SlideShare a Scribd company logo
1 of 9
Download to read offline
1
BIT TAKA
[Bangladesh Country Owned Crypto
Currency and Blockchain technology ]
Presented By
Mohammad Walid Salehin
Bsc, CSE, Feni University.
2
Contents
1. Introduction-------------------------------------------------------------------------
2. Bit Taka [Block Chain technology Whitepaper] - Content
3. System Information
4. Network Diagram
5. Business Diagram
3
4
1. Introduction
Bit Taka. In the journey to building a cashless society and advanced digital Bangladesh crypto-
currency and Block chain Technology would play a vital role. Today’s World being spread their
research For making secure and Modern decentralized Digital payment gateway. Our Country
Should be join in this Network. Bit Taka bring us these opportunity to develop Our country owned
Crypto system. Every Sector will decentralize and secure with these Block chain technology. Here is
the points to Building cashless block chain based economy with Bit Taka.
 First of All, Planning and Development The Bit Taka and get ready to Implement it with every
Sector. 

 Integrate it with All of the Government and Public Service Organization with cooperate Public
Private Research Participation. 

 Availability of the All Device and Banking System.

E-Commerce and Online Businesses are Depend on Electronic Payment System. But all payment
systems are not appropriate for Hardware and Decentralized secured. Those systems are just Data-
Message Exchange. That Means E-mail handling. This system never being a electronic Payment
system.
In The whole world, a lot of Computing devices has unused Memory and CPU Power. Which doesn’t
used for connecting International Payment Processing gate-way. Peer to Peer Network system bring
this Possibility to Use those Computing power for Building block and Make a Economical Infrustrure
and Digital banking Capability. Crypto Currency is those Currency which is generate by using
Computing Power and Mining for Building block with cloud based Network-Chain. This called Block
chain.
Bangladesh become Digitalize and Cashless Country. For achieving this goal, Block-chain would
Play a vital role. Need a Crypto Currency and Block-Chain System for maintaining Total economical
back-bone. We have a strong capability for Connecting International Block-Chain network, because
Our Northern Part of Country Having a Cool Place and Mining friendly weather. So we have strong
Opportunity for being a Crypto Mining Country. According to this dream Invented Bit Taka. This
Crypto Currency Mainly work with Bit-Coin, But It is Capable with All Legit Crypto currency and
block-chain technology. Here is Points of Making This Currency-
 Find the sectors of currency where would be implementing this technology. 

 Ensure that all data and guidance are available which are required to install, configure,
maintain and operate the system securely.
In addition, the Security Whitepaper is intended to provide all information that may be required during
the procurement and selection process for the Electronic Computing Device, thus avoiding the need
for customer specific questionnaires.
This document is intended to provide a standard Blockchain Development Whitepaper content
template to be used across the Country and Economic industry.
5
Bit Taka [Block Chain technology Whitepaper] - Content
The following content should be considered when writing the development of Bit Taka and Block-
chain technology Whitepaper for any Device–system, Software only or solution. The actual content
has to be adapted to the specific nature of the Computing Device in question.
Purpose of this Document
This Block-Chain Developing Whitepaper describes the technical aspects of <Crypto Currency
Name> that are relevant for Block-chain development and it is mainly intended for the service and
customer personnel that are responsible for installation, configuration, maintenance, and operation
and for Marketing and Sales to support the procurement process. But it also should be made
available to customers on demand for transparency.
This Block-Chain Development Whitepaper contains all required information to:
 Support the procurement and selection process for the all Computing Devices.

 Avoid the need for generic security questionnaires.

 Provide this information to customer and service personnel.

 Securely install, configure, maintain, and operate the Computing Devices.

2. Development of the Program
Generic (Business) information on the Development of Block-chain program and incident and
vulnerability management, and additionally information on :
Blockchain development
 Blockchain by design
 Blockchain testing

 Secure configuration

 Security training

 Contact address (email, website) to submit vulnerability and incident notifications

 Other security program elements implemented by the supplier

3. System Information
3.1. System Overview
Brief overview of the solution:
 Description of the device, it’s intended use and market segment, taken from marketing
information

 Device list (analyzers, PCs, network equipment, etc.)

