• +1 (901) 701-TECH
  • St.Louis, US

Commonly used Blockchain Terms and their Definitions.


The movement of departments of a large organization away from a single administrative centre to other locations
decentralization refers to the process of something not being under the control of a single center of administration.


A proof-of-work (PoW) system (or protocol, or function) is an economic measure to deter denial of service attacks and other service abuses such as spam on a network by requiring some work from the service requester, usually meaning processing time by a computer.


Proof-of-stake (PoS) is a type of algorithm by which a cryptocurrency blockchain network aims to achieve distributed consensus. In PoS-based cryptocurrencies the creator of the next block is chosen via various combinations of random selection and wealth or age (i.e. the stake).


Is the assurance that someone cannot deny something. Typically, it refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated.


A book or other collection of financial accounts, record book, register, registry, log book.
it is just a group of transactions.

Digital ledger

A special database, where each new data block entry in the database is cryptographically linked to the previous block and becomes thereby dependent on all previous blocks.


CPU/GPU cycles spent checking hashes


Unable to change.


Impossible to deny or disprove


Data integrity is a fundamental component of information security. In its broadest use, “data integrity” refers to the accuracy and consistency of data stored in a database, data warehouse, data mart or other construct.


A official record of origin of a document or work of art where the document was created or received initially or it is placed where the document is now stored. A provenance can be proved by following the record of ownership.


Confidential information (CI) is data that must be protected from unauthorized disclosure or public release based on state or federal law. Since systems are sometimes used to manage sensitive information, Data Confidentiality is often a measure of the ability of the system to protect its data.

© 2016 KE TECHIES. All rights reserved | Design by W3layouts