SlideShare une entreprise Scribd logo
1  sur  21
Blockchain and It's Practical Use Cases
Ken Bradberry, CTO Xerox Healthcare
• A blockchain is a data structure that makes it possible to create a digital
ledger of transactions and share it among a distributed network of
computers.
• It uses cryptography to allow each participant on the network to
manipulate the ledger in a secure way without the need for a central
authority.
• Once a block of data is recorded on the blockchain ledger, it’s extremely
difficult to change or remove.
• When someone wants to add to it, participants in the network — all of
which have copies of the existing blockchain — run algorithms to
evaluate and verify the proposed transaction.
• If a majority of nodes agree that the transaction looks valid — that is,
identifying information matches the blockchain’s history — then the new
transaction will be approved and a new block added to the chain.
What is Blockchain?
2
Block Chain Diagram
Blockchain Example
4
Username +
Password +
Biometric data
Basics – Tokenization (public/private keys)
Create a Secure Identity
for Everything
Token -
0x23e423s3234…
Owner -
0xfe839a340d…
Owner
• id
• proof
Person
• Userna
me
• SSN
• DOB
Data
• Address
• Phone
Slides courtesy of Microsoft
Basics – Tokenization composites
Slides courtesy of Microsoft
Basics – Ownership – Introduce a ledger
Slides courtesy of Microsoft
Blockchain | Overview
Cryptographically Authentic
Uses tried and true public/private signature
technology. Blockchain applies this technology to
create transactions that are impervious to fraud
and establishes a shared truth.
Shared
Blockchain’s value is directly linked to the number of
organizations or companies that participate in them. There is
huge value for even the fiercest of competitors to participate
with each other in these shared database implementations.
Distributed
There are many replicas of the Blockchain
database. In fact, the more replicas there are,
the more authentic it becomes.
Ledger
The database is a read/write-once database
so it is an immutable record of every
transaction that occurs.
8
Slides courtesy of Microsoft
Cryptographically authentic shared distributed
ledger
Blockchain ledger
Block
0x5f23827e3cd1…
0x6f23827e3cd1…
0x3e23827e3cd1…
0x6f23827e3cd1…
0x5f23827e3cd1…
SmartContracts
Blockchain ledger
Payments and Remittance – Transactions can occur directly between
two parties on a frictionless P2P basis. The technology’s application for
overseas transactions has the potential to reduce risk, transaction costs
and to improve speed, efficiency and transparency.
Issuance, Ownership and Transfer of Financial Instruments – A
blockchain-based securities market allows traders to buy or sell stocks
directly on exchanges or directly to other market participants in a P2P
manner without the intermediation services provide by a broker or
clearinghouse.
Clearing and Settlement Latency – On the blockchain, the entire
lifecycle of a trade, including its execution, clearing and settlement can
occur at trade level, lowering post-trade latency and reducing counterparty
exposures.
Practical Use of Block Chain - Financial
Smart Contracts – Smart contracts would automatically pay providers
when conditions of service are established such as;
•Validation that a service was received by a registered Medicaid patient
•Service was provided by a properly registered doctor & provider
•Neither party is on a known list of past participants in any fraud
Cost Containment – The block chain can be filtered to identify and alert
about specific activity on the chain, monitoring, using patterns, can include
data that represents a doctor, consumer, drugs, procedures, all can to
tokenized and added to the chain.
• Building a rule base using best practices, CPT codes, ICD codes,
medical procedures and other costs can be monitored and audited
using blockchain.
Practical Use of Block Chain - Healthcare
12
EHR storage & security - Blockchain is a security technology at its core
and with the ever-present concern over the security of electronic health
records, it is likely to cater to this challenge first as it enters healthcare.
This approach can secure medical records and audit trails using the
Blockchain.
• We can do this by cryptographically encoding private medical data and
then a digital fingerprint is formed for time-stamping and verification
purposes.
DNA wallets – This concept stores genetic and medical data which is
again secured via the blockchain and accessed using private keys and
this will form a “DNA wallet”. This could allow healthcare providers to
securely share – and possibly monetize – patient data, helping
pharmaceutical companies to tailor drugs more efficiently.
Practical Use of Block Chain - Healthcare
Practical Use of Block Chain - Healthcare
Anti-counterfeit drugs – The industry is designing blockchain in the
fight against counterfeit drugs. It features panels on drug packages
