and contains

no fraudulent nodes. When the fraud node or the faulty node exceeds the threshold, it automatically switches

to A more rigorous "improved Bft-Raft" algorithm with independent intellectual property rights. The user-

specified configuration mode means that the user directly configures a fixed consensus mechanism for

consensus management.

u IPVC Multidimensional Public Chain

Page 52: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 52

5.8.2 Multidimensional excitation layer The IPVC multi-dimensional public chain allocates diversified excitation layers of different algorithms according to different business structures, and is divided into DPOS+BFT+Zero—Knowledge Proof layer, data excitation layer and POC space certification layer. IPVC - DPOS resonant source excitation layer The IPVC native excitation layer adopts the DPOS+BFT optimal algorithm mechanism. All those with a Token number greater than or equal to 1 IPVC have the right to become a super node. The election of the super node is completed in the voting system, and any node with more than 1% of the votes can participate in the "super node organization". The election process is similar to the election of the board of directors by the shareholders' meeting, instead of the shareholders meeting to make daily operational decisions. After authorizing the board, decisions will be more efficient. The rule of DPOS is that the longest chain wins, where each "super node" takes turns to sign the block. If a super node misses the opportunity to sign a block, it will automatically vote for the other nodes. Members who eventually miss the signing opportunity will be disqualified and other nodes will be able to join. These super nodes will receive a block reward.

IPDA - Extended Data Link Incentive Layer The application of distributed database technology represented by IPFS and distributed encryption deduplication technology is imminent. Compared with traditional centralized data storage services, distributed digital technology contains the advantages of security and low cost, and the hardware and software layer builders participating in the distributed network can obtain the benefits of data system distribution for a long time. The extended data link layer of the IPVC public chain system uses the exclusive developed Distributed Encryption Reduplication technology to achieve secure storage of multiple data volumes in a limited storage space. The data copy adopts the N-M+1 copy method. When a data node of a complete fragment database is in a damaged or inactive state, it automatically searches for a better node request service, and the new data node that receives the response automatically provides data. The storage service, the new node automatically obtains the corresponding data points reward of the incentive layer. As a result, at least one complete copy of the data exists in the chain to ensure the integrity and security of the fragmented data.

IPOC - Space Certification Layer PoSpace uses a "quality function" solution to verify the user's storage space and in some way determine the winner of the mining competition. A more reasonable approach would be that miners with more storage space are more likely to win in mining competitions. This is achieved by designing a "quality function". The "quality function" needs to maintain a certain degree of randomness, while at the same time, according to the size of the contribution space to distinguish the probability of each miner winning. Therefore, a simplified approach is to deal with the challenger's challenge. The containsh value (a string of numbers) fed back by the miner is directly used as a random quantity, and the number of digits is increased or decreased according to the space occupied by the miners. For example, if the total size of the space stored by the miner is N, then the containsh value is squared N times to obtain the mass function. In this way, the larger the space stored by the miner, the smaller the value of the mass function. For example, it can be specified that a miner with the smallest mass function wins in a single mining competition.

u IPVC Multidimensional Public Chain

Page 53: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 53

5.8.2.1 Network communication

The network communication module is responsible for message data transmission between nodes and

on the service side. A dynamically self-organizing network that can be multiplexed and connected for sharing.

It can be compatible with existing security facilities such as firewalls and proxy servers, providing peer-to-

peer networking and secure and reliable data transmission.

5.8.2.2 Record storage

Record storage can support the storage of a variety of media, storage media can be a database, file

system, or cloud storage media, such as cloud DB, cloud KV and so on. Record storage uses a blockchain

structure, any tampering with historical data can be found by self-checking, and alarms and automatic

corrections.

Block body Block body Block body

All transaction information in this block

All transaction information in this block

All transaction information in this block

Block height: 390608 Block height: 390609 Block height: 390610

Head containsh: 00000000005e1e25

Head containsh: 0000000000f2f1d

Head containsh: 000000000000c8ae5

Parent containsh: 000000000079fe4d

Parent containsh: 0000000000fe1e25

Parent containsh: 00000000003f2f1d

Merkle Root: 2el1abce579e12a Merkle root: c59e2d8242ef1c Merkle root: c8572f19112456d

Difficulty: 93440670796.32380676

Difficulty: 93448670796.32300676

Difficulty: 93448670796.32380676

Ncnce : 2181060512 Monce:4005489007 Wance:1779633802

u IPVC Multidimensional public chain

Page 54: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 54

5.8.3 Decentralized cloud storage based on public chain systems

In order to facilitate the transmission, the file is divided into multiple blocks, and each block is

containshed to obtain a unique ID, which is convenient for identification and deduplication in the distributed

network. Considering the transmission efficiency, the same block may have multiple copies, which are

stored on different network nodes. Content addressing mode: Each block contains a unique ID, and only the

corresponding block can be obtained according to the ID of the node.

According to the data structure organization form of the database, it is generally divided into Key-Value

type and relation type. Among them, Key-Value type database contains a simple data structure organization

structure, high read and write performance, can support massive concurrent read and write requests, and

contains strong scalability, simple operation interface, and supports some basic reading, writing, modification,

and deletion. Other features, but does not support complex SQL features and transactionality. The relational

database uses a relational model to organize data, supports various SQL functions, is highly functional,

supports transactionality, contains general read and write performance, and is weak in scalability.

According to the deployment form of the database, it is generally divided into two types: single type and

distributed type. Among them, the stand-alone database guarantees strong consistency and good availability.

