The Development of Digital Monetary Encryption in China and Its Application in Artificial Intelligence Information Security

2022-04-26 03:22TangLinyun,TangHeyun
科技与法律 2022年2期
关键词:大数据分析机器学习

Tang Linyun, Tang Heyun

Abstract: In the artificial intelligence (AI) era, the commercial battlefield has gradually shifted to network, whereas networks have produced new economic models. In this smoke-free era of digital competition, AI has generated an unprecedented boost to human development while giving rise to needs for network security; thus, more efforts from scholars and the government are required to meet this critical demand and make the revolution of this new era safer and more beneficial. In the information area, innovation has established new forces and development opportunities. China should take advantage of the opportunities of "one belt, one road" to accelerate the development and national major strategic integration of AI in two ways. First, by speeding up the integration and development of AI and cloud computing, Internet+, big data, technological innovation, and other national strategies, as well as actively promoting the development of AI and innovative technology. Second, by fast tracking the integration of AI with China's current ambitious initiatives, "one belt, one road", "intelligent power", and "industrial power" initiatives, to promote a development strategy that leverages the power of AI.

Keywords: cloud computing; industrial power; new economic models; intelligence; machine learning; theoretical algorithms; data analysis

CLC: D 912 DC: A                    Article ID:2096⁃9783(2022)02⁃0126⁃12

1 Introduction

Science and technology are the primary productive forces of humanity. As an emerging technology, artificial intelligence (AI) is pushing a new era forward. Accenture, a well-known international consulting company, published a report entitled "How Artificial Intelligence Can Drive China's Growth," pointing out that AI will promote China's economy considerably in the next 20 years. With the rapid development of AI, at a growth rate expected to reach 17% in the future, the total AI market value will exceed 127 billion US dollars by 2025. National AI planning in China should focus on comprehensively promoting technological breakthroughs, industrial development, and strategic applications of AI. It is imperative that the nation grasps the important opportunity presented by this era in the development of AI, striving to encourage its progress with attending contributions and to usher in a new generation of information technology with epochal significance. In contemporary times, AI represents the most significant technological change to the flow of human society, and will exert profound impact on our social lives. Such change is imperceptible, from the drip of daily life, to macro-industrial development. AI currently covers many fields, such as unmanned driving, natural language processing, image recognition, portraiture, data science, and a seemingly endless array of other applications. AI is a highly intelligent technology. Through machine learning based on existing and projected data statistics, it intelligently automates the operation of various transactions, simulating the processes of human consciousness and reasoning, and establishing technology with abilities similar to those of human intelligence. AI is capable of perceiving and interacting with the outside world. The rapid development of AI will have a wide and far-reaching impact on human society and ultimately change the world, focusing on algorithms theory, cloud storage, hybrid enhancement, machine learning, computer chips, and other challenges. Essentially, AI technology will develop along two main frontiers of algorithms and computing, and has now entered a new era of quantum computing and human?computer collaboration.

2 Digital Information Security and Block chain

2.1 Block Chain Technology

The block chain technology is based on Bitcoin technology. From the perspective of data storage, the block chain provides an undetrimental reliance and trust, the reliable data distributed storage of collective maintenance. From the perspective of basic science and technology, block chain is a comprehensive application of multiple technologies based on databases, cryptography, and network communications. The block chain is supported by Bitcoin basic technology. As the basic application system, through the hierarchical analysis and application of the system, the concept of the block chain can be better understood, as a typical architecture of the block chain, a Bitcoin system application integral to maintaining a smooth operation of Bitcoin. From the architecture and layered application technology of Bitcoin, it fully demonstrates the fusion and new electronic cash trading characteristics of technology. In 2015, the block chain technology separated from the concept of "Bitcoin" and became an independent research direction. Block chain is a common maintenance of multiple parties, using cryptographic guarantees transmission and access security. It can implement data unanimous storage difficult to tamper, to prevent rendering technology, also known as distributed book technology (Distributed Ledger Technology). A typical block chain stores data in block-chain structure.

2.2 Principle

Conscientiously implementing the relevant national policies, in accordance with the research and utilization of new technology, the digital currency risk of preventive zone chain networks is for better facing and seizing the development of the block chain. Internet of Things, cloud computing, big data, artificial intelligence, machinery deep learning, block chain, bioactic engineering, etc. If new technology drives network space from everyone to all things, digital, networked and intelligent services will be everywhere. As a key engine that responds to the "post financial crisis" era growth, inexperience and uncertainty, deepening structural reforms and promoting sustainable development. The new technology plays an extremely important role, with a district block chain technology and the current development of the current situation multi-zone chain it is better to understand and learn the block chain.