that can be peeled or scratched off to reveal a unique verification tag.
This is then cross referenced with the blockchain to ensure that the
pharmaceutical product is legitimate.
Protein folding - Stanford University previously relied on expensive
super computers to simulate protein folding as it happens incredibly
fast.
• This method was obviously costly and had a single point of failure.
Using the blockchain, they can instead use a decentralized network
of over 170,000 computers to produce 40,000 teraflops of
computing power.
• This example will grab the attention of other industries that utilize
expensive supercomputers. This could even make its way into the
analytical space by utilizing a broad base of data for predictive
analytics.
The challenge when defining block chain technologies is how to position it
for the future. This use case explores patient identity and the delivery of
EMR and other patient information necessary to deliver healthcare.
• In the world that we live in and increasing over time is that each
human or patient is actually a conglomerate of a huge variety of data.
• In the past have had EMR’s and maybe that was adequate.
• The patient of the future is a composite of EMR data and the data
from other provider EMR’s be it a hospital, ambulatory or urgent care,
pharmacies, genomic data, huge data set from our wearables,
survey’s, implants and IoT.
Block Chain – Healthcare example
• The patient of the future is a vast collection of data.
• Currently when someone comes into a healthcare institution, all we
have today is a small database of data, and has some file that is
separated and might be faxed or in stacks of paper.
• With that requires a form of identity that connects that patient to the
data they are carrying or in a variety of databases where MR numbers
are different and patient information can be inconsistent.
• The potential of block chain utilized by the payer and provider can
streamline this process.
• The healthcare entities would join a block chain to have access to a
large network of verified and secure data.
Block Chain – Healthcare example
• When a patient comes to the hospital and wants care, the provider has
a method to see all the imaging data, EMR information.
• In additional all the wearable data, pharma data, genomic data, the
past claims data, because that provider is part of this block chain
network we have access to this information where the validity of the
data and identity is immutable and easy to access.
• The advantages of block chain enabled solution is that healthcare
providers will have a greater ability to treat patients, with a better
picture and understanding of the patient’s health.
• It will also save in costs, today in a fixed fee based healthcare system
when you run a redundant test the system makes money, in the future
value based model that will not be the case and that redundant
procedure will not be reimbursed, access via block chain can eliminate
that redundant test and reduce cost.
Block Chain – Healthcare example
• Block chain has the potential to improve treatment.
• This is the core mission for healthcare providers, to improve quality
and reduce the cost of healthcare by enabling the secure delivery of
data across multiple providers and modalities.
• Improve safety by providing a more reliable identity management
process and reduce the stress on patient’s when communicating
health information as they inherent more responsibility in their own
care.
Block Chain – Healthcare example
Enterprise Block chains need more
‒ How to work with existing systems
‒ Operations and management
‒ Privacy understanding
‒ Identity and Key Management
‒ Be great to have some analytics
‒ Tools need to improve
What’s missing?
How can CISO’s address the blockchain challenge?
“Blockchain has the potential to become a significant trust enabler in the CISO’s arsenal.
However, solutions are unclear, standards have yet to coalesce and regulation is far on the
horizon. CISOs must make informed technology decisions that align with the organization’s
risk appetite and tolerance.”
Block chain is not widely adopted in any industry, not in the least in
healthcare.
• So why should we sign up for an unproven technology?
• I do not discount the concept, just that when the broader market has not adopted it
begs the question. Now when I wake up tomorrow & see headlines that Microsoft is
using Blockchain to drive their new security software and their stock is up 25%, then
that will settle my skepticism….but until then…
From my perspective we still need to firm the problems we want to
solve…so I don’t much worry about the solution yet.
We now have the hammer and now we are looking for a nail.
Questions
©2016 Xerox Corporation. All rights reserved. Xerox®, Xerox and Design® and “Work Can Work Better” are trademarks of Xerox Corporation in
the United States and/or other countries.