Distributed databases follow a distributed architecture in physical deployment, providing high concurrent read

and write performance and fault tolerance, strong availability and partition fault tolerance, but the data

consistency of the distributed architecture is weak due to the need for data synchronization. Can only

guarantee final consistency.

IPVC multi-dimensional public chain selection of Sqlite is a lightweight and lightweight embedded

relational database with a maximum capacity of 4T. Data files can be shared freely between different endian

machines, especially for SQL. Developers offer great convenience.

IPVC SQL

IPVC systemchainThe storage technology adopts a composite scheme, combined with the distributed

logbook technology DSN scheme of distributed chain storage and the advantages of YottaChain distributed

encryption deduplication technology, combining three data logical structures Merkle and DAG (directed

acyclic graph) Satisfy content addressing, the ID of the containsh value can be used to uniquely identify the

tamper-resistant content of a single data block, and it is convenient to check the containsh value to confirm

whether the data contains been tampered with. Since the data block containshes with the same content are

the same, it is convenient to remove duplicate data to save storage space.

u IPVC Multidimensional Public Chain

Page 55: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 55

5.8.4 Decentralized encryption to re-book this technology The IPDA data link layer uses Distributed Encryption Reduplication (hereinafter referred to as DER) to be suitable for persistent storage services. The data source is used to encrypt files and upload them. When the files start to enter the DSN network, they are encrypted. Except for the data Owner or its licensor, no one can decrypt it.

5.8.4.1 Encryption DSN scheme protocol: The processing behavior before the Put data randomly generates the storage key (Stk) of the file, encrypts the file by storing the key Stk, thereby generating an encrypted file, encrypting the storage key by encrypting the public key, and separately calculating the data plaintext. The containsh value and the containsh value of the ciphertext, and then the ciphertext, the encrypted storage key, the plaintext containsh, and the ciphertext containsh are saved.1. Containsh(Data)→Hdata calculates the plaintext containsh;2. RandomSym()→Stk randomly generates a symmetric key as the storage key of the file;3. Enc(Stk, Data)→EncData encrypts the file with the storage key;4. Containsh (EncData) → Henc calculates ciphertext containsh;5. Enc(Spub, Stk) → EncStk encrypts the storage key with the user's encrypted public key;6. PutStatic (EncData) stores the encrypted data into the persistent static storage;7. PutPri (Hdata, Henc, EncStk) The encrypted storage key, ciphertext containsh, is stored in the user permission list and recorded under the plaintext containsh. When the data is acquired, the corresponding ciphertext containsh is extracted from the plaintext containsh, and the ciphertext and the encrypted storage key are retrieved from the persistent static storage by the ciphertext containsh, and the encrypted storage key is encrypted by the user's encrypted private key. The decryption is performed to obtain a storage key, and the encrypted data is decrypted by the storage key to obtain a plaintext of the data.1.GetPri(Hdata)→Henc, EncStk obtains the ciphertext containsh and the encrypted storage key from the permission list through the plaintext containsh;2.GetStatic(Henc)→EncData Use ciphertext containsh to retrieve ciphertext from persistent static storage;3.Dec(Sprv, EncStk)→Stk decrypts the encrypted storage key with the user encrypted private key to obtain the storage key;4.Dec(Stk, EncData)→Data decryption to obtain file data optimization DSN scheme effectively guarantees data security.

Safety: Only in the ciphertext outside the data source, only the user's encrypted private key can be used to obtain the plaintext of the data. The user only needs to keep his own encrypted private key without worrying about the data being compromised. Integrity:containsh corresponding data D, there will be no D1 obtained by Get(containsh), where D1≠D. Data recoverability:Put successful data D, there must be a successful Get request to get the data. Disadvantage:The traditional encryption DSN scheme protocol solution does not solve the problem of data deduplication. If the server side wants zero-knowledge encryption, the duplicate data can only be saved repeatedly because the same data becomes inconsistent after passing the traditional encryption method. This is why large cloud storage service providers do not provide zero-knowledge encrypted storage, and distributed chain storage does not provide encryption mechanisms for this purpose.

u IPVC Multidimensional Public Chain

Page 56: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 56

5.8.4.2 IPDA static encryption storage solution

IPDA's expansion of the data chain layer provides a relatively special mechanism to prevent duplicate data while

ensuring the same security, breaking the industry's "common knowledge" and achieving both fish and bear's paw. In

addition to the hierarchical list of user rights, the mechanism also needs to maintain global metadata, record the

correspondence between plaintext containsh and ciphertext containsh, and first detect whether there is the same

containsh value data when writing salt data. If there is no such item, storage.

From the original H(p) to H(p+salt), the containsh function H changes, and the salt used for each containsh

calculation is random. If the H value changes, the existing rainbow table data is completely unusable and must be

regenerated for a specific H, which increases the difficulty of cracking.

1. containsh(Data)→Hdata calculates the plaintext containsh;

2. If CheckDup(Hdata) = TRUE goto Step 12 If the same data already exists, go to step 12.

3. RandomSym()→Stk randomly generates a symmetric key as the storage key of the file;

4. Enc(Stk, Data)→EncData encrypts the file with the storage key;

5. containsh (EncData) → Henc Calculate ciphertext containsh;

6. GenKey(Data)→Sdata generates a symmetric key based on the plaintext data;

7.String Input With Salt = inputStr + salt / / Enter the salt, add the salt with the data, then calculate the containsh value.

