Position: Home page » Currency » Is wallet the same as digital currency

Is wallet the same as digital currency

Publish: 2021-04-27 04:35:49
1.

1、 Different monetary attributes

1. digital currency:

digital currency belongs to legal tender

2. Wechat:

wechat belongs to the third-party payment instrument

3, Alipay:

Alipay belongs to the third party payment tool. p>

2. Different issuers

1. Digital currency:

the issuer of digital currency is the central bank

2. Wechat:

the clearing Party of wechat is a commercial bank

3, Alipay:

Alipay's settlement party is commercial bank. p>

extended data

in the third-party payment mode, the buyer uses the account provided by the third-party platform to pay for the goods (to the third party), and the third party notifies the seller of the arrival of the goods and requires delivery; After receiving the goods, inspecting the goods and confirming, the buyer shall notify the third party for payment; The third party transfers the money to the seller's account

digital currency can be considered as a virtual currency based on node network and digital encryption algorithm. The core characteristics of digital currency are mainly reflected in three aspects:

1. Due to some open algorithms, digital currency has no issuing subject, so no one or organization can control its issuing

Because the number of algorithm solutions is determined, the total amount of digital currency is fixed, which fundamentally eliminates the possibility of inflation caused by the overuse of virtual currency

3. Because the transaction process needs the approval of each node in the network, the transaction process of digital currency is safe enough

2.

The digital currency wallet is the hardware wallet, which means that the private key of digital assets is stored in a single chip, isolated from the Internet, plug and play. Hardware wallet can't guarantee 100% security. For example, if a geek gets your hardware wallet and doesn't know your private key, it may be cracked by violence. It's just one of the safest storage methods compared to other storage methods

many block chain entrepreneurs at home and abroad are optimistic about the development of this field, so they begin to build more hardware wallets. In the case of the exchange being stolen a lot of money and the software wallet being stolen from time to time, many investors regard the hardware wallet as the last moat

extended information:

whether the hardware wallet is safe

the hardware wallet can not guarantee 100% security. For example, if a geek obtains your hardware wallet, it may be cracked violently even if it doesn't know your hardware wallet immediately. It's just one of the safest storage methods compared to other storage methods

of course, there are exceptions, such as you have unlimited brain power and never forget. It's better to save it anywhere than in your own mind

3.

Digital assets and digital currency are not the same thing

Digital assets refer to the non monetary assets owned or controlled by enterprises or indivials in the form of electronic data and held in daily activities for sale or in the process of proction. The emergence of digital assets benefits from office automation, digital assets rely on the development of electronic payment system, its prospects are predictable

2. Digital currency

digital currency refers to the digitization of currency. Digitization doesn't mean scanning. This is just like digital signature. Digital signature does not mean scanning your signature into a digital image, or using the touchpad to obtain the signature, let alone your signature

digital currency is often mistaken for virtual currency. But virtual currency refers to non real currency. For example, when you play "Three Kingdoms" (game) or "grand Voyage", you have money, and that money is virtual. Of course, the virtual money will also have its real value

for example, if you buy her / his account from another player, you can get all the virtual assets of that player, and then it will be much easier for you to continue playing. Virtual money is not necessarily digital. For example, children play games with pebbles as virtual currency

extended data

characteristics of digital assets:

1. High price. Because these application software with special purpose is specially developed for a specific work, its cost is relatively high, and its price is not lower than the price of fixed assets of factory buildings

(2) strong attachment. Application software must be supported by computer hardware and system software in order to play its role

3. Strong interaction. Even the simplest application software also has some interactive functions, such as the error prompt to the operator, which is the most basic advantage of IT instry procts

The quantity is infinite. Digital assets as assets are scarce (because not all enterprises or indivials can create digital assets), but its supply can be unlimited. However, tangible assets are always limited e to the limitation of property and storage space

Cost decreasing. The proction cost of tangible assets is positively proportional to the proction quantity

References:

Network: digital assets

Network: digital currency



4. It's a tool for managing and using digital currency.
5.

the functions and properties of digital currency are exactly the same as paper money, but its form is digital Mu Changchun, director of the digital currency Research Institute of the central bank, said that the central bank's digital currency is a digital alternative to paper money, that is, digital currency and electronic payment tools. If we regard the digital currency issued by the central bank as digital RMB cash, we can understand the concept of digital currency very well

