Partners

Project introduction

Nowadays, the development of blockchain technology has brought subversive changes to human society

Behind the digital currency lies both the dawn of the new era economy and numerous difficulties and challenges.Against such a background of opportunities and challenges, we released a set of digital ID solution — HOPE, which is based on blockchain technology.HOPE is a digital currency created on the basis of blockchain. It is a service system integrating government affairs, credit, transaction and payment with digital identity, featuring low transaction cost, fast transaction speed and high anonymity

The HOPE platform was established in 2019 and features the global incremental user market.HOPE platform has received nearly ten million dollars of investment from several blockchain investment institutions.

HOPE Mobile App

Once you’ve entered into our ecosystem, you can mange every thing. Anyone with a smartphone and an internet connection can participate in global marketplace.

HOPE currency and block chain business characteristics based on the characteristics of the user, to HOPE currency underlying modular split, to deal with multi-dimensional, the role of safety protection, data privacy, confidentiality, distributed data storage and credible data access and trading assets, provide strong underlying security. Specific include user layer, service layer, core layer and base layer and layer across functions.

  • Low Cost
  • Scalability
  • Reliability
  • Low Latency
  • High Utilization Rate And Safer

The Leadership Team

International top technology research and development team support

team
Tracy Ben-Yair
Shimrit ben-yair is a former Google core technician with a bachelor's degree in computer science, statistics and operational studies from tel aviv university, Israel, and an MBA from MIT Sloan school of management.
team
Ray Landman
Focus on prediction algorithms, accurate prediction of the future trend of cryptocurrencies such as bitcoin, and get a high reputation, operating a cryptocurrency research website
team
Michael
Michael joined Google in 2006 with a bachelor's degree in electrical and computer engineering from orlin college of technology and an MBA from harvard business school
team
Sandy White
More than six years of project risk control experience, with pre-control awareness, and the ability to deal with specific problems during and after the event
team
Gordon Harris
Software development engineer, with more than 15 years of experience in algorithm research and block chain software development, has rich experience in system architecture, and participated in the investment of DOGECOIN

Applied stereoscopic scene

HOPE will gather global community forces to build a global community ecology, gradually attracting enterprises and users from different fields, upstream and downstream of different industrial chains to access HOPE coin

Lightning network

The lightning network opens a payment channel by setting up a multi-signature wallet containing a certain amount of cryptocurrency and then setting up a savings wallet address on the blockchain.After all planned transactions are completed, the final balance will be kept in the blockchain and each party can restore its share of the wallet.In this way, the two parties can avoid costly and slow interactions on the blockchain and make quick and cheap payments directly

Subdivision technology

The idea of shard is that HOPE network will have main chain and shard chain in the future. The transactions on shard chain are in their own independent space. Shard verifiers only need to verify the shard they care about.The consensus results of shard chain still need a higher level of public knowledge in the main chain to ensure the safety

Data security

Data generated by the terminal is stored in a third party, resulting in the separation of ownership and use rights of the data.Data loss, data leakage, illegal data operation and other problems are easily generated, and data security cannot be guaranteed.For example, 360 water drop live event and facebook privacy leakage event, the solution is to use block chain technology to encrypt and confirm the right of data, which can only be used after authorization.Blockchain storage networks also guarantee data integrity, such as IPFS.

The authentication

If there are millions of IoT terminals that are centrally online and authenticated, the traditional centralized authentication mechanism cannot be realized. Therefore, with the decentralized distributed authentication technology of block chain, each device can generate its own unique public key-based address, so that it can send and receive encrypted messages with other terminals

Privacy protection

How to maximize the value of data while protecting personal privacy?Zero knowledge proof!Zero-knowledge proof means that the verifier can convince the verifier that an argument is correct without providing any useful information to the verifier.It can prove to someone that my data is valuable, but it doesn't tell you where the real private data is

Get In Touch

Any question? Reach out to us and we’ll get back to you shortly.

  • phone
  • emailinfo@yourcompany.com
  • teleJoin us on Telegram
PARTNERS