Position: Home page » Blockchain » Blockchain encryption authentication
Blockchain encryption authentication
Publish: 2021-05-02 06:45:35
1. Basically, the principle is the same. Take baopin.com as an example, baopin.com's video blockchain authentication is actually DAPP. First, it takes a screenshot of the video's key frames per minute, then transcodes it into a string of unique numbers, and then uploads and records it into the Ethereum blockchain.
2. Blockchain encryption algorithm
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
3. Jinwowo network believes that privacy protection is the advantage of blockchain. We use cryptography and distributed structure to protect privacy
jinwowo will use blockchain technology to promote the legalization of big data business. The encryption of blockchain technology can ensure that the privacy of data sources can be better protected while big data is called.
jinwowo will use blockchain technology to promote the legalization of big data business. The encryption of blockchain technology can ensure that the privacy of data sources can be better protected while big data is called.
4. It doesn't work if you open 120 frames depending on your resolution and display 60
5. First of all, these two are virtual assets. The price of these two kinds of digital currency, or a specific price of digital currency, is determined according to the market situation
the details of these two digital assets are as follows
bitcoin (bitcoin: bitcoin) was originally a kind of network virtual currency, which can buy real-life goods. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals
the full name of NMC is "new media chain", the Chinese name is media chain, and the former domain name currency (also referred to as NMC) is two completely different currencies. NMC is the circulating currency of three decentralized application platforms: coin call [blockchain information community portal], coin search [blockchain network query tool], ncoin [digital currency exchange]. However, the prices of these two kinds of digital currencies will fluctuate with the market, which can not guarantee a development prospect. If the current price is concerned, bitcoin will be a bit higher.
the details of these two digital assets are as follows
bitcoin (bitcoin: bitcoin) was originally a kind of network virtual currency, which can buy real-life goods. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals
the full name of NMC is "new media chain", the Chinese name is media chain, and the former domain name currency (also referred to as NMC) is two completely different currencies. NMC is the circulating currency of three decentralized application platforms: coin call [blockchain information community portal], coin search [blockchain network query tool], ncoin [digital currency exchange]. However, the prices of these two kinds of digital currencies will fluctuate with the market, which can not guarantee a development prospect. If the current price is concerned, bitcoin will be a bit higher.
6. The problem of power consumption is caused by many factors. The main reason is that some applications can't exit normally and run in the background all the time. Please go to settings - power to see which apps consume too much power. You can press the home key on the desktop to clear the programs that don't need to run in the background, which can significantly rece the power consumption.
7. Blockchain technology solves the key problems in data stream sharing by "stamping" and "encryption". On the one hand, the blockchain registers and certifies the data, confirms the source, ownership and circulation path of big data assets, and makes the transaction records recognized, transparent and traceable.
8. First, you need to understand what "private key" and "public key" are and how they work
in order to ensure the data security of users, the blockchain system is implemented through a cryptographic algorithm. Specifically, it is implemented through a public cryptographic algorithm mechanism. We all know how a cryptographic algorithm can have a secret key, and the public secret key algorithm is a pair of (that is, two) secret keys, just like tiger amulet, which are used together. One is called public key, which can be disclosed to others. The private key should be kept by itself. In the blockchain system, the public key is used to identify the identity, and the private key is equivalent to the key to decrypt. But the difference is that a public key is only for a unique private key, that is to say, if you forget the private key, it will not be retrieved for you, In the blockchain system, it will not help you retrieve the private key, so you should keep the private key properly
in the blockchain system structure, the data encrypted with public key must be decrypted with the corresponding private key, while the data encrypted with private key
must be decrypted with the corresponding public key, so the data encrypted with private key (usually called "signature") must be decrypted with the corresponding public key, which can play a great role
for a simple example, if Zhang San wants to send a check to Li Si, how can it be sent? In the past, it would be taken by the bookkeeper, so Zhang San thought of a way. He encrypted the check with Li Si's public key, and then signed his name (signed with his private key). At this time, other people would not use it even if they got the check, because only Li Si had his private key, That is, only Li Si can use this check. This function design is called "script system" in the blockchain system
therefore, the private key encrypted by the blockchain digital signature cannot be decrypted by the original encrypted private key, but must be decrypted by the corresponding public key.
in order to ensure the data security of users, the blockchain system is implemented through a cryptographic algorithm. Specifically, it is implemented through a public cryptographic algorithm mechanism. We all know how a cryptographic algorithm can have a secret key, and the public secret key algorithm is a pair of (that is, two) secret keys, just like tiger amulet, which are used together. One is called public key, which can be disclosed to others. The private key should be kept by itself. In the blockchain system, the public key is used to identify the identity, and the private key is equivalent to the key to decrypt. But the difference is that a public key is only for a unique private key, that is to say, if you forget the private key, it will not be retrieved for you, In the blockchain system, it will not help you retrieve the private key, so you should keep the private key properly
in the blockchain system structure, the data encrypted with public key must be decrypted with the corresponding private key, while the data encrypted with private key
must be decrypted with the corresponding public key, so the data encrypted with private key (usually called "signature") must be decrypted with the corresponding public key, which can play a great role
for a simple example, if Zhang San wants to send a check to Li Si, how can it be sent? In the past, it would be taken by the bookkeeper, so Zhang San thought of a way. He encrypted the check with Li Si's public key, and then signed his name (signed with his private key). At this time, other people would not use it even if they got the check, because only Li Si had his private key, That is, only Li Si can use this check. This function design is called "script system" in the blockchain system
therefore, the private key encrypted by the blockchain digital signature cannot be decrypted by the original encrypted private key, but must be decrypted by the corresponding public key.
Hot content