Untitled Document
Untitled Document
computer can solve in any feasible amount of time (irrespective of the usefulness of the
problem).
● Entanglement-based protocols: focus on quantum states in which two objects are linked
together, forming a combined quantum state. In this method, if an eavesdropper accesses
a previously trusted node and changes something, the other involved parties will know.
National Mission on Quantum Technologies and Applications (NMQTA): Budget 2020 allocated
Rs 8000 Crore to the mission for a period of five years.
● Quantum Information and Computing (QuIC) lab at the Raman Research Institute, Bangalore.
● Quantum-Enabled Science & Technology (QuEST) a research program by the Department of
Science & Technology.
Quantum Frontier mission: It is an initiative of the Prime Minister's Science, Technology, and
Innovation Advisory Council (PM-STIAC) which aims to initiate work in the understanding and
control of quantum mechanical systems.
Supercomputers
Jointly steered by: Ministry of Electronics & Information Technology and Department of Science and
Technology.
Implemented by: C-DAC and Indian Institute of Science, Bangalore
Mission envisages empowering our national academic and R&D institutions spread over the country
by installing a vast supercomputing grid comprising of more than 70 high-performance computing
(HPC) facilities.
Eg: PARAM Shivay [IIT (BHU)], PARAM Shakti (IIT Kharagpur),PARAM Brahma (IISER, Pune) etc.
4 major pillars of NSM are Infrastructure, Applications, R&D, Human resource development
India’s Supercomputers:
● Pratyush : Located in Indian Institute of Meteorology.
● Mihir: Located in the National Centre for Medium Range Weather Forecasting.
● PARAM Siddhi : It will be India ' s largest High-Performance Computing and Artificial
Intelligence (HPC-AI) supercomputer. The supercomputer will have a speed oshf 210 AI Petaflops.
● Param Shakti and Param Brahma: Installed at IIT-Kharagpur and IISER, Pune.
Blockchain
● Blockchain is a distributed or decentralized ledger technology which was first introduced in the
design and development of cryptocurrency, Bitcoin in 2009.
● Blockchain technology is an amalgamation of various technologies such as distributed systems,
cryptography, etc
● Blockchain is a series of blocks, where each block contains details of transactions executed over
the network, hash(address) of the previous block, timestamp etc.
● Data and transactions stored in blocks are secured against tampering using cryptographic hash
algorithms and are validated and verified through consensus (consensus protocols) across nodes
of the Blockchain network.
● Blockchain platforms are being developed to offer Blockchain based digital transaction platforms.
Popular blockchain platforms include Hyperledger, Cosmos, Polkadot, Redbelly, Ethereum etc.
Unlike in centralized systems like banks, we ourselves can maintain the ledger of our transactions
(money, land records, IPR data, health records etc.) in a decentralized manner through the use of
blockchain.
Each set of transactions is recorded on a block. You need a record of previous transactions to
validate future ones. This will create a chain of blocks called blockchain.
Transaction details
Hash number
Work number
The transaction details will generate a One Way Function, which will be a unique Hash Number. If
the transaction detail changes, the hash function will also change. And it will also be then required
to change the details in subsequent blocks.
New Transaction :
● Your friends will check the previous ledger ● Validate ● Add to the chain
Hash (#)/ref no. (unique fingerprint);
○ Generated on basis of 1 and 3 compartment
● New transaction
○ If any illegitimate content : Ref # will change completely
○ Validated - added to chain of blocks.
● Block chain
○ Not centralized
○ Everyone has a copy, and any one can validate
● Since all are linked you can’t randomly change any record.
○ Change resistant and Hack proof.
● Can be validated/invalidated by anyone
○ Digital scarcity + Decentralization
● Missing = Accountability
To prevent this, work needs to be done to change any block chain and that work should be tough
to do. This is where the Work Number is important.
Lot of computational power required Because work number of all block used to change.
Moreover, new blocks are constantly being added. Therefore it becomes very difficult to change a
block chain. The longest chain would obviously be more secure.
