SlideShare a Scribd company logo
1 of 26
Download to read offline
The World’s first Public Chain
for Decentralized NaaS (Network-as-a-Service)
Disclaimer
Presentation and the information contained herein is not intended to be a source of advice or credit analysis
with respect to the material presented, and the information and/or documents contained in this presentation
do not constitute investment advice. Accordingly, any decision in connection with funds, instruments or
transactions described or mentioned herein must be made solely on the information contained in a prospectus
and no reliance is to be placed on any other representations.
on-demand service
What is Net-as-a-Service:
when network infrastructure becomes
2.3 billion people …
can’t live without internet
Whenever, wherever
We are covered by
Network Services
What's the Problem
with current Mobile Network Operation?
Problem of Privacy
and Network Restrictions
When I use WiFi
I want it to be private and secure
• Is public WiFi secure?
• Is WiFi in hotels secure?
• Can I operate transactions in full
security & privacy?
• Can I escape a restrictive Network
at Work or School?
Problem
of Payment
Paying for WiFi
or other mobile services is:
• Overpriced
• Complicated
• Limited
I can’t just pay a reasonable
amount, just when I need it and
only for the data and time I used it.
Problem
of Trust
How to make sure
I can trust a WiFi on the go?
• Are reviews real and trustworthy?
• Am I sure a reviewer has actually
used the reviewed service?
• I don’t have an audit trail.
• Reviews don’t contain information
to prove a review is real and to
trust.
The Solution:
Decentralized Network Services!
The Future is… Decentralized Network
Why decentralized network service is
significant as a part of decentralized
infrastructure?
Current vs
Distributed Internet protocol
Upon the wave of decentralization, new protocol will be introduced
Layer of Internet
Content/Application
Computing
Network
The Future…
Distributed Internet Protocol
Hash ID resolution, IPFS
Decentralized computing
Ethereum, EOS
Decentralized NaaS
Current Internet Protocol
HTTP, SMTP, DNS
TCP
Linux OS
The Infrastructure of Decentralization
Network
Service
Blockchain
=
QLC Chain
+Decentralized
Computing
Decentralized
Content
Decentralized
Network
How does QLC Chain
implement this idea?
QLC Chain Architecture
Blockchain
Smart
Contract
Dual
Consensus
Block
Lattice
QLC Smart
Contract
Shannon
Consensus
+ dPoS
1. To register network related devices, QLC Chain will turn them into
four types of basic nodes of network.
2. Each node can provide service to others.
3. QLC Chain applies Block Lattice, multiple account system. Each node
will have its own blockchain to record services provided to any user.
Each time service is provided, for example Wi-Fi access, VPN access,
data transmission, it’s a transaction.
4. Smart Contract will govern the execution among different nodes.
5. Dual consensus – dPoS and Shannon Consensus
How does it work?
API and SDK for Developers
Some concepts to illustrate the possibilities
• P2P account sharing protocol
share login & password through P2P network without disclosing any details
• Decentralized name resolution protocol
every QLC Chain node contributes its capability to translate names
(domain names, hash names or other self-defined names) into P2P identification
• Trusted billing protocol
nodes verify the actual result of information
• Proof of Retrievability
destination nodes and only destination nodes store content index dictionary
WiFi Account Sharing
The 1st dApp on
Account Sharing Protocol
Ready to download
from Google Play
WiFi Sharing Process
WiFi Sharer
- Registers
WiFi Network
in the QLC Chain
ecosystem
- Configures the share
and reward model for the
virtual asset QLC
Public Chain
WiFi
- Connects to a shared WiFi
- Agrees to the terms and conditions
- Configuration and access information
received via P2P Connection between
WiFi and the User
Access & Identity
4
1
QLC is paid to the WiFi Sharer
WinQ dApp
WinQ broadcasts
the WiFi info to users
2
5
User
3
Decentralized VPN
Ready to download
from Google Play
The 2nd dApp on
Account Sharing Protocol
Exchange Listing
Join our Community
and be part of Decentralized Network
Telegram Discord
Thank you!