Contenu connexe

Tendances

Blockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in LibrariesBlockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in LibrariesNabi Hasan
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology Niuversity
 
Ppt on blockchain technology
Ppt on blockchain technologyPpt on blockchain technology
Ppt on blockchain technologyRATAN AGARWALA
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyNimmy Solomon
 
Understanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger TechnologyUnderstanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger TechnologySuraj Kumar Jana
 
Blockchain technology.pptx
 Blockchain technology.pptx Blockchain technology.pptx
Blockchain technology.pptxARNAV PATEL
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architectureEY
 
Blockchain in healthcare sector
Blockchain in healthcare sectorBlockchain in healthcare sector
Blockchain in healthcare sectorBalaji Naik
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Edureka!
 
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Edureka!
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology FundamentalsExperfy
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyRashi Singh
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in HealthcareSusan Dart
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain PresentationZied GUESMI
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainMalak Abu Hammad
 

Tendances (20)

Blockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in LibrariesBlockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in Libraries
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology
 
Ppt on blockchain technology
Ppt on blockchain technologyPpt on blockchain technology
Ppt on blockchain technology
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Understanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger TechnologyUnderstanding Blockchain: Distributed Ledger Technology
Understanding Blockchain: Distributed Ledger Technology
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain technology.pptx
 Blockchain technology.pptx Blockchain technology.pptx
Blockchain technology.pptx
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architecture
 
Introduction to Blockchain
Introduction to Blockchain Introduction to Blockchain
Introduction to Blockchain
 
Blockchain in healthcare sector
Blockchain in healthcare sectorBlockchain in healthcare sector
Blockchain in healthcare sector
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
 
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
 
Unlocking Blockchain’s Potential
Unlocking Blockchain’s PotentialUnlocking Blockchain’s Potential
Unlocking Blockchain’s Potential
 
BLOCKCHAIN
BLOCKCHAINBLOCKCHAIN
BLOCKCHAIN
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in Healthcare
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 

Similaire à Practical Applications of Block Chain Technologies

Adopting Blockchain in Healthcare to solve complex data issues & improve cust...
Adopting Blockchain in Healthcare to solve complex data issues & improve cust...Adopting Blockchain in Healthcare to solve complex data issues & improve cust...
Adopting Blockchain in Healthcare to solve complex data issues & improve cust...Mindfire LLC
 
Blockchain use cases in health and education
Blockchain use cases in health and educationBlockchain use cases in health and education
Blockchain use cases in health and educationNetcetera
 
Blockchain in Health Care
Blockchain in Health CareBlockchain in Health Care
Blockchain in Health CarePolsinelli PC
 
Blockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewBlockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewDebut Infotech
 
Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...
Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...
Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...Sai Sriharsha Sudulaguntla
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareRuchi Dass
 
5 Healthcare IT Trends to Watch in 2017
5 Healthcare IT Trends to Watch in 20175 Healthcare IT Trends to Watch in 2017
5 Healthcare IT Trends to Watch in 2017Patrick Hurley
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareLevi Shapiro
 
Blockchain E-Health Supplychain Presentation I.pptx
Blockchain E-Health Supplychain Presentation I.pptxBlockchain E-Health Supplychain Presentation I.pptx
Blockchain E-Health Supplychain Presentation I.pptxZoroZoro32
 
Unleashing Blockchain's Power in Healthcare Exploring 6 Essential Use Cases
Unleashing Blockchain's Power in Healthcare Exploring 6 Essential Use CasesUnleashing Blockchain's Power in Healthcare Exploring 6 Essential Use Cases
Unleashing Blockchain's Power in Healthcare Exploring 6 Essential Use CasesAmplework Software Pvt. Ltd.
 
Blockchain for Healthcare
Blockchain for HealthcareBlockchain for Healthcare
Blockchain for HealthcareCitiusTech
 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET Journal
 
Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?Patientory
 
5 ways on how will blockchain impact healthcare
5 ways on how will blockchain impact healthcare5 ways on how will blockchain impact healthcare
5 ways on how will blockchain impact healthcareBlockchain Council
 

Similaire à Practical Applications of Block Chain Technologies (20)

Adopting Blockchain in Healthcare to solve complex data issues & improve cust...
Adopting Blockchain in Healthcare to solve complex data issues & improve cust...Adopting Blockchain in Healthcare to solve complex data issues & improve cust...
Adopting Blockchain in Healthcare to solve complex data issues & improve cust...
 
