• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    The Development of Digital Monetary Encryption in China and Its Application in Artificial Intelligence Information Security

    2022-04-26 03:22:11TangLinyun,TangHeyun
    科技與法律 2022年2期
    關(guān)鍵詞:大數(shù)據(jù)分析機(jī)器學(xué)習(xí)

    Tang Linyun, Tang Heyun

    Abstract: In the artificial intelligence (AI) era, the commercial battlefield has gradually shifted to network, whereas networks have produced new economic models. In this smoke-free era of digital competition, AI has generated an unprecedented boost to human development while giving rise to needs for network security; thus, more efforts from scholars and the government are required to meet this critical demand and make the revolution of this new era safer and more beneficial. In the information area, innovation has established new forces and development opportunities. China should take advantage of the opportunities of "one belt, one road" to accelerate the development and national major strategic integration of AI in two ways. First, by speeding up the integration and development of AI and cloud computing, Internet+, big data, technological innovation, and other national strategies, as well as actively promoting the development of AI and innovative technology. Second, by fast tracking the integration of AI with China's current ambitious initiatives, "one belt, one road", "intelligent power", and "industrial power" initiatives, to promote a development strategy that leverages the power of AI.

    Keywords: cloud computing; industrial power; new economic models; intelligence; machine learning; theoretical algorithms; data analysis

    CLC: D 912 DC: A ? ? ? ? ? ? ? ? ? ?Article ID:2096?9783(2022)02?0126?12

    1 Introduction

    Science and technology are the primary productive forces of humanity. As an emerging technology, artificial intelligence (AI) is pushing a new era forward. Accenture, a well-known international consulting company, published a report entitled "How Artificial Intelligence Can Drive China's Growth," pointing out that AI will promote China's economy considerably in the next 20 years. With the rapid development of AI, at a growth rate expected to reach 17% in the future, the total AI market value will exceed 127 billion US dollars by 2025. National AI planning in China should focus on comprehensively promoting technological breakthroughs, industrial development, and strategic applications of AI. It is imperative that the nation grasps the important opportunity presented by this era in the development of AI, striving to encourage its progress with attending contributions and to usher in a new generation of information technology with epochal significance. In contemporary times, AI represents the most significant technological change to the flow of human society, and will exert profound impact on our social lives. Such change is imperceptible, from the drip of daily life, to macro-industrial development. AI currently covers many fields, such as unmanned driving, natural language processing, image recognition, portraiture, data science, and a seemingly endless array of other applications. AI is a highly intelligent technology. Through machine learning based on existing and projected data statistics, it intelligently automates the operation of various transactions, simulating the processes of human consciousness and reasoning, and establishing technology with abilities similar to those of human intelligence. AI is capable of perceiving and interacting with the outside world. The rapid development of AI will have a wide and far-reaching impact on human society and ultimately change the world, focusing on algorithms theory, cloud storage, hybrid enhancement, machine learning, computer chips, and other challenges. Essentially, AI technology will develop along two main frontiers of algorithms and computing, and has now entered a new era of quantum computing and human?computer collaboration.

    2 Digital Information Security and Block chain

    2.1 Block Chain Technology

    The block chain technology is based on Bitcoin technology. From the perspective of data storage, the block chain provides an undetrimental reliance and trust, the reliable data distributed storage of collective maintenance. From the perspective of basic science and technology, block chain is a comprehensive application of multiple technologies based on databases, cryptography, and network communications. The block chain is supported by Bitcoin basic technology. As the basic application system, through the hierarchical analysis and application of the system, the concept of the block chain can be better understood, as a typical architecture of the block chain, a Bitcoin system application integral to maintaining a smooth operation of Bitcoin. From the architecture and layered application technology of Bitcoin, it fully demonstrates the fusion and new electronic cash trading characteristics of technology. In 2015, the block chain technology separated from the concept of "Bitcoin" and became an independent research direction. Block chain is a common maintenance of multiple parties, using cryptographic guarantees transmission and access security. It can implement data unanimous storage difficult to tamper, to prevent rendering technology, also known as distributed book technology (Distributed Ledger Technology). A typical block chain stores data in block-chain structure.

    2.2 Principle

    Conscientiously implementing the relevant national policies, in accordance with the research and utilization of new technology, the digital currency risk of preventive zone chain networks is for better facing and seizing the development of the block chain. Internet of Things, cloud computing, big data, artificial intelligence, machinery deep learning, block chain, bioactic engineering, etc. If new technology drives network space from everyone to all things, digital, networked and intelligent services will be everywhere. As a key engine that responds to the "post financial crisis" era growth, inexperience and uncertainty, deepening structural reforms and promoting sustainable development. The new technology plays an extremely important role, with a district block chain technology and the current development of the current situation multi-zone chain it is better to understand and learn the block chain.

    3 "Block Chain +" Medical Application Scene

    3.1 Block Chain Application Scene Overview

    As the block chain consensus mechanism is from the need to mine to the upgrade without the mineral process, its application scenario has also widen from the original single electronic virtual currency trading system to a broader application scenario. In recent years, many block chain alliances, established at home and abroad, are committed to the use of block chain technology into a real-world production environment to achieve high efficiency, low cost goals. The application of the block chain can be roughly divided into three stages: the first stage is the encrypted digital currency; the second stage is the application of digital financial assets such as stock, bond, futures, intelligent contract; the third stage is the application of digital assets in various aspects such as energy, manufacturing, supply chain, government, health, culture and art. With the continuous maturity and improvement of the block chain technology, its application scenario has also broadened from the original single electronic virtual currency trading system to a broader intelligent contract, equity transaction, and charity.

    3.2 Analysis of the Block Chain Application Scenario

    As a distributed book database, the block chain uses a digital encryption technology and consensus mechanism algorithm to achieve decryption system and security credibility. According to the block chain technology architecture and core key technique on the technical characteristics of the block chain, it has the following four major characteristics:

    (1) Block chain can be detrimental as a distributed account book, the information interaction between its nodes is a direct transaction method of point-to-point, that is, any node has the same rights and obligations, which can obtain the same, complete account, but at the same time, the information data in the database is maintained to protect its security. This mode not only breaks the traditional needs of the trusted third party to complete the transaction mode, but also effectively solves the problem of trust in economic life. In addition, the interactive mode of the point-to-point can simplify the transaction process, laying a low-cost, high-efficiency payment channel to the trade, while contributing to constructing a flat global integrated liquidation system.

    (2) The block chain is open and security guarantee on the one hand, any node in the block chain network can participate in the balance of the ledger account, and the information data stored on the block is not reversible by the consensus mechanism, and therefore, in addition to the required private information requiring a particular encryption, the block chain all information data in the system is highly transparent. On the other hand, the information data stored on the block is only lost or tampered with when half of the node is attacked simultaneously, so the information data stored in the block chain is open and safe.

    (3) Block chains have high secret unlike traditional symmetrical encryption methods, the block chain account system consists of a public key and a unique private key corresponding to the corresponding encryption method. Using an asymmetric encryption algorithm, the recipient cannot use the assets in the public key to ensure the right to obtain information and data without the private key. Although users in the system can encrypt with the public key, the decryption authority can only be used by the holder of the private key.

