Can digital currency wallets be developed
Recently, Huawei and tpcast jointly completed the instry's first cloud VR service verification under 5g experimental network, realizing real-time cloud rendering of interactive CG (computer graphics) VR content, which is a revolutionary progress in the history of VR instry
from last year to this year, Huawei cloud seems to have sprung up. We can always see Huawei cloud's achievements in the media
according to the data on Huawei's official cloud website, Huawei released its cloud strategy in 2010, and then officially released its cloud operating system fusionsphere after three years, and there has been no substantial progress in the next four years. It was not until Xu Zhijun, vice chairman and CEO of Huawei, announced the establishment of cloud Bu ring the Huawei China ecological partnership conference in March 2017 that Huawei began to make full use of cloud computing and achieved rapid development
it can be said that Huawei cloud really started in 2017, which is quite late in the highly competitive cloud computing market, but the rapid progress of Huawei cloud is obvious to all, isn't it surprising for many people
coincides with the critical period of instry upgrading
public cloud has been developing for ten years in the world, and the first batch of customers are mainly Internet enterprises. In this generation of public cloud, Amazon, Microsoft and Alibaba have obvious advantages. But at present, two changes have taken place in the market: first, more customers of traditional enterprises or government agencies begin to migrate to the cloud, transforming the traditional architecture with cloud computing, big data and artificial intelligence technologies, and enjoying the dividends of these new technologies. Second, the last generation of public cloud has been developing for ten years, and the technology and architecture are facing upgrading. Especially with the help of a new round of artificial intelligence tide, it is the general trend for enterprises to go to the cloud, and creating cloud ecology has become the top-level construction goal of the cloud instry
It has such instry-leading data processing capabilities, but it does not touch data, which includes three sentences: the first sentence: Huawei does not use technical means to obtain customer data in the background, and recognizes the data sovereignty of the enterprise; The second sentence: Huawei does not commercialize customers' data and will never force enterprises to exchange data with Huawei; The third sentence: Huawei will open up its cloud and big data capabilities to help enterprises process data and give full play to the value of dataas we all know, the data on the public cloud is the most sensitive topic in the whole instry. Huawei has been emphasizing "don't touch data" since its first day. Under the guidance of this strategic idea, Huawei has won the trust of a large number of partners in a short time. By the end of 2017, Huawei cloud had nearly 2000 ecological partners. With the help of so many partners, it is impossible for Huawei cloud to be strong
"action group" corporate culture
people who know Huawei all know that this company is a typical "action group": if you don't do what you want to do, you have to do it, do it with all your strength, do the best, and do it to an incomparable degree. This is true of Huawei's enterprise business and Huawei's consumer business, which have continued to rise in recent years. Now it's Huawei's turn to cloud business
in any instry, it is the doers who really decide the direction of the instry, which is exactly where Huawei's culture lies. Huawei cloud Bu has been formally established for just one year, which not only shows its strength and sincerity to the instry, but also shows its low-key, pragmatic and honest attitude
on December 17, 2017, Huawei cloud and Tuowei Information System Co., Ltd. established cooperation to build nine public cloud instry solutions for the government and enterprises based on Huawei cloud; On January 27, 2018, Huawei cloud and UFIDA cloud jointly released four general enterprise services: Marketing cloud, collaboration cloud, tax cloud and U8 cloud; In February 2018, Huawei cloud officially released the deep learning service and blockchain service BCS; On March 15, 2018, Huawei cloud announced the opening of a Hong Kong data center to help enterprises reach the world and innovate in the future
the data shows that the number of Huawei cloud services has increased from 45 in 10 categories at the end of 2016 to more than 100 in 14 categories at present, including more than 60 solutions such as manufacturing, healthcare, EI enterprise intelligence, e-commerce, sap, HPC high performance computing, IOT, etc. Since the establishment of cloud Bu, the number of users and resource usage of Huawei cloud have increased three times
according to the market report from IDC, Huawei's cloud government cloud solutions are among the leading manufacturers in China's Government cloud market; Fusioncloud's private cloud solution ranks first in China
1. Security risk of running environment
the core file of encrypted digital currency Wallet - private key / mnemonics is stored on the terminal device, whether it is PC or mobile terminal, if the terminal device appears unsafe phenomenon, it has a very high security risk for private key / mnemonics
at the beginning of design, a secure digital wallet can avoid the possibility of private key / mnemonics being stolen e to the running environment. The security problems of the running environment on the terminal mainly include virus software, operating system vulnerabilities and hardware vulnerabilities
2. The security risk of network transmission
the security of network transmission is more reflected in the ability to resist man in the middle attack. Man in the middle attack means that the attacker creates independent contact with both ends of the communication and exchanges the data they receive, so that both ends of the communication think that they are talking directly with each other through a private connection, but in fact the whole conversation is completely controlled by the attacker
although most digital wallet applications use the HTTPS protocol to communicate with the server, the man in the middle attack method is to get the content of the HTTPS protocol by installing a digital certificate in the user terminal
a secure digital wallet needs to be able to scan the legality of all the digital certificates in the terminal, check the proxy settings in the network transmission process, and ensure the security of the basic network communication environment
in the development of digital wallet, whether to use two-way verification for communication verification at the network transmission level is also an important criterion to measure the security of a digital wallet application
3. The security risk of file storage mode
for the private key / mnemonics of digital wallet, the storage mode of terminal device also needs to be paid attention to in the security design. The access right of private key / mnemonic file directory, the form of private key / mnemonic file storage and the design of encryption algorithm all need to be strictly designed
when we analyze the security of several mainstream digital wallets, we find that even the well-known digital wallets are random in the storage of private key / mnemonic words. There are both plaintext storage and encrypted storage, but the decryption key is fixed in the code, which can not play any role in security defense
4. The security risk of the application itself
the security risk of the application itself mainly focuses on the security defense of the application installation package itself
whether the application installation package has the ability of anti tampering is a very core technical ability. In addition, memory security, anti debugging ability, life cycle management of private key / mnemonics, security of debugging log and security of development process also need to be enhanced
5. Security risk of data backup
if the mobile application can be backed up, it can use the machine with more powerful computing performance to brutally crack the private key / mnemonics. For example, if android:allowBackup Property is set to allow backup, then the backup mechanism of the system can be used to back up the application data files, and the private key / mnemonics of the encrypted digital currency will be backed up to the external media, which breaks the security boundary design of the operating system from another direction
for the majority of users, the security of digital wallet also means the security of wealth, so we must be careful when choosing digital wallet.