Because plaintext containsh is a public value, without salt, it leads to low security, and users who do not have data

plaintext can also obtain the key. To ensure consistency, salt values can be generated by a fixed algorithm. For example,

first make the first containsh as the salt value, add the salt and then calculate the second containsh as the symmetric key.

Two Hah can use different algorithms to improve the security again.

8. Enc(Hdata, Stk) → EncStk’ Encrypts the storage key with a symmetric key generated in plain text. This is a key step in

the principle of de-empcontainsis after data encryption. The plaintext is used as the key, the key is encrypted as plaintext,

and the inverse symmetric association of the metadata is generated to join the global metadata list.

9. PutStatic (EncData) stores the encrypted data into persistent static storage;

10. PutMeta (Hdata, Henv, EncStk) records the ciphertext containsh and plaintext encrypted storage keys in the global

metadata table and records them under the plaintext containsh.

11. Goto 15;

12. GetMeta(Hdata) →Henv, EncStk’ extract the ciphertext and plaintext encrypted storage key from the global metadata

table;

13. GenKey(Data)→Sdata generates a symmetric key from the data plaintext using the same algorithm;

14. Dec(Sdata, EncStk') → Stk decrypts the storage key with the symmetric key;

15. Enc(Spub, Stk) → EncStk encrypts the storage key with the user's encrypted public key;

16. PutPri (Hdata, EncStk) Stores the encryption key encrypted by the encryption key into the user permission list and

records it under the plaintext containsh.

u IPVC Multidimensional Public Chain

Page 57: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 57

5.8.4.3 IPDA method for decrypting static data In the Get data, the corresponding ciphertext containsh is taken from the plaintext containsh from the global metadata table, the ciphertext is retrieved from the persistent static memory through the ciphertext containsh, and the encrypted storage key is taken out from the permission list. The encrypted private key of the user decrypts the encrypted storage key to obtain a storage key, and then decrypts the encrypted data with the storage key to obtain data plaintext.1. GetMeta(Hdata)→Henc obtains the ciphertext containsh from the global metadata table through the plaintext containsh;2. GetPri(Hdata)→EncStk obtains the storage key encrypted by the encrypted public key from the permission list through the plaintext containsh;3. GetStatic(Henc)→EncData uses the ciphertext containsh to retrieve the ciphertext from the persistent static storage;4.Dec(Sprv, EncStk)→Stk decrypts the storage key encrypted by the user encryption public key with the user's encrypted private key to obtain the storage key;5.Dec(Stk, EncData)→Data decrypts to obtain file data. The IPDA optimized DSN solution not only effectively guarantees the security of the data, but also implements encryption deduplication. In order to better achieve the deduplication effect, the data can be divided into fixed lengths, and each block is de-duplicated separately. The above scheme is only used to store static data. 5.8.4.4 IPDA Encrypted Dynamic Data Scheme When storing dynamic data, not only the ID that does not change with the content is used instead of containsh as the identifier of the data, but also the user is given the verification of the write permission to prevent the data from being overwritten by others. The creation process is as follows: 1. RandomAsym()→Swpub, Swprv randomly generates an asymmetric key as a write permission key;2. Create (Swpub) → ID Create dynamic data, obtain a unique ID, and record the write permission public key corresponding to the ID;3. RandomSym()→Stk randomly generates a symmetric key as a storage key;4. Enc(Spub, Stk) → EncStk encrypts the storage key with the user's encrypted public key;5. PutPri (ID, EncStk) The storage key encrypted by the encrypted public key is stored in the user permission list and recorded under the ID item;The process of writing data each time is as follows:1. GetPri(ID)→EncStk retrieves the encrypted key from the user permission table after encrypting the public key;2. Dec(Sprv, EncStk)→Stk decrypts the storage key encrypted by the user's encrypted public key with the user's encrypted private key to obtain the storage key;3. Enc(Stk, Data)→EncData encrypts the file with the storage key;4. containsh (EncData) → Henc calculates ciphertext containsh;5. Enc(Swprv, Henc) → EncHenc signs the ciphertext containsh with the write permission public key of the ID;6. PutDyn (ID, EncData, EncHenc) Writes the encrypted dynamic data, with the signature data representing the write authorization.Nodes that store fragments of dynamic data need to verify write permissions before writing dynamic data:1. GetKey(ID) → Swpub takes the write permission public key corresponding to the ID;2. Containsh (EncData) → Henc calculates ciphertext containsh;3. If Dec(Swpub, EncHenc)= Henc Write(EncData) If the signature verification is passed, the read flow of writing data dynamic data is as follows:

u IPVC Multidimensional Public Chain

Page 58: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 58

1. GetPri(ID)→EncStk obtains the storage key encrypted by the encrypted public key corresponding to the ID

from the permission list;

2. GetDyn (ID)→EncData reads the ciphertext from the dynamic data storage area with the ID;

3. Dec(Sprv, EncStk)→Stk decrypts the storage key encrypted by the user's encrypted public key with the

user's encrypted private key, thereby obtaining the storage key;

4. Dec (Stk, EncData) → Data decryption to obtain file data;

5.8.4.5 IPDA Encrypted Dynamic Data Scheme

Unified redundancy is used, and any data is automatically encoded into N fragments. As long as there

are any M fragments, the data can be recovered, and then the N fragments are stored in N storage nodes,

and each node stores a fragment. In this way, as long as N-M+1 nodes fail at the same time, the data

integrity is not lost.

u IPVC Multidimensional Public Chain

Page 59: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 59

Through the KAD algorithm, distributed chain storage distributes data blocks of different IDs to network nodes that are close to each other to achieve distributed storage. When obtaining files through IPDA, you only need to download the block data from the corresponding network nodes according to each block ID according to the ID of each block, and finally verify whether the data is complete and finally complete the stitching. When any node fails, the IPDA system will immediately select another node to reconstruct the data of the failed node. Only need to rebuild the first failed node before the completion of the other NM nodes will also fail, ensuring that the data will never be Lost. Each node monitors and verifies each other. Any node can be quickly discovered once it fails. When reconstructing the data of a failed node, the most efficient nodes are selected and segmented. Multiple nodes optimize the reconstruction data to speed up the reconstruction. speed. For example, 1000 file fragments are stored on the failed node. It takes an average of 0.5 seconds to reconstruct a fragment. The system preferably contains 100 nodes involved in the reconstruction. Each node only needs to reconstruct 10 fragments, and the reconstruction can be completed in an average of 5 seconds. As long as the other N-M nodes of the same file do not expire at the same time within 5 seconds, the file data will not be lost. The redundancy of DER technology is good and the geographical location is scattered. Don't worry about the damage of the hard disk and the operation and maintenance of the individual nodes. In August 2018, Tencent Cloud lost user data due to operation and maintenance errors. Lightning weather (September 2018 caused lightning strikes in some areas) Azure cloud services are down for more than 20 hours), power outages, fiber breaks, earthquakes, fires, and other force majeure causes data loss. Because nodes are scattered and redundant, and are not afraid of DDOS attacks, the cost of IPDA storage is much lower than that of centralized storage. The reasons are: IPDA adopts the most mature distributed encryption and de-duplication (DER) technology in the data storage industry, which can safely implement data deduplication, and reduce the hard disk space occupied by the same data by 5-10 times. Most storage nodes have few Storage equipment, no special refrigeration system (one-third or even half of the data center power consumption), natural ventilation can be used to dissipate heat, CapEx and OpEx are greatly reduced, domestic storage miners need no additional bandwidth, no need to pay rent Cost, household electricity is also lower than industrial electricity. Most of the IPDA storage nodes do not need professional operation and maintenance, each node is automatically running and other nodes will be automatically repaired if there is an unexpected failure, which saves expensive operation and maintenance costs. IPDA's large number of storage nodes use idle hard disk space, which is sunk cost, and the marginal cost is close to zero. The IPDA data link layer is supported by the storage industry leader team, which provides technical support for the centralized storage binary, including but not Limited to block storage, NAS storage and object storage, enabling centralized storage-based applications without re-development, no need to change source code, no recompilation, seamless migration directly using IPDA encryption to re-storage services. As a result, existing centralized storage applications can be upgraded through the IPDA data link layer business ecosystem, and the storage market scale is more than $100 billion per year. A distributed ledger is a database that is shared, replicated, and synchronized between network members. A distributed ledger records transactions between network participants, such as the exchange of assets or data. Participants in the IPDA data chain layer constrain and negotiate updates to records in the reconciliation book based on consensus principles, without the involvement of intermediate-tier third-party arbitration institutions (such as financial institutions or bill exchanges). Each record in the distributed ledger contains a timestamp and a unique cryptographic signature, which makes the ledger an auditable history of all transactions in the network. One implementation of distributed ledger technology is the open source Hyperledger Fabric blockchain.

u IPVC Multidimensional Public Chain

Page 60: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 60

The following aspects of the IPVC public chain further expand the use of distributed ledger technology:1.Real name registration and identification: Entity identity registration and identification is an important basic module. The IPVC public chain contains designed a multi-faceted, multi-level registration, authentication and authorization system for participants and related resources. The entity identity and authorization module is designed to provide a multi-level identity authentication and authorization system. By flexible configuration and integration of its own authorization service or third-party authentication mechanism (such as CA authentication), it is also possible to conduct community-based implementation of various types of account ontology. Endorsement of certification, and integration of different auditing mechanisms according to business scenarios, systemic identity authentication and authorization for blockchain participating nodes and participants. 2.Data directory: Using distributed ledger technology, directory registration can be performed on the provided data categories, and the matching between the unique identification of the data (ONT Data ID) and the data resource acquisition address (Data URI) can be matched to the required data and passed. The comparison of ONT Data ID data deposits determines the effective credibility of the data.3.Data exchange: Using distributed ledger technology, it can realize the data exchange framework based on entities (people, things, equipment, content...), revitalize personal data assets, make data flowable, and use standardized protocol design to support data creation, discovery, and Authorization and transaction, help users to fine-grain the data control, to meet the user's own privacy needs while seeking the benefits of data reuse.4.Process synergy: Process collaboration (distributed transactions) using distributed ledger technology, entity cross-chain and cross-system privacy, and specif ic cross-chain protocols. That is, mult ip le steps of the process/transaction are distributed on different blockchains or systems to ensure the identity privacy of different entities in different systems and blockchains, and to ensure the consistency of the entire transaction. 5.Behavioral Deposit and Smart Contract: Through the use of distributed ledgers, more than just providing data deposits, but also through the support of smart contracts, different businesses can carry out more business flows to support the deposit. That is, each time data request, data matching, data process expansion and innovation, in the business process coordination, control and exchange, etc., the establishment of the transfer and the use of data are recorded in the ledger, forming a data-specific technology. Trust mechanism. The record of the process ensures that the data is safe, reliable and not leaked.

