Coins:legiongame: Difference between revisions

From Decimal Wiki
Jump to navigation Jump to search
[unchecked revision][unchecked revision]
(Created page with "<div class="mikio-article-content"> <div class="mikio-tags"> </div> <span id="legion_game"></span> = LEGION GAME = <div class="level1"> LG — это внутренняя цифровая единица расчета компании LEGION GROUP, созданная для нескольких основных целей: <ol> <li><div class="li"> вознаграждения за активность на занятиях (Bounty) </div></li> <li><div class="l...")
 
No edit summary
Line 1: Line 1:
{{#seo:
{{#seo:
                     |title=Content
                     |title= Content  
                     |titlemode=append
                     |titlemode= append  
                     |keywords=Content
                     |keywords= Content  
                     |description=Content
                     |description= Content  
                     }}
                     }}
   
   
                     Content
                     Content


·LEGION GAME
·2FA / Multi-factor authentication


·How LEGION GAME works
o


·The history of the LEGION GAME creation
§The categories of such evidence include:


·LEGION GAME Technical Parameters
·Double-factor authentication


A budget of 1,000 DEL was spent on the creation of the token
2FA / Multi-factor authentication


This version (2021/02/18 09:10) has been verified by renata user.The previous verified version is available (2021/02/04 11:56).
Multi-factor authentication is an extended verification procedure (or a method of controlling access to a computer). To gain access to information, the user must present more than one “proof”.


LEGION GAME
'''The categories of such evidence include:'''


LG is an internal digital unit of calculation of the LEGION GROUP company, created for several main purposes:
''Data that the subject possesses.''


1.rewards for activity in the classroom (Bounty)
This is secret information that only an authorized subject knows. The password can be a speech word, a text word, a combination for a lock or a personal identification number (PIN code.). However, it has significant drawbacks: it is often difficult to keep a password secret, because attackers are constantly coming up with new ways of stealing, hacking and password selection. This makes the password mechanism unsecure. Many secret questions, such as “Where were you born?”, are elementary examples of the knowledge factor, because they can be known to a wide group of people or be investigated.


2.remuneration for inviting a person to a presentation (regardless of the purchase of the product by the invited person)
''A thing that the subject possesses.''


3.payment of partner rewards, cashbacks, gifts and salaries to founders and hired employees
It is important here that the subject has some kind of unique object. It can be a personal seal, a key to the lock, a data file containing a characteristic. The characteristic is often embedded in a special device: for example, a plastic card. It is more difficult for an attacker to get hold of such a device than to crack a password, and the subject can immediately report in case of theft of the device. This makes this method more secure than a password mechanism, but the cost of such a data access protection system is higher.


4.getting access to intermediate and advanced level educational products
''A property that the subject possesses.''


5.competitive points that make it possible to win the course for 1st and 2nd place at the marathon
A characteristic is a physical feature of the subject. It can be a face, fingerprints, iris, capillary patterns, DNA sequence or voice. From the point of view of the subject, this method is the simplest: you do not need to remember the password or carry an authentication device with you. However, the biometric system must have high sensitivity in order to confirm an authorized user, but reject an attacker with similar biometric parameters. Also, the cost of such a system is quite high.


6.discounts from the company at the rate of 1 token = 1 percent discount, but no more than 50% discount per course . How LEGION GAME works
'''Double-factor authentication'''


LEGION GAME has several stages of training in each product, and in order to get access to the products, starting from the second stage, the client must first buy a DEL token, and then exchange it in the console for a LEGIONGAME token.
Double-factor authentication is a type of multi-factor authentication. 2FA is a technology that provides user identification using a combination of two different components. The bright example of two-factor authentication is Google authorization. When a user logs in from a new device, in addition to password authentication, they are asked to enter a six-digit/eight-digit confirmation code. The subscriber can receive it by SMS or by voice call to his phone. Also, a new one-time password can be generated by the authenticator application in short periods of time. The method of receiving the confirmation code is selected in the settings.
 