    (4) The block chain has systematic stability as a distributed book database, any node can share its information data, so modifications or attacks for a single node are invalid, unless more than 51% of the nodes in the entire account database can be controlled. In addition, the more nodes involved in the database, the stronger the computing power and the safer the information data in the database. According to the block chain to decentralization, openness, safety, high secret and systematic stability, application scenarios mainly include:

    Scenarios that need to build trust in multi-party collaboration. The basic feature of the block chain can be detrimental to the business model of multiple collaboration between multiple decentralized management organizations. In the block chain network, the information interaction between inter-agency no longer needs to be able to achieve a point-to-point service through a third party "transfer station", which helps to simplify the transaction process, improve business processing efficiency and reduce operating costs. In short, the characteristics of the block chain "trust" can make two or more users who do not trust independently, build trusted information interactive channels without worrying about fraud, bitcoin, etc. The successful operation of virtual currency is a good example in the anti-fraud region.

    Trading scenes requires traceable. The openness and security of the block chain gives its unique chain data structure and the publicized storage mode of the whole network. In this mode, any node can record historical transaction information data that occurred in the whole network, i.e. attack or tampering with individual nodes, will not affect the security of the full network general book. Therefore, there is a fully encrypted digital hash, the same copy account in any node, anyone (authorized users in the league chain) is possible to check the information data stored in the block chain network as well as to check every transaction of the entire block chain node.

    Scenes for anonymous trading. The public zone chain is almost the first choice for high anonymous business. Because there is no need to collect user personal information in any centralization system, the block chain network can complete the interaction of information data through the WOP (Proof of Work) incentive mechanism. There is no need to worry about privacy leaks. The highly secret feature of the block chain can provide a pair of encrypted asymmetric public private spots, the public key can be publicly published, used to send information sent by the sender encryption, a private key for receiving, and decrypt the received encrypted content. No need to leak your privacy information to anyone during the period.

    Scene of anti-counterfeiting. The system steady feature of the block chain can provide an effective solution to the information data of the license, anti-counterfeiting and other issues. Today, many economic services are based on contracts or vouchers and the process of digital informatization, it is inevitable, and there is a problem that the data will be issued, anti-counterfeited and other issues. The traditional solution is to use the trusted service provided by third parties to realize the tamper-proof of data, but the technical risk, compliance risk and morality of the third party will bring new risk points to the economic business, so Block chain embedding is the best solution. It not only does not require third parties, but also based on the theory of information asymmetry and automatically provides timestamp service.

    3.3 Block Chains Use Scene in the Insurance Industry

    As the proportion of insurance spending is increasing in people's lives, the innovation of traditional insurance business model is also hoped, and the emergence of block chain insurance, great innovation has revolutionized the traditional insurance business model, enhanced the insurance market's recording capacity, transparency, recognition accuracy and reaction speed of risk. Block Chain expert Olivier Rikken believes that block chain technology can realize real P2P 1or crowdfunding insurance models, enabling the focus of insurance companies to focus from asset management to risk calculation.

    Image source: HUOBI Network Block Chain Application Ecological Scenario Cycle Diagram

    3.4 Block Chain Insurance and Related Industrial Chain Development

    In recent years, increase cooperation with data-driven Internet platforms, and increase its cooperation with emerging technology companies or improve their technical research and development capabilities, and become the key development direction of traditional Internet companies. For example, the water droplet group has been dripped by a social fundraising platform, and the online mutual aid platform water drops, the public welfare platform water droplets, the health insurance is preferred platform water, and the rapid accumulation of more than 550 million registered users, 160 million independent paid users, and accumulated a large number of user behavior data. It is able to create portraits by establishing a relatively precise user. Based on the outstanding advantages of innovation and product precision promotion in the design of its insurance product, it has gradually become a cooperative object of many traditional insurance companies. In addition to being an accurate distribution channel of insurance companies, it also began to participate in the repositioning of some user data analysis and risk control businesses and the new trend of the insurance industry: driven by data and new technologies. In addition, Internet insurance leaders are all security insurance, with its prominent technology research and development and service capabilities, have reached technology and business cooperation with many traditional insurance companies. All security insurance has now launched its own security insurance open platform, providing the industry insurance agency to customized insurance industry solutions based on cutting-edge technology such as large data, artificial intelligence and block chain.

    3.4.1 Block Chain for the Insurance Industry Improvement

    The block chain of the block chain mainly includes the following aspects: Based on block chain credit system and automatic implementation of intelligent contracts, enhanced user trust, this stage is especially important for mutual insurance products. Mutual insurance agencies or network mutual aid platforms can store payment information such as pay-ins of interest in the block chain, and introduce third parties with supervisory efficacy to jointly maintain the book to improve the difficulty of tampering. The insured can check it by checking according to its own needs, which can effectively reduce the information asymmetry between the uninsured and the insured. In the trust mechanism of intelligent contracts and block chain, other types of insurance products can also try to store the product premium structural design, claims cases, and standard critical data stored on the block chain, and strengthen user trust. Create a shared transparent account of multi-party maintenance to enhance insurance data integration analysis, improve the efficiency of integrated insurance, especially between direct insurance companies and reinsurance companies. The convergence scheme of block chain + trusted calculation can achieve the operation and inspection of the data without privacy data, providing new ideas and possibilities for data sharing between direct insurance companies. It is capable of providing trusted records and retrospective capabilities of dynamic change information such as agricultural insurance, natural disaster insurance, etc. Identity Authentication Service System: The design positioning of the handover chain is the league chain. Participants need to provide application, register corporate information, submit a public key, and complete the production of the certificate, only the access certificate can be added. In the block chain network, in order to meet the regulatory requirements, the management agency has the right to revoke the certificate of registered certificates. Intelligent Contract System: The block chain is designed to separate the safety containers to each business scene compile and run the intelligent contract to provide the effectiveness of the operation and maintenance. Services: Classify independent business sub-chains according to specific business scenarios, allowing participates to participate in the business chain, and enhancement of network overall performance.

    3.4.2 Block Chain Scene Application Conditions

    As an emerging technology, the block chain has the potential for applications in many fields. However, the block chain is not universal, technical centering, difficult to tamper, make it a high application value in the limited scenario, which can be summarized as "new database, multi-service body, not mutual trust," More powerful interactive business applications. The block chain is essentially a new database with a timestamp, from the perspective of the data true, effective, successful, difficult to tamper, and is a new starting point. Each of the block chains can have a full account copy, through instant clearing mode, to ensure consistency between data and multiple mains, and avoid complex recipient processes. Again, it is suitable for establishing mathematical trust in an untrustworthy environment. The block chain guarantees the system's data trusted (cryptographic algorithm, digital signature, timestamp), the result of credible (intelligent contract, formula algorithm) and historical credible (chain structure, timestamp), the block chain provides a "machine intermediary", especially for industry applications that collaborators are untrustworthy, inconsistent or lack of authoritative third-party intervention. The public chain allows for any node, does not limit the communication of information, and information is open to the entire system; the league chain only allows the certified institution to participate in consensus, transaction information is localized according to the consensus mechanism; compared with the private chain Narrow, only within a limited mechanism.

    4 Block Chain + Insurance Development Trend

    4.1 Technology and Architecture Standard

    Block chain technology is considered to be a great new era innovation technology, with artificial intelligence, cloud computing, 5G internet computing mode subversive innovation, and block chain technology utilization has triggered high attention while developing, related blocks chain technology and its application are one of the current hot topics. The block chain experienced technical origins, block chains 1.0, block chain 2.0 and block chain 3.0 era. Its application has also extended to various fields such as Internet of Things, intelligent manufacturing, supply chain management, digital asset transactions. The block chain deployment model is based on distributed ledger control and various methods to perform node cluster computing on the block chain. Deployment models include public chain and league chain. Technical support common concerns require coordination between different roles and unanimously achieved behavior and capabilities in the block chain system. Common attention points can be shared by multiple characters, block chain activities, and function components and have an impact on them.