New transactions need to be validated. Why would someone validate transactions / remain a good
actor?
● Validation here is calculation of work number for a particular block. This is also known as mining.
● Reasons for remaining a good actor :
1. You need a lot of computational power for validation.
2. Every time you validate new currency : you will get tokens. These tokens have value
only till the time your chain has validity.
Proof of authority
● Consensus protocol is based on value of identity. There are limited number of moderators and it
is close to a centralized system.
● Reputation based system.
● No mining / validation
● Ethereum switched to merge software mechanism that uses proof of stake (PoS) mechanism.
This will help slash energy requirements.
● Ethereum is a decentralized blockchain platform used to build decentralized Apps and Smart
Contracts as well as a cryptocurrency.
● From proof of work to proof of stake consensus mechanism.
Presidio Principles : Foundational Values for a decentralized future:released by world economic forum
● Currency : crypto ● Banking and Finance : Transaction ledgers ● Inventory : Supply Chain
Management ● Health : patient records : digital health mission ● Property and ownership records ●
Smart contracts : update regularly ● IPR and asset protection ● Good governance : India Chain ●
Corruption : audits
Blockchain : Cryptocurrency
● Cryptocurrency → digital currency secured by cryptography → medium of exchange where the
ownership data is stored in a computerized database; Based on→ Blockchain technology
● Cryptography- The science of protecting information by transforming it into a secure format
through encryption.
● Decentralized; Security; Anonymity; Speed; Ease of transfer; Cross border trade;
Advantages:
● Wallet- the account addresses of the user which is accessible only by a private and a public key;
the private key is unique and known only to the owner of the wallet.
● Instantaneous transaction →help save time of both the parties; everything is being done on the
internet.
● International monetary market : work in countries with unstable economy; poor institutional
strength;
Disadvantages
● Vulnerability: It’s hidden nature of transaction →illegal activities → terror-funding, money
laundering and tax-evasion.
● The RBI & Ministry of Finance issued statements on cryptocurrencies ;
● Frauds and scams – Squid cryptocurrency
● Payments in one go: Payments cannot be reversed back; no rollback and no central legal
authority;
During a transaction between, say A and B, there public keys are revealed till the transaction is not
mined/ validated. In this time, a quantum computer can trace the private key of the two people
using their public key. But for now, the mining time < time taken by quantum computer.
Web 3.0
● Web 1.0, also called the Static Web, which enabled easy access to information. However, the
information was largely disorganized and difficult to navigate.
● The Social Web, or Web 2.0, made the internet a lot more interactive thanks to advancements in
web technologies like Javascript, HTML5, CSS3, etc., which enabled startups to build interactive
web platforms such as YouTube, Facebook, Wikipedia and many more.
For example: if we open facebook, we see different data based on our preferences (interactive).
Problems in Web 2.0: Data not secure, informed consent not taken, we are the product.
● NFT is a Digital file such as photo file(JPEG),Animated image(GIF),music file (MP3) etc. Stored
using blockchain Technology.
● They cannot be subdivided and/or their individual subunits can not be exchanged with one
another. Because their values are different based on buyer’s preference, So NFTs are non-
fungible.
Internet Of Things
It is a seamless connected network of embedded objects/ devices, with identifiers, in which
Machine to Machine (M2M) communication without any human intervention is possible using
standard and interoperable communication protocols.
Phones, Tablets and PCs are not included as part of IoT.
LiFi
E-SIM
● an eSIM is an embedded SIM
○ It has same hardware of a regular SIM card chip
○ It is a permanently embedded part of the motherboard of a device.
● e-SIM acting as a unique identifier for telecom operators to reach the exact smartphone when
they make a call or send a text.
● users switch operators without having to replace any physical SIM cards.
● Convenience: The ability to store multiple SIM profiles in your eSIM also means you can switch
between profiles easily, without the need of activating a SIM repeatedly or physically switching
cards repeatedly.