3 "Block Chain +" Medical Application Scene

3.1 Block Chain Application Scene Overview

As the block chain consensus mechanism is from the need to mine to the upgrade without the mineral process, its application scenario has also widen from the original single electronic virtual currency trading system to a broader application scenario. In recent years, many block chain alliances, established at home and abroad, are committed to the use of block chain technology into a real-world production environment to achieve high efficiency, low cost goals. The application of the block chain can be roughly divided into three stages: the first stage is the encrypted digital currency; the second stage is the application of digital financial assets such as stock, bond, futures, intelligent contract; the third stage is the application of digital assets in various aspects such as energy, manufacturing, supply chain, government, health, culture and art. With the continuous maturity and improvement of the block chain technology, its application scenario has also broadened from the original single electronic virtual currency trading system to a broader intelligent contract, equity transaction, and charity.

3.2 Analysis of the Block Chain Application Scenario

As a distributed book database, the block chain uses a digital encryption technology and consensus mechanism algorithm to achieve decryption system and security credibility. According to the block chain technology architecture and core key technique on the technical characteristics of the block chain, it has the following four major characteristics:

(1) Block chain can be detrimental as a distributed account book, the information interaction between its nodes is a direct transaction method of point-to-point, that is, any node has the same rights and obligations, which can obtain the same, complete account, but at the same time, the information data in the database is maintained to protect its security. This mode not only breaks the traditional needs of the trusted third party to complete the transaction mode, but also effectively solves the problem of trust in economic life. In addition, the interactive mode of the point-to-point can simplify the transaction process, laying a low-cost, high-efficiency payment channel to the trade, while contributing to constructing a flat global integrated liquidation system.

(2) The block chain is open and security guarantee on the one hand, any node in the block chain network can participate in the balance of the ledger account, and the information data stored on the block is not reversible by the consensus mechanism, and therefore, in addition to the required private information requiring a particular encryption, the block chain all information data in the system is highly transparent. On the other hand, the information data stored on the block is only lost or tampered with when half of the node is attacked simultaneously, so the information data stored in the block chain is open and safe.

(3) Block chains have high secret unlike traditional symmetrical encryption methods, the block chain account system consists of a public key and a unique private key corresponding to the corresponding encryption method. Using an asymmetric encryption algorithm, the recipient cannot use the assets in the public key to ensure the right to obtain information and data without the private key. Although users in the system can encrypt with the public key, the decryption authority can only be used by the holder of the private key.

(4) The block chain has systematic stability as a distributed book database, any node can share its information data, so modifications or attacks for a single node are invalid, unless more than 51% of the nodes in the entire account database can be controlled. In addition, the more nodes involved in the database, the stronger the computing power and the safer the information data in the database. According to the block chain to decentralization, openness, safety, high secret and systematic stability, application scenarios mainly include:

Scenarios that need to build trust in multi-party collaboration. The basic feature of the block chain can be detrimental to the business model of multiple collaboration between multiple decentralized management organizations. In the block chain network, the information interaction between inter-agency no longer needs to be able to achieve a point-to-point service through a third party "transfer station", which helps to simplify the transaction process, improve business processing efficiency and reduce operating costs. In short, the characteristics of the block chain "trust" can make two or more users who do not trust independently, build trusted information interactive channels without worrying about fraud, bitcoin, etc. The successful operation of virtual currency is a good example in the anti-fraud region.

Trading scenes requires traceable. The openness and security of the block chain gives its unique chain data structure and the publicized storage mode of the whole network. In this mode, any node can record historical transaction information data that occurred in the whole network, i.e. attack or tampering with individual nodes, will not affect the security of the full network general book. Therefore, there is a fully encrypted digital hash, the same copy account in any node, anyone (authorized users in the league chain) is possible to check the information data stored in the block chain network as well as to check every transaction of the entire block chain node.

Scenes for anonymous trading. The public zone chain is almost the first choice for high anonymous business. Because there is no need to collect user personal information in any centralization system, the block chain network can complete the interaction of information data through the WOP (Proof of Work) incentive mechanism. There is no need to worry about privacy leaks. The highly secret feature of the block chain can provide a pair of encrypted asymmetric public private spots, the public key can be publicly published, used to send information sent by the sender encryption, a private key for receiving, and decrypt the received encrypted content. No need to leak your privacy information to anyone during the period.