    4.2 Block Chain + Insurance Future Development Prospect

    (1) Customize individual insurance to meet diverse needs. The block chain can provide low-cost products to emerging markets and improve customer participation in the emerging market and enhance customer participation to promote innovation of insurance companies, and to help insurance companies achieve business growth.

    (2) Promote fairer anti-fraud claims in the insurance industry. The block chain technology can play a role in the identification of insured, and the insurance fraud risk is reduced by an uncharged identity certificate. According to the information, there is a problem that the pension insurance or fraudulent insurance is generally exists. The identification system based on the block chain can enable everyone with unique password information. If the input and verification links of the password information are set in the insurance premium, it is basically avoiding the incident of the insurance premium. At the same time, based on the application of block chain smart contracts, you can track the health status and life status of the insured by establishing a personal health information management system, including hospitals, communities, civil affairs departments, and whether or not insurance premium is issued and make a claim for decision support.

    (3) Establish a more efficient credit consensus mechanism environment. The intelligent contract can complete the automatic implementation of claims, which is a reliable and transparent payment mechanism for customers, and intelligent contracts can be used to strengthen specific contract rules. For example, in a car accident, if the car is maintained in accordance with the predetermined process in the prescribed repair shop, the intelligent contract can ensure that the claims pay for the claims.

    (4) Mutual insurance, risk allocation. The reason why insurance is developed for risk sharing, in development, well-developed, in the company mechanism of the block chain, makes full use of its trust consensus mechanism, so that mutual help can better achieve the important form of risk management. Take advantage of the consensus of the block chain letter of contracting mechanism, allowing organizational members to achieve better trust mechanisms, allowing mutual insurance risk to reduce costs, and then achieve risk management through lower fees. The block chain will have a huge impact on existing economic society, and the influence of the leaping activities. For the future prospects, several aspects can be expressed: First, the application model is upgraded to achieve a balance between security and profitability and increased transaction volume. The future block chain is mainly composed of private chains, public chains and hybrid chains. The second is multi-center. Future district block chain system architecture will enable the construction of multi-center system to disperse independent single center, enhance the unified multi-center of multi-party participation, thereby improve trust transmission efficiency and reduce transaction costs. Third, Digital currency as payment drives other industries to break out of financial innovation. The area of the block chain will first create trust in the parties to the transaction, but it is not easy to establish a breakthrough in the field of trust relationship. The fourth is the socialization of intelligent contracts. In the future, the contract will be intelligent, and the intelligent contract can guarantee the agreed reliability. The block chain can also be used in the field of intangible asset management, such as intellectual property, domain management, and integral management.

    5 Advances in AI

    The development of AI in the EU began early2. Since 2010, the realization of AI growth has been regarded as one of the three major growth factors of intelligent, sustainable, and inclusive growth. AI significantly influences the promotion of scientific and technological innovation, industrial advancement, and economic quality development and progress. Following the development of global information technology, the new round of technological innovation and industrial transformation through AI is akin to installing wings to promote the exponential growth of the intelligence industry. This revolution, as with previous technological revolutions, will lead to rapid development, affecting all walks of life. In addition to bringing about efficient economic growth, it will enable high-quality innovation and improvement for other industries; e.g., a chip based on graphene will run 100 times faster than existing chips, whereas energy consumption will dramatically decrease, further paving the way for new developments in AI.

    The National Science and Technology Commission's Subcommittee on Machine Learning and Artificial Intelligence has established the arrangement of AI development in the US. On February 11, 2019, then, President Trump signed an executive order entitled "Maintaining American Leadership in Artificial Intelligence," signaling the high priority of the development, planning, and strategic positioning of AI in the US. Data storage and access were also upgraded to a new level. The cultivation of AI talent has also been accorded a higher priority level. This "priority" level of urgency enabled the official launching of the American AI program.

    AI is of significant interest in international competitions. China has elevated AI to a strategic technical level in its national planning, putting it on a par with major developed countries in terms of national advancement. Thus, China has positioned AI as a major approach for safeguarding national security, formulating plans and policies, and carefully deploying core technologies, talent, standards, and norms. The development of AI in China has a large base, a good foundation, and a high degree of national attention. Various initiatives have been successively issued, with excellent achievements in training AI talent and technological innovation. After years of accumulation, the number of papers published by high-impact journals and international patents granted, now rank second in the world. Tremendous breakthroughs have been made in the fields of cross-border integration, human–machine collaboration, and integrated intelligence. Intelligent sensors, neural network chips, and supporting tools with high precision and low cost are steadily and expeditiously developing. Progress has been made in the R&D of AI technology innovation, theoretical modeling, digitalization, networking, and consolidating open source platform on the bases of intelligent software and hardware.

    6 Application of AI

    Network and cloud-based intelligence technology will promote the development of distributed AI, making it possible for data to generate new knowledge through in-depth learning in the cloud, as AI machines will cultivate abilities in perception and learning. A series of computer algorithms, such as bioengineering algorithms, neural computing, and immune computing, will initiate a revolution in bio intelligence. In addition, the development of innovative computing theory, particularly quantum computing theory and chip technology, will revolutionarily influence the development and application of AI.

    6.1 Application at the Enterprise Level

    AI technology is also widely used for upgrading intelligent factory and enterprise applications in the field of electronics, particularly in the retail sector. The network data marketing of e-commerce provides a vast amount of sales data. These sales data deliver information about the reality on the ground to develop both market and demand, and can be used in intelligent production planning. Sales provide training data for AI technology. For example, customers who want to buy clothes no longer have to go to the store to try them on. When choosing clothes on some platforms, AI technology provides personalized intelligent recommendations for customers based on their known size and preferences.

    6.2 Application at the Industrial Level

    The in-depth implementation of intelligent manufacturing and governmental encouragement of the exploration and development of a new generation of AI technology in all aspects of industrial fields have advanced strategic achievements in industrial manufacturing. To support breakthroughs and innovation in the application of algorithms in key areas of intelligent manufacturing equipment, manufacturing processes, and industrial advancement, functions have been systematically upgraded, and a new generation of intelligence has resulted. The development plan is forward-looking related to the current overall situation and long-term projected benefits. AI is also widely used in various fields, including smart grids to promote green development, increase the efficiency of investment and output, and advance energy conservation. Intelligent cities accelerate sustainable development and promote the application of intelligent transportation, smart buildings, and other technologies in urban construction and development. To date, only 370 such R&D projects have been implemented in Europe.

    6.3 Data Information Analysis of AI

    In the big data age, exploring data requires managing complex information. The biggest challenge restricting such work is the inadequacy to manually process massive amounts of information. With improvements in information technology and acceleration of network convergence, enormous information is fed back to the data center through unmanned aerial vehicle, cameras, wearable devices, and other forms of communication technology. An immense array of images and video information is continuously being transmitted and processed. With the gradual development and advancement of robust AI, in the future, revolutionary changes will occur through intelligent perception and information processing, intelligent command- and control-assisted decision-making, unmanned machinery and robots, intelligent assistant systems, and other smart applications3 in various fields.

    Image Source: www.monolithicpower.com/en/applications/industrial/unmanned-aerial.html

    (1) Black market economy

    With the advent of the internet age came the exponential rise of applications such as Facebook, Twitter, PayPal, Alipay, Cisco, Ctrip, and NetEase, as well as the accompanying urgency of managing network security and vulnerabilities. In the IT world, a group of anti-fraud security technology experts quickly launched the antibrush system, sword finger wool party, malicious orders, malicious users, and business fraud as well as vowed to eliminate network threats successively. They are committed to making business risk control more simple, efficient, and reliable through AI security technology using big data and other approaches. They protect network security as the patron saints of the network. Simultaneously, a new force has been gathered for this purpose.

    The Republic of El Salvador is the first country to make bitcoin legal tender, and Panama, also located in Central America, is officially working on a new proposal to include cryptocurrencies, including bitcoin, together as legal tender. As a representative of digital currencies, Bitcoin is restricted in many countries. Taking the block chain, the central technology of Bitcoin, as an example, block chain technology brings low cost and cryptographic security. Block chain makes digital currencies more efficient and less costly than traditional currency applications, but the block chain economy also inevitably brings the birth of a black market economy, which can cause money laundering and proliferation of black market transactions because of the strong anonymity of the block chain. Moreover, the anchored block chain economy, such as Bitcoin, will cause challenges to the status of fiat currencies if it is promoted and applied on a large scale. For instance, the global payment system function of the US dollar will be weakened by the promotion of Bitcoin, Litecoin, and digital RMB, which will also cause countermeasures of monetary sovereign countries.

    The digital currency economy is an inevitable product of the information age; in the process of highly developed economic development, the real economy will give way to finance, and finance will adapt to the needs of technological innovation, resulting in the digital currency economy. The black market economy, like the developing countries need transnational middle-income traps to enter the developed country stage and is determined by the technology and environment of the digital currency. This will usher in a new economic stage, different from the past; the R&D of economics can no longer be confined to a single field. It will integrate a set of electronic information technology, materials technology, economics, industrial base, and other new disciplines.

    (2) Future innovation strategy trends

    Currently, the development of AI has entered the stage of industrial application. National science and technology innovation bases have been continuously constructed and upgraded. Several leading international innovation bases have been built in the field of AI. AI innovation is developing a new generation on the cutting edge of the field. AI technology is persistently developed by the main telecom operators in the world, and technology is a key to the construction and establishment of operators' differential competitive advantages. World-renowned enterprises have long-term strategic development plans in the AI field. Through improving network performance, enhancing customer experience, and exploiting big data to generate additional business opportunities, they are most concerned with the application and direction of AI enterprises. Application fields mainly focus on network operation and maintenance, customer service, business and product innovation, and open source level. In the field of application development, such as smart finance, communications, and automobiles, enterprises with more experience in digitalization are more likely to gain revenue from integrating AI technology than other fields. With the support of AI technology, enterprises will fundamentally adjust business composition and portfolio, developing new business models to build more efficient, robust, and effective strategic paths.

    Improving quality and efficiency is a perpetual focus of enterprises' attention. The effective launch of AI technology can improve a company's operating efficiency, enhance cost-effectiveness, and upgrade customer experience. AI, cloud computing, big data, and other technologies can effectively advance the development of diversified network functions. Intelligent operation and maintenance of network data, network fault early warning, and self-repair are currently conducted. These leverage AI to further optimize network quality. Gartner (the world's leading research and advisory company) predicts that, by 2022, about 25% of automation processes within operators will be based on machine learning technology. In most cases, the challenge of incorporating AI into the data processing and decision-making approaches of an enterprise is far greater than the technical challenge of implementing AI. With the continuous integration of AI technology and advanced visualization technology, collaboration, and design thinking, enterprises are required to shift their focus from improving process efficiency to improving the effective management of AI for decision-making. For managers, a method of continuously upgrading and learning new insights can be formed, which will uncover new requirements for AI professionals and AI itself. This cycle will continuously introduce fresh driving forces into the market.

    In today's rapid crossover between industrialization and informationization, the physical model of entities can be digitally transformed and transmitted through virtualization. Data can be intelligently manufactured in physical form by industrial means and technology so that the derivation of digital assets will be formed. In the era of the Internet of everything, the digital currency will naturally enter the market from data generation, without the need to price the actual currency and intermediary currency to circulate, this will bring new productivity to the future economic system but will be an unprecedented challenge to the inherent system of fiat money, resulting in higher requirements for data management and application technology clusters.

    (3) Security Challenges and Development Trends

    The rapid development of the internet aroused human creativity regarding information security. In an era where access to data and data resources are paramount, many data resources have been stolen and exploited. This real black market and dark web economy cultivates a breeding environment, with potential harm mainly manifesting in the following four ways. 1. Personal property and security, as well as data, are perpetually at risk. The relevance of a data breach is incalculable; once leaked, it will have a significant impact, for example, in recent years, the popularity of "SEO Spam". Although this network has a role of hosting expressions of public opinion, it attracts illegal acts through the opportunity of connections. Globally, there are an enormous number of fraudulent acts while using the internet. Trawling between networks often occurs, seriously threatening the security of network environments. 2. Numerous information breaches have occurred in social media. Shocked by the Chinese and foreign Facebook leak, the company had to face bankruptcy because data of up to 50 million individuals were leaked and used by political advertising companies. According to research data from Tencent Security Antifraud Laboratory, more than 2,200 viral variants of malicious mobile promotion are added daily, affecting more than 10 million netizens daily. 3. Stolen data can be used to destroy the normal operation of economic, trade, and enterprises’ production environments. With the increase of the internet's role in the industry, much more people rely on the internet to make a living. Almost all large- and medium-sized enterprises now operate in a network environment; e.g., online shopping, cloud computing, and cloud services. Some illegal businesses will exploit website loopholes, engage in malicious billing, and deceive consumers, which affect business transactions that are fair and normal and significantly influence the country's economic construction. 4. Triggering of major national and public security events. Recently, the rise of the internet has fomented information wars among various nations. If national information security is breached, it would significantly influence the country and society.

    In the current technical conditions and development trends, we can project the future by tracing the history of technology development; Facebook's CEO, Zuckerberg's main investment toward the metaverse can be a glimpse of one or two. In addition, the arrival of the future economy generated by the innovation will far outweigh the impact of mobile terminal payments instead of paper money and credit cards. The future of digital currency is like the chip manufacturing of electronic computers. It will be the success of the current high-end science and technology, the currency will be redefined, and the country that can dominate the new digital currency system is bound to have a competitive advantage in trade in the international economy. Human life can be considerably improved in economic development, and the scope of life will certainly be expanded.

    The arrival of the AI era has promoted the vigorous and rapid development of society. With the continuous application of cloud computing, AI, and big data, we are becoming more aware of the convenience that access to information and communication technology brings. It also frees more people from the repetitive work of the past, achieving the accurate and dynamic results brought by innovation. By contrast, we should clearly understand the dual role of AI, urgently considering all arising security issues and potential future challenges of smart systems and AI. In the highly developed information era, information security must be directly linked to AI development, which needs to trigger further human creativity and innovation to advance both the safety and confidence in its direction.

