Mining strategy of block cloud app
blockchain comprehensive interpretation
when it comes to blockchain, people always compare it with bitcoin. On October 31, 2008, a person named "Nakamoto" sent an email in a cryptography email group, declaring, "I have been studying a new e-cash system, which is completely peer-to-peer and does not need any trusted third party." He launched a new system with bitcoin as the trading currency
I had done a USB mining project before, and the boss cheated a lot of money. It's also working with a lot of big companies.
Development: This article is developed by yuanzhongrui editor / exchange to see the name
Security: digital assets are stored in hot and cold wallets, and multiple authentication ensures the account security
stable: user data is backed up multiple times around the world, and can be recovered immediately in case of failure
specification: the 100% digital currency margin system can timely respond to the withdrawal needs of customers
Service: provide customer service staff to help you solve problems at any time
Technology: continuously update and iterate the system according to the user's needs and opinions on the website and the market
in addition, the platform also needs to have an intelligent data analysis and trading system to provide users with a variety of trading strategies and results analysis, so as to make the transaction more flexible and convenient.
1 Division of mining units of ore deposits generally, ore deposits occupy a large area and have abundant reserves. In order to develop in a planned way, the ore deposits are often divided into several parts (mining units) from large to small according to the occurrence conditions of ore bodies, and are classified into corresponding mining enterprises (proction units) for mining
generally, the distribution range of ore deposits is called mining area, which is usually classified as a Mining Bureau (or company). All deposits in the same geological structure and of the same origin are called ore fields (coal mines are called coalfields). If the mine field is large in scale, it can be divided into several parts, each part is mined by a mine (pit mouth), which is called mine field (Figure 12-1). The boundary of mine field can be artificial boundary or natural boundary. During mining, the mine field must be divided into smaller parts. For inclined seam, the seam is usually divided into several long sections parallel to the strike according to a certain elevation along its inclined direction, which is called stage (or middle section), and the upper and lower interface is called horizontal, such as 0m level and - 50m level (Fig. 12-2). When the stage is small, the mining can be carried out at one time along the whole stage; If the stage area is large, it should be further divided into n mining areas, each mining area along the inclined layout of n mining faces, called section
Fig. 12-8 schematic diagram of roof failure zoning
(according to Beijing Academy of Coal Sciences, 1985)
a-irregular caving; B - rule falling; C-serious fracture; D-general cracking; E - tiny crack; F - caving zone; G-fracture zone; H-overall moving zone; I-fracture zone
1) caving zone: the area where the direct roof splits into pieces and collapses downward. It can be divided into irregular caving section and regular caving section. The rocks in this area are broken and expanded, accumulated and permeable, which can form a channel for the upper groundwater or surface water to pour downward, causing water inrush. Generally, this area is not allowed to develop into the upper strong aquifer or surface water
2) fracture zone: a large number of mining fractures with cut and separated layers appear above the caving zone. The zone can be divided into three sections: serious fracture section, general fracture section and micro fracture section. When the zone reaches the supply water source, the mine water inflow will increase sharply, even cause water inrush
3) overall movement zone of rock stratum: the zone is located above the fracture zone, which is generally characterized by the overall bending deformation or shear displacement of the stratum, or the overall bending and falling in the zone. Generally, there is no fracture and it does not form a water filling channel
there is a certificate generation tool makecert.exe in MS sdk6.0. You can use this tool to generate test certificates
in the first step, a self signed root certificate (issuer) is generated< br />> makecert -n " CN=Root" - R - SV rootissuer.pvk rootissuer.cer
at this time, a prompt box will pop up. First, set the private key protection password for the rootissuer.pvk file
then, enter the password again and use the private key (in the rootissuer.pvk file) to encrypt the public key (in the rootissuer.cer file)
the second step is to use this certificate to issue a sub Certificate (subject)< br />> makecert -n " CN=Child" - IV rootissuer.pvk - IC rootissuer.cer - SV childsubject.pvk childsubject.cer
in this case, a prompt box will pop up to set the protection password for the private key file childsubject.pvk of this sub certificate
then, enter the password of the private key (in childsubject. PVK) of the sub certificate to protect the public key of the sub Certificate (in childsubject. CER)
next, you will be prompted to enter the password of the private key of the root certificate (in rootissuer. PVK) to sign the whole sub Certificate (public key and user information)
if you want to issue more sub certificates, similarly, you can use this certificate to issue further certificates, provided that the childsubject certificate can also be used for issuing (as an issuer)
remarks:
(1) if you need an interactive certificate for secure communication, add the option sky exchange
(2) if you need a signing certificate to sign certificates or binary files, then add the option sky signature.
(3) if you need a client certificate to mark your identity or personal information protection (e-mail), then the E field in option - n is indispensable
examples: - N & quot; CN = company name, e = e-mail address, o = organization name, Ou = organization unit, C = country, s = province (state), P = County & quot< Other auxiliary tools:
1) public key certificate format is converted to SPC. cert2spc.exe
> Cert2spc testroot. Cer testroot. SPC
. SPC means software publisher certificate.
2) combines the public key certificate and the private key into a PFX format certificate file. pvk2pfx.exe
> Pvk2pfx - PVK testroot.pvk - SPC testroot.spc - PFX testroot.pfx
enter the protection password of testroot.pvk to merge. PVK and. SPC files. If you do not set the protection password of testroot.pfx to be merged, the protection password is the same as that of the input file testroot.pvk Note: it's OK to get the CER file directly, but it's not necessary to get the SPC file).
3) signature tool. Signature.exe
binary file digital signature. In order to ensure the integrity of binary file, digital signature is a good method
the following command starts a file signing tool wizard with graphical interface:
& gt; Signtool wizard
the following is the command line signature:
& gt; signtool sign /f " Full path of PFX file & quot/ p " Protection password of PFX file & quot/ t " http://timestamp.verisign.com/scripts/timstamp.dll" / d " Description of this signature & quot& quot; The whole path of the signed program & quot;
