The essential feature of view taking is to be egocentric
theory of cognitive development stage
① perceptual movement stage (0-2 years old): through exploring the relationship between perception and movement to obtain action experience, needs and appearances have not yet been fully formed, and object permanence and goal orientation behavior have been existed
② pre operation stage (2-7 years old): with concrete image, irreversible thinking, not yet acquired the concept of object conservation, rapid development of language, symbolization of action diagram, egocentrism< (3) concrete operation stage (7-11 years old): be able to perform logical operation, but still need the support of concrete things, with conservation and reversibility, de egocentrism and cluster operation< (4) formal operation stage (11-16 years old): thinking is no longer dependent on specific perceptible things, but can be solved by hypothetical reasoning, hypothetical dective reasoning, adolescent egocentrism, and children's development thinking is close to alt level.
key management includes all aspects from key generation to key destruction. It is mainly manifested in management system, management protocol, key generation, key management, key distribution, key replacement and key injection. For the military computer network system, e to the user's strong mobility, complex membership and cooperative command, higher requirements for key management are put forward
process:
(1) key generation
the key length should be long enough. Generally speaking, the larger the length of the key, the larger the corresponding key space, and the more difficult it is for the attacker to guess the password exhaustively
choose a good key to avoid weak key. The random bit string generated by the automatic processing equipment is a good key. When choosing a key, we should avoid choosing a weak key
for public key cryptosystems, key generation is more difficult because the key must satisfy some mathematical characteristics
key generation can be realized through online or offline interactive negotiation, such as cryptographic protocol
(2) key distribution
symmetric encryption algorithm is used for secure communication, which needs to share the same key. Usually, a member of the system selects a secret key first, and then transmits it to another member or other members. X9.17 standard describes two kinds of keys: key encryption key and data key. Key encryption key encryption is other keys that need to be distributed; The data key only encrypts the information stream. Key encryption key is usually distributed by hand. In order to enhance the confidentiality, the key can be divided into many different parts and sent out in different channels
(3) verify the key
the key is attached with some error detection and correction bits for transmission. When an error occurs in the key transmission, it can be easily detected, and if necessary, the key can be retransmitted
the receiver can also verify whether the received key is correct. The sender encrypts a constant with the key, and then sends the first 2-4 bytes of the ciphertext together with the key. At the receiving end, do the same work. If the decrypted constant of the receiving end can match the constant of the sending end, the transmission is correct
(4) update key
when the key needs to be changed frequently, it is really difficult to distribute new keys frequently. An easier solution is to generate a new key from the old key, sometimes called key update. One way functions can be used to update the key. If both sides share the same key and operate with the same one-way function, they will get the same result
(5) key storage
key can be stored in brain, magnetic stripe card and smart card. The key can also be divided into two parts, half stored in the terminal, half stored in the ROM key. The key which is hard to remember can also be encrypted and saved by a method similar to key encryption key
(6) backup key
key can be backed up by key escrow, secret partition, secret sharing, etc
the simplest way is to use a key escrow center. Key escrow requires all users to give their own keys to the key escrow center, and the key escrow center will back up and keep the keys (such as locking them in a safe somewhere or encrypting them with the master key). Once the user's key is lost (such as the user forgets the key or the user dies accidentally), according to certain rules and regulations, The user's key can be obtained from the key escrow center. Another backup scheme is to use smart card as temporary key escrow. For example, Alice stores the key in the smart card and gives it to Bob when Alice is away. Bob can use the card to do Alice's work. When Alice comes back, Bob returns the card. Because the key is stored in the card, Bob doesn't know what the key is
Secret segmentation divides a secret into many pieces. Each piece does not represent anything, but if these pieces are put together, the secret will reappear
a better way is to use a secret sharing protocol. The key K is divided into n blocks, and each part is called its "shadow". Knowing that any m or more blocks can calculate the key K, knowing that any M-1 or less blocks can not calculate the key K, this is called (m, n) threshold (threshold) scheme. At present, many secret sharing schemes are proposed based on Lagrange interpolation polynomial method, projective geometry, linear algebra and Sun Tzu theorem
Lagrange interpolation polynomial scheme is an easy to understand secret sharing (m, n) threshold scheme
Secret Sharing solves two problems: first, if the key is accidentally or intentionally exposed, the whole system will be vulnerable to attack; Second, if the key is lost or damaged, all the information in the system can not be used
(7) key validity
the encryption key cannot be used indefinitely for the following reasons: the longer the key is used, the greater the chance of its leakage; If the key is leaked, the longer the key is used, the greater the loss; The longer the key is used, the more attractive it will be for people to spend their energy to decipher it; Cryptanalysis of multiple ciphertexts encrypted with the same key is generally easier
different keys should have different validity periods
the validity period of data key mainly depends on the value of data and the amount of encrypted data in a given time. The higher the value and data transfer rate, the more frequent the key change
key encryption keys do not need to be changed frequently because they are only used occasionally for key exchange. In some applications, the key encryption key is changed only once a month or a year
the encryption key used to encrypt and save data files cannot be changed frequently. Usually, each file is encrypted with a unique key, and then all the keys are encrypted with the key encryption key. The key encryption key is either remembered or stored in a safe place. Of course, losing the key means losing all the file encryption keys
the validity period of the private key in the application of public key cryptography varies according to different applications. The private key used for digital signature and identification must last for several years (even for life), and the private key used for coin toss protocol should be destroyed immediately after the protocol is completed. Even if the security of the key is expected to last for a lifetime, it is necessary to replace the key every two years. The old key still needs to be kept secret in case the user needs to verify the previous signature. However, the new key will be used as a new file signature to rece the number of signature files that can be attacked by cryptoanalysts
(8) destroy the key
if the key must be replaced, the old key must be destroyed and the key must be physically destroyed
(9) key management of public key
public key cryptography makes key management easier. No matter how many people are on the network, everyone has only one public key
using a public / private key pair is not enough. Any good implementation of public key cryptography needs to separate the encryption key from the digital signature key. But a single pair of encryption and signature keys is not enough. Like an ID card, a private key proves a relationship, while a person has more than one relationship. For example, Alice can sign a document in her personal name, vice president of the company, etc.
