Understand the alliance chain R3 in one article

In the international market of the alliance chain, there is a alliance chain product specially designed for the regulated market, which is R3.

The R3 alliance is based on the Corda blockchain and the confidential computing platform Conclave. The entire alliance is promoting the construction of applications on these two systems.

In this article, we will summarize and summarize the information of the alliance chain R3, so that everyone can understand R3 more clearly.

R3

R3 is a leading technology service provider that enables digital collaboration in regulated industries. R3’s trusted technology, Internet and regulated market expertise can drive market innovation and improve business processes in banking, capital markets, global trade, and insurance.

As the first batch to provide the only private, secure and scalable DLT platform and confidential computing platform designed for the regulated market, R3 can give full play to the potential of trusted collaboration. We maintain one of the largest DLT ecosystems in the world, connecting more than 400 institutions from the private and public sectors.

R3 provides purpose-built DLT and confidential computing technologies to support the development of solutions and promote and provide digital trust between all parties.

Application builders include DTCC, Wells Fargo, MoneyGram, SIX Swiss Exchange and Nasdaq, as well as major central banks and regulatory agencies around the world.

R3 Development Fund

R3 Development Fund is the corporate venture capital arm of R3. The fund invests in early-stage startups that build applications on R3’s enterprise blockchain platform Corda and confidential computing platform Conclave.

R3 launched the fund in 2019 to support companies that use blockchain to conduct global commerce and further establish R3’s influence in the fields of financial services, trade finance, insurance and digital assets.

Rope Network

Corda Network is an open internet of Corda nodes operated by network participants. Each node is identified by a certificate issued by the network identity manager service, and can also be identified on the network map.

Corda Network achieves interoperability, exchanging data or assets through a secure and efficient Internet layer. This is not possible with Corda Network alone. There is a common root of trust surrounding all transactions, and a consistent set of network parameters ensures that all participants can transact with each other.

Join Corda

Any legal entity wishing to use the Corda network must first create a node (a Java virtual machine runtime environment hosting Corda services and CorDapps), and then obtain a certificate of participation, which will allow their nodes to access the network. Once the legal entity obtains the Corda Network Participant Certificate, it becomes a “Corda Network Participant” and uses the “Corda Network Node”.

There are two types of Corda network participants: participants (with legal contracts with R3) and sponsored participants (access to the Corda network through participants’ legal contracts).

Requests for all participating certificates will always be made through participants. Therefore, sponsored participants will not request certificates directly from R3, but sponsored participants that allow them to access the network through their legal contracts. Currently, the Corda blockchain will be updated to version 5.

Corda5 preview version data

Corda 5 has significant improvements. The previous version of Corda focused on building a network ecosystem. Corda 5 is application-centric, making it easier to build, test, and distribute CorDapp.

In order to simplify the CorDapp development process, Corda 5 decomposes Corda’s operation and development capabilities into multiple layers.

The complete list of new features in the Corda 5 Developer Preview:

Modular API

Dependency upgrade on Gradle 6, Java 11 and Kotlin 1.4

Node interactive upgrade

CorDapps is no longer packaged as a .jar file

Corda package .cpk is now a software unit executed in a single sandbox

CorDapps is a set of .cpks that define the versions of deployable applications

A new integration testing framework that reflects the behavior of real nodes

Used for pluggable unique service (notarization) API

CorDapp development changes

Corda 5 stream interface and CorDapp packaging make building CorDapps easier and more concise. The stream interface allows you to create a stream and inject your favorite methods (now called Corda services) into the stream.

Use the new CorDapp packaging plugin to package your code more easily. You can use a simple command line interface (CLI) to bundle CorDapps together to create your enterprise solution.

Network and node changes

You can easily boot the local Corda 5 network using the new CLI. This deployment creates a developer network where you can test your Corda 5 CorDapps or try new node HTTP commands to start the process on the demo CorDapp.

Conclave

Conclave is R3’s confidential computing SDK, which can build privacy protection solutions to securely share, aggregate and process sensitive customer data. Applications range from aggregating sensitive bank account data to detecting complex types of anti-money laundering (AML) to training AI models using sensitive data sets.

Enclave

Enclave can process data and code without the computer owner’s access. This makes the program resistant to physical and software attacks from the computer owner or operator. Enclave requires clients to communicate through encrypted and authenticated messages. Conclave’s API provides an intuitive messaging model for the client to send private data to the enclave securely.

Business logic and host program

The Conclave application consists of two different code areas: business logic and host program. The difference between the two code areas is important because the business logic runs inside the enclave, while the host program runs in an untrusted environment. The client will interact with the business logic and host program. Business logic refers to algorithms that run and process private data in a secure Enclave.

Remote authentication

Intel® SGX has a feature called remote attestation. Through this process, the client builds confidence that they are talking to a real Enclave running a specific fingerprint algorithm. This allows clients to confirm that they are sending data to a secure SGX-enabled machine with the latest security patch.

Remote attestation cannot provide trust in the security of algorithms and calculations that process data in a secure enclave. The client can only verify the security of the enclave by auditing the source code of the enclave. Enclave code includes Conclave code and business logic. The audit can be performed by the customer himself or by a third-party auditor to confirm that the code performs exactly as expected.

R3 provides enclave developers with an audit license for the Conclave code running in a secure enclave. The audited algorithm hash and match it with the enclave hash from the remote attestation. After completing this process, the client successfully verified that they are using the appropriate algorithm to talk to the secure Enclave.

Posted by:CoinYuppie,Reprinted with attribution to:https://coinyuppie.com/understand-the-alliance-chain-r3-in-one-article/
Coinyuppie is an open information publishing platform, all information provided is not related to the views and positions of coinyuppie, and does not constitute any investment and financial advice. Users are expected to carefully screen and prevent risks.

Leave a Reply