ArchEthic is a fast, secure & low-consumption layer 1. We are making the blockchain world accessible with the tip of a finger https://linktr.ee/archethic
ArchEthic is a fast, secure & low-consumption layer 1. We are making the blockchain world accessible with the tip of a finger https://linktr.ee/archethic
Uniris Blockchain offers the first integrated services platform to address a fundamental need: to give everyone back control of technology. Thus, Uniris is part of the promise to make the world more secure, inclusive and truly decentralized.
4 years of research and 12 strong international patents endow Uniris with technological attributes that its predecessors lacked - scalability, speed, reliability and simplicity of native biometric recognition. These patents will be awarded to the open source community to encourage participation and therefore accelerate the pace of innovation.
Designed for mainstream adoption, Uniris relies on a new form of unbreakable validation consensus (ARCH) that is ultra-secure and allows an unlimited number of transactions. Uniris implements biometrics in a natural way, using an identification method that is tamper-proof and accessible to everyone. This technology exploits the incredible complexity of the inside of the fingers, unique to each individual, without the need to store any biometric data.
Our cryptocurrency, UCO, is the backbone of the network that fuels these transactions and monetizes participants in the development of an ecosystem built by people for people. Our blockchain platform aims to replace and improve all current applications with a comprehensive and open ecosystem, allowing people to move from the trust imposed by centralized systems (Facebook, Google, Amazon, Banks) to a decentralized system where everyone retains control over their data, property and privacy.
Uniris returns to humanity control over technology and control of each person over his personality.
Unlike fingerprints, irises, faces, which can be easily reproduced and faked from a photo on Facebook or on the street, it is impossible to recover the inside of a finger. The device checks vital signs during each authentication to ensure that the finger is not cut off and that the person is fully aware and consents before any verification of the transaction.
Tamper-resistant authentication No key storage (GDPR by design). No one can steal your keys, you can delete them, but you will never forget or lose them.
All current biometric identification data is based on the same principle:
collection of biometric data and storage of this recognition data (template);
comparison of the measurement with the sample;
if the match exceeds a certain threshold, then the person is identified (software).
Identification by a Uniris biometric device is no longer based on a recognition threshold and therefore no longer needs to be saved for comparison.
Private cryptographic keys are generated on the fly (and then deleted), allowing the user to retrieve and decrypt their decentralized "keychains".
tolerance to identification is provided by the learning mechanism described above. Finally, authentication is no longer software-based, but cryptographic, making any attempts at software-based attack useless.
Unlike biometric identification on a smartphone, which only works on one smartphone, Uniris authentication works for anyone and on any device. Because no keys are stored, it is compliant with the most stringent data protection regulations (GDPR, CNIL, etc.), making biometric data available for large scale use.
Keys are generated in pairs based on biometric measurements. If one of the dimensions is different (cut, burn, etc.) then only one key will match and can validate the authentication, while two new keys will be added to encrypt (via related public keys) the decentralized key ring, thus learning new human biometric measurements without the need to store keys.
Proof of Origin Authentication via Proof-of-work
Identification on the Uniris network is not limited to biometric devices, and as shown in the figure above, each access method (smartphone, USB key, software key, etc.)
Will have its own certification method. The identification method associated with the transaction and proof of work completion will thus allow the required security to be configured for any smart contract or portfolio, for example:
A transaction under 1000 UCO can be made from a specific smartphone, but only from a biometric device above that value.
Entrance to a sensitive building can be via NFC during business hours and via biometrics at other times.
The technically decentralized identity of a person or related entity consists of a randomly generated Seed (root key) from which all keys can be generated according to the acquisition path. Thus, for any access to a service or application, the key will be computed on the fly from the seed (the root key) and the first public key associated with the service or application. Thus, an infinite number of identifiers can be created without the need to store associated keys.
Because all transactions are public, the network has a mechanism called the "Privacy Wheel" to de-correlate the sender, recipient, time, and amount of a transaction. This mechanism is used in particular for e-voting and allows everyone to keep their vote private without compromising the consistency of the voting logs.
The most scalable, secure and energy efficient blockchain thanks to the ARCH consensus.
For the first time in history, blockchain is a technology that can operate without a central decision maker. The system is not only impartial, but also transparent and inalienable. The new form of Consensus ARCH created by Uniris is based on the unpredictable choice of a small subset of nodes (miner) to validate and store transactions (197 per 100,000 nodes). The network uses controlled multicast, so each node will always know where to look for data over the most efficient network path, allowing transactions per second to increase linearly with the number of network nodes (~100x). The table below shows the main differences from other blockchains:
Smart Contracts: Autonomous Robots in the Digital Age
Smart contracts allow you to calculate what robots are in real life: they perform actions in accordance with events. Uniris smart contracts are making a technological leap forward. They are autonomous and can be triggered by internal events (date, transactions) or real life (Oracle feed: confirmed by consensus and cross-referenced information), such as weather, stock price, news. They adapt to their environment. Fully modifiable, they can natively manage operations such as inventory management, payments, web hosting without creating a reality beyond confirmed transactions (UTXO).
