return

Blockchain encryption technology: an important technological innovation in the field of financial technology;

Maintaining a growing chain, it is only possible to add records, and the records that have occurred can not be tampered; decentralized, or multi-centered, can achieve consensus without centralized control, and achieve as much distribution as possible; through cryptography Mechanisms to ensure that transactions cannot be denied and destroyed, and to protect the privacy of user information and records.

Our plan

    • Hash uniqueness

      In the blockchain, each block and hash are in one-to-one correspondence, and each hash is calculated by the block header through sha256. Because the block header contains the hash of the current block and the hash of the previous block, if the current block content changes or the previous block Hash changes, it will definitely cause the current block Hash to change. If someone modifies a block, the block HashIt has changed.
    • Cryptographic security

      In the case of Bitcoin, digital currency uses asymmetric encryption. All data storage and records have digital signatures as credentials. Asymmetric encryption ensures the reliability of payment.
    • Authentication

      In a digital currency transaction, a data transfer from one address to another verifies it: - Hash of the previous transaction (the origin of the verification currency) - the address of both parties of the transaction - the public key of the payer - the digital signature generated by the private key of the payment method
    • Decentralized distributed design

      For the blockchain, the book data is all publicly disclosed or partially disclosed. It emphasizes that there are multiple copies of the book data, and there is no risk of data loss. The solution currently used in the blockchain is fully distributed storage. There are many in the network. All nodes, synchronize all the book data (some synchronization parts, of course, there are enough copies of each data storage), so that there are enough copies in the network to meet the high availability requirements, and the risk of losing data is much lower.
    • Transmission security

      During the transmission process, the data has not been persisted. This part of the air data will be processed by HTTP+SSL (also using websocket+websocketS) to ensure that the data is tamper-proof and encrypted during network transmission.