Can the block chain solve the real world IT problem?


n
nnRampage comment: When it comes to the application of block chains, many people will only think of financial, few people mention it in the IT industry role. This article from this perspective, from the equipment management, identity management and licensing of three aspects of a brief description of the block chain may be the IT field to solve the problem. The authors believe that the IT industry will become more efficient and safer by using block chains. Of course, the implementation of all this also requires a lot of effort, it takes a long time.n
nnTranslated by: Inan
nThe technology world began to accept high-risk / high-reward ideas from a long time ago, and people often hear about how a technology will revolutionize the world. Block chains can lead to significant changes, including combating electoral fraud and rebuilding the world’s financial system. The future of the block chain seems to be very bright, but I have not heard people discuss it in IT more practical application. How does the block chain make IT more efficient and secure?n
nTo explore the practical application of the block chain, we must first understand why it is so transformative. The idea of ​​distributed data is not new, and BitTorrent’s technology has been around for years. The block chain extends the concept of distributed data, incorporating digital transactions and books.n
nOften, a transaction is owned by a single party and can only be shared with a trusted third party, which is the way in which traditional systems such as banks operate. For example, if you have a deposit in Bank A, use it to pay for Company B, and Bank A will tell Company B that you have the funds to pay your bills and transfer funds to B’s bank.n
nThe block chain is different in that it distributes the transaction record to the Internet device that runs the block chain software. Create trust by verifying data blocks that are associated with previous blocks via multiple devices. If any previous block is changed and only less than 51% of the chain is verified, the change will not be passed. It protects data and processes by using the trust generated by math and encryption keys. Of course, this is only a general introduction, omitted a lot of details.n
nNow that we have a new way to validate and track digital transactions, how can we use it to develop IT? The problem that is suitable for using the block chain should have the following characteristics:n
nnManagement of things is very dynamic;n
nnnThe current solution is too scattered and difficult to manage;n
nnnVulnerable to malicious activity.n
nnIT is currently facing many of the challenges are equipped with these features, we talk about three of them:n
nn
nEquipment managementn
nAt present, the device is managed through an enterprise system that verifies ownership through a software system on an operating system (such as AirWatch) or a hardware signature (such as Apple DEP) that embeds the firmware at the time of production. If the device is lost or stolen, the plotted person can only control the device by bypassing the single point of authentication.n
nBlock chain technology can be used to verify ownership by using the functionality of a distributed network. If the device is stolen, an unauthorized party will be rejected by the distributed network when attempting to log in. Only 51% of the network certified the operation to use the device.n
nThe key to distributed device management is to connect to a specific network identity. How can we verify the digital identity? Then we come to understand this problem.n
nn
nIdentity managementn
nThe current identity management system will store personal information and proof in one place and share it with a trusted third party, and the way the device is managed. I can use my Gmail account to sign in to a number of other systems that I authorize, but my permissions are still stored on Google’s servers.n
nWe can use block chains to store permissions on a distributed network and only allow third-party systems to access through block transactions. If I quit my job at company X, I would go to Y to work, and then I would let the network stop sharing my name, address and SSN with company X and start sharing this information with company Y. I can not let Y company see my medical history. I can take full control of my own ownership. This ownership does not belong to a single supplier, and without my explicit permission, will not be shared with other people.n
nIn this way, we basically eliminate the need to rely on IT department to manage the user’s proof. The employee himself will have complete control over which specific data the individual system can access. Can completely eliminate the need for Active Directory, SSO, multi-factor authentication and application-specific security.n
nn
nPermitn
nOne of the most troublesome and rewarding challenges facing IT is the management of licenses. The license key is the standard way to track the current purchase, but is susceptible to loss or theft. If the “license” is simply an access verification through a distributed network, the actual license key or file is not required. The vendor’s block chain determines whether the user can access the software.n
nThe days of license verification, software assurance and license fraud have passed. If a person verifies access to the software through a block chain, the software can be used. If the transaction has been completed and its access is revoked, he will lose access. very simple.n
nTo make these systems work, you still need to do a lot of work. One of the key steps is to build the block chain technology directly into all operating systems. Assuming a period of two years, we will probably eliminate the need to rely on IT to manage end users and devices after 5 to 10 years.n

Leave a Reply

Your email address will not be published. Required fields are marked *