close

Hot Widget

Type Here to Get Search Results !

USING BLOCKCHAIN TECHNOLOGI WISLEY

 

Using Blockchain Technology Wisely













1. Analysis Method

Using and checking each data collection and checking the support of the lever system, and the test method, namely blackbox testing.

This test can be carried out when we begin to try to take advantage of the blockchain technology test system, so that we can ascertain the extent to which the technology can be ensured to result in utilization in the security and certification system.


2. Data Collection Method

We can get this technique from the analysis of a system test movement that we have studied and understood before, so that we have collected a lot of data.

This data collection technique can later be used as a basis for compiling research instruments.

Data collection techniques which will actually produce highly dependent data, and vice versa.

There are 3 (three) data collection

(1). Observation.

Defined as a process of involving researchers and capturing meaning systematically

to the problems that arise in the object of this research.

(2). Interview.

Interview is a question and answer process between researchers and informants or oral subjects in order to obtain research data needed by researchers.

(3). Literature review.

Literature study is the collection of data from literature reviews as a research reference source such as journals, books, etc.


3. Methods for Leveraging Identity

This method involves creating trust by verifying who involved in transactions, because certificates involving statements from one party to another can verify the continued identity of the owner and certificate holder.

The identity of a person is to use an identity document, which is certified in order to prove the identity or      system, often a third party is involved to help verify the identity as a solution.


4. Standardization of certificate issuance

The importance of ensuring that the certificates issued by a system are predictable and fair by considering certain criteria.

Identity of the parties in a transaction to third parties need to have full trust for the issuer to create a verification system individually or independently of the certification system.


5. Regulatory and guarantee mechanisms

Since 2009, blockchain has served as a potential information technology transformative that is expected to be as revolutionary as the Internet. 

Originally developed as a methodology for recording cryptocurrency transactions, the function

Blockchain is now growing big in applications, such as banking, finance, insurance, voting systems, leasing contracts, and government services.

Although there is such progress, the implementation of blockchain regulations and guarantees is still lacking

explored.


6. Security Features

Third parties wishing to verify the authenticity of certificates must ensure that the certificate is not forged.

There is one way to prevent counterfeiting ne of them Has a special design in the certificate that only the issuer has do the special design. 

The existence of a centralized database owned by the publisher, if there is a third party that uses the data, the traces will immediately be seen.


7. Accessibility

The final element for that trust to be visible on the certificate

(a). The recipient of the certificate must be able to hold a copy.

(b). Third parties requiring access to the certificate must be provided with easily by either the holder, issuer or registrar.

(c). The certificate must contain information

on how to verify claims, and the standards and processes used to file a claim and issue a certificate.

(d). The information in the certificate must be clear, which means that the identity can be read and easily understood and understood and can be read by the system.


8. Test Method

The testing or testing method is a technical test of the extent to which the program is running well, the application of program testing to find errors or warning problems by using the black box testing method.

Black box testing is a test to find out the function of the software has worked according to its needs.

Blackbook testing on e-certificates based on blockchain technology can be done by executing the encryption code from the system by providing input.

The existing code is then observed whether it matches the existing e-certificate or not.

Initial testing phase by providing input into the program. The input is in accordance with the functional requirements, to ensure that the results displayed are in accordance with the wishes of the program's basic functions or not, if the input provided produces an output that meets the requirements, then the program is correct, but if the output provided does not match the functional requirements, an error is found, and Further analysis was carried out to correct the error.


Theory Studies 2021






Posting Komentar

0 Komentar
* Please Don't Spam Here. All the Comments are Reviewed by Admin.