Scene of anti-counterfeiting. The system steady feature of the block chain can provide an effective solution to the information data of the license, anti-counterfeiting and other issues. Today, many economic services are based on contracts or vouchers and the process of digital informatization, it is inevitable, and there is a problem that the data will be issued, anti-counterfeited and other issues. The traditional solution is to use the trusted service provided by third parties to realize the tamper-proof of data, but the technical risk, compliance risk and morality of the third party will bring new risk points to the economic business, so Block chain embedding is the best solution. It not only does not require third parties, but also based on the theory of information asymmetry and automatically provides timestamp service.

3.3 Block Chains Use Scene in the Insurance Industry

As the proportion of insurance spending is increasing in people's lives, the innovation of traditional insurance business model is also hoped, and the emergence of block chain insurance, great innovation has revolutionized the traditional insurance business model, enhanced the insurance market's recording capacity, transparency, recognition accuracy and reaction speed of risk. Block Chain expert Olivier Rikken believes that block chain technology can realize real P2P 1or crowdfunding insurance models, enabling the focus of insurance companies to focus from asset management to risk calculation.

Image source: HUOBI Network Block Chain Application Ecological Scenario Cycle Diagram

3.4 Block Chain Insurance and Related Industrial Chain Development

In recent years, increase cooperation with data-driven Internet platforms, and increase its cooperation with emerging technology companies or improve their technical research and development capabilities, and become the key development direction of traditional Internet companies. For example, the water droplet group has been dripped by a social fundraising platform, and the online mutual aid platform water drops, the public welfare platform water droplets, the health insurance is preferred platform water, and the rapid accumulation of more than 550 million registered users, 160 million independent paid users, and accumulated a large number of user behavior data. It is able to create portraits by establishing a relatively precise user. Based on the outstanding advantages of innovation and product precision promotion in the design of its insurance product, it has gradually become a cooperative object of many traditional insurance companies. In addition to being an accurate distribution channel of insurance companies, it also began to participate in the repositioning of some user data analysis and risk control businesses and the new trend of the insurance industry: driven by data and new technologies. In addition, Internet insurance leaders are all security insurance, with its prominent technology research and development and service capabilities, have reached technology and business cooperation with many traditional insurance companies. All security insurance has now launched its own security insurance open platform, providing the industry insurance agency to customized insurance industry solutions based on cutting-edge technology such as large data, artificial intelligence and block chain.

3.4.1 Block Chain for the Insurance Industry Improvement

The block chain of the block chain mainly includes the following aspects: Based on block chain credit system and automatic implementation of intelligent contracts, enhanced user trust, this stage is especially important for mutual insurance products. Mutual insurance agencies or network mutual aid platforms can store payment information such as pay-ins of interest in the block chain, and introduce third parties with supervisory efficacy to jointly maintain the book to improve the difficulty of tampering. The insured can check it by checking according to its own needs, which can effectively reduce the information asymmetry between the uninsured and the insured. In the trust mechanism of intelligent contracts and block chain, other types of insurance products can also try to store the product premium structural design, claims cases, and standard critical data stored on the block chain, and strengthen user trust. Create a shared transparent account of multi-party maintenance to enhance insurance data integration analysis, improve the efficiency of integrated insurance, especially between direct insurance companies and reinsurance companies. The convergence scheme of block chain + trusted calculation can achieve the operation and inspection of the data without privacy data, providing new ideas and possibilities for data sharing between direct insurance companies. It is capable of providing trusted records and retrospective capabilities of dynamic change information such as agricultural insurance, natural disaster insurance, etc. Identity Authentication Service System: The design positioning of the handover chain is the league chain. Participants need to provide application, register corporate information, submit a public key, and complete the production of the certificate, only the access certificate can be added. In the block chain network, in order to meet the regulatory requirements, the management agency has the right to revoke the certificate of registered certificates. Intelligent Contract System: The block chain is designed to separate the safety containers to each business scene compile and run the intelligent contract to provide the effectiveness of the operation and maintenance. Services: Classify independent business sub-chains according to specific business scenarios, allowing participates to participate in the business chain, and enhancement of network overall performance.

3.4.2 Block Chain Scene Application Conditions

As an emerging technology, the block chain has the potential for applications in many fields. However, the block chain is not universal, technical centering, difficult to tamper, make it a high application value in the limited scenario, which can be summarized as "new database, multi-service body, not mutual trust," More powerful interactive business applications. The block chain is essentially a new database with a timestamp, from the perspective of the data true, effective, successful, difficult to tamper, and is a new starting point. Each of the block chains can have a full account copy, through instant clearing mode, to ensure consistency between data and multiple mains, and avoid complex recipient processes. Again, it is suitable for establishing mathematical trust in an untrustworthy environment. The block chain guarantees the system's data trusted (cryptographic algorithm, digital signature, timestamp), the result of credible (intelligent contract, formula algorithm) and historical credible (chain structure, timestamp), the block chain provides a "machine intermediary", especially for industry applications that collaborators are untrustworthy, inconsistent or lack of authoritative third-party intervention. The public chain allows for any node, does not limit the communication of information, and information is open to the entire system; the league chain only allows the certified institution to participate in consensus, transaction information is localized according to the consensus mechanism; compared with the private chain Narrow, only within a limited mechanism.