    7 Conclusion

    The potential applications of AI are broad, and commercial applications will most certainly be further popularized. AI already reaches deeply into every field of social life and is gradually expanding its capacity to touch all walks of life. Combined with the new trend of AI development, fields of brain science, computational science, and quantum theory should result in relevant projects to increase investment, actively seize a commanding position in AI development, and develop a solid theoretical foundation for advancements in AI application and industrialization. As AI is a new focus of international competition, major developed countries regard its development as a major strategy to enhance national competitiveness and maintain national security. Many nations have stepped up the formulation of strategic plans and policies, strengthened the regulation of AI, increased investment in R&D, and established new R&D institutions. This serves to accelerate the promotion of AI innovation in governance system construction and enhanced intelligent network security, as they strive to maintain a lead role in this new round of international scientific and technological competition.

    The new generation of AI will focus on the ability to turn big data intelligence into actionable knowledge, further training AI from this knowledge, forming a continuously expanding and innovative knowledge center that connects multiple fields, and supporting cross-border integration and innovation services for developing new technologies and industries. With the emergence of capable AI, standardized systems will gain the self-design ability, understanding, and improvement, evolving into even more autonomous intelligent systems. Regarding the current state of AI development and the potential uncertainties of its independent advancement and innovation, establishing AI laws, regulations, ethics, and policies is imperative. This calls for the formation of a coherent AI control system to standardize and guide AI development, strengthen risk assessment approaches concerning advanced AI technology, establish laws, and monitor and enforce the development and uses of cognitive intelligence and machine intelligence AI applications. Research is necessary to ensure that AI has a proper development environment. In designing and assessing strategies and risk control, researchers need to focus on prevention and policy design, explore approaches for more inclusive supervision, and investigate the challenges of both employment structure and ethics.

    References:

    [1] Tencent Research Institute. Artificial intelligence[M]. Beijing: Renmin University Press, 2011.

    [2] HE Z. Towards the age of artificial intelligence-also on the strategic direction of American artificial intelligence and its reference to Chinese artificial intelligence strategy[J]. E-government, 2016(12): 2?10.

    [3] JIA G L. Third industrial revolution and industrial intelligence[J]. Chinese Social Sciences, 2016(6): 87?106.

    [4] WANG D H. Global artificial intelligence development trends[J]. Competitive Intelligence, 2017(4): 87?206.

    [5] WANG Q. On the qualitative characterization of artificial intelligence generation in copyright law[J]. Journal of Northwest University of Political Science and Law, 2017(5): 148?155.

    [6] WU X Y. Brief analysis of the application of artificial intelligence technology in life[J]. Digital World, 2017(11): 114?115.

    [7] PEI F, TONG Y, HE F, et al. How will the perfect integration of machine and artificial intelligence impact the happiness of the industrial 4.0 era? [J]. Smart Factory, 2017 (3): 27?29.

    [8] YUAN Y, YU M M, TAO Y X, ?et al. Quantitative research on artificial intelligence industry policy based on text mining[J]. Journal of China Academy of Electronic Sciences, 2018(6): 663?668.

    [9] YUAN Z. A survey of artificial intelligence limited legal personality[J]. Oriental Law, 2017(5): 50?57.

    [10] JIA J K, JIANG Y H. Three basic issues of AI governance: technological logic, risk challenges and public policy choices[J]. China Administration, 2017(10): 40?45.

    [11] WU H D. Institutional arrangements and legal regulations in the age of artificial intelligence[J]. Legal Science: Journal of Northwest University of Political Science and Law, 2017(5): 128?136.

    [12] SI X, CAO J F. On the civil liability of artificial intelligence: taking automatic driving vehicle and intelligent robot as the entry point[J]. Legal Science: Journal of Northwest University of Politics and Law, 2017(5): 166?173.

    [13] GAO Q Q. China's special mission in the age of artificial intelligence[J]. Exploration and Controversy, 2017(1): 49?55.

    [14] XU Y. Next generation artificial intelligence: a new driving force to lead the world's development[J]. People's Forum, Academic Frontier, 2017(20): 12?23.

    [15] WANG X L. China's logistics industry: review of the 12th Five-Year Plan and prospect of the 13th Five-year Plan[J]. Logistics Engineering and Management, 2016(2).

    [16] IB Daily. China's manufacturing[J]. Investors Business Daily, 2015(21): 5?9.

    [17] China Block Chain Technology and Industrial Development Forum[EB/OL]. (2019-11-15)[2021-04-18]. http://chainb.com/download/ China block chain technology and application development white paper 1014.pdf.

    [18] AWREY D. Three projects in the new law and finance[J]. Accounting, Economics, and Law: A Convivium, De Gruyter, 2021, 11(1), 9?25.

    [19] SOHAIL J, HUW L, MOHAMMAD H, et al. Block chain-enabled supply chain: analysis, challenges, and future directions[J]. Multimedia Systems, 2021(27): 787?806.

    [20] Cloud & Smart Industries Group. Tencent a world-leading internet and technology company that develops innovative products and services: China's first block chain E-invoice issued in Shenzhen, adding another application scenario to tencent block chain 10th [EB/OL]. (2018-08-17)[2021-04-12]. https://www.tencent.com/en-us/articles/2000006.html.

    [21] HOFSTADTER D R, GBDEL E. Bach: an eternal golden braid[M]. New York, USA: Basic Books, 1983 ,48(3): 864?871.

    我國加密數(shù)字貨幣發(fā)展及其在人工智能信息安全中的應(yīng)用

    湯林云,湯和云

    (北京大學(xué) 軟件與微電子學(xué)院,北京100781)

    摘 ? ?要:在人工智能(AI)時(shí)代,商業(yè)戰(zhàn)場(chǎng)已經(jīng)逐漸轉(zhuǎn)移到網(wǎng)絡(luò),而網(wǎng)絡(luò)也產(chǎn)生了新的經(jīng)濟(jì)模式。在這個(gè)沒有硝煙的數(shù)字競(jìng)爭(zhēng)時(shí)代,人工智能對(duì)人類發(fā)展產(chǎn)生了前所未有的推動(dòng)作用,同時(shí)也催生了對(duì)網(wǎng)絡(luò)安全的需求,需要學(xué)者和政府做出更多的努力來滿足這一關(guān)鍵需求,讓這個(gè)新時(shí)代的革命更安全、更有益。在信息領(lǐng)域,創(chuàng)新已經(jīng)形成了新的力量和發(fā)展機(jī)遇。中國應(yīng)利用 “一帶一路”的機(jī)遇,從兩個(gè)方面加快人工智能的發(fā)展和國家重大戰(zhàn)略整合。第一,通過加快人工智能與云計(jì)算、互聯(lián)網(wǎng)+、大數(shù)據(jù)、科技創(chuàng)新等國家戰(zhàn)略的融合發(fā)展,積極推動(dòng)人工智能和創(chuàng)新技術(shù)的發(fā)展。第二,通過快速推進(jìn)人工智能與中國當(dāng)前雄心勃勃的 “一帶一路”“智能強(qiáng)國”“工業(yè)強(qiáng)國 ”等倡議的融合,促進(jìn)發(fā)揮人工智能力量的發(fā)展戰(zhàn)略。

    關(guān)鍵詞:云計(jì)算工業(yè)動(dòng)力;新經(jīng)濟(jì)模式智能;機(jī)器學(xué)習(xí);理論算法;大數(shù)據(jù)分析

