Product Advantages
Create new business value with secure, reliable, and production-ready blockchain solutions on BCS
-
Build customized enterprise blockchain applications using innovative open-source frameworks, tools, and libraries: Hyperledger Fabric framework, Docker containers, and Kubernetes container-orchestration system.
Build customized enterprise blockchain applications using innovative open-source frameworks, tools, and libraries: Hyperledger Fabric framework, Docker containers, and Kubernetes container-orchestration system.
-
Flexible scaling to handle spikes in demand of thousands of transactions per second, and pay-per-use pricing that is in line with the number of connected peer organizations.
Flexible scaling to handle spikes in demand of thousands of transactions per second, and pay-per-use pricing that is in line with the number of connected peer organizations.
-
Creating private or consortium blockchain applications is easier, faster, and more efficient on Huawei Cloud. With BCS, there is no need to manually provision hardware, install and configure software, or set up security components.
Creating private or consortium blockchain applications is easier, faster, and more efficient on Huawei Cloud. With BCS, there is no need to manually provision hardware, install and configure software, or set up security components.
-
Keep your app secure with built-in governance tools, configurable consensus algorithms, multi-layer encryption, user permission management, isolation of keys, and zero-knowledge password proofs.
Keep your app secure with built-in governance tools, configurable consensus algorithms, multi-layer encryption, user permission management, isolation of keys, and zero-knowledge password proofs.
Application Scenarios
Innovative industry applications in finance, manufacturing, healthcare, food, logistics, fashion, and more
New Features
Functions
Build, test and deploy your blockchain project on enterprise-grade managed infrastructure
-
By masking the underlying technology, private and consortium blockchain deployment time is reduced from days to minutes.
By masking the underlying technology, private and consortium blockchain deployment time is reduced from days to minutes.
-
Configurable cryptographic algorithms, and advanced security settings to match application requirements.
Configurable cryptographic algorithms, and advanced security settings to match application requirements.
-
Multiple consensus algorithms for scenarios with different speed and trust tolerance requirements.
Multiple consensus algorithms for scenarios with different speed and trust tolerance requirements.
-
Set up a private and fully trusted blockchain network within your organization. Create permissioned systems with a distributed ledger that operates as a closed, secure database.
Set up a private and fully trusted blockchain network within your organization. Create permissioned systems with a distributed ledger that operates as a closed, secure database.
-
Each tenant is invited to join the consortia with their own separate VPC, ensuring security and controllability. Consortium blockchains can be formed dynamically, and members can share the blockchain network costs.
Each tenant is invited to join the consortia with their own separate VPC, ensuring security and controllability. Consortium blockchains can be formed dynamically, and members can share the blockchain network costs.
-
File database (GoLevelDB) and NoSQL (CouchDB) are available for ledger storage.
File database (GoLevelDB) and NoSQL (CouchDB) are available for ledger storage.
-
Choose between ECDSA (Elliptic Curve Digital Signature Cryptographic Algorithm), or OSCCA-published cryptographic algorithms. Fabric uses TLS 1.2/1.3 to secure and authenticate nodes at the network level.
Choose between ECDSA (Elliptic Curve Digital Signature Cryptographic Algorithm), or OSCCA-published cryptographic algorithms. Fabric uses TLS 1.2/1.3 to secure and authenticate nodes at the network level.
-
Privacy isolation on different VMs, optional use of homomorphic encryption library, zero-knowledge password proofs, OSCCA-published cryptographic algorithms based on light nodes provide secure computing, trustworthy data sharing, and decentralized identity capabilities.
Privacy isolation on different VMs, optional use of homomorphic encryption library, zero-knowledge password proofs, OSCCA-published cryptographic algorithms based on light nodes provide secure computing, trustworthy data sharing, and decentralized identity capabilities.
-
BCS works with Cloud Trace Service (CTS) to record and track user actions and resource changes.
BCS works with Cloud Trace Service (CTS) to record and track user actions and resource changes.
