top of page

Intervalue: Next Generation Global Value Internet


Live for the Times

In 2008, the Blockchain technology marked by the birth of bitcoin, solved the trust problem among many parties through the underlying core technology. From Blockchain 1.0 which is represented by bitcoin to Blockchain 2.0 which is represented by Ethernet, people increase the awareness of the scope of application and availability of block-chain technology, more and more people are devoted to the Blockchain bottom core technology, Chain application and scene landing R & D and continuous in-depth exploration. The main focus is on three levels:

1.The underlying technology and infrastructure layer, which mainly includes the basic protocol and the underlying implementation.

2. Common application and technology extension layer: provides services and interfaces and related technical services for the vertical application layer of the industry, and provides services including smart contracts, Mining services, data services, anti-counterfeiting tracing, etc.

3. Vertical industry application layer: Finance, Digital money, Entertainment, Supply chain, Medical, Legal, Energy, Public Welfare, Social, Internet of things, Agriculture and other vertical areas.

Limited by the difficulty of the underlying technology development and the number of professional technical personnel, currently in the group engaged in Blockchain research and development, The proportion of the Blockchain bottom technical research team is only 20%, while the proportion of the team engaged in the practical application of the Blockchain and the vertical industry landing is as high as 80%. Because the underlying protocol can create the market value of Token, compared with the application layer, more importantly, it changes the traditional Internet mode of application layer data centralization in. In a Blockchain system, the application layer project itself becomes the complete service side, which no longer has user traffic and data value alone. It spreads the value of personal data to Individual user nodes, so the underlying protocol is more valuable than the application layer.

At the present stage, various kinds of bottom protocol projects such as EOSN NEOU, ArcBlock appear in endlessly, but most of the bottom protocol projects are based on etheric space. On this basis, the iterative process has not reached the standard of 3.0 era (Application extension of Blockchain). Blockchain technology is still far away from the practical application of various industrial and fields, that is Blockchain 4.0. At present, most teams are engaged in Blockchain landing business which is limited by the performance, scope, and stability of the underlying protocol, although some industrial applications have been attempted, In addition to the original Bitcoin-marked financial applications and some entertainment applications, other industrial applications are still in the exploration stage. The underlying protocols keep the continuous change, the scene cannot be truly landed.

Therefore, there is an urgent need to develop Blockchain bottom protocol research, capture the Blockchain bottom core technology, solve and meet the transaction congestion, high transaction costs, longer transaction confirmation time, weak ability to resist quantum attack, communication layer node anonymity is not high, anonymous transaction protection, weak ability of cross-chain communication and multi-chain convergence, large storage space, weak ability of cross-chain communication and multi-chain convergence, large storage space, weak industry support function, etc. Optimize the protocols and mechanisms of Blockchain technology at all levels. To realize the real practical supporting protocol of value transmission network at all levels. To provide infrastructure for all kinds of value transmission applications, to provide the underlying development platform for all kinds of DApp development, to provide the practical and feasible technical approach for building global value interconnection.

Features and Breakthrough

InterValue (http://www.inve.one) realizes all kinds of bottom Network protocols for value transmission network, builds global value networks, and provides a basic network for all kinds of value transmission applications. It will completely reshape the existing Internet operation mode, transform the economic incentive system itself into a system that can be recycled within the system, and create a completely decentralized Internet value transmission ecosystem. Become the cornerstone of the next generation of global value Internet.

At the same time, InterValue is also a fully open community ecosystem, a user-friendly high availability, and centralization distributed application development platform, which can transcend national boundaries and enable each participant to gain the corresponding value.

InterValue focuses on the infrastructure of Blockchain and the core technology of platform layer, constructs the communication protocol with an original distributed anonymous P2P network, a new anti-quantum attack cryptographic hashing algorithm and signature algorithm, and creates a double-layer consensus and mining mechanism. Supports for transaction anonymity protection, Turing complete intelligent contracts, and other features. InterValue adopts fair distribution mechanism, supports third-party asset issuance, cross-chain communication, multi-chain fusion and other functions. It can land on the Blockchain 4.0 infrastructure of the actual application scenario with Public Blockchain, Alliance Blockchain, Private Blockchain and other forms and supports the Blockchain 4.0 ecosystem for all kinds of chain applications.

The Background of Blockchain 4.0

The Ecosystem Diagram of InterValue

In The Front of The Technology

InterValue's main technological innovations include:

In the communication layer of the underlying P2P network node, the original anonymous P2P communication network is realized by combining the existing Tor-based anonymous communication network, the distributed VPN of the Blockchain-based and the advantages of the Blockchain-based distributed content sharing network. The protocol of node anonymity access is designed, and the private encrypted communication protocol is realized. These two protocols greatly enhance the anonymity of nodes in the underlying communication network and ensure that the communication between nodes is hard to be traced and cracked.