    猜你喜歡
    大數(shù)據(jù)分析機(jī)器學(xué)習(xí)
    大數(shù)據(jù)分析對(duì)提高教學(xué)管理質(zhì)量的作用
    亞太教育(2016年36期)2017-01-17 17:26:50
    基于大數(shù)據(jù)分析的電力通信設(shè)備檢修影響業(yè)務(wù)自動(dòng)分析平臺(tái)研究與應(yīng)用
    面向大數(shù)據(jù)遠(yuǎn)程開放實(shí)驗(yàn)平臺(tái)構(gòu)建研究
    面向大數(shù)據(jù)分析的信息管理實(shí)踐教學(xué)體系構(gòu)建
    傳媒變局中的人口電視欄目困境與創(chuàng)新
    科技傳播(2016年19期)2016-12-27 14:35:21
    基于詞典與機(jī)器學(xué)習(xí)的中文微博情感分析
    大數(shù)據(jù)分析的移動(dòng)端在網(wǎng)絡(luò)課堂教學(xué)中的應(yīng)用
    基于機(jī)器學(xué)習(xí)的圖像特征提取技術(shù)在圖像版權(quán)保護(hù)中的應(yīng)用
    基于網(wǎng)絡(luò)搜索數(shù)據(jù)的平遙旅游客流量預(yù)測(cè)分析
    前綴字母為特征在維吾爾語文本情感分類中的研究
    中国三级夫妇交换| 色哟哟·www| 久久久精品区二区三区| 黄片播放在线免费| 久久久久久久精品精品| 日本爱情动作片www.在线观看| 视频中文字幕在线观看| 中文字幕av电影在线播放| 亚洲精品久久午夜乱码| 少妇猛男粗大的猛烈进出视频| 啦啦啦视频在线资源免费观看| 99久久综合免费| 亚洲欧美清纯卡通| 一本一本综合久久| 五月天丁香电影| 麻豆精品久久久久久蜜桃| 麻豆精品久久久久久蜜桃| 超碰97精品在线观看| 黑人巨大精品欧美一区二区蜜桃 | 人人妻人人澡人人看| 日日撸夜夜添| 日韩中文字幕视频在线看片| 少妇丰满av| 欧美日韩成人在线一区二区| 一区二区三区精品91| 免费高清在线观看视频在线观看| 一级,二级,三级黄色视频| 亚洲精品,欧美精品| 免费观看a级毛片全部| 亚洲怡红院男人天堂| 国产成人91sexporn| 在线观看三级黄色| 国产亚洲午夜精品一区二区久久| 免费大片18禁| 一级毛片我不卡| 在线观看免费高清a一片| 国产欧美亚洲国产| 久久久久视频综合| 如日韩欧美国产精品一区二区三区 | 日韩大片免费观看网站| 99久久中文字幕三级久久日本| 高清av免费在线| 中国国产av一级| av国产精品久久久久影院| 久久午夜福利片| 亚洲精品日本国产第一区| 亚洲精品成人av观看孕妇| 晚上一个人看的免费电影| 18禁动态无遮挡网站| 男人爽女人下面视频在线观看| 天堂8中文在线网| 日本av手机在线免费观看| 日日爽夜夜爽网站| av电影中文网址| 美女国产高潮福利片在线看| 建设人人有责人人尽责人人享有的| 纯流量卡能插随身wifi吗| tube8黄色片| 在线播放无遮挡| 成人免费观看视频高清| 熟女电影av网| 18在线观看网站| 国产一区二区在线观看av| 国产成人免费观看mmmm| 王馨瑶露胸无遮挡在线观看| 欧美精品高潮呻吟av久久| 99国产综合亚洲精品| 国产一区二区在线观看av| 卡戴珊不雅视频在线播放| 婷婷色av中文字幕| 国产毛片在线视频| 国产极品天堂在线| 国产成人av激情在线播放 | 亚洲经典国产精华液单| 精品一区二区免费观看| xxxhd国产人妻xxx| 香蕉精品网在线| 人人妻人人爽人人添夜夜欢视频| 哪个播放器可以免费观看大片| 国产亚洲最大av| 久久久久久久久大av| 下体分泌物呈黄色| 亚洲国产精品999| 国产亚洲av片在线观看秒播厂| 成人综合一区亚洲| 一个人看视频在线观看www免费| 久久久久久久久久人人人人人人| 午夜福利网站1000一区二区三区| 午夜日本视频在线| 国产精品秋霞免费鲁丝片| 国产精品三级大全| 91久久精品国产一区二区成人| 日本欧美国产在线视频| 在线免费观看不下载黄p国产| 搡女人真爽免费视频火全软件| 亚洲精品第二区| 久久 成人 亚洲| 能在线免费看毛片的网站| 简卡轻食公司| 亚洲av不卡在线观看| 午夜影院在线不卡| 在线播放无遮挡| 色网站视频免费| 亚洲一区二区三区欧美精品| 视频区图区小说| 日本猛色少妇xxxxx猛交久久| 日日爽夜夜爽网站| 日韩 亚洲 欧美在线| 自线自在国产av| 午夜影院在线不卡| 亚洲一区二区三区欧美精品| 亚洲,一卡二卡三卡| 亚洲av不卡在线观看| 国产精品.久久久| 又大又黄又爽视频免费| 国产亚洲精品久久久com| 国产亚洲av片在线观看秒播厂| 国产精品久久久久久久电影| 国产亚洲最大av| 三级国产精品片| 人人妻人人爽人人添夜夜欢视频| 极品人妻少妇av视频| av电影中文网址| 亚洲第一av免费看| 成人毛片a级毛片在线播放| 黑人猛操日本美女一级片| 亚洲欧美一区二区三区国产| 亚洲性久久影院| 一区在线观看完整版| 中文字幕av电影在线播放| 亚洲图色成人| 边亲边吃奶的免费视频| 美女xxoo啪啪120秒动态图| 欧美3d第一页| 熟女av电影| 中文字幕人妻丝袜制服| 精品一区在线观看国产| 欧美亚洲日本最大视频资源| 日韩在线高清观看一区二区三区| 大话2 男鬼变身卡| 一级毛片电影观看| 婷婷色综合www| 91精品国产九色| 九草在线视频观看| 亚洲国产精品专区欧美| 日韩 亚洲 欧美在线| 久久亚洲国产成人精品v| 中文欧美无线码| xxxhd国产人妻xxx| 国产日韩欧美在线精品| 如日韩欧美国产精品一区二区三区 | 免费不卡的大黄色大毛片视频在线观看| 亚洲综合精品二区| 热99久久久久精品小说推荐| 一区二区av电影网| 中文乱码字字幕精品一区二区三区| 80岁老熟妇乱子伦牲交| 欧美bdsm另类| 曰老女人黄片| www.av在线官网国产| 日韩制服骚丝袜av| 国产黄色视频一区二区在线观看| 日韩,欧美,国产一区二区三区| 最新中文字幕久久久久| a级毛片黄视频| 热99久久久久精品小说推荐| 亚洲天堂av无毛| 国产成人a∨麻豆精品| 91成人精品电影| 亚洲国产精品一区二区三区在线| 搡老乐熟女国产| 婷婷成人精品国产| 日本免费在线观看一区| 99九九线精品视频在线观看视频| 18禁动态无遮挡网站| 在线天堂最新版资源| 有码 