iiotTrust® Industrial Internet Security Blockchain

shape
shape
shape
shape
shape
shape
shape
shape

Application Scenarios

As a collaborative depositary receipt platform that adopts the blockchain technology, iiotTrust has such features as anti-tamper, traceability, strong consistency, and decentration, providing a reliable decentralized communications network for the IT/OT integration in the context of Industrial Internet, with the control and collaboration data among various nodes on the industrial Internet recorded to the blockchain network by the means of “transaction”.



Download White Paper (Chinese Version)

main-pic

Instruction Security Communications

Communications instructions are sent via iiotTrust, the inter-node consensus mechanism can authenticate the identity and content of senders, and cryptographic algorithm is adopted to ensure key information can be read by certain recipients only.

Inter-organizational Communications Depositary Receipt

All the information whose communications collaboration is conducted through the iiotTrust blockchain is tamper-proof between nodes and can be preserved for good, and the key business flows between organizations can be traced on demand.

Risk Control and Audit

The tamper-proof feature of blockchain can be used by connecting iiotTrust to customer’s business system, with operations made by operators to be recorded on the chain and smart contract to act as the rule engine to identify any abnormal operations, as well as by conducting compliance audit to the history of operations made by operators.

API Invoking quota management

As the information recorded by iiotTrust on the blockchain is stored in the form of “transaction”, Token can be issued on iiotTrust for internal circulation, with a certain quantity of Token to be consumed for each transaction and the transaction record corresponding to each quota consumption to be traced, to have a precise control over the number of interface invocation operations and prevent interface abuse.

Features

As a collaborative depositary receipt platform that adopts the blockchain technology, iiotTrust has such features as anti-tamper, traceability, strong consistency, and decentration, providing a reliable decentralized communications network for the IT/OT integration in the context of Industrial Internet, with the control and collaboration data among various nodes on the industrial Internet recorded to the blockchain network by the means of “transaction”.

Decentralization

The data in the iiotTrust block can be shared through multiple sites, at different locations, or in the network consisting of multiple organizations, with each network member having access to the same data copy as other members and any data revisions in the block to be reflected in the data copies of all other network members.

Consensus Mechanism

The safety and reliability of the data stored in the iiotTrust block is guaranteed through public and private keys and signatures to have the consistency maintenance at the level of cryptography, with participants in the network restricting and discussing record updates in the principle of consensus without having to entrust trust to any third parties as intermediaries.

Tamper-proof

Every record in iiotTrust has a unique timestamp and cryptographical signature, which can be used to make blockdata auditable history of all transactions in the network, with data modification by any network members to be completed based on consensus with other network members in accordance with the consensus mechanism.

Core Advantages

With the technical features of blockchain, iiotTrust has offered a new choice for data security collaboration among multiple equipment; in the context of industrial Internet, blockchain can effectively solve problems related to coordination and trust among collaborative manufacturing equipment that not only improves efficiency but reduces security risks; compared to traditional ways of data centralization, blockchain adopts a decentralized network structure that increases transaction transparency and avoid potential corruption or fraud in the central structure of excessive power concentration; and at the same time, as the block ledger is jointly maintained by all network members, the ledger itself wouldn’t be significantly affected as a result of any attacks to single network node, which helps protect the stability and security of the entire distributed network.

Attacks or damage to the data of some nodes do no harm to the entire blockchain as a decentralized distributed network.
Forged instructions wouldn’t be confirmed by other nodes as a result of the node consensus mechanism, which would be written to the blockchain.
The cryptographical encryption technology is applied to ensure no unauthorized access to sensitive data.
The historical data in the blockchain has timestamps and cryptographical signatures, which can be protected from any tampering via the consensus mechanism.
All the communications instructions are written in the blockchain in the form of TX that can be audited at any time.