Различия
Показаны различия между двумя версиями страницы.
| Предыдущая версия справа и слеваПредыдущая версияСледующая версия | Предыдущая версия | ||
| en:startpage [2023/10/03 10:14] – anel | en:startpage [2024/04/30 06:52] (текущий) – anel | ||
|---|---|---|---|
| Строка 1: | Строка 1: | ||
| - | ====== | + | ====== |
| - | ===== Connectivity Options | + | ===== Knowledge base ===== |
| + | |||
| + | **H2K service ** is a [[en: | ||
| + | |||
| + | H2K includes a unique technology with a well-thought-out security system that corresponds to [[en: | ||
| Our team has successfully developed both a web version and a mobile application of the H2K service, providing clients with the flexibility to utilize these tools based on their level of experience in blockchain technologies. | Our team has successfully developed both a web version and a mobile application of the H2K service, providing clients with the flexibility to utilize these tools based on their level of experience in blockchain technologies. | ||
| Строка 9: | Строка 13: | ||
| ---- | ---- | ||
| - | |||
| - | **H2K service ** is a [[en: | ||
| **Service Components**: | **Service Components**: | ||
| Строка 22: | Строка 24: | ||
| ---- | ---- | ||
| - | ===== The relevance ===== | + | The solution significantly expands the capabilities of smart contracts, providing access to real-world data and autonomous computations while maintaining the security and reliability guarantees inherent to blockchain technology. |
| - | - Increasing interest | + | Service clients have the ability to verify the funds in their wallets without the need for obligatory interaction |
| - | - Transition of many financial services to crypto assets; | + | **We do not have access to clients' |
| - | - Need for conducting cross-border payments. | + | |
| - | + | ||
| - | Due to the spread of crypto assets, new solutions are required for easy access to the blockchain and secure transaction processing. | + | |
| - | + | ||
| - | + | ||
| - | In the modern world of crypto assets, there are **2 main** issues that stand out: | + | |
| - | * Preserving the [[en: | + | |
| - | * Distributing access to the secret key among potential | + | |
| ---- | ---- | ||
| - | The project' | + | =====Functionality of H2K===== |
| - | The solution significantly expands the capabilities | + | ^ Functionality |
| + | | Supported Blockchains and Tokens: H2K provides full coverage of the Bitcoin (BTC) blockchain, Polygon and supports the TRON and ETH blockchains, | ||
| - | [[en: | + | **Signature verification and collection** |
| - | {{ : | + | In H2K, the wallet' |
| To create a transaction, | To create a transaction, | ||
| Строка 49: | Строка 44: | ||
| - A generated BB key pair using the elliptic curve method, with the public key shared with the participant. | - A generated BB key pair using the elliptic curve method, with the public key shared with the participant. | ||
| - | ---- | + | {{ : |
| - | =====Functionality of H2K===== | + | |
| - | ^ Functionality of H2K ^^^ | + | The signing sequence is as follows: first, wallet co-signers provide their signatures. Once the minimum number of signatures is reached, the owner of the wallet' |
| - | | Supported Blockchains and Tokens: H2K provides full coverage of the Bitcoin (BTC) blockchain and supports the TRON and ETH blockchains, including tokens such as TRX, ETH, and USDT (TRC-20, ERC-20). In the near future, we plan to add support for other tokens.| Convenience: | + | |
| - | ---- | + | **Security** |
| - | ====Signature verification | + | **The main security principle** is the complete isolation of processes involving wallet creation, wallet key generation, |
| - | The [[en: | + | **The key system and security** revolve around the secure isolated data storage of Black Box. It is located in the DMZ (Demilitarized Zone) and operates according |
| - | After successful verification by BB, the transaction is sent to the network. | + | |
| - | Successful verification criteria: | + | The H2K server in the DMZ has tightly restricted access privileges, preventing employees from stealing private wallet keys. |
| - | + | Electronic signatures from wallet participants are generated by the Safina application server and then transmitted to Black Box for inclusion in wallet | |
| - | - The minimum required number of signatures is collected. | + | |
| - | - The signature of the wallet | + | |
| ---- | ---- | ||
| - | * [[en: | ||
| - | * [[en: | ||
| - | |||
| - | * [[en: | ||
| - | |||
| - | ---- | ||
| [[https:// | [[https:// | ||
| Строка 82: | Строка 66: | ||
| [[https:// | [[https:// | ||
| - | |||
| - | [[https:// | ||
| [[https:// | [[https:// | ||
| - | |||
| - | [[https:// | ||
| [[https:// | [[https:// | ||
| - | |||
| - | [[https:// | ||