1. In the communication layer of the underlying P2P network node, the original anonymous P2P communication network is realized by combining the existing Tor-based anonymous communication network, the block chain-based distributed VPN and the advantages of the Blockchain-based distributed content sharing network. The protocol of node anonymity access is designed, and the private encrypted communication protocol is realized. These two protocols greatly enhances the anonymity of nodes in the underlying communication network and ensures that the communication between nodes is hard to be traced and cracked.

2. At the underlying data structure Layer, a new data structure with an enhanced directed acyclic graph (HashNet) is adopted, which greatly reduces the storage space required by the nodes and improves the efficiency and security of the underlying data storage;

3. At the consensus mechanism Layer, we designed three different consensus mechanism: a HashNet based consensus mechanism, BA-VRF consensus mechanism, basic DAG consensus mechanism. A consensus mechanism based on HashNet to enhance the consensus of DAG and BA-VRF consensus mechanism for notary selection is presented. In project version 1.0, due to the fact that HashNet-based DAG consensus is more difficult to implement, we first implement a two-Layer consensus mechanism that combines DAG consensus with BA-VRF. These consensuses all support high transaction concurrency, fast transaction confirmation speed, and building eco-systems for different application scenarios;

4. At the Layer of anti-quantum attack, new anti-quantum algorithms is adopted, which replaces the existing SHA series algorithm with the Keccak-512 hash algorithm, and replaces the ECDSA signature algorithm with an integer lattice-based NTRUsign signature algorithm. These algorithms reduce the threat which brings from the quantum computing development and gradual popularization of a quantum computer;

5. At the Layer of an anonymous transaction, combined with the characteristics of cryptocurrency such as Monroe and ZCash, the zero-knowledge proof and ring signature are used to design transaction anonymity and privacy protection method with high effective cost ratio and excellent security to meet privacy requirements of different application scenarios;

6. At the Layer of smart contracts, we adopt the Turing comprehensive contract with fair distribution mechanism and support the issuance of third-party assets, which can take place in the form of the public Blockchain, permissioned (private) Blockchain, consortium (hybrid) Blockchain to the actual application scenario;

7. At the Layer of cross-link communication and multi-chain fusion, the use of relay chain technology to cross-chain communication and multi-chain fusion function module as a single layer overlay to achieve, not only can maintain the independence of cross-chain operation, but also reuse InterValue basis chain Various functions.

8. At the ecologically motivated Layer, various Token allocation tools and methods are used in combination and support for double-layer mining for miners' incentives.

9. At the industry application level, the development of JSON-RPC industry common interfaces, such as circulation payment, data transmission, data search, and contract invocation, supports various applications at the upper level.

The Key Features of InterValue

InterValue supports various applications such as anonymous network communication, computing power-sharing, storage space sharing, bandwidth sharing, credit sharing (credit guarantee) and others, provides open interfaces for the development of DApp by third parties, and working with various service providers and application providers by combining various practical application scenarios, supports the business organizations and government agencies to build the Public Blockchain, Alliance Blockchain and Private Blockchain application system based on their own business characteristics and needs and applies InterValue to various practical application scenarios.

Wide Usages

The application scene of InterValue mainly includes three parts: (1) Digital cash; (2) Extensive financial application; (3) Non-financial applications.

1. Digital currencies

The main application scenes of digital currencies are as follows: 1. Third-party asset issuance; 2. Crowdfunding, ICO financing.

2. Extensive financial application

The main application scenes of digital currencies are as follows: 1. Cross-border payment, Supply chain finance, Digital bill; 2. Asset Securitization, Bank reference, Insurance.

3. Non-financial applications

  1. Medical care: Electronic health(EHR), DNA wallet, Drug Counterfeit-proof.

  2. Internet of things: Supply chain management, Sharing economy, Energy management.

  3. IP copyright &Cultural entertainment: Copyright, Authentication, and tracing of image, Intellectual property registration, Decentralization of digital rights management.

  4. Public service&Education: Public audit, Land right, Public welfare project, Educational information registration.

The current application examples mainly include virtual assets application, conditional payment application, privacy transaction application, over-the-counter transaction application, social transaction application, sharing economy and so on. At the same time, two typical InterValue chain applications that have been developed and planned substantially are applications of distributed social network based on InterValue, and global storage grid applications based on InterValue.

The Scene of Chain

Unlimited Future

The InterValue product route is divided into two stages: platform development and application promotion. In the platform development stage, the InterValue product falls to the ground according to the project vision and enters the application promotion stage through the four-round iterative upgrade.

The Roadmap of InterValue

Comments


bottom of page