Topic:Credible Digital Asset Store Certification Application GroupA: Undergraduates or above | |
Topic introduction: Explaining the whole idea andrequirements of the topic | In recent years, users attachmore importance to digital assets. Competitors will provide an application withdigital asset store certification and authentication by virtue of a combinationof cloud computing, block chain, big data and other related techniques. A block chain network of storecertification application is deployed to a virtual machine on a cloud computingplatform, and through the application, key information (including but notlimited to Chinese and English languages) and md5 value of digital assets (PDFdocuments, pictures, videos, etc.) are stored in block chains, and digitalassets are stored in a storage server. Credible digital asset storecertification application can be used for effectively storing key informationof digital assets and preventing tampering information, and is equipped with aneffective disaster recovery mechanism by virtue of underlying block chains,thus preventing single point of failure effectively. Notes to digital assetinformation extraction: 1. Document acquisition: digitalassets, including student ID cards, property ownership certificates and papers,can be acquired through the Internet or in the manner of automatic generation. 2. Extracting ways: competitorscan directly extract or use picture processing open-source tools from or indocuments. However, it’s better that with deep learning, competitors identifyand store key information through picture processing. |
Functional requirements | Credible digital asset store certification application is established inthe topic scenario, and has the following capabilities of:
|
Non-functional requirements | 1. Virtualmachines, storage, databases and other resources provided on a cloud platformare available; 2. Deeplearning, picture identification and other tools provided on a big dataplatform are available; and 3. An underlying block chain has at least four storagenodes. |
Other restrictions: Development environment, testplatform, development language, database, complier, etc. (as explicit aspossible) | 1. Programming language: Go, Python, JAVA, C/C++,etc.; and 2. Block chain open-source software: Hyperledger Fabric. |
Test data or platform: Test environment and dataprovided to competitors (electronic documents are acceptable) | Competitorscan acquire cloud platform, deep learning and other tools on the Internet orthrough H3C, and can establish corresponding equipment environment with cloudplatform, deep learning tool and virtual machine to debug by self or use theequipment environment provided by H3C. Competitors can seek technical support ofcloud platform, big data, block chains, etc. from H3C, and if necessary, H3Ccan answer questions about the topic and operating environment in the manner ofremote connection or others. |
Instructions about development equipment and equipmentmetrics | Competitors can establish environment for testsor ask H3C to provide test environment. |
Other requirements | Accordingto requirements of the topic scenario, competitors prepare requirementspecifications of application systems in development and relevant modules. Competitorsprepare detailed design specifications of basic design ideas, key technologiesfor design and component interactions of application system, and describe key technicalfactors through flow diagrams or UML diagrams. When reviewing, H3C can ask teams to providesource codes if necessary. |
工业和信息化部
教育部
江苏省人民政府
中国电子信息产业发展研究院
江苏省工业和信息化厅
江苏省教育厅
教育部高等学校计算机类专业教学指导委员会
南京航空航天大学
中国信息化周报
中国(南京)软件谷
江苏软件产业人才发展基金会
客服电话:010-88559646
大赛邮箱:cnsoftbei@qq.com
邮编:100048
联系地址:北京市海淀区紫竹院路66号赛迪大厦18层