Mu Changchun once described such a use scenario: as long as you and I have DC / EP digital wallets on mobile phones, we don't even need the network. As long as the mobile phone has electricity and two mobile phones touch each other, we can transfer the digital currency in one person's digital wallet to another person. Digital money does not need to bind any bank account when it is paid, unlike WeChat and Alipay bank. p>

fan Yifei, vice governor of the central bank, said that the central bank's digital currency focuses on replacing M0 (i.e. banknotes and coins), and maintains the properties and main features of cash, which meets the needs of portability and anonymity, and will be the best tool to replace cash

{rrrrrrr}

extended materials

Digital RMB will be carried out in Beijing, Tianjin and Hebei and other places

the notice on printing and distributing the overall plan for comprehensively deepening the innovation and development of service trade was released on the official website of the Ministry of Commerce on the 14th, which announced the pilot areas of digital RMB

the reporter noted that Article 93 "comprehensively deepen the pilot tasks, specific measures and division of responsibilities for innovative development of trade in services" proposes to carry out digital RMB pilot projects in Beijing Tianjin Hebei, Yangtze River Delta, Guangdong, Hong Kong, Macao and other pilot areas in central and Western China

according to the notice, the people's Bank of China has formulated policy safeguard measures; First, Shenzhen, Cheng, Suzhou, xiong'an new area and other relevant departments of the future Winter Olympic Games scene will assist in the promotion, and then expand to other regions as appropriate

the pilot areas for comprehensive deepening are Beijing, Tianjin, Shanghai, Chongqing (21 municipal districts including Fuling District), Hainan, Dalian, Xiamen, Qing, Shenzhen, Shijiazhuang, Changchun, Harbin, Nanjing, Hangzhou, Hefei, Jinan, Wuhan, Guangzhou, Cheng, Guiyang, Kunming, Xi'an, Urumqi, Suzhou, Weihai, xiong'an New District of Hebei, Gui'an New District of Guizhou Shaanxi Xixian new area and other 28 provinces and cities (regions)

6.

Recently, Huawei and tpcast jointly completed the instry's first cloud VR service verification under 5g experimental network, realizing real-time cloud rendering of interactive CG (computer graphics) VR content, which is a revolutionary progress in the history of VR instry

from last year to this year, Huawei cloud seems to have sprung up. We can always see Huawei cloud's achievements in the media

according to the data on Huawei's official cloud website, Huawei released its cloud strategy in 2010, and then officially released its cloud operating system fusionsphere after three years, and there has been no substantial progress in the next four years. It was not until Xu Zhijun, vice chairman and CEO of Huawei, announced the establishment of cloud Bu ring the Huawei China ecological partnership conference in March 2017 that Huawei began to make full use of cloud computing and achieved rapid development

it can be said that Huawei cloud really started in 2017, which is quite late in the highly competitive cloud computing market, but the rapid progress of Huawei cloud is obvious to all, isn't it surprising for many people

coincides with the critical period of instry upgrading

public cloud has been developing for ten years in the world, and the first batch of customers are mainly Internet enterprises. In this generation of public cloud, Amazon, Microsoft and Alibaba have obvious advantages. But at present, two changes have taken place in the market: first, more customers of traditional enterprises or government agencies begin to migrate to the cloud, transforming the traditional architecture with cloud computing, big data and artificial intelligence technologies, and enjoying the dividends of these new technologies. Second, the last generation of public cloud has been developing for ten years, and the technology and architecture are facing upgrading. Especially with the help of a new round of artificial intelligence tide, it is the general trend for enterprises to go to the cloud, and creating cloud ecology has become the top-level construction goal of the cloud instry

It has such instry-leading data processing capabilities, but it does not touch data, which includes three sentences: the first sentence: Huawei does not use technical means to obtain customer data in the background, and recognizes the data sovereignty of the enterprise; The second sentence: Huawei does not commercialize customers' data and will never force enterprises to exchange data with Huawei; The third sentence: Huawei will open up its cloud and big data capabilities to help enterprises process data and give full play to the value of data

as we all know, the data on the public cloud is the most sensitive topic in the whole instry. Huawei has been emphasizing "don't touch data" since its first day. Under the guidance of this strategic idea, Huawei has won the trust of a large number of partners in a short time. By the end of 2017, Huawei cloud had nearly 2000 ecological partners. With the help of so many partners, it is impossible for Huawei cloud to be strong