4 Block Chain + Insurance Development Trend

4.1 Technology and Architecture Standard

Block chain technology is considered to be a great new era innovation technology, with artificial intelligence, cloud computing, 5G internet computing mode subversive innovation, and block chain technology utilization has triggered high attention while developing, related blocks chain technology and its application are one of the current hot topics. The block chain experienced technical origins, block chains 1.0, block chain 2.0 and block chain 3.0 era. Its application has also extended to various fields such as Internet of Things, intelligent manufacturing, supply chain management, digital asset transactions. The block chain deployment model is based on distributed ledger control and various methods to perform node cluster computing on the block chain. Deployment models include public chain and league chain. Technical support common concerns require coordination between different roles and unanimously achieved behavior and capabilities in the block chain system. Common attention points can be shared by multiple characters, block chain activities, and function components and have an impact on them.

4.2 Block Chain + Insurance Future Development Prospect

(1) Customize individual insurance to meet diverse needs. The block chain can provide low-cost products to emerging markets and improve customer participation in the emerging market and enhance customer participation to promote innovation of insurance companies, and to help insurance companies achieve business growth.

(2) Promote fairer anti-fraud claims in the insurance industry. The block chain technology can play a role in the identification of insured, and the insurance fraud risk is reduced by an uncharged identity certificate. According to the information, there is a problem that the pension insurance or fraudulent insurance is generally exists. The identification system based on the block chain can enable everyone with unique password information. If the input and verification links of the password information are set in the insurance premium, it is basically avoiding the incident of the insurance premium. At the same time, based on the application of block chain smart contracts, you can track the health status and life status of the insured by establishing a personal health information management system, including hospitals, communities, civil affairs departments, and whether or not insurance premium is issued and make a claim for decision support.

(3) Establish a more efficient credit consensus mechanism environment. The intelligent contract can complete the automatic implementation of claims, which is a reliable and transparent payment mechanism for customers, and intelligent contracts can be used to strengthen specific contract rules. For example, in a car accident, if the car is maintained in accordance with the predetermined process in the prescribed repair shop, the intelligent contract can ensure that the claims pay for the claims.

(4) Mutual insurance, risk allocation. The reason why insurance is developed for risk sharing, in development, well-developed, in the company mechanism of the block chain, makes full use of its trust consensus mechanism, so that mutual help can better achieve the important form of risk management. Take advantage of the consensus of the block chain letter of contracting mechanism, allowing organizational members to achieve better trust mechanisms, allowing mutual insurance risk to reduce costs, and then achieve risk management through lower fees. The block chain will have a huge impact on existing economic society, and the influence of the leaping activities. For the future prospects, several aspects can be expressed: First, the application model is upgraded to achieve a balance between security and profitability and increased transaction volume. The future block chain is mainly composed of private chains, public chains and hybrid chains. The second is multi-center. Future district block chain system architecture will enable the construction of multi-center system to disperse independent single center, enhance the unified multi-center of multi-party participation, thereby improve trust transmission efficiency and reduce transaction costs. Third, Digital currency as payment drives other industries to break out of financial innovation. The area of the block chain will first create trust in the parties to the transaction, but it is not easy to establish a breakthrough in the field of trust relationship. The fourth is the socialization of intelligent contracts. In the future, the contract will be intelligent, and the intelligent contract can guarantee the agreed reliability. The block chain can also be used in the field of intangible asset management, such as intellectual property, domain management, and integral management.

5 Advances in AI

The development of AI in the EU began early2. Since 2010, the realization of AI growth has been regarded as one of the three major growth factors of intelligent, sustainable, and inclusive growth. AI significantly influences the promotion of scientific and technological innovation, industrial advancement, and economic quality development and progress. Following the development of global information technology, the new round of technological innovation and industrial transformation through AI is akin to installing wings to promote the exponential growth of the intelligence industry. This revolution, as with previous technological revolutions, will lead to rapid development, affecting all walks of life. In addition to bringing about efficient economic growth, it will enable high-quality innovation and improvement for other industries; e.g., a chip based on graphene will run 100 times faster than existing chips, whereas energy consumption will dramatically decrease, further paving the way for new developments in AI.

The National Science and Technology Commission's Subcommittee on Machine Learning and Artificial Intelligence has established the arrangement of AI development in the US. On February 11, 2019, then, President Trump signed an executive order entitled "Maintaining American Leadership in Artificial Intelligence," signaling the high priority of the development, planning, and strategic positioning of AI in the US. Data storage and access were also upgraded to a new level. The cultivation of AI talent has also been accorded a higher priority level. This "priority" level of urgency enabled the official launching of the American AI program.

AI is of significant interest in international competitions. China has elevated AI to a strategic technical level in its national planning, putting it on a par with major developed countries in terms of national advancement. Thus, China has positioned AI as a major approach for safeguarding national security, formulating plans and policies, and carefully deploying core technologies, talent, standards, and norms. The development of AI in China has a large base, a good foundation, and a high degree of national attention. Various initiatives have been successively issued, with excellent achievements in training AI talent and technological innovation. After years of accumulation, the number of papers published by high-impact journals and international patents granted, now rank second in the world. Tremendous breakthroughs have been made in the fields of cross-border integration, human–machine collaboration, and integrated intelligence. Intelligent sensors, neural network chips, and supporting tools with high precision and low cost are steadily and expeditiously developing. Progress has been made in the R&D of AI technology innovation, theoretical modeling, digitalization, networking, and consolidating open source platform on the bases of intelligent software and hardware.

6 Application of AI

Network and cloud-based intelligence technology will promote the development of distributed AI, making it possible for data to generate new knowledge through in-depth learning in the cloud, as AI machines will cultivate abilities in perception and learning. A series of computer algorithms, such as bioengineering algorithms, neural computing, and immune computing, will initiate a revolution in bio intelligence. In addition, the development of innovative computing theory, particularly quantum computing theory and chip technology, will revolutionarily influence the development and application of AI.

6.1 Application at the Enterprise Level

AI technology is also widely used for upgrading intelligent factory and enterprise applications in the field of electronics, particularly in the retail sector. The network data marketing of e-commerce provides a vast amount of sales data. These sales data deliver information about the reality on the ground to develop both market and demand, and can be used in intelligent production planning. Sales provide training data for AI technology. For example, customers who want to buy clothes no longer have to go to the store to try them on. When choosing clothes on some platforms, AI technology provides personalized intelligent recommendations for customers based on their known size and preferences.

6.2 Application at the Industrial Level

The in-depth implementation of intelligent manufacturing and governmental encouragement of the exploration and development of a new generation of AI technology in all aspects of industrial fields have advanced strategic achievements in industrial manufacturing. To support breakthroughs and innovation in the application of algorithms in key areas of intelligent manufacturing equipment, manufacturing processes, and industrial advancement, functions have been systematically upgraded, and a new generation of intelligence has resulted. The development plan is forward-looking related to the current overall situation and long-term projected benefits. AI is also widely used in various fields, including smart grids to promote green development, increase the efficiency of investment and output, and advance energy conservation. Intelligent cities accelerate sustainable development and promote the application of intelligent transportation, smart buildings, and other technologies in urban construction and development. To date, only 370 such R&D projects have been implemented in Europe.

6.3 Data Information Analysis of AI

In the big data age, exploring data requires managing complex information. The biggest challenge restricting such work is the inadequacy to manually process massive amounts of information. With improvements in information technology and acceleration of network convergence, enormous information is fed back to the data center through unmanned aerial vehicle, cameras, wearable devices, and other forms of communication technology. An immense array of images and video information is continuously being transmitted and processed. With the gradual development and advancement of robust AI, in the future, revolutionary changes will occur through intelligent perception and information processing, intelligent command- and control-assisted decision-making, unmanned machinery and robots, intelligent assistant systems, and other smart applications3 in various fields.

Image Source: www.monolithicpower.com/en/applications/industrial/unmanned-aerial.html

(1) Black market economy

With the advent of the internet age came the exponential rise of applications such as Facebook, Twitter, PayPal, Alipay, Cisco, Ctrip, and NetEase, as well as the accompanying urgency of managing network security and vulnerabilities. In the IT world, a group of anti-fraud security technology experts quickly launched the antibrush system, sword finger wool party, malicious orders, malicious users, and business fraud as well as vowed to eliminate network threats successively. They are committed to making business risk control more simple, efficient, and reliable through AI security technology using big data and other approaches. They protect network security as the patron saints of the network. Simultaneously, a new force has been gathered for this purpose.