亚洲区| 99热这里只有是精品在线观看| 九草在线视频观看| 免费久久久久久久精品成人欧美视频 | 最近中文字幕高清免费大全6| 久久精品国产亚洲av天美| 亚洲第一区二区三区不卡| 中文精品一卡2卡3卡4更新| 久久97久久精品| 久久久午夜欧美精品| 美女中出高潮动态图| 最近中文字幕2019免费版| 亚洲国产av影院在线观看| 少妇人妻 视频| 国产一区亚洲一区在线观看| 国国产精品蜜臀av免费| 成人无遮挡网站| 18禁观看日本| 中国美白少妇内射xxxbb| 亚洲精品aⅴ在线观看| 99热网站在线观看| 欧美日韩视频高清一区二区三区二| 国产视频内射| 久久久国产欧美日韩av| 亚洲性久久影院| 亚洲精品久久久久久婷婷小说| 18在线观看网站| 亚州av有码| 99九九线精品视频在线观看视频| 99久久综合免费| 国产乱来视频区| 欧美 日韩 精品 国产| 午夜影院在线不卡| 国产熟女欧美一区二区| 99热网站在线观看| 亚洲国产精品一区三区| av卡一久久| 免费黄色在线免费观看| 国产日韩欧美亚洲二区| 亚洲国产日韩一区二区| 国产精品偷伦视频观看了| 午夜免费鲁丝| 精品一区二区三区视频在线| 免费黄频网站在线观看国产| 国产成人精品在线电影| 日韩精品有码人妻一区| 中国国产av一级| 久久人人爽人人片av| 国产av一区二区精品久久| 国产永久视频网站| 国产一区亚洲一区在线观看| 我要看黄色一级片免费的| 免费黄频网站在线观看国产| 大陆偷拍与自拍| 蜜臀久久99精品久久宅男| 国产有黄有色有爽视频| 国产亚洲精品第一综合不卡 | 亚洲av免费高清在线观看| 日日啪夜夜爽| 色94色欧美一区二区| 亚洲美女视频黄频| 国产黄频视频在线观看| 亚洲精品乱码久久久久久按摩| 亚洲av福利一区| 精品一区二区三区视频在线| 国产免费又黄又爽又色| 两个人的视频大全免费| 一级毛片 在线播放| 狂野欧美白嫩少妇大欣赏| 国产免费现黄频在线看| 国产精品女同一区二区软件| 青春草视频在线免费观看| 国产一区二区在线观看日韩| 久久久久国产精品人妻一区二区| 日韩熟女老妇一区二区性免费视频| 午夜激情久久久久久久| 97在线人人人人妻| 国产一区二区三区av在线| 一本大道久久a久久精品| 日韩成人伦理影院| 国产精品免费大片| av黄色大香蕉| 男人操女人黄网站| 国产精品99久久99久久久不卡 | 国产在视频线精品| 中国美白少妇内射xxxbb| 国产成人免费观看mmmm| 在线亚洲精品国产二区图片欧美 | 美女视频免费永久观看网站| 亚洲精品亚洲一区二区| 我要看黄色一级片免费的| 99国产精品免费福利视频| 大码成人一级视频| 九九爱精品视频在线观看| 亚洲av国产av综合av卡| 国内精品宾馆在线| 大陆偷拍与自拍| 人人澡人人妻人| 黄色欧美视频在线观看| 国产一区二区在线观看av| 久久久久国产精品人妻一区二区| 免费高清在线观看日韩| 久久影院123| 亚洲第一av免费看| 我的女老师完整版在线观看| 中文字幕亚洲精品专区| 久久99蜜桃精品久久| 国产亚洲精品久久久com| 人妻制服诱惑在线中文字幕| 丰满迷人的少妇在线观看| 国产一区有黄有色的免费视频| 亚洲色图 男人天堂 中文字幕 | 秋霞在线观看毛片| 中文天堂在线官网| 热99国产精品久久久久久7| 人妻制服诱惑在线中文字幕| 久久综合国产亚洲精品| 18+在线观看网站| 久久久久视频综合| 热re99久久精品国产66热6| 国产成人freesex在线| 色94色欧美一区二区| 老女人水多毛片| 黑丝袜美女国产一区| 亚洲精品456在线播放app| 午夜福利,免费看| 亚洲精品自拍成人| 精品久久蜜臀av无| 丰满少妇做爰视频| 亚洲av成人精品一区久久| 成人毛片60女人毛片免费| 国产精品三级大全| 天堂俺去俺来也www色官网| 国产成人freesex在线| 国产极品粉嫩免费观看在线 | 国产 精品1| 高清视频免费观看一区二区| 欧美bdsm另类| 午夜福利影视在线免费观看| 黄色欧美视频在线观看| 这个男人来自地球电影免费观看 | 亚洲精品第二区| 全区人妻精品视频| 午夜91福利影院| 成年人免费黄色播放视频| 国产男女内射视频| 亚洲三级黄色毛片| 久久久久视频综合| 亚洲国产毛片av蜜桃av| 久久久久久伊人网av| 亚洲av不卡在线观看| 日产精品乱码卡一卡2卡三| 丰满少妇做爰视频| 国产亚洲精品第一综合不卡 | 久久午夜综合久久蜜桃| 免费观看的影片在线观看| 欧美日韩亚洲高清精品| 欧美日本中文国产一区发布| 三级国产精品欧美在线观看| 亚洲精品乱码久久久久久按摩| 天堂8中文在线网| 亚洲精品一区蜜桃| 两个人的视频大全免费| 亚洲情色 制服丝袜| 国产深夜福利视频在线观看| 亚洲av日韩在线播放| 青青草视频在线视频观看| 亚洲av在线观看美女高潮| 欧美精品一区二区大全| 午夜免费鲁丝| 久久久国产欧美日韩av| 丁香六月天网| 两个人的视频大全免费| 一级a做视频免费观看| 建设人人有责人人尽责人人享有的| 成人午夜精彩视频在线观看| 亚洲国产成人一精品久久久| 久久鲁丝午夜福利片| 国产成人免费观看mmmm| 一本大道久久a久久精品| 亚洲精品久久成人aⅴ小说 | 亚洲精品久久久久久婷婷小说| 色视频在线一区二区三区| 国产亚洲av片在线观看秒播厂| 亚洲精品亚洲一区二区| 大片免费播放器 马上看| 人妻 亚洲 视频| 精品久久久久久久久亚洲| 我要看黄色一级片免费的| 欧美老熟妇乱子伦牲交| 国产成人免费观看mmmm| 久久精品国产亚洲网站| 国产男女超爽视频在线观看| 97在线视频观看| 国产爽快片一区二区三区| 成人毛片a级毛片在线播放| 日日摸夜夜添夜夜爱| 国产淫语在线视频| 欧美日韩精品成人综合77777| 能在线免费看毛片的网站| 99re6热这里在线精品视频| 9色porny在线观看| 欧美人与善性xxx| 久久久久人妻精品一区果冻| 国产成人一区二区在线| 欧美日韩视频高清一区二区三区二| 亚洲无线观看免费| 色视频在线一区二区三区| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 久久久久久久久久久免费av| 91精品伊人久久大香线蕉| www.av在线官网国产| 亚洲欧美日韩卡通动漫| 欧美激情极品国产一区二区三区 | 搡女人真爽免费视频火全软件| 两个人的视频大全免费| 一级毛片 在线播放| 视频中文字幕在线观看| 中文字幕制服av| 午夜福利网站1000一区二区三区| 