安心・安全なCyberVeinウォレット

Trezorエコシステムで、CyberVein資産を完全に安心して管理できます。

  • ハードウェア・ウォレットで保護
  • 互換性のあるホットウォレットと使う
  • 200万人以上のお客様に信頼されています
Trezor Suiteアプリ内のCyberVeinウォレット画面のスクリーンショット – 完全な統合とサポートを表示

CyberVeinをTrezor Suiteアプリでで送信、受信

Trezor Suite アプリはCyberVeinに対応するアプリで、デスクトップ、Web、モバイルで利用できます。
送信&受信

送信&受信

お使いのCyberVeinを、どのウォレットや取引所からでも簡単にTrezorハードウェア・ウォレットへ移動できます。
購入・売却・交換

交換

Trezorハードウェア・ウォレットで資産を移動・保存・保管しましょう。

CyberVeinをサポートするTrezorハードウェア・ウォレット

Trezorをウォレットアプリと同期

CyberVeinを、複数のウォレットアプリと同期させたTrezorハードウェア・ウォレットで管理しましょう。

  • Trezor Suite
  • MetaMask
  • Rabby

対応 CyberVein ネットワーク

  • Ethereum

なぜハードウェア・ウォレットを使うのですか?

Trezorでオフライン管理

  • コインは100%あなたのものです
  • あなたのウォレットはオフラインで100%安全です
  • お客様のデータは100%匿名です
  • あなたのコインはどの会社にも紐付いていません

オンライン取引所

  • 取引所が破綻すると、コインを失うことになります
  • 取引所はハッカーの標的
  • あなたの個人データが漏洩する可能性があります
  • コインを、あなたはまだ完全に自分のものにしていません。

TrezorでCVTを使う方法

1

Trezorを接続

Trezorハードウェア・ウォレットをコンピューターまたはモバイルデバイスに接続し、セットアップ手順に従ってください。
2

Trezor Suiteアプリをインストール

Trezor Suiteアプリをインストール
最高の体験を得るには、Trezor Suiteアプリをダウンロードしてインストールするか、ブラウザでWebアプリを開いてください。
3

お持ちのCVTを送金する

コインを送金する
Trezor Suiteアプリを開き、資産を選択(必要に応じて先に有効化)、「受取」に進み、フルアドレスを表示します。次に、そのアドレスをTrezor本体で確認し、取引所の「送金先」欄にアドレスを貼り付けます。はい、これで完了です!
4

お手持ちのCVTを最大限に活用しましょう

送金が完了したら、CyberVeinTrezor Suiteアプリを使ってTrezorハードウェア・ウォレットで暗号資産を簡単かつ安全に管理CyberVeinできます。

TrezorはあなたのCVTを安全に保護します

CyberVein was founded at the beginning of a world class structure, and is a public link to open to the world. CyberVein is made to integrate the form of data economy in various aspects with the block chain technology as the core. Blockchain is the essence of a variety of technology integration into a State of a synchronous Machine (State Machine), using the characteristics of block chain technology to solve problems which cannot be solved in a traditional network. CyberVein also need to fully consider the model in the process of economics, architecture of applied mathematics, computer hardware and software technology. Its main purpose is to use the block chain technology to successfully serve the problem solving product/platform (BASS).

Through the analysis of the problems encountered in the design process of the existing blockchain technology, we also propose solutions to these problems. CyberVein is a underlying framework based on DAG and contains a programming language, the virtual machine, new smart contracts to build ecological chain system, the underlying blocks dedicated to and from the aspects of technical level and business level to solve the problem from the data value of the information age.

The business logic of CyberVein

  1. The value of passive data: passive data (such as Cookies) is not valuable in itself and only has the value to be exchanged.
  2. Definition of data exchange value: the exchange value of data needs to be defined by carrier and medium, which can be quantified to define data value and realize data transfer.
  3. The ownership of data: data is different from the ownership of the property rights and intellectual property rights. Data ownership is fundamentally to dominate the process of data, it can define the data owner distributing the data in detail, the capability of sharing, and delivered to the other party; At the same time, data ownership can also define the rights of data owners and tripartite users to create, edit, modify, share, and restrict access to data. The three characteristics of CyberVein in the design of deep understanding and mining data can only improve the ecology of data value discovery.

The technical solutions of CyberVein CyberVein has the following technologies and innovative solutions proposed by multiple analysis to realize the design goal of CyberVein. 1.A distributed ledger of DAG architecture. 2.A smart contract programming language improved by CyberVein and a database virtual machine. 3.A new consensus mechanism - PoC (Proof of Contribution) 4.A new, inter-ecological smart contract architecture. On the value of the data found in the process of using a DAG architecture of distributed books and a virtual machine with database functions, anyone can write the database and release smart contracts and Dapp, thus they can develop the data ownership of their value, data exchange format and data conversion function of rules.

CyberVein programming language and virtual machine In order to better achieve our smart contract outstanding performance, there are differences to the existing blockchain smart contracts. CyberVein will be in the development of the network at the same time, develop our own programming language Vein and Virtual Machine CBVM (CyberVein Virtual Machine). Vein language will take the Solidity as the foundation, at the same time, to improve the running mechanism with the help of some rich libraries about database operations, realize functions such as definition method call price. Vein language will help in the existing smart contract writers blockchain migration, and CyberVein will release documents to help developers get started faster. CBVM defines the data value in ecological and metastasis, and provide safe and reliable high-performance smart contracts running environment. CyberVein virtual machine in addition to used to run the smart contract, will also be a database operation system. Unlike traditional database, the database in CBVM sandbox is more like a database, and the operation of each node of the virtual machine will have independent sandbox, ensure data or use condition does not affect chain is affected.

CyberVein new consensus algorithm: Proof of Contribution CyberVein, like all blockchain technology, is driven by motivation of safe mode. In the traditional blockchain mining consensus, it is based on the choice of total difficulty of highest blocks. Miners and others to the blocks. In most of the consensus standards, only containing a given difficulty of work experience (PoW) of blocks are valid. There’s no mining mechanism in the DAG architecture because there is no miner concept. However, the existing DAG in the project before the release unit verification, most are using PoW and CyberVein will use our PoC mechanism is put forward. CyberVein contribution to prove: a response to block in the chain of the abuse of power or force concentrated and algorithm. PoC is based on the user's contribution to the network, add the appropriate hash calculation, to determine whether can win in the competition mechanism in the network. In traditional blockchain PoC can be used in the process of mining. In each have the same hash miners work force, contribute more to the network resources miners (such as he contributed more hard disk capacity, or bandwidth, or power, etc.) will have smaller hash difficulty, so as to have more chance to beat competitors in the probability, acquired the right to the manufacture of new blocks. In the DAG, when a user has more units under the condition of (he contributed more hard disk storage unit in the network), it will be more likely to reference the existing units, and obtain the corresponding fees. IOTA and Byteball projects in PoW validation of the role is mainly used to prevent the witch attacks and network to some extent abuse problems, and we believe that the use of PoC and other mechanisms, and can be done at the same time, encourage more users to participate in and contribution to the attack of prevention effect.

コミュニティ

他のサポートされているコイン&トークンを探す

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
サポート対象のすべての資産を表示