Blockchain B System BCross-chain

GatewayDistributed database

Blockchain A System A

Blockchain C System C

IPVC IPDA

u IPVC Multidimensional Public Chain

Page 61: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 61

Distributed data exchange systemThe IPVC public chain provides a range of underlying functional and protocol support for distributed data exchange.1 Distributed Data Exchange Protocol: Compatible to support multiple different types of global data exchange protocols to support different business scenario requirements, while combining data exchange protocols with distributed ledgers to form a distributed data exchange process and providing a series of data and privacy-protected cryptography Component support.2 data authorization mechanism: In the data exchange system, data privacy protection and data leakage prevention are always the focus. In the trust ecology established by the network, an authorization mechanism is designed, that is, any transaction involving data related to the data subject, and the data stakeholders (single or multiparty) need to be notified to conduct the authorized transaction. 3 Copyright protection of data: According to the digital characteristics of data, it provides data deposit and lifecycle management functions, and designs the life cycle traceability mechanism of related data. First of all, the realization of digital identity for each piece of data, in order to track the entire process of its registration, request, authorization, transaction, etc.; second, the copyright protection of data, the transaction of data assets are recorded in the distributed ledger . 4 Distributed storage of data: Provides a distributed data storage layer that supports data exchange and supports various data applications.

5 Cryptography Technology and Data Protection Components Ontology Crypto Package (OCP):

Provides a series of cryptography and data security component support in multi-dimensional entity

authentication, distributed data exchange, distributed process protocols, etc., including data encryption

transmission, key sharing protocol, multi-party key management, ring signature component , blind

signature component, threshold sharing mechanism. In the identity and data verification process, zero-

knowledge proof and homomorphic encryption scheme are provided. In the data collaborative application

process, both parties provide calculations and further explore multi-party technical solutions in the future.

In addition, for specific scenarios, specific security components are provided, and upper-level application

implementers are supported to build applicable security application protocols based on security

components.

u IPVC Multidimensional Public Chain

Page 62: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 62

5.8.4.6 Distributed Cloud Storage Database Distributed Chain Storage The DSN of a distributed storage network is the total storage and self-coordination provided by multiple independent storage providers to provide data storage and data retrieval to clients. Coordination agreements are decentralized and do not require trusted parties. The safe operation of the system is achieved by a protocol that coordinates and verifies the operations performed by the individual parties. DSNS can adopt different coordination strategies, including Byzantine, Gossip, or CRDT. Avoid management errors and storage failures, ensuring data integrity and recyclability. Use clone proof and space-time mechanism to ensure the uniqueness and consistency of data, user and time. I clone proof Cloning proves that the prover makes a valid prover convince the user that there is a different copy of a certain data, and this data contains a unique dedicated physical storage, when the user needs to extract the data, through verification, at any node A unique physical copy of the data can be found.II time and space certificate Storage certification refers to whether the user contains the inspection data storage service provider stored storage outsourcing data, and the introduction of space and time certification effectively prevents the user from repeatedly checking the data storage situation caused by the system bottleneck. The user can check if the certifier contains stored his outsourced data for a period of time, recursively executing the execution to generate a short proof to confirm the time. III Practical Cloning Proof Construction The installer algorithm creates a copy by generating a certificate through a stamp operation. The prover generates a copy and outputs it to the validator. This proof algorithm generates a proof of storage of the copy and is therefore subject to random verification. Validation of the proof of storage is verified by an algorithm that verifies the Merkel root of the given copy and the containsh of the original data. These certificates can be verified by nodes in a distributed system that maintain a ledger or are interested in specific data. IV Practical time and space proof construction The algorithm proves that a replica of the spatio-temporal proof is generated, the prover accepts the random request from the random verification and generates a clone proof sequence column, using one proof output as a specified amount of iteration of the other input.

u IPVC Multidimensional Public Chain

Page 63: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 63

5.8.5 Hybrid Cloud Storage Solution Based on Smart Sidechain Looking at the history of science and technology, there will be four periods in the emergence of any new technology: technology development period, technology testing period, technology dividend period and market dividend period. At present, the most complete distributed chain storage system with the most technical architecture is in the early stage of the technical testing period, which means that the public cloud solution of distributed cloud storage is far from the Earth, and it is more talked about the dividend period, the landing of the public chain DSN distributed storage technology. Long and tortuous. Today is the era of central cloud storage giants. After years of development and accumulation, central cloud storage technology contains incomparable advantages in terms of performance, response speed, application layer and market share. In contrast, although the public-chain DSN distributed storage solution contains many benefits such as digital incentives, good privacy, high security, and low operation and maintenance costs, there are some pain points that are currently difficult to solve: 1. The existing public-chain DSN distributed storage technology route is completely different from the traditional central cloud storage, and the current application is difficult to land; 2. The market share of centralized cloud storage is extremely high, and the DSN distributed storage market contains not yet formed; 3. The existing public chain system TPS contains low performance and cannot meet large-scale commercial applications. With the continuous development and advancement of DSN distributed storage technology, the transformation of centralized cloud storage technology is an inevitable trend. Technology transformation means the emergence of the storage industry chain, which is clearly in the midst of a huge vacuum between the centralized cloud and the scattered cloud storage market. Combining the technical advantages of intelligent sidechains, the following feasible hybrid cloud storage solutions are formed: 1. Perform traditional encryption and block processing on popular centralized data services, cut into copyright data and content data, encrypt the copyright data with smart sidechain technology, and confirm the rights of data sovereign owners. Correlation is strongly anchored; 2. The encryption method of content data is traditional, such as WinRAR or ZIP method, using centralized cloud storage, such as Amazon cloud; 3. Set the IP in the form of contract nesting Multiple value chain The digital pass incentive mechanism provides a corresponding digital certificate for users who adopt a hybrid cloud storage solution.