国产综合精华液| 亚洲国产精品成人久久小说| 国产69精品久久久久777片| 精品人妻一区二区三区麻豆| 国产日韩欧美在线精品| 精品人妻熟女毛片av久久网站| 亚洲av二区三区四区| 亚洲国产精品专区欧美| 欧美3d第一页| 欧美精品人与动牲交sv欧美| 成人无遮挡网站| 国产精品国产av在线观看| 又大又黄又爽视频免费| 麻豆精品久久久久久蜜桃| 国产av精品麻豆| 美女xxoo啪啪120秒动态图| av在线老鸭窝| 欧美bdsm另类| 青春草国产在线视频| 欧美日韩一区二区视频在线观看视频在线| 久久久久久久精品精品| 亚洲精品久久成人aⅴ小说 | 精品午夜福利在线看| 妹子高潮喷水视频| 久久99一区二区三区| 久久青草综合色| 纯流量卡能插随身wifi吗| 99re6热这里在线精品视频| 久久久久国产网址| 女人久久www免费人成看片| 亚洲美女黄色视频免费看| 亚洲av电影在线观看一区二区三区| videossex国产| 女的被弄到高潮叫床怎么办| 欧美日韩综合久久久久久| 国产亚洲最大av| 欧美丝袜亚洲另类| 人体艺术视频欧美日本| 精品少妇内射三级| 国产av码专区亚洲av| 欧美 亚洲 国产 日韩一| 我的老师免费观看完整版| 中文乱码字字幕精品一区二区三区| 国产女主播在线喷水免费视频网站| 成年人午夜在线观看视频| 国产永久视频网站| 国产69精品久久久久777片| 亚洲熟女精品中文字幕| 99久久人妻综合| 美女国产视频在线观看| 夜夜爽夜夜爽视频| 精品一区在线观看国产| 亚洲在久久综合| 2018国产大陆天天弄谢| 亚洲国产色片| 丰满饥渴人妻一区二区三| 99国产综合亚洲精品| 日本爱情动作片www.在线观看| 国产男人的电影天堂91| 亚洲欧洲精品一区二区精品久久久 | 街头女战士在线观看网站| 黄色视频在线播放观看不卡| 性高湖久久久久久久久免费观看| 国产精品一区二区在线不卡| 夜夜爽夜夜爽视频| 亚洲怡红院男人天堂| 晚上一个人看的免费电影| 男人操女人黄网站| 丰满饥渴人妻一区二区三| 成人毛片60女人毛片免费| 国产日韩一区二区三区精品不卡 | 在线观看免费视频网站a站| 中文欧美无线码| 欧美xxxx性猛交bbbb| 日韩,欧美,国产一区二区三区| 一边亲一边摸免费视频| 亚洲人成网站在线播| 亚洲av日韩在线播放| 成人漫画全彩无遮挡| 免费看不卡的av| 国国产精品蜜臀av免费| 夜夜骑夜夜射夜夜干| 人妻一区二区av| 国产成人精品婷婷| 国产一区有黄有色的免费视频| www.色视频.com| 99热这里只有精品一区| av播播在线观看一区| 精品人妻熟女av久视频| 午夜福利网站1000一区二区三区| 一本大道久久a久久精品| 久久国产精品大桥未久av| 久久国产亚洲av麻豆专区| 一个人看视频在线观看www免费| 国产综合精华液| 久久婷婷青草| 一级a做视频免费观看| 日韩电影二区| 国产亚洲午夜精品一区二区久久| 日韩一区二区视频免费看| xxx大片免费视频| 久久精品国产a三级三级三级| 国产伦精品一区二区三区视频9| 狠狠精品人妻久久久久久综合| 五月伊人婷婷丁香| 婷婷成人精品国产| 国产精品 国内视频| 久久 成人 亚洲| 国产成人精品福利久久| 国产精品一区二区在线不卡| 日韩在线高清观看一区二区三区| 夫妻午夜视频| 亚洲国产毛片av蜜桃av| 97超视频在线观看视频| 中文字幕制服av| 国产免费一级a男人的天堂| 成人18禁高潮啪啪吃奶动态图 | 九色亚洲精品在线播放| 日韩,欧美,国产一区二区三区| 日韩中文字幕视频在线看片| 韩国高清视频一区二区三区| 国产成人精品福利久久| 菩萨蛮人人尽说江南好唐韦庄| 九色亚洲精品在线播放| 女性生殖器流出的白浆| 日韩精品有码人妻一区| 国产黄色视频一区二区在线观看| 成人亚洲精品一区在线观看| 欧美国产精品一级二级三级| 成年av动漫网址| 日产精品乱码卡一卡2卡三| 精品卡一卡二卡四卡免费| 精品一品国产午夜福利视频| 男女啪啪激烈高潮av片| 中国国产av一级| videos熟女内射| 亚洲色图 男人天堂 中文字幕 | 精品国产露脸久久av麻豆| 男女国产视频网站| 涩涩av久久男人的天堂| 这个男人来自地球电影免费观看 | √禁漫天堂资源中文www| 成人综合一区亚洲| 国产成人精品婷婷| 国产高清三级在线| 爱豆传媒免费全集在线观看| 日本91视频免费播放| av免费在线看不卡| 国产精品麻豆人妻色哟哟久久| 精品久久蜜臀av无| 一级毛片aaaaaa免费看小| 中文精品一卡2卡3卡4更新| 赤兔流量卡办理| 成人漫画全彩无遮挡| 午夜免费观看性视频| 亚洲av男天堂| 如何舔出高潮| 久久精品国产自在天天线| 熟妇人妻不卡中文字幕| 99久久中文字幕三级久久日本| 国产精品麻豆人妻色哟哟久久| 亚洲av.av天堂| 国产一区有黄有色的免费视频| 国产成人精品婷婷| 精品一品国产午夜福利视频| √禁漫天堂资源中文www| 国产又色又爽无遮挡免| 国产精品女同一区二区软件| 国产精品99久久久久久久久| 91在线精品国自产拍蜜月| 国产精品.久久久| 国产精品久久久久久av不卡| 免费高清在线观看日韩| 日韩欧美精品免费久久| 国产精品久久久久久久电影| 精品国产国语对白av| 国产av精品麻豆| 亚洲av免费高清在线观看| 伊人亚洲综合成人网| 精品人妻熟女av久视频| freevideosex欧美| 妹子高潮喷水视频| 精品国产一区二区久久| 乱人伦中国视频| 一边亲一边摸免费视频| 日韩成人伦理影院| 亚洲色图综合在线观看| 国产熟女欧美一区二区| 亚洲欧美一区二区三区国产| 欧美日韩在线观看h| 欧美3d第一页| 日韩精品有码人妻一区| 又黄又爽又刺激的免费视频.| 日韩中文字幕视频在线看片| 两个人免费观看高清视频| 人人澡人人妻人| 免费av不卡在线播放| 国产精品久久久久久精品电影小说| 亚洲精品,欧美精品| 纯流量卡能插随身wifi吗| 日日撸夜夜添| 美女中出高潮动态图| 亚洲精品国产色婷婷电影| 国产探花极品一区二区| 久久青草综合色| 最近中文字幕2019免费版| 午夜福利影视在线免费观看| 99视频精品全部免费 在线| 美女cb高潮喷水在线观看| 亚洲精品aⅴ在线观看| 少妇 在线观看| 国产熟女午夜一区二区三区 | 亚洲一区二区三区欧美精品| 亚洲五月色婷婷综合| 国产一区二区三区av在线| 亚洲精品乱码久久久v下载方式| 黑人高潮一二区| 91精品一卡2卡3卡4卡| 91在线精品国自产拍蜜月|