Blockchain use cases in health and education
Blockchain use cases in health and educationBlockchain use cases in health and education
Blockchain use cases in health and education
 
Blockchain.pptx
Blockchain.pptxBlockchain.pptx
Blockchain.pptx
 
Block chain explained
Block chain explainedBlock chain explained
Block chain explained
 
Blockchain in Health Care
Blockchain in Health CareBlockchain in Health Care
Blockchain in Health Care
 
current insight using blockchain in the pharmaceutial cold chain
current insight using blockchain in the pharmaceutial cold chaincurrent insight using blockchain in the pharmaceutial cold chain
current insight using blockchain in the pharmaceutial cold chain
 
Blockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewBlockchain in Healthcare: An Overview
Blockchain in Healthcare: An Overview
 
Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...
Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...
Blockchain Technology. Crypto currencies, Bitcoin and other alt coins. Blockc...
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and Healthcare
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in Healthcare
 
5 Healthcare IT Trends to Watch in 2017
5 Healthcare IT Trends to Watch in 20175 Healthcare IT Trends to Watch in 2017
5 Healthcare IT Trends to Watch in 2017
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt Healthcare
 
Blockchain E-Health Supplychain Presentation I.pptx
Blockchain E-Health Supplychain Presentation I.pptxBlockchain E-Health Supplychain Presentation I.pptx
Blockchain E-Health Supplychain Presentation I.pptx
 
Unleashing Blockchain's Power in Healthcare Exploring 6 Essential Use Cases
Unleashing Blockchain's Power in Healthcare Exploring 6 Essential Use CasesUnleashing Blockchain's Power in Healthcare Exploring 6 Essential Use Cases
Unleashing Blockchain's Power in Healthcare Exploring 6 Essential Use Cases
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
 
Blockchain for Healthcare
Blockchain for HealthcareBlockchain for Healthcare
Blockchain for Healthcare
 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare Records
 
Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?
 
5 ways on how will blockchain impact healthcare
5 ways on how will blockchain impact healthcare5 ways on how will blockchain impact healthcare
5 ways on how will blockchain impact healthcare
 
Blockchain in life sciences
Blockchain in life sciencesBlockchain in life sciences
Blockchain in life sciences
 

Plus de Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Plus de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Practical Applications of Block Chain Technologies