● Security: In case of theft of phone, SIM card can not be misused as it is embedded part of smart
phone
RFID
● It is an electronic tag that can exchange data with an RFID reader through radio waves.
● In this, an antenna broadcasts energy to tag, which in turn return modulated energy back in form
of back-scatter.
● It is faster connection, and operational range is about 100m.
● RFID tag typically sends out information hence only one-way information
1. Active RFIDs use their own power source, mostly batteries.
2. Passive RFIDs are activated through the reader using the electromagnetic energy it
transmits.
3. Unlike Barcodes, RFIDs do not require direct line of sight to identify objects.
● NFC is the technology that allows compatible devices to establish radio communication with
each other by touching them together or bringing them into a distance maximum of 10 cm.
● NFC works on Radio Frequency Identification (RFID) technology and Magnetic induction
principle
● However, RFID and NFC also have many differences.
NFC is both unidirectional + Bi-directional. RFID is unidirectional.
● When electrons flow through a conductor, they create a magnetic field. And when magnetic
fields change, they can cause electrons to flow through a conductor. This relationship -- known as
inductive coupling.
● In NFC also the reader or the mobile acts as the active device whose antenna or the coil
releases a sinusoidal carrier wave and creates a magnetic field. Then the passive tags present in
that field gets energy from the reader and change the properties of the receiving frequency.
Applications: contactless payments, info./data sharing, in-store check-ins, smart watch etc.
Edge Computing
● It enables data to be analysed, processed, transferred at edge of a network.
● It means, data is analyzed locally, closer to where it is stored, in real time without latency.
● Basic difference between edge computing and cloud computing lies in where data processing
takes place.
● Cloud Computing: It means storing and accessing data and programs over Internet instead of
your computer's hard drive.
● Existing Internet of Things (loT) systems perform all their computations in cloud using data
centers.
● Edge Computing: It manages massive amounts of data generated by loT devices by storing and
processing data locally.
Benefits: High speed ● Reduced latency ● Better reliability and security● Very important in IOT.
Digital Signature
● It is a way to ensure integrity of data recorded onto a blockchain. Akin to a physical signature on
a paper, digital signature is for digital documents. It binds a person / entity to a digital document
Digital Certificate
B uses its private key and the hash algorithm to encrypt the document.
R uses the public key of B and the hash algorithm to receive the document.
Digital Certificate
Verification by public key and hash algorithm: ensures that document has not been altered, but you
have no idea about the true identity of the sender as it depends on the public key which is
publically available.
Solution : digital certificate : electronic credentials issued by a trusted third party. It not only verifies
the identity of the owner but also verifies that the owner owns public key.
● Digital certificates are electronic credentials issued by a trusted third party. It not only verifies the
identity of the owner, but also verifies that the owner owns the public key.
● It contains the certificate owner’s name, owner’s public key, certificate issuer’s name and
certificate issuer’s digital signature.
● Trusted 3rd party : issues digital certificates.
D2M Technology
(DTH-> Direct To Home)
● Direct To Mobile Tech—>broadcast video and other forms of multimedia content directly to
mobile phones (a miniaturized dish inside phone)● It does not require an active internet connection
Concept
● D2M is based on the convergence of broadband and broadcast, using which mobile phones can
receive terrestrial digital TV. ● It would be similar to how people listen to FM radio on their phones,
where a receiver within the phone can tap into radio frequencies. ● Using D2M, multimedia content
can also be beamed to phones directly.
Benefits: ● It can be used to directly broadcast content related to citizen-centric information,
counter fake news, issue emergency alerts and offer assistance in disaster management.
CrysXPP
● Researchers from IIT Kharagpur in collaboration with the IndoKorea Science and Technology
Center (IKST) have developed a method called CrysXPP.
● It is a machine learning (ML) system that enables rapid prediction of various material properties
with high precision.
Web 5.0
● Former Twitter CEO recently announced his vision for a new decentralized web platform that is
being called Web 5.0.
● Objective—> “ownership of data and identity to individuals”.