The Republic of El Salvador is the first country to make bitcoin legal tender, and Panama, also located in Central America, is officially working on a new proposal to include cryptocurrencies, including bitcoin, together as legal tender. As a representative of digital currencies, Bitcoin is restricted in many countries. Taking the block chain, the central technology of Bitcoin, as an example, block chain technology brings low cost and cryptographic security. Block chain makes digital currencies more efficient and less costly than traditional currency applications, but the block chain economy also inevitably brings the birth of a black market economy, which can cause money laundering and proliferation of black market transactions because of the strong anonymity of the block chain. Moreover, the anchored block chain economy, such as Bitcoin, will cause challenges to the status of fiat currencies if it is promoted and applied on a large scale. For instance, the global payment system function of the US dollar will be weakened by the promotion of Bitcoin, Litecoin, and digital RMB, which will also cause countermeasures of monetary sovereign countries.

The digital currency economy is an inevitable product of the information age; in the process of highly developed economic development, the real economy will give way to finance, and finance will adapt to the needs of technological innovation, resulting in the digital currency economy. The black market economy, like the developing countries need transnational middle-income traps to enter the developed country stage and is determined by the technology and environment of the digital currency. This will usher in a new economic stage, different from the past; the R&D of economics can no longer be confined to a single field. It will integrate a set of electronic information technology, materials technology, economics, industrial base, and other new disciplines.

(2) Future innovation strategy trends

Currently, the development of AI has entered the stage of industrial application. National science and technology innovation bases have been continuously constructed and upgraded. Several leading international innovation bases have been built in the field of AI. AI innovation is developing a new generation on the cutting edge of the field. AI technology is persistently developed by the main telecom operators in the world, and technology is a key to the construction and establishment of operators' differential competitive advantages. World-renowned enterprises have long-term strategic development plans in the AI field. Through improving network performance, enhancing customer experience, and exploiting big data to generate additional business opportunities, they are most concerned with the application and direction of AI enterprises. Application fields mainly focus on network operation and maintenance, customer service, business and product innovation, and open source level. In the field of application development, such as smart finance, communications, and automobiles, enterprises with more experience in digitalization are more likely to gain revenue from integrating AI technology than other fields. With the support of AI technology, enterprises will fundamentally adjust business composition and portfolio, developing new business models to build more efficient, robust, and effective strategic paths.

Improving quality and efficiency is a perpetual focus of enterprises' attention. The effective launch of AI technology can improve a company's operating efficiency, enhance cost-effectiveness, and upgrade customer experience. AI, cloud computing, big data, and other technologies can effectively advance the development of diversified network functions. Intelligent operation and maintenance of network data, network fault early warning, and self-repair are currently conducted. These leverage AI to further optimize network quality. Gartner (the world's leading research and advisory company) predicts that, by 2022, about 25% of automation processes within operators will be based on machine learning technology. In most cases, the challenge of incorporating AI into the data processing and decision-making approaches of an enterprise is far greater than the technical challenge of implementing AI. With the continuous integration of AI technology and advanced visualization technology, collaboration, and design thinking, enterprises are required to shift their focus from improving process efficiency to improving the effective management of AI for decision-making. For managers, a method of continuously upgrading and learning new insights can be formed, which will uncover new requirements for AI professionals and AI itself. This cycle will continuously introduce fresh driving forces into the market.

In today's rapid crossover between industrialization and informationization, the physical model of entities can be digitally transformed and transmitted through virtualization. Data can be intelligently manufactured in physical form by industrial means and technology so that the derivation of digital assets will be formed. In the era of the Internet of everything, the digital currency will naturally enter the market from data generation, without the need to price the actual currency and intermediary currency to circulate, this will bring new productivity to the future economic system but will be an unprecedented challenge to the inherent system of fiat money, resulting in higher requirements for data management and application technology clusters.

