Alipay URL Scheme is the most complete in the entire network, and the startActivity address is being updated.

The following is the Scheme protocol address that I sorted out the Alipay APP software and compiled in practical applications. I want to share it with you. If you don’t have any, you can comment @ me. I’m looking for additional protocol addresses. //Alipay: alipay:// //receipt: alipays://platformapi/startapp?appId=20000123 //Scan code: alipays://platformapi/startapp?saId=10000007 //Yue Bao: alipays://platformapi/startapp?appId=20000032 //transfer: alipays://platformapi/startapp?appId=20000221 […]

Discussion on MySQL bulk data insertion scheme

Because the company has a need to insert a large amount of data, it took time to research it, and currently summarizes 5 methods: Single data loop insertion Perform sql splicing and insertion Batch insertion using mybatis plus (mp) Combined with sql splicing + loop insertion An upgraded version of 4, inserted into the same […]

From principle to practice, analyze the implementation scheme of Redisson distributed lock

Previously we explained how to use Redis to implement distributed locks. It provides simple primitives to implement distributed locks based on Redis. However, Redis also has some shortcomings as an implementation of distributed locks. This article will introduce Redisson to implement distributed locks. Portal: https://blog.csdn.net/Ascend1977/article/details/131221941 1What is Redisson Redisson is a distributed Java framework based […]

Scanning scheme for default file system types

1. Introduction Normally, when we need to traverse the entire disk, we will choose to use the interface provided by the system, or call the filesystem module in the standard library or boost library. The traversal method of the filesystem library is relatively simple, so this article only lists the usage of the system traversal […]

[Javascript] I am not satisfied with the Token non-perceptual refreshing scheme on the Internet, so I thought about it myself and it feels pretty good~

?Foreword Imagine that there is a super large form page, the user finally fills it out, and then clicks submit. At this time, the request interface actually returns 401, and then jumps to the login page. . . Then the user must have ten thousand idiots in his heart~~~ Therefore, it is necessary to implement […]

Principle, construction and code implementation of linear secret sharing scheme based on sharing matrix

1 Linear secret sharing scheme Linear secret sharing scheme is an encryption technology used to split a secret message into multiple fragments and distribute these fragments to multiple participants. Only when a sufficient number of participants cooperate, the complete secret information can be restored Secret information. The basic principle of linear secret sharing scheme is […]

MPC-in-the-Head post-quantum signature scheme: public and private key sizes are small, but signature size is too large

1. Introduction Preface blog: Digital signature schemes of the future: Dilithium, FALCON and SPHINCS+ NIST has established PQC Additional Signatures Round 1. For details, see: Post-Quantum Cryptography: Digital Signature Schemes – Round 1 Additional Signatures The current finalists are: 1) 10 signature schemes based on multi-variables: 3WISE DME-Sign HPPC (Hidden Product of Polynomial Composition) MAYO […]

3D cephalometric scheme for accurately quantifying craniofacial symmetry and facial growth (Matlab code implementation)

Welcome to this blog Advantages of bloggers:Blog content should be as thoughtful and logical as possible for the convenience of readers. Motto:He who travels a hundred miles is half as good as ninety. The directory of this article is as follows: Table of Contents 1 Overview 2 Operation results 3 References 4 Matlab code, data, […]