Transaction 975eb6cf951ab12eae70e12dfb254c21394e37894b88f4b887fd06c887744b17

1 Input
  • 6d2cd3d46bff6ecc0fa1bb60a112a5bb7e6f81396a459eeb053b1ac70ef5f574:0
    OP_DATA_32(32) 7930869ed17f2f8df41ed58f58dc44f6c5793c904a8a8719845a4b1f8a2339fa
    OP_CHECKSIG(172)
    OP_0(0)
    OP_IF(99)
    OP_DATA_3(3) ord
    OP_DATA_1(1) 
    OP_DATA_24(24) text/plain;charset=utf-8
    OP_0(0)
    OP_PUSHDATA2(77) {"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How can blockchain technology be applied in digital identity management?","a":"Data Encryption: Blockchain technology utilizes asymmetric encryption techniques to encrypt identity information, allowing only users with private keys to decrypt corresponding data. This helps protect user privacy and prevents identity information from being stolen during transmission and storage."}]}],"pr":"a26388ba584e4ebded95156fbbdcc8a48b9bccc82
    OP_DATA_25(25) 59b1e4ba7fd0aa61fbc73bd"}
    OP_ENDIF(104)
1 Outputs
  • 975eb6cf951ab12eae70e12dfb254c21394e37894b88f4b887fd06c887744b17:0
  • value  546
    address  bc1pffh9rqw5mryqjnenm6teamztwf2qrnyymt0447qf4ywmlxze5duqgmmcnz