1
00:00:07,939 --> 00:00:10,610
Hey everyone, welcome back to the course.

2
00:00:10,610 --> 00:00:16,010
So now we have gone through the enterprise blockchain architecture and being an enterprise blockchain

3
00:00:16,010 --> 00:00:23,360
architect, you have also seen the different considerations and strategies which you can employ for

4
00:00:23,360 --> 00:00:24,970
your blockchain solutions.

5
00:00:24,980 --> 00:00:30,920
We have also gone through the security concerns and risk management, and these will help you to formulate

6
00:00:30,920 --> 00:00:35,810
the different factors which will help you to devise a much more effective solution.

7
00:00:35,930 --> 00:00:42,140
Although we have gone through the different kinds of interaction and integration capabilities and have

8
00:00:42,140 --> 00:00:48,740
given you the design feature sets for multiple problem statements, still, you don't need to devise

9
00:00:48,740 --> 00:00:50,540
everything from scratch.

10
00:00:50,750 --> 00:00:58,280
There are design patterns available which acts as a solution for some of the common problems which exist

11
00:00:58,280 --> 00:01:00,140
with blockchain employment.

12
00:01:00,170 --> 00:01:06,650
These design patterns will help you to create a blueprint for your solution, and on top of those solutions,

13
00:01:06,650 --> 00:01:10,020
you can create your whole enterprise blockchain project.

14
00:01:10,480 --> 00:01:16,540
In this lecture, we are going to discuss some of the major categories for the design patterns and in

15
00:01:16,540 --> 00:01:22,600
future lectures we will take each design pattern category at one point and then we will discuss what

16
00:01:22,600 --> 00:01:27,220
different blueprints are available for you to utilize for your solutions.

17
00:01:28,830 --> 00:01:32,340
The first category of patrons are the external world patrons.

18
00:01:32,340 --> 00:01:38,920
External world patrons are related to anything which you need to communicate with the external services.

19
00:01:38,940 --> 00:01:45,690
It could be your legal services or Oracle services or smart contracts which are existing out of your

20
00:01:45,690 --> 00:01:46,950
blockchain scope.

21
00:01:46,950 --> 00:01:52,730
So anything related to the external world connectivity will be maintained through the external world

22
00:01:52,740 --> 00:01:53,480
patrons.

23
00:01:53,490 --> 00:01:58,500
Some of the factors which affect the external world patrons are privacy and performance.

24
00:01:58,500 --> 00:02:04,530
Privacy is one of the feature which is built within the blockchain, and if we are exposing blockchain

25
00:02:04,530 --> 00:02:10,259
components to external services, then we need to make sure that the privacy is maintained with our

26
00:02:10,259 --> 00:02:11,070
solution.

27
00:02:11,160 --> 00:02:17,010
There are three different patron types, part of external world patrons verifier, reverse verifier

28
00:02:17,010 --> 00:02:19,020
and legal and smart contract payer.

29
00:02:19,140 --> 00:02:24,570
We will discuss each patron in detail when we go and discuss about the external world patrons.

30
00:02:25,610 --> 00:02:30,740
The second type of category for blockchain application patterns are the data management patterns.

31
00:02:30,770 --> 00:02:36,110
Data management patterns are related to management of data on and off blockchain.

32
00:02:36,140 --> 00:02:40,610
These patterns will help you to distribute the data throughout the blockchain.

33
00:02:40,640 --> 00:02:45,630
The factors which affect these kind of patterns are confidentiality and data size.

34
00:02:45,650 --> 00:02:52,130
You might be looking into a huge data, then you can utilize data management patterns for your needs.

35
00:02:52,160 --> 00:02:57,950
Some of the pattern types for data management patterns are encrypting on chain data, tokenization,

36
00:02:57,980 --> 00:03:00,530
off chain data storage and state journal.

37
00:03:00,560 --> 00:03:05,540
We will see each pattern type when we go and discuss about data management patterns.

38
00:03:07,020 --> 00:03:12,040
The third type of category for blockchain application patterns are the security patterns.

39
00:03:12,060 --> 00:03:17,220
Security patterns are one of the key aspects for the production based applications.

40
00:03:17,250 --> 00:03:23,220
These patterns define that how some of the common problems related to security considerations for a

41
00:03:23,220 --> 00:03:27,690
blockchain solution can be solved using the security patterns.

42
00:03:27,720 --> 00:03:33,750
The factors affecting these kind of patterns are authorization and identity management and the pattern

43
00:03:33,750 --> 00:03:39,360
types which we are going to discuss in the later part of the course are multiple authorization off chain,

44
00:03:39,360 --> 00:03:42,930
secret enabled dynamic authorization and confirmation.

45
00:03:42,930 --> 00:03:47,310
We will see each pattern in detail once we discuss about the security patterns.

46
00:03:48,820 --> 00:03:54,110
The fourth type of blockchain application pattern is contract structural pattern.

47
00:03:54,130 --> 00:04:00,340
Contract structural patterns are wholly related to smart contracts and how smart contracts run with

48
00:04:00,340 --> 00:04:01,360
your blockchain.

49
00:04:01,390 --> 00:04:07,420
They will design and define what could be the structure of smart contract and how smart contracts are

50
00:04:07,420 --> 00:04:12,760
going to integrate with the external services and with the internal functions of the blockchain.

51
00:04:12,790 --> 00:04:18,120
They will also define the different tokens and cost associated with the smart contract.

52
00:04:18,130 --> 00:04:24,670
Some of the factors defining these patterns are cost and performance, and the major types for this

53
00:04:24,670 --> 00:04:30,760
pattern are contract registry data, contract, embedded permissions, factory contract and incentive

54
00:04:30,760 --> 00:04:31,690
execution.

55
00:04:31,690 --> 00:04:36,940
We will see each pattern in detail once we go and discuss about the contract structural patterns.

56
00:04:38,570 --> 00:04:43,990
So that was just the overview of the different categories for the blockchain application patterns.

57
00:04:44,000 --> 00:04:50,240
These categories define some of the common problems which can be solved by the blueprints which we are

58
00:04:50,240 --> 00:04:53,000
going to provide in the later part of the course.

59
00:04:53,000 --> 00:04:59,180
You can use these blueprints in your design processes and create the whole enterprise blockchain architecture

60
00:04:59,180 --> 00:05:00,230
on top of these.

61
00:05:00,260 --> 00:05:04,820
Now let's go and discuss the first category for our design patterns.

62
00:05:04,820 --> 00:05:07,550
That is the external world patterns.

63
00:05:07,700 --> 00:05:13,010
If you have any queries, feel free to contact us at info at the rate weblogs.com.