Why develop digital currency? From the perspective of the central bank, there are six advantages:
first, to improve the convenience and transparency of economic transactions; second, to rece the high cost of the issuance and circulation of traditional paper money; third, to better support economic and social development; fourth, to help the comprehensive realization of Inclusive Finance; fifth, to rece money laundering, to promote the development of the economy and society Sixth, improve the central bank's control over money supply and circulation
steps of digital currency development:
the first step,
first, we need to download the source code of a blockchain system from git, such as choosing the backbone code of bitcoin to download the relevant source code
At the same time, prepare the corresponding compiling environment (c + + is recommended in Linux) and install the corresponding development environment and toolsthe second step and
code all need to be compiled, so you need to prepare the compilation environment and tools, download the environment compilation tools, configure
system environment variables, QT environment and other files, and compile commands are described in detail in the files in ITC source code
however, the construction of the system and development environment, program compilation and other processes are cumbersome, so it is not recommended for ordinary users to make their own. For developers, it may take 2-3 days to install and configure for the first time
the third step,
take bitcoin development as an example, it is the development environment of Q. after downloading the source code and configuring the environment, open the source code of the bitcoin core in qtcreator, configure relevant files and compilers, and start to try to compile the client of the bitcoin core
Step 4,
transform into your own digital currency, open each source file, find the corresponding local adjustment parameters, such as adjusting
the number of coins in each block, the total output, the adjustment difficulty, and so on. Then the most critical point is to change the name to your own currency
name as you want, and don't forget to replace the related icons in the resource folder. If all goes well, after re compiling, your new coin will be invented successfully
for the development of this digital currency, the technology is relatively professional, so it is better to have a professional team to assist
framework for digital currency development:
1. Build ethereum private chain test environment and public chain node environment configuration
2. Ethereum transaction and confirmation principle
3. Ethereum JSON RPC interface
4. Ethereum transfer and withdrawal principle
5. The server connects Ethereum public chain interface, and its own server stores business data, Public chain storage transaction anonymous data
6, private key security processing
the following is the development code example:
for example, the common digital currency wallets in the market are:
app class: kcash Imtokenweb: myethereumwallet Google browser plug-in: metamask
one of the most commonly used is imtoken
blockchain transaction technology concept:
let's take a look at how blockchain transaction is handled with bitcoin as an example. In order to send a certain amount of bitcoin to another wallet, you need the following information: the address to send the funds to your wallet, the amount of cryptocurrency you want to send
the ID of the recipient's wallet
each transaction is signed with a unique confidential private key. Once the payment is signed by the sender, it becomes publicly available. The transaction still needs to be confirmed so that the payee can get the money. In order to confirm the transaction, it is necessary to generate a new chain block
these blocks are generated by complex mathematical calculation to find the unique key. It takes 10 minutes to create a new block, and the person who finds the key gets a certain amount of coins as a reward. Once a new block of the chain is created, it is not possible to remove it from the database or change the information in some way. Therefore, blockchain transaction is final and irreversible
three core advantages of digital currency:
first, digital currency is a fair currency
digital currency has no specific issuing institution, is not issued by a country, only depends on a specific algorithm, which means that digital currency can not be manipulated by manipulating the number of issues, so digital currency is a free, non-state currency
we can see that there are many countries that directly recognize the virtual currency, so if there is a demand, it needs a trading platform
many investors who want to build a virtual currency trading platform now, why can't they go to these areas to build a trading platform? Building a virtual currency trading platform is a good business opportunity, isn't it
Second, the security factor of digital currency is higher.
although the emergence of paper money facilitates the transactions in our daily life, there are risks of being stolen and received. Although e-money can avoid these risks, there will be new problems such as theft and swiping
digital currency can avoid the above problems. And broadcast every transaction record on the network. Yes, all nodes save all the currency circulation information, so that any node can easily find the currency circulation before the transaction
Thirdly, the transaction of digital currency can realize anonymous transaction. Although you can query the flow information of each account according to the local complete transaction recordsbut we can't know who the owner of this account is, and no one has the ability to manipulate the digital currency on other people's accounts, which protects the privacy of users
if you also hold trading digital currency, foreign exchange gold, crude oil, contract Futures: