Anti cheating of blockchain
Yibao block chain technology is based on bcos open source platform, which can calculate metadata through sha-512 hash algorithm, timestamp service and pbft consensus algorithm, and flexibly expand alliance chain institutions and nodes. The data stored in the blockchain through easy preservation will be stored on the blockchain in the form of hash value. With the characteristics of decentralized and distributed storage in the blockchain, the authenticity and objectivity of the data can be effectively guaranteed, and tampering can be effectively prevented
Chinese Mahjong: the world's earliest blockchain project
first of all, a initiates an application. I want to play mahjong and set up a mahjong Bureau, which is equivalent to creating a block, and this block will be broadcast to B, C, D, a, B, C, C, C, C, C, D, D, D, D, D, D, D, D, D, D, D, D, D, D, D, D, D, D, D, D, D D...
in the process of playing mahjong, the above four people constantly play cards, which can be understood as mining, through what to mine? Mahjong machine can understand the mineralization machine. These four miners are the so-called miners. These four miners collide from 144 mahjong, and any right card can be Hu card. We can understand the 144 mahjong as a series of hash values (numbers). The process of Hu card is called computational power. Until Hu card, it means that the right hash value is collided and you can get a reward, Each person will pay the corresponding chips to C and put them in the blockchain. The reward is bitcoin or other virtual coins
Why do the other three people take the initiative to reward C? That's because these people have automatically reached a consensus that C has indeed won, and everyone has recorded the account, including the family members who are sitting next to buy horses. It's not good to deny it, otherwise when it comes out that the character is not good, no one will play with him again. After all, the circle is very important
when we reached a consensus, we didn't see any intermediary or third party judging that C had won, and the rewards given to C didn't need to be transferred to C through the third party. All of them were direct point-to-point transactions. This process was decentralization. The card players (miners) recorded their own achievements in the first game, and the third team won the first game, After the record is completed, a complete block is generated. But remember, this is only the first round. In the whole blockchain, this is just a node. The first eight rounds are finished, that is, eight nodes (blocks). Eight blocks are connected together to form a complete account book, which is the blockchain. Because everyone has one account book, it is a distributed account book. The purpose is to prevent someone from tampering with records. In the end, it is clear who wins or loses.
hash function in blockchain is the key to anti tampering, and hash algorithm is a one-way cryptographic mechanism to ensure that transaction information is not tampered in blockchain. After receiving a piece of plaintext, hash algorithm will transform it into a short and fixed hash data in an irreversible way. So block association has but is not limited to tamper proof
2. Quantum secure communication is divided into quantum cryptography communication, quantum teleportation and quantum dense coding. It can be divided into classical communication and quantum communication. The former mainly transmits quantum key, while the latter can be used for quantum teleportation and quantum entanglement distribution. When quantum communication is eavesdropped, although the eavesdropper can't get the information, the communication is interrupted, which affects the normal communication. His anti eavesdropping is at the cost of interrupting the communication, so it doesn't seem as good as the legend.. At present, there are still many unsolved problems in quantum communication, such as short transmission distance, relay difficulty and so on
3. In secure communication, technology competition and complementarity are mutual reference and common development. In secure communication, blockchain should belong to network layer, and quantum communication should belong to physical layer. Therefore, there should be no competition result of who will replace who.
Tencent battery manager will intelligently rece the CPU frequency and keep the minimum power consumption
in normal use, Tencent battery manager will maintain a stable CPU frequency,
keep the best power saving state without affecting the experience; When playing games,
battery manager will give full play to the powerful performance of CPU and improve the fun of playing games.
Cooper takes interest rate swap as an example. Dodd Frank requires both parties to record 140 data fields. However, in the blockchain, other banks can only see specific data points, and they may just display the code of transaction nature and price range
at the same time, the blockchain will store complete transactions, which can only be seen by relevant parties and regulators with monitoring obligations
of course, the most important thing about blockchain is that it can not be tampered with, and the protection of intellectual property rights is very important, such as the recent foreign project of decent, which is a distributed content publishing platform.