 Intended use statement

 Intended operational environment

 Operation in virtualization environments
6
3.2. Hardware Specifications
Description of details of the hardware that is being shipped (even if not used) or that is required (at
the minimum) to operate the solution, including:
 Full specs of PCs or servers with Advanced Graphics card GPU.

 Input devices such as keyboard, mouse, and touch

 Output devices such as monitors, Graphics Card, CPU, Miner Machine and printers

 External LAN, USB or Firewire ports

 Handheld barcode reader

 Uninterruptible power supply

 Wireless communication components (Wi-Fi, Bluetooth, infrared, RFID)

 Camera, Microphone, Fingerprint reader

 Compliance (CE, RoHS, FCC)
3.3. Product Software
Description of the security-related features and aspects of the solution
 User Authentication

 Audit Logging

 Connectivity

 Software Updates and Patches

 Reports

 Database
3.4. Operating System
Configuration of the OS that is shipped with the solution or configuration that the customer is
required to provide to run the solution: As this Blockchain graph of the number of blockchain wallet
users shows, growth started slow but exploded in just a handful of years:
3.4.1. OS Version information
 We Use Hyper Ledger Base Crypto Corrency. So, We Need Linux OS For Develop and
deploy This Block-Chain technology.
3.4.2. Patch level and patch policy
 Patch Level of the operating system at delivery

 Vendor patch policy and interval

 
3.4.3. Firewall
 Type, name and version of firewall

 State

 Exceptions

 Logging

 Default deny for in / out connections
7
3.4.4. Network Configuration
 Internet/Web Access restricted

 IPv6

 
3.4.5. DHCP requirements
 DNS requirements

 Wi-Fi (including encryption algorithm)
3.4.6. Hardening
 Standard or custom?

 Unneeded accounts disabled

 Unneeded file shares disabled

 Unneeded ports disabled

 Unneeded services disabled

 Unneeded applications disabled

 Restriction of external (USB) devices

 Authentication of external devices (e.g. USB Type-C Authentication specification)
3.4.7. Customer Supplied Software
 Printer drivers

 Customer antimalware

 Other tools
3.5. Third Party Software
Software supplied by other suppliers (3rd party suppliers) with the system / solution or required to
operate it. May be Off-The-Shelf Software (OTS) or Open Source Software (OSS)
 Type of Software

 Supplier

 Version information

 Licensing information

 Vulnerability Monitoring & Patching

 Configuration information

 Which configuration settings are required for regular use
3.6. Connectivity
Description of how the solution connects to its environment and how it interacts with it:
 How does the system connect to the environment

 IP configuration
o LIS / LAS / Remote Service Connectivity
 Protocol & (Default/Serial) Ports

 Modes and default mode (Server/Client)

 Data format (file format or application layer protocol)

 Services running on the System

 Idling Time
8
o For each type of connectivity:
(For example: Secure Download, Web Service, SOAP, VNC, Remote Desktop, File Share)
 Protocol & (Default) Ports (e.g. SMB/124)

 Services running on the System

 Service Discovery

 Data format (file format or application layer protocol)

 Multicast

 Idling Time
3.7. Security Patching
 Description of Patch Process (vendor or customer supplied patches)

 Availability pf patches
o Components which are being
patched o Timeframe of patching
o Delivery channels for patches
3.8. Sensitive Data
 Types of sensitive data that is processed by the solution (e.g. demographic, diagnostic,
therapeutic, financial, employee or other PII).

 Statement on how the customer’s data is processed (e.g. stored on or transmitted to the
vendor’s infrastructure or local storage only).

 Methods and scenarios used to de-identify sensitive data (e.g. replacement of data by
asterisks when service is logged in, in log files or in printed reports) – anonymization and / or
pseudonymization

 Handling of sensitive data in transit or at rest (e.g. encrypted when transmitted via network,
when exported, when at rest in database)

 Handling of sensitive data when system is decommissioned
























9
4. Network Diagram
4.1. Network diagram of the solution
<network diagram>
USERS
Transfer 1 btc from
acct_btc to acct_bittaka
Confirm 1 wraped btc in
acct_bittaka
BIT COIN
BIT TAKA
USER ACCOUNT : acct_btc
Bit Taka Wallet.
User account : acct_bittaka
Bit taka Wallet
BIT
COIN
Bit_
Coin
Bit Taka a Trusted
Broker
Confirm 1 btc Transfer 1 wraped btc from Bittaka
Wallet to acct_bittaka
Transfer 1 btc
Transfer 1 wraped btc

More Related Content

What's hot

Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
Taming the compliance beast in cloud
Taming the compliance beast in cloudTaming the compliance beast in cloud
Taming the compliance beast in cloudSaumya Vishnoi
 
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...ijcisjournal
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossQuick Heal Technologies Ltd.
 
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...IJECEIAES
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeIdentity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeVenkatesh Devam ☁
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesUlf Mattsson
 
PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,Khaled Mosharraf
 
AnuuTech Whitepaper.pdf
AnuuTech Whitepaper.pdfAnuuTech Whitepaper.pdf
AnuuTech Whitepaper.pdfAnuuTech
 
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkPrivate and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkIRJET Journal
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storagePapitha Velumani
 

What's hot (19)

Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
Taming the compliance beast in cloud
Taming the compliance beast in cloudTaming the compliance beast in cloud
Taming the compliance beast in cloud
 
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
 
Mapping document
Mapping documentMapping document
Mapping document
 
Atm switch
Atm switchAtm switch
Atm switch
 
Fools your enemy with MikroTik
Fools your enemy with MikroTikFools your enemy with MikroTik
Fools your enemy with MikroTik
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeIdentity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage Scheme
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and Strategies
 
PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,
 
AnuuTech Whitepaper.pdf
AnuuTech Whitepaper.pdfAnuuTech Whitepaper.pdf
AnuuTech Whitepaper.pdf
 
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkPrivate and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 

Similar to Bangladesh's Bit Taka crypto currency and blockchain whitepaper

DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKIRJET Journal
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverableSarmad Ibrahim
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesSherry Bailey
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Zeeve
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET Journal
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET Journal
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Lattice Network Yellow Paper.pdf
Lattice Network Yellow Paper.pdfLattice Network Yellow Paper.pdf
Lattice Network Yellow Paper.pdfBijanBurnard
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain TechnologyIRJET Journal
 
Blockchain Tech Approach Whitepaper
Blockchain Tech Approach WhitepaperBlockchain Tech Approach Whitepaper
Blockchain Tech Approach WhitepaperProperty Bihar
 
Creating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainCreating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainIRJET Journal
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcKristen Wilson
 
Blockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksBlockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksNam Yong Kim
 

Similar to Bangladesh's Bit Taka crypto currency and blockchain whitepaper (20)

DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay Examples
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc System
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and Ethereum
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Lattice Network Yellow Paper.pdf
Lattice Network Yellow Paper.pdfLattice Network Yellow Paper.pdf
Lattice Network Yellow Paper.pdf
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
 
Blockchain Tech Approach Whitepaper
Blockchain Tech Approach WhitepaperBlockchain Tech Approach Whitepaper
Blockchain Tech Approach Whitepaper
 
Creating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainCreating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using Blockchain
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
Blockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksBlockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networks
 

Recently uploaded

The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Pooja Nehwal
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...shivangimorya083
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free DeliveryPooja Nehwal
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxanshikagoel52
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 

Recently uploaded (20)

The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
 
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptx
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 

Bangladesh's Bit Taka crypto currency and blockchain whitepaper

  • 1. 1 BIT TAKA [Bangladesh Country Owned Crypto Currency and Blockchain technology ] Presented By Mohammad Walid Salehin Bsc, CSE, Feni University.
  • 2. 2 Contents 1. Introduction------------------------------------------------------------------------- 2. Bit Taka [Block Chain technology Whitepaper] - Content 3. System Information 4. Network Diagram 5. Business Diagram
  • 3. 3
  • 4. 4 1. Introduction Bit Taka. In the journey to building a cashless society and advanced digital Bangladesh crypto- currency and Block chain Technology would play a vital role. Today’s World being spread their research For making secure and Modern decentralized Digital payment gateway. Our Country Should be join in this Network. Bit Taka bring us these opportunity to develop Our country owned Crypto system. Every Sector will decentralize and secure with these Block chain technology. Here is the points to Building cashless block chain based economy with Bit Taka.  First of All, Planning and Development The Bit Taka and get ready to Implement it with every Sector.    Integrate it with All of the Government and Public Service Organization with cooperate Public Private Research Participation.    Availability of the All Device and Banking System.  E-Commerce and Online Businesses are Depend on Electronic Payment System. But all payment systems are not appropriate for Hardware and Decentralized secured. Those systems are just Data- Message Exchange. That Means E-mail handling. This system never being a electronic Payment system. In The whole world, a lot of Computing devices has unused Memory and CPU Power. Which doesn’t used for connecting International Payment Processing gate-way. Peer to Peer Network system bring this Possibility to Use those Computing power for Building block and Make a Economical Infrustrure and Digital banking Capability. Crypto Currency is those Currency which is generate by using Computing Power and Mining for Building block with cloud based Network-Chain. This called Block chain. Bangladesh become Digitalize and Cashless Country. For achieving this goal, Block-chain would Play a vital role. Need a Crypto Currency and Block-Chain System for maintaining Total economical back-bone. We have a strong capability for Connecting International Block-Chain network, because Our Northern Part of Country Having a Cool Place and Mining friendly weather. So we have strong Opportunity for being a Crypto Mining Country. According to this dream Invented Bit Taka. This Crypto Currency Mainly work with Bit-Coin, But It is Capable with All Legit Crypto currency and block-chain technology. Here is Points of Making This Currency-  Find the sectors of currency where would be implementing this technology.    Ensure that all data and guidance are available which are required to install, configure, maintain and operate the system securely. In addition, the Security Whitepaper is intended to provide all information that may be required during the procurement and selection process for the Electronic Computing Device, thus avoiding the need for customer specific questionnaires. This document is intended to provide a standard Blockchain Development Whitepaper content template to be used across the Country and Economic industry.
  • 5. 5 Bit Taka [Block Chain technology Whitepaper] - Content The following content should be considered when writing the development of Bit Taka and Block- chain technology Whitepaper for any Device–system, Software only or solution. The actual content has to be adapted to the specific nature of the Computing Device in question. Purpose of this Document This Block-Chain Developing Whitepaper describes the technical aspects of <Crypto Currency Name> that are relevant for Block-chain development and it is mainly intended for the service and customer personnel that are responsible for installation, configuration, maintenance, and operation and for Marketing and Sales to support the procurement process. But it also should be made available to customers on demand for transparency. This Block-Chain Development Whitepaper contains all required information to:  Support the procurement and selection process for the all Computing Devices.   Avoid the need for generic security questionnaires.   Provide this information to customer and service personnel.   Securely install, configure, maintain, and operate the Computing Devices.  2. Development of the Program Generic (Business) information on the Development of Block-chain program and incident and vulnerability management, and additionally information on : Blockchain development  Blockchain by design  Blockchain testing   Secure configuration   Security training   Contact address (email, website) to submit vulnerability and incident notifications   Other security program elements implemented by the supplier  3. System Information 3.1. System Overview Brief overview of the solution:  Description of the device, it’s intended use and market segment, taken from marketing information   Device list (analyzers, PCs, network equipment, etc.)   Intended use statement   Intended operational environment   Operation in virtualization environments
  • 6. 6 3.2. Hardware Specifications Description of details of the hardware that is being shipped (even if not used) or that is required (at the minimum) to operate the solution, including:  Full specs of PCs or servers with Advanced Graphics card GPU.   Input devices such as keyboard, mouse, and touch   Output devices such as monitors, Graphics Card, CPU, Miner Machine and printers   External LAN, USB or Firewire ports   Handheld barcode reader   Uninterruptible power supply   Wireless communication components (Wi-Fi, Bluetooth, infrared, RFID)   Camera, Microphone, Fingerprint reader   Compliance (CE, RoHS, FCC) 3.3. Product Software Description of the security-related features and aspects of the solution  User Authentication   Audit Logging   Connectivity   Software Updates and Patches   Reports   Database 3.4. Operating System Configuration of the OS that is shipped with the solution or configuration that the customer is required to provide to run the solution: As this Blockchain graph of the number of blockchain wallet users shows, growth started slow but exploded in just a handful of years: 3.4.1. OS Version information  We Use Hyper Ledger Base Crypto Corrency. So, We Need Linux OS For Develop and deploy This Block-Chain technology. 3.4.2. Patch level and patch policy  Patch Level of the operating system at delivery   Vendor patch policy and interval    3.4.3. Firewall  Type, name and version of firewall   State   Exceptions   Logging   Default deny for in / out connections
  • 7. 7 3.4.4. Network Configuration  Internet/Web Access restricted   IPv6    3.4.5. DHCP requirements  DNS requirements   Wi-Fi (including encryption algorithm) 3.4.6. Hardening  Standard or custom?   Unneeded accounts disabled   Unneeded file shares disabled   Unneeded ports disabled   Unneeded services disabled   Unneeded applications disabled   Restriction of external (USB) devices   Authentication of external devices (e.g. USB Type-C Authentication specification) 3.4.7. Customer Supplied Software  Printer drivers   Customer antimalware   Other tools 3.5. Third Party Software Software supplied by other suppliers (3rd party suppliers) with the system / solution or required to operate it. May be Off-The-Shelf Software (OTS) or Open Source Software (OSS)  Type of Software   Supplier   Version information   Licensing information   Vulnerability Monitoring & Patching   Configuration information   Which configuration settings are required for regular use 3.6. Connectivity Description of how the solution connects to its environment and how it interacts with it:  How does the system connect to the environment   IP configuration o LIS / LAS / Remote Service Connectivity  Protocol & (Default/Serial) Ports   Modes and default mode (Server/Client)   Data format (file format or application layer protocol)   Services running on the System   Idling Time
  • 8. 8 o For each type of connectivity: (For example: Secure Download, Web Service, SOAP, VNC, Remote Desktop, File Share)  Protocol & (Default) Ports (e.g. SMB/124)   Services running on the System   Service Discovery   Data format (file format or application layer protocol)   Multicast   Idling Time 3.7. Security Patching  Description of Patch Process (vendor or customer supplied patches)   Availability pf patches o Components which are being patched o Timeframe of patching o Delivery channels for patches 3.8. Sensitive Data  Types of sensitive data that is processed by the solution (e.g. demographic, diagnostic, therapeutic, financial, employee or other PII).   Statement on how the customer’s data is processed (e.g. stored on or transmitted to the vendor’s infrastructure or local storage only).   Methods and scenarios used to de-identify sensitive data (e.g. replacement of data by asterisks when service is logged in, in log files or in printed reports) – anonymization and / or pseudonymization   Handling of sensitive data in transit or at rest (e.g. encrypted when transmitted via network, when exported, when at rest in database)   Handling of sensitive data when system is decommissioned                        
  • 9. 9 4. Network Diagram 4.1. Network diagram of the solution <network diagram> USERS Transfer 1 btc from acct_btc to acct_bittaka Confirm 1 wraped btc in acct_bittaka BIT COIN BIT TAKA USER ACCOUNT : acct_btc Bit Taka Wallet. User account : acct_bittaka Bit taka Wallet BIT COIN Bit_ Coin Bit Taka a Trusted Broker Confirm 1 btc Transfer 1 wraped btc from Bittaka Wallet to acct_bittaka Transfer 1 btc Transfer 1 wraped btc