More Related Content

What's hot

The Future of Blockchains & Decentralization
The Future of Blockchains & DecentralizationThe Future of Blockchains & Decentralization
The Future of Blockchains & DecentralizationShachindra
 
User defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesUser defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesLeMeniz Infotech
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101Suki Chana
 
Blockchain-intro (2)
Blockchain-intro (2)Blockchain-intro (2)
Blockchain-intro (2)Zakir Hoosen
 
Blockchain: it's much more than Bitcoin
Blockchain: it's much more than BitcoinBlockchain: it's much more than Bitcoin
Blockchain: it's much more than BitcoinKuba Tymula
 
Blockchain 101 presentation by fstream.io
Blockchain 101 presentation by fstream.ioBlockchain 101 presentation by fstream.io
Blockchain 101 presentation by fstream.ioBaiju Devani
 
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractUser defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractSoftroniics india
 
Blockchain & Cryptocurrency
Blockchain & CryptocurrencyBlockchain & Cryptocurrency
Blockchain & CryptocurrencySumit Rajpal
 
Application of Blockchain and Smart Contracts on the Internet of Things
Application of Blockchain and Smart Contracts on the Internet of ThingsApplication of Blockchain and Smart Contracts on the Internet of Things
Application of Blockchain and Smart Contracts on the Internet of ThingsCSCJournals
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technologyAndrew Adamson
 
How Blockchain Is Different From Cryptocurrency?
How Blockchain Is Different From Cryptocurrency?How Blockchain Is Different From Cryptocurrency?
How Blockchain Is Different From Cryptocurrency?Endive Software
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and BitcoinM Shamim Iqbal
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsTechracers
 
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...Blockchain Council
 

What's hot (20)

The Future of Blockchains & Decentralization
The Future of Blockchains & DecentralizationThe Future of Blockchains & Decentralization
The Future of Blockchains & Decentralization
 
User defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesUser defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based services
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
Blockchain-intro (2)
Blockchain-intro (2)Blockchain-intro (2)
Blockchain-intro (2)
 
Blockchain: it's much more than Bitcoin
Blockchain: it's much more than BitcoinBlockchain: it's much more than Bitcoin
Blockchain: it's much more than Bitcoin
 
Blockchain 101 presentation by fstream.io
Blockchain 101 presentation by fstream.ioBlockchain 101 presentation by fstream.io
Blockchain 101 presentation by fstream.io
 
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractUser defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstract
 
Blockchain & Cryptocurrency
Blockchain & CryptocurrencyBlockchain & Cryptocurrency
Blockchain & Cryptocurrency
 
Application of Blockchain and Smart Contracts on the Internet of Things
Application of Blockchain and Smart Contracts on the Internet of ThingsApplication of Blockchain and Smart Contracts on the Internet of Things
Application of Blockchain and Smart Contracts on the Internet of Things
 
Blockchain
BlockchainBlockchain
Blockchain
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
How Blockchain Is Different From Cryptocurrency?
How Blockchain Is Different From Cryptocurrency?How Blockchain Is Different From Cryptocurrency?
How Blockchain Is Different From Cryptocurrency?
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
GEO Protocol Presentation
GEO Protocol Presentation GEO Protocol Presentation
GEO Protocol Presentation
 
Smart contract
Smart contractSmart contract
Smart contract
 
The Education Blockchain
The Education BlockchainThe Education Blockchain
The Education Blockchain
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...
Blockchain And Cryptocurrency : How Blockchain And Cryptocurrency Relate To E...
 
BlockChain Public
BlockChain PublicBlockChain Public
BlockChain Public
 

Similar to QLC Chain--2018

Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreJonathan Habicht
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docxUnlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docxAnalog3
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationSahil Bajaj
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhtonmasukmia.com
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The PlatformQuantum1Net
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The PlatformQuantum1Net
 
SEA IGF 2021: Some thoughts on Internet infrastructure
SEA IGF 2021: Some thoughts on Internet infrastructure SEA IGF 2021: Some thoughts on Internet infrastructure
SEA IGF 2021: Some thoughts on Internet infrastructure APNIC
 
VNNIC Internet Conference 2022: The Future of the Internet
VNNIC Internet Conference 2022: The Future of the InternetVNNIC Internet Conference 2022: The Future of the Internet
VNNIC Internet Conference 2022: The Future of the InternetAPNIC
 
Blockchain in Cloud computing.pptx
Blockchain in Cloud computing.pptxBlockchain in Cloud computing.pptx
Blockchain in Cloud computing.pptxNickjohn33
 
HKNOG 6.0: Death in Transit
HKNOG 6.0: Death in TransitHKNOG 6.0: Death in Transit
HKNOG 6.0: Death in TransitAPNIC
 
HKNOG 6.0: Death in Transit
HKNOG 6.0: Death in TransitHKNOG 6.0: Death in Transit
HKNOG 6.0: Death in TransitBhadrika Magan
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 
Blockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its StructureBlockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its Structurekasthurimukila
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual NetworksNicole Gomez
 

Similar to QLC Chain--2018 (20)

Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyre
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docxUnlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhton
 
Service mesh
Service meshService mesh
Service mesh
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The Platform
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The Platform
 
SEA IGF 2021: Some thoughts on Internet infrastructure
SEA IGF 2021: Some thoughts on Internet infrastructure SEA IGF 2021: Some thoughts on Internet infrastructure
SEA IGF 2021: Some thoughts on Internet infrastructure
 
VNNIC Internet Conference 2022: The Future of the Internet
VNNIC Internet Conference 2022: The Future of the InternetVNNIC Internet Conference 2022: The Future of the Internet
VNNIC Internet Conference 2022: The Future of the Internet
 
Blockchain in Cloud computing.pptx
Blockchain in Cloud computing.pptxBlockchain in Cloud computing.pptx
Blockchain in Cloud computing.pptx
 
HKNOG 6.0: Death in Transit
HKNOG 6.0: Death in TransitHKNOG 6.0: Death in Transit
HKNOG 6.0: Death in Transit
 
HKNOG 6.0: Death in Transit
HKNOG 6.0: Death in TransitHKNOG 6.0: Death in Transit
HKNOG 6.0: Death in Transit
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Blockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its StructureBlockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its Structure
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Blockchain
BlockchainBlockchain
Blockchain
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

QLC Chain--2018

  • 1. The World’s first Public Chain for Decentralized NaaS (Network-as-a-Service)
  • 2. Disclaimer Presentation and the information contained herein is not intended to be a source of advice or credit analysis with respect to the material presented, and the information and/or documents contained in this presentation do not constitute investment advice. Accordingly, any decision in connection with funds, instruments or transactions described or mentioned herein must be made solely on the information contained in a prospectus and no reliance is to be placed on any other representations.
  • 3. on-demand service What is Net-as-a-Service: when network infrastructure becomes
  • 4. 2.3 billion people … can’t live without internet
  • 5. Whenever, wherever We are covered by Network Services
  • 6. What's the Problem with current Mobile Network Operation? Problem of Privacy and Network Restrictions When I use WiFi I want it to be private and secure • Is public WiFi secure? • Is WiFi in hotels secure? • Can I operate transactions in full security & privacy? • Can I escape a restrictive Network at Work or School? Problem of Payment Paying for WiFi or other mobile services is: • Overpriced • Complicated • Limited I can’t just pay a reasonable amount, just when I need it and only for the data and time I used it. Problem of Trust How to make sure I can trust a WiFi on the go? • Are reviews real and trustworthy? • Am I sure a reviewer has actually used the reviewed service? • I don’t have an audit trail. • Reviews don’t contain information to prove a review is real and to trust.
  • 8. The Future is… Decentralized Network
  • 9. Why decentralized network service is significant as a part of decentralized infrastructure?
  • 10. Current vs Distributed Internet protocol Upon the wave of decentralization, new protocol will be introduced Layer of Internet Content/Application Computing Network The Future… Distributed Internet Protocol Hash ID resolution, IPFS Decentralized computing Ethereum, EOS Decentralized NaaS Current Internet Protocol HTTP, SMTP, DNS TCP Linux OS
  • 11. The Infrastructure of Decentralization Network Service Blockchain = QLC Chain +Decentralized Computing Decentralized Content Decentralized Network
  • 12. How does QLC Chain implement this idea?
  • 15. 1. To register network related devices, QLC Chain will turn them into four types of basic nodes of network. 2. Each node can provide service to others. 3. QLC Chain applies Block Lattice, multiple account system. Each node will have its own blockchain to record services provided to any user. Each time service is provided, for example Wi-Fi access, VPN access, data transmission, it’s a transaction. 4. Smart Contract will govern the execution among different nodes. 5. Dual consensus – dPoS and Shannon Consensus How does it work?
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. API and SDK for Developers Some concepts to illustrate the possibilities • P2P account sharing protocol share login & password through P2P network without disclosing any details • Decentralized name resolution protocol every QLC Chain node contributes its capability to translate names (domain names, hash names or other self-defined names) into P2P identification • Trusted billing protocol nodes verify the actual result of information • Proof of Retrievability destination nodes and only destination nodes store content index dictionary
  • 21. WiFi Account Sharing The 1st dApp on Account Sharing Protocol Ready to download from Google Play
  • 22. WiFi Sharing Process WiFi Sharer - Registers WiFi Network in the QLC Chain ecosystem - Configures the share and reward model for the virtual asset QLC Public Chain WiFi - Connects to a shared WiFi - Agrees to the terms and conditions - Configuration and access information received via P2P Connection between WiFi and the User Access & Identity 4 1 QLC is paid to the WiFi Sharer WinQ dApp WinQ broadcasts the WiFi info to users 2 5 User 3
  • 23. Decentralized VPN Ready to download from Google Play The 2nd dApp on Account Sharing Protocol
  • 25. Join our Community and be part of Decentralized Network Telegram Discord