"action group" corporate culture

people who know Huawei all know that this company is a typical "action group": if you don't do what you want to do, you have to do it, do it with all your strength, do the best, and do it to an incomparable degree. This is true of Huawei's enterprise business and Huawei's consumer business, which have continued to rise in recent years. Now it's Huawei's turn to cloud business

in any instry, it is the doers who really decide the direction of the instry, which is exactly where Huawei's culture lies. Huawei cloud Bu has been formally established for just one year, which not only shows its strength and sincerity to the instry, but also shows its low-key, pragmatic and honest attitude

on December 17, 2017, Huawei cloud and Tuowei Information System Co., Ltd. established cooperation to build nine public cloud instry solutions for the government and enterprises based on Huawei cloud; On January 27, 2018, Huawei cloud and UFIDA cloud jointly released four general enterprise services: Marketing cloud, collaboration cloud, tax cloud and U8 cloud; In February 2018, Huawei cloud officially released the deep learning service and blockchain service BCS; On March 15, 2018, Huawei cloud announced the opening of a Hong Kong data center to help enterprises reach the world and innovate in the future

the data shows that the number of Huawei cloud services has increased from 45 in 10 categories at the end of 2016 to more than 100 in 14 categories at present, including more than 60 solutions such as manufacturing, healthcare, EI enterprise intelligence, e-commerce, sap, HPC high performance computing, IOT, etc. Since the establishment of cloud Bu, the number of users and resource usage of Huawei cloud have increased three times

according to the market report from IDC, Huawei's cloud government cloud solutions are among the leading manufacturers in China's Government cloud market; Fusioncloud's private cloud solution ranks first in China

7. Safe and reliable digital wallet should be designed from at least five dimensions:
1. Security risk of running environment
the core file of encrypted digital currency Wallet - private key / mnemonics is stored on the terminal device, whether it is PC or mobile terminal, if the terminal device appears unsafe phenomenon, it has a very high security risk for private key / mnemonics
at the beginning of design, a secure digital wallet can avoid the possibility of private key / mnemonics being stolen e to the running environment. The security problems of the running environment on the terminal mainly include virus software, operating system vulnerabilities and hardware vulnerabilities
2. The security risk of network transmission
the security of network transmission is more reflected in the ability to resist man in the middle attack. Man in the middle attack means that the attacker creates independent contact with both ends of the communication and exchanges the data they receive, so that both ends of the communication think that they are talking directly with each other through a private connection, but in fact the whole conversation is completely controlled by the attacker
although most digital wallet applications use the HTTPS protocol to communicate with the server, the man in the middle attack method is to get the content of the HTTPS protocol by installing a digital certificate in the user terminal
a secure digital wallet needs to be able to scan the legality of all the digital certificates in the terminal, check the proxy settings in the network transmission process, and ensure the security of the basic network communication environment
in the development of digital wallet, whether to use two-way verification for communication verification at the network transmission level is also an important criterion to measure the security of a digital wallet application
3. The security risk of file storage mode
for the private key / mnemonics of digital wallet, the storage mode of terminal device also needs to be paid attention to in the security design. The access right of private key / mnemonic file directory, the form of private key / mnemonic file storage and the design of encryption algorithm all need to be strictly designed
when we analyze the security of several mainstream digital wallets, we find that even the well-known digital wallets are random in the storage of private key / mnemonic words. There are both plaintext storage and encrypted storage, but the decryption key is fixed in the code, which can not play any role in security defense
4. The security risk of the application itself
the security risk of the application itself mainly focuses on the security defense of the application installation package itself
whether the application installation package has the ability of anti tampering is a very core technical ability. In addition, memory security, anti debugging ability, life cycle management of private key / mnemonics, security of debugging log and security of development process also need to be enhanced
5. Security risk of data backup
if the mobile application can be backed up, it can use the machine with more powerful computing performance to brutally crack the private key / mnemonics. For example, if android:allowBackup Property is set to allow backup, then the backup mechanism of the system can be used to back up the application data files, and the private key / mnemonics of the encrypted digital currency will be backed up to the external media, which breaks the security boundary design of the operating system from another direction
for the majority of users, the security of digital wallet also means the security of wealth, so we must be careful when choosing digital wallet.
8. Pay for a lesson system
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750