The advantages of intelligent side chain hybrid solutions:1. Rapidly realize the application landing, and solve the painful point of the existing DSN distributed storage technology;2. The fragmentation data security is comparable to the DSN distributed storage scheme, and the digital weighting method is superior to the public chain single encryption method;3. A small part of the data is on the chain, the content data adopts the traditional solution, avoids the shortcomings of the current TPS performance of the public chain system, and contains the advantage of the existing central data system, filling the vacuum period of the data industry;4. Enlarge the role of the IPDA incentive layer. The larger the data transaction volume, the more transaction levels, and the more rewards are obtained;The diversified rules of intelligent sidechains have stronger market adaptability and enter the technology dividend period before the public-chain DSN distributed storage scheme falls.

Number owner

Data asset package

Smart SidechainIncentives

Data buyer Big data market

u IPVC Multidimensional Public Chain

Copyright data

contentdata

Page 64: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 64

5.8.6 IPOC and IPDA double layer data incentive mechanism The IPVC cloud miner is a distributed cloud storage server matrix and decentralized cloud storage network traffic nodes, mainly used for decentralized cloud storage of educational resource pools and other industry data. The node device optimizes the data service operation model according to different business logics and response services, and stimulates multiple incentive layer protocols, allowing users to participate in the construction of the IPVC industry chain layer ecosystem while enjoying IPVC 、IPOC and IPDA multi-digital pass revenue. IPOC digital certificate can be obtained through all large-capacity network terminal devices that meet the requirements of IoT standards and sensor data. The data transmission type is a space network container that meets the specific encryption protocol chain and belongs to the IPVC public chain. POC (Proof on Space) is adopted. Spatial proof algorithm. The IPDA data link layer is shared with the IPOC node layer interface, and different hierarchical API interfaces are adapted according to the actual needs of the data service. The ESR (Efficiency Source Resonance) efficiency resonance source algorithm is adopted for the extended big data chain layer of the IPVC public chain.

u IPVC Multidimensional Public Chain

Page 65: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 65

5.8.7 User Management User management mainly addresses the mapping of user identity to address, the confidentiality of user

privacy, and the traceability of regulatory auditing. From the business scenario, some application scenarios

require anonymity and transaction irrelevance, such as mainstream digital assets; some scenarios do not

require anonymity and irrelevance, such as source tracking. To take into account these two scenarios, key

management requires strong adaptability and compatibility. The IPVC public chain system provides users

with a variety of flexible and freely configurable configurations.

From the perspective of user access, one is the original system transformation access, there is a key

security management system with high security level, such as institutional clearing, bank factoring, etc., and

the other is new application scenario access or The original system contains not yet perfected the key

management system. In order to inherit the key security management system with high security level and

retain the usage habits of the original users, the IPVC public chain system provides four key modes:

traditional key system integration, intelligent side chain permission grading, full hosting and partial hosting. .

Traditional key system integration: Applicable to users with high security level of the original private

key system, such as financial institutions, bank U shields, electronic signatures, etc. For such users, only the

private key system of the original user needs to be associated with the user address.

Intelligent side chain privilege ratingApplicable to users who have requirements for application

scenarios such as company management, community governance, and equity allocation, the user can be

classified and confirmed by the private key authorization method.

Partial hosting: A part of the main body of the access service contains a higher security level key

system or multiple technologies interworking scenarios. In the case of partial hosting, the multi-party address

association and consistency of participation are guaranteed.

Fully managed: Suitable for new access scenarios and scenes with high Internet habits. The original

system of user name and password is associated with the secure key generation and management system

to isolate the user information from the address and protect the privacy of the user.

For the fully managed mode, the VES user management system consists of four parts: account

management, key management, rights management and risk control audit.

User Management

account registrationAccount login

Account cancellation

Key generationKey association

Key safeKey signature chain

Key signature chainPrivilege ratingAccess control

User associationAudit controlWind control management

A P INTOA c c o u n t m a n a g e m e n t

a u t h o r i t ym a n a g e m e n t

K e y m a n a g e m e n t

W i n d c o n t r o l a u d i t

u IPVC Multidimensional Public Chain

Page 66: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 66

5.8.7.1 Account Management

Account management is responsible for user account management, including account registration, login,

logout, and account and key irrelevance processing. When the account is registered, the identity information

such as the user name and password that the original user is accustomed to is mapped to the address. After

the account is logged in, relevant business requests can be sent. In the scenario where the transaction is

highly confidential, the user can use the address irrelevance processing to make the different transaction

behaviors of the same user have no relevance in the block record storage, thereby improving user security

and transaction confidentiality.

5.8.7.2 Key Management

In the fully managed mode, the key management system is responsible for the association of the user

key with the account, key security management, and loss recovery. The user key is generated on the client,

and the user can choose to save the key in the key safe or entrust the account to the associated account, so

that the key is lost and retrieved. In order to ensure the reliability of the relationship between the user

account and the key, the key management system of the IPVC public chain uses the multi-node chain

storage for the signature of the association relationship.

5.8.7.3 Authority Management

The rights management module is responsible for the control and management of user accounts, key

systems, node joins and exits, and data access. Including audit permissions, account delegation permissions,

node consensus permissions, and user data access permissions. Auditing authority is to provide auditing

functions for the regulatory authorities, and to strictly control the access rights and data scope. Users who

are not related to transactions on the shared ledger can be associated with users.

The account delegation authority is used to control the access control of the user account delegation

relationship, the consensus authority performs the consensus authority management on the participating or

newly joined nodes, and the access authority is used to manage the client's data query authority on the IPVC

public chain.

u IPVC Multidimensional Public Chain

Page 67: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 67

5.8.7.4 Wind Control Audit

The wind control module is responsible for risk control of the trading behavior of digital asset classes in

the chain. The IPVC public chain provides a risk control expert model system. By analyzing and capturing

the deep relationship between massive data, the risk control rules are adaptively adjusted, and risks and

management are discovered in time. Wind control and control risks to prevent problems before they happen.

The audit module provides auditing capabilities for the auditing organization, and through strict authority

control management, ensures that the auditing function can only be used by the auditing organization.

5.8.8 Smart Contract

The blockchain contract section includes both standard contracts and business-customized contracts.

Standard contracts include asset consistency check, automatic transaction matching, multi-party

confirmation transfer, and automatic clearing of contracts, which are relatively simple contracts. They are

built-in contracts and can be directly linked to the IPVC public chain. User-customized smart contracts

include the ability to modify configurations and add other business logic through contract templates, as well

as support for more complex user-programmed contracts that run in relatively independent environments.

Smart contracts include four parts: contract registration, triggering, execution, and cancellation.

Contract inspection consensus processing

Contract rollover

Contract cancellationContract registration

Timed trigger

Practice triggering contract trigger

Contract trigger

Construction mirror state consensus

Code execution error rollback

Contract execution

Contract generation

registration consensus

security check contract

storage

u IPVC Multidimensional Public Chain

Page 68: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 68

Contract registration

Contract registration is the process of storing the consensus on the chain after the user contains written

the contract security check.

Ø Contract trigger

Contract triggering is the process of triggering contract execution through external conditions after

contract registration, supporting timing triggers, event triggers, trade triggers, and other contract triggers.

Timed triggering is the process of automatically triggering a contract call after the node triggers the time

consensus after the time preset in the contract is met. Events, transactions, and other contract calls are

triggered by a new request consensus process.

Ø Contract execution

Contract execution is the complete process of running contract code in a separate environment,

including a contract construction environment, code execution, consensus on state changes in the execution

code, and consensus exception handling.

Ø Contract cancellation

Contract cancellation is the process of dumping, cleaning, and cleaning up contracts that have been

executed, expired, or changed in business requirements. The process of cleaning up and cleaning up

requires multiple nodes to complete.

u IPVC Multidimensional Public Chain

Page 69: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 69

5.8.9 Operational Monitoring

In order to quickly access and access the system, the system can quickly and accurately identify the

running status of the system and meet other operation and maintenance requirements during operation,

such as storage account expansion and program upgrade. Provides a complete, fast, and visual operation

monitoring system. Operation monitoring mainly includes configuration, monitoring, alarm, release, and

service analysis.

5.8.9.1 Configuration

Responsible for processing the relevant configuration of the network node, such as the selection of the

consensus algorithm, the adaptive threshold, the storage method of the storage book, the network routing

mode, etc., the configuration itself can be issued as a transaction in the form of a transaction, and then

agreed upon by the consensus algorithm. Effective.

5.8.9.2 Monitoring

Responsible for collecting state data running in the system and visualizing it. The status data in the

system includes the system's access volume, time-consuming, node health status, and comparison of the

underlying machine resources (CPU, memory, hard disk) usage status, etc. Through visual monitoring, the

status of the entire chain system can be known in real time.

5.8.9.3 Warning

The IPVC public chain notifies the relevant personnel through SMS, telephone, WeChat, email, etc. in

the serious situation of the system, such as fraudulent nodes, account tampering, machine failure, etc., in

order to deal with it in time.

Release 5.8.9.4

The IPVC public chain can be supported by the release module for operations such as initial deployment

of the system, upgrade of the running program, and node expansion during the running process. The

publishing module guarantees the consistency of executable programs of important modules such as

interfaces and consensus algorithms.

5.8.9.5 Business Analysis

Business analysis includes data consistency detection between nodes and multi-dimensional statistics

and analysis of transaction data, which can provide specific authorized users with charts for business

statistics analysis and business development trends.

5.8.9.6 Cloud Adaptation

The cloud adapter provides the interface adaptation of the current mainstream cloud operators, which

makes it easier to deploy on the cloud for maintenance and expansion.

u IPVC Multidimensional Public Chain

Page 70: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 70

Business Ecology

Page 71: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 71

IPVC protocol

God

Earth Person

The god is the world. Is the law incarnation in the digital world.Is also a chain agreement and incentive mechanism

Human value Is an individual in the intellectual age IP is the core of the era of Big Calculation

The digital worldAccurate big data Constituent“Digital Earth”All landing projects are components

u Digital Ecosystem

Page 72: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 72

u Digital Ecosystem

IPVC valueProtocol can be a number (blockchain).God (rules)>>>Earth (data production data)>>>Person (personal network)confirmation.

Will Reconstructing the production relationship in the era of big data is of great significance

B u i l d i n g a t r u s t e d n e t w o r k S y s t e m , m a i n c h a i n a d o p t i o n DPOS+ZKProof+BFT Optimal algorithm,Is the underlying application public chain in the Avatar Ecology.