  • 1. Blockchain and It's Practical Use Cases Ken Bradberry, CTO Xerox Healthcare
  • 2. • A blockchain is a data structure that makes it possible to create a digital ledger of transactions and share it among a distributed network of computers. • It uses cryptography to allow each participant on the network to manipulate the ledger in a secure way without the need for a central authority. • Once a block of data is recorded on the blockchain ledger, it’s extremely difficult to change or remove. • When someone wants to add to it, participants in the network — all of which have copies of the existing blockchain — run algorithms to evaluate and verify the proposed transaction. • If a majority of nodes agree that the transaction looks valid — that is, identifying information matches the blockchain’s history — then the new transaction will be approved and a new block added to the chain. What is Blockchain? 2
  • 5. Username + Password + Biometric data Basics – Tokenization (public/private keys) Create a Secure Identity for Everything Token - 0x23e423s3234… Owner - 0xfe839a340d… Owner • id • proof Person • Userna me • SSN • DOB Data • Address • Phone Slides courtesy of Microsoft
  • 6. Basics – Tokenization composites Slides courtesy of Microsoft
  • 7. Basics – Ownership – Introduce a ledger Slides courtesy of Microsoft
  • 8. Blockchain | Overview Cryptographically Authentic Uses tried and true public/private signature technology. Blockchain applies this technology to create transactions that are impervious to fraud and establishes a shared truth. Shared Blockchain’s value is directly linked to the number of organizations or companies that participate in them. There is huge value for even the fiercest of competitors to participate with each other in these shared database implementations. Distributed There are many replicas of the Blockchain database. In fact, the more replicas there are, the more authentic it becomes. Ledger The database is a read/write-once database so it is an immutable record of every transaction that occurs. 8 Slides courtesy of Microsoft
  • 9. Cryptographically authentic shared distributed ledger Blockchain ledger Block 0x5f23827e3cd1… 0x6f23827e3cd1… 0x3e23827e3cd1… 0x6f23827e3cd1… 0x5f23827e3cd1…
  • 11. Payments and Remittance – Transactions can occur directly between two parties on a frictionless P2P basis. The technology’s application for overseas transactions has the potential to reduce risk, transaction costs and to improve speed, efficiency and transparency. Issuance, Ownership and Transfer of Financial Instruments – A blockchain-based securities market allows traders to buy or sell stocks directly on exchanges or directly to other market participants in a P2P manner without the intermediation services provide by a broker or clearinghouse. Clearing and Settlement Latency – On the blockchain, the entire lifecycle of a trade, including its execution, clearing and settlement can occur at trade level, lowering post-trade latency and reducing counterparty exposures. Practical Use of Block Chain - Financial
  • 12. Smart Contracts – Smart contracts would automatically pay providers when conditions of service are established such as; •Validation that a service was received by a registered Medicaid patient •Service was provided by a properly registered doctor & provider •Neither party is on a known list of past participants in any fraud Cost Containment – The block chain can be filtered to identify and alert about specific activity on the chain, monitoring, using patterns, can include data that represents a doctor, consumer, drugs, procedures, all can to tokenized and added to the chain. • Building a rule base using best practices, CPT codes, ICD codes, medical procedures and other costs can be monitored and audited using blockchain. Practical Use of Block Chain - Healthcare 12
  • 13. EHR storage & security - Blockchain is a security technology at its core and with the ever-present concern over the security of electronic health records, it is likely to cater to this challenge first as it enters healthcare. This approach can secure medical records and audit trails using the Blockchain. • We can do this by cryptographically encoding private medical data and then a digital fingerprint is formed for time-stamping and verification purposes. DNA wallets – This concept stores genetic and medical data which is again secured via the blockchain and accessed using private keys and this will form a “DNA wallet”. This could allow healthcare providers to securely share – and possibly monetize – patient data, helping pharmaceutical companies to tailor drugs more efficiently. Practical Use of Block Chain - Healthcare
  • 14. Practical Use of Block Chain - Healthcare Anti-counterfeit drugs – The industry is designing blockchain in the fight against counterfeit drugs. It features panels on drug packages that can be peeled or scratched off to reveal a unique verification tag. This is then cross referenced with the blockchain to ensure that the pharmaceutical product is legitimate. Protein folding - Stanford University previously relied on expensive super computers to simulate protein folding as it happens incredibly fast. • This method was obviously costly and had a single point of failure. Using the blockchain, they can instead use a decentralized network of over 170,000 computers to produce 40,000 teraflops of computing power. • This example will grab the attention of other industries that utilize expensive supercomputers. This could even make its way into the analytical space by utilizing a broad base of data for predictive analytics.
  • 15. The challenge when defining block chain technologies is how to position it for the future. This use case explores patient identity and the delivery of EMR and other patient information necessary to deliver healthcare. • In the world that we live in and increasing over time is that each human or patient is actually a conglomerate of a huge variety of data. • In the past have had EMR’s and maybe that was adequate. • The patient of the future is a composite of EMR data and the data from other provider EMR’s be it a hospital, ambulatory or urgent care, pharmacies, genomic data, huge data set from our wearables, survey’s, implants and IoT. Block Chain – Healthcare example
  • 16. • The patient of the future is a vast collection of data. • Currently when someone comes into a healthcare institution, all we have today is a small database of data, and has some file that is separated and might be faxed or in stacks of paper. • With that requires a form of identity that connects that patient to the data they are carrying or in a variety of databases where MR numbers are different and patient information can be inconsistent. • The potential of block chain utilized by the payer and provider can streamline this process. • The healthcare entities would join a block chain to have access to a large network of verified and secure data. Block Chain – Healthcare example
  • 17. • When a patient comes to the hospital and wants care, the provider has a method to see all the imaging data, EMR information. • In additional all the wearable data, pharma data, genomic data, the past claims data, because that provider is part of this block chain network we have access to this information where the validity of the data and identity is immutable and easy to access. • The advantages of block chain enabled solution is that healthcare providers will have a greater ability to treat patients, with a better picture and understanding of the patient’s health. • It will also save in costs, today in a fixed fee based healthcare system when you run a redundant test the system makes money, in the future value based model that will not be the case and that redundant procedure will not be reimbursed, access via block chain can eliminate that redundant test and reduce cost. Block Chain – Healthcare example
  • 18. • Block chain has the potential to improve treatment. • This is the core mission for healthcare providers, to improve quality and reduce the cost of healthcare by enabling the secure delivery of data across multiple providers and modalities. • Improve safety by providing a more reliable identity management process and reduce the stress on patient’s when communicating health information as they inherent more responsibility in their own care. Block Chain – Healthcare example
  • 19. Enterprise Block chains need more ‒ How to work with existing systems ‒ Operations and management ‒ Privacy understanding ‒ Identity and Key Management ‒ Be great to have some analytics ‒ Tools need to improve What’s missing?
  • 20. How can CISO’s address the blockchain challenge? “Blockchain has the potential to become a significant trust enabler in the CISO’s arsenal. However, solutions are unclear, standards have yet to coalesce and regulation is far on the horizon. CISOs must make informed technology decisions that align with the organization’s risk appetite and tolerance.” Block chain is not widely adopted in any industry, not in the least in healthcare. • So why should we sign up for an unproven technology? • I do not discount the concept, just that when the broader market has not adopted it begs the question. Now when I wake up tomorrow & see headlines that Microsoft is using Blockchain to drive their new security software and their stock is up 25%, then that will settle my skepticism….but until then… From my perspective we still need to firm the problems we want to solve…so I don’t much worry about the solution yet. We now have the hammer and now we are looking for a nail. Questions
  • 21. ©2016 Xerox Corporation. All rights reserved. Xerox®, Xerox and Design® and “Work Can Work Better” are trademarks of Xerox Corporation in the United States and/or other countries.

