Using Blockchain Technology Wisely |
1. Analysis Method
Using and checking each data collection and checking the support of the lever system, and the test method, namely blackbox testing.
This test can be carried out when we begin to try to take advantage of the blockchain technology test system, so that we can ascertain the extent to which the technology can be ensured to result in utilization in the security and certification system.
2. Data Collection Method
We can get this technique from the analysis of a system test movement that we have studied and understood before, so that we have collected a lot of data.
This data collection technique can later be used as a basis for compiling research instruments.
Data collection techniques which will actually produce highly dependent data, and vice versa.
There are 3 (three) data collection
(1). Observation.
Defined as a process of involving researchers and capturing meaning systematically
to the problems that arise in the object of this research.
(2). Interview.
Interview is a question and answer process between researchers and informants or oral subjects in order to obtain research data needed by researchers.
(3). Literature review.
Literature study is the collection of data from literature reviews as a research reference source such as journals, books, etc.
3. Methods for Leveraging Identity
This method involves creating trust by verifying who involved in transactions, because certificates involving statements from one party to another can verify the continued identity of the owner and certificate holder.
The identity of a person is to use an identity document, which is certified in order to prove the identity or system, often a third party is involved to help verify the identity as a solution.
4. Standardization of certificate issuance
The importance of ensuring that the certificates issued by a system are predictable and fair by considering certain criteria.
Identity of the parties in a transaction to third parties need to have full trust for the issuer to create a verification system individually or independently of the certification system.
5. Regulatory and guarantee mechanisms
Since 2009, blockchain has served as a potential information technology transformative that is expected to be as revolutionary as the Internet.
Originally developed as a methodology for recording cryptocurrency transactions, the function
Blockchain is now growing big in applications, such as banking, finance, insurance, voting systems, leasing contracts, and government services.
Although there is such progress, the implementation of blockchain regulations and guarantees is still lacking
explored.
6. Security Features
Third parties wishing to verify the authenticity of certificates must ensure that the certificate is not forged.
There is one way to prevent counterfeiting ne of them Has a special design in the certificate that only the issuer has do the special design.
The existence of a centralized database owned by the publisher, if there is a third party that uses the data, the traces will immediately be seen.
7. Accessibility
The final element for that trust to be visible on the certificate
(a). The recipient of the certificate must be able to hold a copy.
(b). Third parties requiring access to the certificate must be provided with easily by either the holder, issuer or registrar.
(c). The certificate must contain information
on how to verify claims, and the standards and processes used to file a claim and issue a certificate.
(d). The information in the certificate must be clear, which means that the identity can be read and easily understood and understood and can be read by the system.
8. Test Method
The testing or testing method is a technical test of the extent to which the program is running well, the application of program testing to find errors or warning problems by using the black box testing method.
Black box testing is a test to find out the function of the software has worked according to its needs.
Blackbook testing on e-certificates based on blockchain technology can be done by executing the encryption code from the system by providing input.
The existing code is then observed whether it matches the existing e-certificate or not.
Initial testing phase by providing input into the program. The input is in accordance with the functional requirements, to ensure that the results displayed are in accordance with the wishes of the program's basic functions or not, if the input provided produces an output that meets the requirements, then the program is correct, but if the output provided does not match the functional requirements, an error is found, and Further analysis was carried out to correct the error.
Theory Studies 2021