-
Raft is a high-speed crash fault tolerance (CFT) ordering service that tolerates faults at a maximum of (N – 1)/2 orderers, where N indicates the total number of orderers. For example, transactions can be correctly ordered if only one of a total of three orderers encounters faults.
Raft is a high-speed crash fault tolerance (CFT) ordering service that tolerates faults at a maximum of (N – 1)/2 orderers, where N indicates the total number of orderers. For example, transactions can be correctly ordered if only one of a total of three orderers encounters faults.
-
FBFT is a consensus algorithm with high fault tolerance and availability. It requires at least four orderers for transaction ordering and tolerates byzantine faults at a maximum of (N – 1)/3 orderers, where N indicates the total number of orderers. For example, assume that there are seven orderers. Transactions can be correctly ordered if a maximum of two orderers experience byzantine faults. This algorithm is recommended for production environments.
FBFT is a consensus algorithm with high fault tolerance and availability. It requires at least four orderers for transaction ordering and tolerates byzantine faults at a maximum of (N – 1)/3 orderers, where N indicates the total number of orderers. For example, assume that there are seven orderers. Transactions can be correctly ordered if a maximum of two orderers experience byzantine faults. This algorithm is recommended for production environments.
-
Supports auto scaling of peers and orderers without needing a system reboot, to meet high availability requirements.
Supports auto scaling of peers and orderers without needing a system reboot, to meet high availability requirements.
-
Develop apps and smart contracts with advanced features, tools, languages, and APIs.
Develop apps and smart contracts with advanced features, tools, languages, and APIs.
-
Monitor data and resources, generate alarms, and send notifications in real time.
Monitor data and resources, generate alarms, and send notifications in real time.
-
Compliant with Kubernetes. Support for shared storage, and automatic node fault recovery.
Compliant with Kubernetes. Support for shared storage, and automatic node fault recovery.
-
Docker containers run on nodes and can be seamlessly scaled out based on user requirements or demand, without interrupting services.
Docker containers run on nodes and can be seamlessly scaled out based on user requirements or demand, without interrupting services.
-
Manage chaincodes via a graphical user interface on the console throughout the entire lifecycle, for coding (Go, Java, or Node.js), debugging, installation, instantiation, and upgrades.
Manage chaincodes via a graphical user interface on the console throughout the entire lifecycle, for coding (Go, Java, or Node.js), debugging, installation, instantiation, and upgrades.
-
Access blockchain services and chaincodes using software development kits (SDKs) and/or RESTful APIs.
Access blockchain services and chaincodes using software development kits (SDKs) and/or RESTful APIs.
-
BCS provides the Trusted Computing Platform to facilitate trusted cooperation between multiple parties, with decentralized identity (DID) management, trusted data sharing, and confidential computing.
BCS provides the Trusted Computing Platform to facilitate trusted cooperation between multiple parties, with decentralized identity (DID) management, trusted data sharing, and confidential computing.
-
Arbitration is introduced for inter-blockchain transaction results. The blockchain data structure is used to manage the inter-blockchain transaction results, ensuring atomicity of the transactions.
Arbitration is introduced for inter-blockchain transaction results. The blockchain data structure is used to manage the inter-blockchain transaction results, ensuring atomicity of the transactions.
-
Perform active upgrades on the underlying blockchain platform, and carry out minor patches and updates automatically.
Perform active upgrades on the underlying blockchain platform, and carry out minor patches and updates automatically.
-
Monitor cluster, node, and workload metrics on the CCE Console. Define alarm rules, automatic reminders, and get notifications by email or SMS.
Monitor cluster, node, and workload metrics on the CCE Console. Define alarm rules, automatic reminders, and get notifications by email or SMS.
-
Manage every part of Blockchain Service on the console, including configuration settings, channel organizations and peers, members, and notifications. Query blockchain information (transactions, performance, status) for maintenance.
Manage every part of Blockchain Service on the console, including configuration settings, channel organizations and peers, members, and notifications. Query blockchain information (transactions, performance, status) for maintenance.