(3) Security Challenges and Development Trends

The rapid development of the internet aroused human creativity regarding information security. In an era where access to data and data resources are paramount, many data resources have been stolen and exploited. This real black market and dark web economy cultivates a breeding environment, with potential harm mainly manifesting in the following four ways. 1. Personal property and security, as well as data, are perpetually at risk. The relevance of a data breach is incalculable; once leaked, it will have a significant impact, for example, in recent years, the popularity of "SEO Spam". Although this network has a role of hosting expressions of public opinion, it attracts illegal acts through the opportunity of connections. Globally, there are an enormous number of fraudulent acts while using the internet. Trawling between networks often occurs, seriously threatening the security of network environments. 2. Numerous information breaches have occurred in social media. Shocked by the Chinese and foreign Facebook leak, the company had to face bankruptcy because data of up to 50 million individuals were leaked and used by political advertising companies. According to research data from Tencent Security Antifraud Laboratory, more than 2,200 viral variants of malicious mobile promotion are added daily, affecting more than 10 million netizens daily. 3. Stolen data can be used to destroy the normal operation of economic, trade, and enterprises’ production environments. With the increase of the internet's role in the industry, much more people rely on the internet to make a living. Almost all large- and medium-sized enterprises now operate in a network environment; e.g., online shopping, cloud computing, and cloud services. Some illegal businesses will exploit website loopholes, engage in malicious billing, and deceive consumers, which affect business transactions that are fair and normal and significantly influence the country's economic construction. 4. Triggering of major national and public security events. Recently, the rise of the internet has fomented information wars among various nations. If national information security is breached, it would significantly influence the country and society.

In the current technical conditions and development trends, we can project the future by tracing the history of technology development; Facebook's CEO, Zuckerberg's main investment toward the metaverse can be a glimpse of one or two. In addition, the arrival of the future economy generated by the innovation will far outweigh the impact of mobile terminal payments instead of paper money and credit cards. The future of digital currency is like the chip manufacturing of electronic computers. It will be the success of the current high-end science and technology, the currency will be redefined, and the country that can dominate the new digital currency system is bound to have a competitive advantage in trade in the international economy. Human life can be considerably improved in economic development, and the scope of life will certainly be expanded.

The arrival of the AI era has promoted the vigorous and rapid development of society. With the continuous application of cloud computing, AI, and big data, we are becoming more aware of the convenience that access to information and communication technology brings. It also frees more people from the repetitive work of the past, achieving the accurate and dynamic results brought by innovation. By contrast, we should clearly understand the dual role of AI, urgently considering all arising security issues and potential future challenges of smart systems and AI. In the highly developed information era, information security must be directly linked to AI development, which needs to trigger further human creativity and innovation to advance both the safety and confidence in its direction.

7 Conclusion

The potential applications of AI are broad, and commercial applications will most certainly be further popularized. AI already reaches deeply into every field of social life and is gradually expanding its capacity to touch all walks of life. Combined with the new trend of AI development, fields of brain science, computational science, and quantum theory should result in relevant projects to increase investment, actively seize a commanding position in AI development, and develop a solid theoretical foundation for advancements in AI application and industrialization. As AI is a new focus of international competition, major developed countries regard its development as a major strategy to enhance national competitiveness and maintain national security. Many nations have stepped up the formulation of strategic plans and policies, strengthened the regulation of AI, increased investment in R&D, and established new R&D institutions. This serves to accelerate the promotion of AI innovation in governance system construction and enhanced intelligent network security, as they strive to maintain a lead role in this new round of international scientific and technological competition.

The new generation of AI will focus on the ability to turn big data intelligence into actionable knowledge, further training AI from this knowledge, forming a continuously expanding and innovative knowledge center that connects multiple fields, and supporting cross-border integration and innovation services for developing new technologies and industries. With the emergence of capable AI, standardized systems will gain the self-design ability, understanding, and improvement, evolving into even more autonomous intelligent systems. Regarding the current state of AI development and the potential uncertainties of its independent advancement and innovation, establishing AI laws, regulations, ethics, and policies is imperative. This calls for the formation of a coherent AI control system to standardize and guide AI development, strengthen risk assessment approaches concerning advanced AI technology, establish laws, and monitor and enforce the development and uses of cognitive intelligence and machine intelligence AI applications. Research is necessary to ensure that AI has a proper development environment. In designing and assessing strategies and risk control, researchers need to focus on prevention and policy design, explore approaches for more inclusive supervision, and investigate the challenges of both employment structure and ethics.

References:

[1] Tencent Research Institute. Artificial intelligence[M]. Beijing: Renmin University Press, 2011.

[2] HE Z. Towards the age of artificial intelligence-also on the strategic direction of American artificial intelligence and its reference to Chinese artificial intelligence strategy[J]. E-government, 2016(12): 2?10.

[3] JIA G L. Third industrial revolution and industrial intelligence[J]. Chinese Social Sciences, 2016(6): 87⁃106.

[4] WANG D H. Global artificial intelligence development trends[J]. Competitive Intelligence, 2017(4): 87⁃206.

[5] WANG Q. On the qualitative characterization of artificial intelligence generation in copyright law[J]. Journal of Northwest University of Political Science and Law, 2017(5): 148⁃155.

