# 2. Introduction

- [2.1. Limitations of and problems with blockchain](/authorization-based-on-blockchain/2.-introduction/2.1.-limitations-of-and-problems-with-blockchain.md)
- [2.2. Borrowing the DB of BaaS based participants](/authorization-based-on-blockchain/2.-introduction/2.2.-borrowing-the-db-of-baas-based-participants.md)
- [2.3. Split & Distribute Data](/authorization-based-on-blockchain/2.-introduction/2.3.-split-and-distribute-data.md)
- [2.4. Verification that is user-centered based on the Public or Private Network](/authorization-based-on-blockchain/2.-introduction/2.4.-verification-that-is-user-centered-based-on-the-public-or-private-network.md)
- [2.5  Proof of integrity for Split & Distribute data](/authorization-based-on-blockchain/2.-introduction/2.5-proof-of-integrity-for-split-and-distribute-data.md)