Notes de l'éditeur

  1. Start – 2 types of things – Unique and Non-Unique that need to be represented digitally. Unique like a person – typically represented digitally with user name and password – moving to bio metrics and multi authorization techniques, fingerprint, face scan, pin number from a specific cell phone. Non-unique like a cell phone – typically represented by a serial number assigned by the manufacturer. A SKU refers to its “type” which is not unique. Establishing this is called provenance. Enter a Cryptographic One-Way Hash – there are lots of these SHA-1, 2, MDA…etc Not important, but the concept is the same regardless of the function. The Cryptographic One-Way Hash creates a Deterministic Digest of its inputs. Meaning, if the values you put in are the same you will always get the same output or hash digest allowing you to use this identifier (also a public key) Unique items do not can be hashed as is, because they are unique...but how they are represented are the weak link here. Unique items usually “own” things that are non-unique. A non-unique thing represented as a serial number is a problem, because its identifier is only unique to its creator another product could have the same serial number from a different creator. Non-unique items also take multiple inputs to create a digest, public key of manufacturer, sku and mayby a nonce or most often a salt value. Anyway a Hash function produces a hash Digest that is often refered to as a public key, where the inputs that created the disgest are the private key. There is no way to determine the private key values from the public key...thus one-way. Basics in establishing a Digital Bearer Instrument. Establishing provenance, assigning ownership, transfering ownership, tracking modiftication and determining lineage across systems. So a person can create a public key with a combination of identifiers where a non-unique item requires similar inputs. This creates a public/private key pair which is the foundation for blockchain technology.
  2. A composite is a collection of public keys as inputs to create a digest for an item containing other items.
  3. Introduce a ledger to record these public keys and you can do all sorts of things. Record the provenance of things, assign ownership and transfer ownership.
  4. Cryptographically authentic shared distributed ledger Cryptographically authentic – each transaction recorded in the database is digitally signed and mathematically guaranteed to be authentic and impervious to fraud. The transaction was signed by the entity that has the private key. No question. The truth Shared – the database’s main value is that it is shared between separate entities, like companies. The more entities shared the greater the value Distributed – many copies of the database exist and they are replicas of each other in relative time Ledger – a write-once, thus immutable, ledger that records every transaction. The entire history of all transactions is available; math doesn’t lie and there is nowhere to hide Value – a shared ledger of truth between separate entities that may be competitors and/or partners with each other The rest is just how it is implemented
  5. So, logically there is a single ledger that is replicated to as many copies as possible. All copies are write once and read copies (immutable) and the synchronize transactions using something called a consensus algorithm. Transactions are written to a block, like a bucket. They stack on top of each other. Once the block is full, it gets capped (mined for proof of work consensus), capping is essentially hashing all the transactions in the block and starting a new block with the digest of the completed one thus linking the blocks in a chain. Mathematically, this creates a stronger truth the longer the chain.
  6. Start with someone creating a SmartContract to Sell a Stock That gets recorded as an address (PK) on the blockchain along with its code Enter in Mary Who has an Alt Coin on the chain that she can spend Mary wants to buy the stock offered in the smart contract Mary creates a transaction to the SmartContract to Buy the Stock with the Alt Coin as payment The Transaction gets sent to the SmartContract. The SmartContract receives the message, then executes the code to sell the SmartContract buy running the code in the Virtual Machine that: Executes the transfer of ownership of the stock from the Seller to the Buyer Transfers the Alt-Coin or a portion of its value for the stock to the Seller, pays any transaction fees out of the ALT-Coin as well Does any other logic it needs to perform in order to complete the transaction.