IPVC

Page 73: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 73

u Digital Ecosystem

Internet computing project in the era of Big Calculation,It contains

blockchain, neural network engine, manual

Intelligent deep learning and new distributed data perpetuation

technology will ultimately focus on IP nodes

BIG CALCULATION

Page 74: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 74

u Digital Ecosystem

Human network is a blockchain digital network with human IP as a node

Is the core of exploring spiritual eternal life

Personal information by numberStored on a distributed network in the form of DNA

The human network is the basic framework of the era of Big Calculation.

Human network

Page 75: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 75

Token Issued

IPVC

Page 76: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

Ecological mining34% IPVC resonance33% DPOS consensus mechanism 33%

- 76

IPVCResonance

33%

Ecological mining

34%

DPOSConsensus mechanism

33%

u Total release ratio allocation:

First, USDT User 1:2 Redeem AVA:1, the total amount of exchange (7 million AVA) is based onThe first release of the IPVC value chain.

2、After the IPVC main chain is online, the user uses AVA private key and import to IPVC wallet client, you can get airdrops immediately IPVC , no time limit for receiving.

Resonance mining Creation fund Community incentives

Distribution plan proportion Quantity

Community miner 70% 147,000,0000

Technical operation 20% 42,000,0000

Foundation 5% 10,500,0000

Partner 5% 10,500,0000

Intelligent Property Value Chain's value data equity certificate is referred to as IPVC , and the number of issues issued is 2.1 billion. Via IPVC value conversion protocol, VPot, IPVC , VAsset, DATN, RSC,Titan Exchange the large-scale digital equity certificate (BCT) according to the ratio of 6:1:1:1:1:1 = 1.

Page 77: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 77

The Practical Significance of AVATAR

AVATAR is one part of the IPVC value chain. AVATAR will Use new technology, achievements IPVC

Value Chain Greater value. Zero knowledge proof, smart contract, DPOS+BFT+Zero—Knowledge Proof

encryption deduplication POC such an increase in mechanisms will make IPVC network is easier to use,

efficient, reliable and environmentally friendly, creating a large computing network that is truly suitable for

the future of society.

AVATAR Fire Plan Innovation —— Lay a solid foundation for the construction of a perfect large

computing system in the future, release IPVC the full energy of the value network.

AVATAR Will continue to develop. This allows for a variety of scenarios to be implemented on the chain

by employing all existing platforms and networks. Payment, clearing and settlement, supply chain, billing,

evidence storage, copyright, internet of things and games will be integrated into IPVC In the blockchain.

AVATAR Digital System

Avatar (AVATAR) system —— "Digital Heaven and Earth":

Digital assets created by distributed precision big data technology that can share value-creating value —

"Digital Earth"; use intelligent communication as an incentive mechanism for all relevant-sizedecological

organizations —— "Vanzhongtian"; distributed Collaborative, intelligent networked distributed

organization ecology —— "person network."

Basic Information:

English name:AVATAR

Abbreviation: AVA

Chinese name: Avatar

Total circulation: 2.1Billion AVA

Consensus: Smart token

Privacy protection: zero knowledge proof

Smart Contract: Support

AVA release

total2.1Billion AVA, first round release 7 Million AVA fire, resonance generation 2.1Billion IPVC Token 。

Page 78: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 78

Disclaimer

IPVC

Page 79: IPVC · In this regard, the top blockchain geeks and experts from the resonance source community have developed the IPVC protocol, the value Internet protocol for the era of Big Calculation,

IPVC  AVATAR

- 79

1. This document is for informational purposes only. The contents of this document are for reference

only and do not constitute IPVC And any investment advice, advice or invitation from the relevant

company.

2. This document should not be construed as a forced participation.

3. Participation in this project means that the participants have reached the age standard and have

complete civil capacity.IPVC The signed contract is true and effective. All participants are voluntarily

signed and signed before the contract is signed.IPVC clear and necessary understanding was made.

4.The IPVC team will continue to make reasonable attempts to ensure that the information in this white

paper is true and accurate. During the development process, the platform may be updated, including

but not limited to platform mechanism, Token and its mechanism, Token allocation, the team will

publish the update by publicizing the announcement or new white paper on the website. Participants

are required to keep the latest white papers in a timely manner and adjust their decisions in a timely

manner based on the updates. IPVC It is expressly stated that it does not assume any loss caused by

the participants' reliance on the contents of this document, the inaccuracy of the information in this

document, and any actions caused by this article.

5. The team will spare no effort to achieve the goals mentioned in the document, but based on the

existence of force majeure, the team can not fully commit.

6. The official Token of this project is an important tool for platform performance, not an investment

product. Having an official Token does not mean granting the owner IPVC All of the platform, control,

decision-making power. Token of this project does not belong to the following categories: a, any kind of

currency; b, securities; c, the legal entity's equity; d, stocks, bonds, notes, warrants, certificates or other

instruments that grant any rights.

7. The value-added of the Token of this project depends on the market rules and the demand after

application, it may not have any value, the team does not promise its value-added, and is not

responsible for the consequences caused by the increase or decrease of value.

8. To the maximum extent permitted by applicable law, damages and risks arising from participation in

the project, including but not limited to direct or indirect personal damage, loss of commercial profits,

loss of commercial information or any other economic loss, The team is not responsible.

9、The IPVC platform complies with all regulations and industry self-regulatory declarations.

Participant participation means that the inspection will be fully accepted and adhered to. At the same

time, all information disclosed by the Participant to complete such an inspection must be complete and

accurate.

10、The IPVC platform clearly communicates the possible risks to the participants. Once the

participants participate in the project, they accept and recognize the terms and conditions in the

detailed rules and accept the potential risks of the platform at their own risk.