[[Category::Commoninfo]]
The first stage of training is always purchased for the national currency (ruble). At the first stage of training, all basic information about blockchain technology, exchange offices and other necessary resources and services to start working with the cryptocurrency market is given. This is more than enough to buy a DEL and exchange it for a LEGION GAME token.
 
Thus, a person passes an exam to move to the second (main) stage of training, and the criterion for passing the exam is the transaction of the LEGION GAME token to the company's wallet.
 
With the help of the LEGION GAME token, LEGION GROUP increases the demand for the DEL token, simplifies settlements with students and founders, and introduces users to the basics of the DecimalChain ecosystem. . The history of the LEGION GAME creation
 
LEGION GROUP companies decided to start using blockchain to conduct their business processes and started by issuing diplomas on blockchain technology, making education honest.
 
To do this, the company issued a LEGION DOCS token in order to send it to the student's wallet, indicating in the comments the information from the printed certificate.
 
The certificates inscribed in the blockchain were liked by the company's customers, so it was decided to create a LEGION GAME token to exchange it for the company's educational products.
 
The founders of LEGIONGROUP are delegates of the DEL coin and are interested in its development, and this is another reason why the company created a token that increases the demand for the DEL coin and allows making settlements between people in tokens.
 
To implement the idea of calculation, a user agreement is created, according to which LEGION GAME is an internal digital unit of calculation created to encourage its customers and to use the functionality of the educational platform.
 
LEGION GAME Technical Parameters
 
A budget of 1,000 DEL was spent on the creation of the token
 
·- LEGION GAME TOKEN
 
·- LEGIONGAME
 
·- The initial issue was set at 10,000 tokens
 
·- The initial reserve was set to 1,000 DEL
 
·- The maximum issue was set at 940 billion tokens, which is about 10 times higher than the maximum issue of DEL. This decision was made because the token rate was fixed 1/10 of the DEL rate
 
·- The Constant Redundancy Ratio (CRR) has been set to 100%. Thus, the token always has a stable exchange rate, which makes it convenient to settle between the company and customers, and also makes it possible to delegate the token to get maximum returns.

Revision as of 03:44, 5 May 2022


                   Content

·2FA / Multi-factor authentication

o

§The categories of such evidence include:

·Double-factor authentication

2FA / Multi-factor authentication

Multi-factor authentication is an extended verification procedure (or a method of controlling access to a computer). To gain access to information, the user must present more than one “proof”.

The categories of such evidence include:

Data that the subject possesses.

This is secret information that only an authorized subject knows. The password can be a speech word, a text word, a combination for a lock or a personal identification number (PIN code.). However, it has significant drawbacks: it is often difficult to keep a password secret, because attackers are constantly coming up with new ways of stealing, hacking and password selection. This makes the password mechanism unsecure. Many secret questions, such as “Where were you born?”, are elementary examples of the knowledge factor, because they can be known to a wide group of people or be investigated.

A thing that the subject possesses.

It is important here that the subject has some kind of unique object. It can be a personal seal, a key to the lock, a data file containing a characteristic. The characteristic is often embedded in a special device: for example, a plastic card. It is more difficult for an attacker to get hold of such a device than to crack a password, and the subject can immediately report in case of theft of the device. This makes this method more secure than a password mechanism, but the cost of such a data access protection system is higher.

A property that the subject possesses.

A characteristic is a physical feature of the subject. It can be a face, fingerprints, iris, capillary patterns, DNA sequence or voice. From the point of view of the subject, this method is the simplest: you do not need to remember the password or carry an authentication device with you. However, the biometric system must have high sensitivity in order to confirm an authorized user, but reject an attacker with similar biometric parameters. Also, the cost of such a system is quite high.

Double-factor authentication

Double-factor authentication is a type of multi-factor authentication. 2FA is a technology that provides user identification using a combination of two different components. The bright example of two-factor authentication is Google authorization. When a user logs in from a new device, in addition to password authentication, they are asked to enter a six-digit/eight-digit confirmation code. The subscriber can receive it by SMS or by voice call to his phone. Also, a new one-time password can be generated by the authenticator application in short periods of time. The method of receiving the confirmation code is selected in the settings.

[[Category::Commoninfo]]