● It is a Decentralized Web Platform that enables developers to leverage Decentralized Identifiers,
Verifiable Credentials, and Decentralized Web Nodes to write Decentralized Web Apps.
● Web 5.0 is Web 2.0 plus Web 3.0 that will allow users to own their identity on the Internet and
control their data.
● It aimed at building an extra decentralized web that puts one in control of your data and identity.
India Stack
● India stack is a collection of open APIs (Application Programming Interface) and digital public
goods
● IndiaStack includes APIs of Aadhaar, Unified Payment Interface (UPI), Co-Win, DigiLocker,
Aarogya Setu, eSanjeevani, UMANG, DIKSHA, etc
● Its objective is to unlock the economic opportunities of identity, data, and payments at population
scale
IPR
IPRs are the rights given to persons over the creations of their minds. They usually give the
creator an exclusive right over the use of his/her creation for a certain period of time.
•It can include creations such as a new drug composition, business module, product, software and
so on.
Trademarks, Trade Secret, Industrial Design, Patents, Copyrights.
Copyright describe the rights that creators have 60 years. Copyrights Act,
over their literary and artistic works Original work: 60 1950.
years after the death
of the author.
Patent exclusive right granted for an invention 20 years The Patent Act,
related to From the date of 1970.
1. Product filing of application.
2. Process 2005
That is amendment-
1. New compliant with
2. Inventive step the TRIPS.
3. Industrial application capablility
should be obtained in each country
a new technical solution to a problem
of any field
Trade Secrets confidential information which may be valid as long as one Contracts Act
sold or licensed does not discover it IPC
formulae, recipes, pattern, technique, independently.
compilation, method, program,
process, device or product
mechanism.
What cannot be patented?
● Frivolous inventions. E.g. schoolbag, laptop bag ● Anything seriously harmful to public order,
morality, humans, animals, plants or environment. ● Atomic energy related inventions. ● Mere
discovery of a scientific principle or the formulation of an abstract theory or discovery of a living
thing ● Plants-seeds varieties, biological process to create them
● Animals breeding; Medical treatment of humans and animals ● Mere discovery of a new form of
a known substance which does not result in the increased efficiency. ● Mere re-arrangement or
duplication of known devices. ● Mere aggregation of properties of the components e.g. lemon +
sugar + water = juice
● Traditional knowledge. E.g. Ayurvedic information. ● Mathematical formula, business method,
method of playing game for ex :helicopter shot. ● computer program, presentation of information,
integrated circuit ● literary, dramatic, musical or artistic work; cinema-TV shows
Compulsory Licensing
● It enables a competent government authority to license the use of a patented invention to a third
party or government agency without the consent of the patent holder.
● Section 92 of the Patent Act, 1970, provides for issuing CL by the central government (permitted
under the WTO’s TRIPS (IPR) Agreement) in circumstances of “national emergency or in
● circumstances of extreme urgency or in case of public non-commercial use”.
Parallel Import
● It is importation without the consent of the patent holder of a patented product marketed in
another country either by the patent holder or with the patent holder's consent.
● For example : USA based company Pfizer sells a drug Lipitor in congo for $1 / pill.
● Same drug is needed by India but India gets the drug at $5 / pill
● India can use parallel import to get the drug.
Evergreening of patent
● Ever-greening of patent: Section 3(d) Indian Patent Act doesn’t allow the renewal of a patent
over a product by introducing minor changes to it. It has been an issue of concern for
pharmaceutical companies (Ex: Novartis issue on the patent of cancer drug Glivec).
● Done by pharma companies to extend patent term beyond 20 years
Utility Model
● A Utility Model just like a Patent also protects inventions/innovations but for a shorter period.
● The main difference between a Patent and Utility Model is that the requirements for granting a
Utility Model are less stringent than for Patents.
● A product or process which is Novel and Industrial applicable passes for Utility Model, inventive
step is not a requirement.
● The term of protection for utility models is shorter than for patents,(usually between 6 and 15
years)