iPhone x battery scalding fault cases
iPhone x battery scalding fault cases
Where did the well-known digital bloggers get the real experience of using the machine? The feedback content is roughly as follows: when I just posted that microblog, my iPhone x began to burn for no reason, and the temperature was getting higher and higher, I can feel the temperature rising through the protective cover. It's a little hot when I take it off and touch my back. I quickly shut it down and restart it. Now the temperature is normal. I don't know if this is the reason for the IOS update or the problem with iPhone X
the same problem is also mentioned in the comments of bloggers: especially when playing "King's glory", it can be described as "extremely hot". There are also problems such as "long press skill to cut the screen" and "flash back to the desktop". In addition, this problem also exists when using tmall and fast charge. There are also complaints about the green around the screen and the serious lack of battery life
why does the iPhone x get hot
some people think it's the problem of IOS system, some think it's the problem of stacking technology of camera motherboard and processor, and some think it's related to Google. For these explanations, they are not specific enough and too objective. Xiao Bian thinks that the reason why the iPhone is hot and hot is like this. It's normal for the iPhone to get hot seriously. Because of the L-type battery, many components are jammed together, and the heat dissipation of the glass body is not good, so it will get hot. In addition, the thermal conctivity of the glass is not good, so the longer it is used, the more heat is accumulated. However, x will rece the frequency of intelligent control of heating, if the heating is very serious, it is recommended to play cold later
why does the iPhone x get hot
in addition, according to netizens' feedback, the battery power consumption of iPhone x is also very fast. The main points of user experience are as follows:
1. When the weather is hot, it will be hot and the screen brightness will be dim
2, the is critical, fever is too laggy.
3. A little video chat will get hot, mainly in the rear camera
4. If you beat the king's glory or eat chicken, you get a high fever. I'm afraid of explosion. This iPhone x is really ordinary. It would crash before, but now it can't make a phone call occasionally
why does the iPhone x get hot
for how to thoroughly solve the problem of iPhone x fever, Xiaobian's suggestion is: the main reason for iPhone x fever is the internal structure design problem. The best answer is to use the mobile phone as little as possible and pay more attention to battery maintenance at ordinary times. Mobile phone battery aging phenomenon is serious, you can consider to replace the mobile phone battery. Of course, we can also pay attention to Apple's official news in real time. Can we alleviate the problem of iPhone X's hot and hot by upgrading the system? You can wait until the local apple repair point for repair service with your warranty card and purchase invoice.
some studies have shown that when people are in social interaction, they have different perception and understanding, Opinion taking will make people feel less fair in social interaction, and they are more self-centered when they take action than when they don't. That is to say, when we consider other people's thoughts with viewpoint selection, we will think that others are selfish and unfair, so we are more self-centered. Think about this phenomenon in our real life. When we think that others are selfish, our psychology will inevitably be unbalanced. We also want to be selfish. Therefore, there are two kinds of situations. Some people choose not to be selfish because of their heavy superego. Others will be affected by this kind of cognition, And choose to be self-centered. In this way, opinion taking has two functions: one is to promote cooperation and be more considerate of others; the other is to make people think more about themselves and deal with problems more selfishly. This kind of cognitive process seems to be a little complicated, but it can be seen everywhere in life. But we can also choose to choose the content, to choose other people's good point of view, to choose other people's malicious point of view, I think the result is not the same. A gentleman is honest, but a villain is sad. Maybe I'm used to looking at the world with a kind eye. I believe there are many good people in the world, and I think others are simple and beautiful. When my elder martial sister introced such a view, I understood the previous confusion. My friends and I don't understand why some people are complicated and some people are so selfish. Maybe they think the world is very complicated and dark. Is it a kind of self-protection? In order not to be hurt, they also choose to be self-centered.
(1) From the point of view of Botany, it is not pulp, but a layer of membrane outside the fruit, which should be called aril Nanzhou June litchi pill (2): views on things or problems formed from certain class interests
in social interaction, people's sense of social justice will be reced by opinion taking, and they are more self-centered when they actually take action than when they don't. That is to say, when we consider other people's thoughts with viewpoint selection, we will think that others are selfish and unfair, so we are more self-centered
think about this phenomenon in our real life. When we think that others are selfish, our psychology is inevitably unbalanced, and we also want to be selfish. Therefore, there are two kinds of situations. Some people choose not to be selfish because of their heavy superego. Others will be affected by this kind of cognition, And choose to be self-centered. In this way, opinion taking has two functions: one is to promote cooperation and be more considerate of others; the other is to make people think more about themselves and deal with problems more selfishly< br />