[6] WU X Y. Brief analysis of the application of artificial intelligence technology in life[J]. Digital World, 2017(11): 114⁃115.

[7] PEI F, TONG Y, HE F, et al. How will the perfect integration of machine and artificial intelligence impact the happiness of the industrial 4.0 era? [J]. Smart Factory, 2017 (3): 27⁃29.

[8] YUAN Y, YU M M, TAO Y X,  et al. Quantitative research on artificial intelligence industry policy based on text mining[J]. Journal of China Academy of Electronic Sciences, 2018(6): 663⁃668.

[9] YUAN Z. A survey of artificial intelligence limited legal personality[J]. Oriental Law, 2017(5): 50⁃57.

[10] JIA J K, JIANG Y H. Three basic issues of AI governance: technological logic, risk challenges and public policy choices[J]. China Administration, 2017(10): 40⁃45.

[11] WU H D. Institutional arrangements and legal regulations in the age of artificial intelligence[J]. Legal Science: Journal of Northwest University of Political Science and Law, 2017(5): 128?136.

[12] SI X, CAO J F. On the civil liability of artificial intelligence: taking automatic driving vehicle and intelligent robot as the entry point[J]. Legal Science: Journal of Northwest University of Politics and Law, 2017(5): 166⁃173.

[13] GAO Q Q. China's special mission in the age of artificial intelligence[J]. Exploration and Controversy, 2017(1): 49⁃55.

[14] XU Y. Next generation artificial intelligence: a new driving force to lead the world's development[J]. People's Forum, Academic Frontier, 2017(20): 12⁃23.

[15] WANG X L. China's logistics industry: review of the 12th Five-Year Plan and prospect of the 13th Five-year Plan[J]. Logistics Engineering and Management, 2016(2).

[16] IB Daily. China's manufacturing[J]. Investors Business Daily, 2015(21): 5⁃9.

[17] China Block Chain Technology and Industrial Development Forum[EB/OL]. (2019-11-15)[2021-04-18]. http://chainb.com/download/ China block chain technology and application development white paper 1014.pdf.

[18] AWREY D. Three projects in the new law and finance[J]. Accounting, Economics, and Law: A Convivium, De Gruyter, 2021, 11(1), 9⁃25.

[19] SOHAIL J, HUW L, MOHAMMAD H, et al. Block chain-enabled supply chain: analysis, challenges, and future directions[J]. Multimedia Systems, 2021(27): 787⁃806.

[20] Cloud & Smart Industries Group. Tencent a world-leading internet and technology company that develops innovative products and services: China's first block chain E-invoice issued in Shenzhen, adding another application scenario to tencent block chain 10th [EB/OL]. (2018-08-17)[2021-04-12]. https://www.tencent.com/en-us/articles/2000006.html.

[21] HOFSTADTER D R, GBDEL E. Bach: an eternal golden braid[M]. New York, USA: Basic Books, 1983 ,48(3): 864⁃871.

我国加密数字货币发展及其在人工智能信息安全中的应用

汤林云,汤和云

(北京大学 软件与微电子学院,北京100781)

摘    要:在人工智能(AI)时代,商业战场已经逐渐转移到网络,而网络也产生了新的经济模式。在这个没有硝烟的数字竞争时代,人工智能对人类发展产生了前所未有的推动作用,同时也催生了对网络安全的需求,需要学者和政府做出更多的努力来满足这一关键需求,让这个新时代的革命更安全、更有益。在信息领域,创新已经形成了新的力量和发展机遇。中国应利用 “一带一路”的机遇,从两个方面加快人工智能的发展和国家重大战略整合。第一,通过加快人工智能与云计算、互联网+、大数据、科技创新等国家战略的融合发展,积极推动人工智能和创新技术的发展。第二,通过快速推进人工智能与中国当前雄心勃勃的 “一带一路”“智能强国”“工业强国 ”等倡议的融合,促进发挥人工智能力量的发展战略。

关键词:云计算工业动力;新经济模式智能;机器学习;理论算法;大数据分析

猜你喜欢
大数据分析机器学习
大数据分析对提高教学管理质量的作用
基于大数据分析的电力通信设备检修影响业务自动分析平台研究与应用
面向大数据远程开放实验平台构建研究
面向大数据分析的信息管理实践教学体系构建
传媒变局中的人口电视栏目困境与创新
基于词典与机器学习的中文微博情感分析
基于网络搜索数据的平遥旅游客流量预测分析
前缀字母为特征在维吾尔语文本情感分类中的研究
基于支持向量机的金融数据分析研究
机器学习理论在高中自主学习中的应用