Decentralized Identity eliminates the need to trust our identity to a third party that may have a conflict of interest and use our identity without our knowledge, such as Google, Facebook, or our favorite merchant site. A person retains exclusive control over his personality, which is stored on many nodes, which ensures its reliability and integrity. Thus, this decentralized identity ensures that privacy is respected and compatible with other applications. Combined with the possibilities offered by smart contracts, it becomes the centerpiece of our interaction with the world: access to major public events (Olympic Games, concerts, etc.), transportation, hotels, our messages, without having to reveal the details of our identity. .
The blockchain-embedded biometric technology provided by Uniris allows anyone to easily identify themselves and without storing any biometric data. This is an access control that is tamper-proof and unrevealed. How it works?
The biometric data inside one of our fingers will generate several cryptographic keys that will never be revealed and with which our digital identity will be encrypted. Only a person who is able to recover one of these keys will be able to decrypt their digital identity and therefore verify their identity. In addition to the technological elegance that can generalize biometric data without risk to our privacy, this method solves the main problem of blockchains - mass adoption.
"The river always chooses the most efficient route."
In the prehistoric model of the Internet (still prevalent since its inception), each new service recreates its elementary operating blocks each time: portal, customer identification, customer databases, service management, hosting, storage, backup, payments, resulting in:
Terrible consumption of computing power;
Lots of logins and passwords for users who end up copying their passwords everywhere and giving them away;
Risks of fraud or cyber attacks that could shake the planet.
The Blockchain + Decentralized Identity model finally rationalizes this operating model by directly integrating all the layers required to create new services:
Much less need for computer skills due to upstream integration;
Unique and universal identification, activated only by the owner, regardless of his physical or virtual location of the visit;
Removal of third parties in favor of the blockchain to ensure the stability of the system;
Significant economic and financial impact on the cost of each new service.
Given universal limits, both tangible and physical, billions of transactions cannot be combined into one branch of related blocks. Similarly, regardless of the consensus method, it is not possible to achieve a universal consensus on billions of transactions by polling all nodes in the network. Finally, the functioning of current distributed networks (P2P) is such that it is impossible to guarantee the freshness (consistency) of data in an asynchronous network, unless the network is severely slowed down due to the calculation of the one-time block number (PoW), as is the case with the Bitcoin network. Uniris solved these problems in the following ways:
Instead of associated transaction blocks, each block is reduced to its atomic form, i.e. each block contains one transaction, and each transaction will be connected on its own chain.
-ARCH or "Atomic Commitment Interleaving Heuristic (ARCH)" is a new generation of consensus. Below is a detailed explanation of each ARCH concept:
-Atomic Commitment is a form of "absolute" consensus that implies 100% agreed and positive responses or refusal to confirm a transaction.
-Heuristics are a set of algorithms, software, and parameters that govern the entire network, allowing the network to decentralize and coordinate the selection of nodes responsible for verifying and storing transaction chains.
-The network is completely distributed (no central or privileged role), the nodes selected for each operation are constantly changing so that no node can predict which node will be selected until the transaction arrives.
Predictive, optimized, geo-safe, self-healing replication system
Instead of ad hoc synchronization of transactions throughout the network, each transaction chain will be stored in a reproducible and ordered manner on a set of nodes - thus, each node will independently know all the nodes hosting a given transaction, and thus will be able to offload the network by polling only the most close "favorite" nodes. The choice of storage nodes also includes geographic location to ensure data security even in the event of a disaster in one or more geographic areas.
Distributed network (P2P) without saturation point
Based on controlled multicast, the peer-to-peer network uses an incoming connection-based self-discovery mechanism and a network transaction chain mechanism to maintain qualified and reliable vision while creating a minimum of new transactions on the network.
Lighthouse chains
Because no node has the physical ability to know the status of every transaction in an unrestricted network, the Uniris network uses a set of specific transaction chains, each containing a subset of the addresses of the latest transactions on a given date, allowing any node to automatically resynchronize in the event of an outage.
Oracle chains
Oracle's State of the World chains are updated by consensus each time information is updated (eg, when a new weather forecast, news is broadcast).
Prediction Module
For a decentralized web to survive decades or even centuries, it must be able to adapt to threats and respond accordingly. For this purpose, the Uniris network has a predictive module that is able to associate a network disruption (for example, the unavailability of nodes in a geographic area) with an event (for example, a storm in this area via Oracle).
Mining
Node selection and network synchronization is provided by heuristic algorithms, proof of work is used to verify that the nodes causing verification and the device causing the transaction are authorized (for example, a biometric device), allowing authentication by its context (for example, e-voting requiring a genuine the identity of the voter). Since the random selection of nodes is no longer associated with power consumption, the power consumption of the network is reduced by 3.6 billion times compared to the Bitcoin network.
Smart contracts
First created by the Bitcoin network to update the general ledger, and then extended by the ability to perform programmed actions through smart contracts to the point of being able to completely control systems, Blockchain technology continues to reinvent itself. Unlike smart contracts written on Ethereum, smart contracts on the Uniris network are directly interpreted and atomically verified by miners. Each transaction or smart contract is stored in a specific group of nodes (alternating heuristic choice: ARCH), which can then synchronously download a set of new functions: for example, to know the status of shares, the number of votes and transactions. in the same smart contract (any transaction with a smart contract is notified and stored in a group of nodes) or automatically triggers an action when an event occurs (date,
To keep smart contracts secure and irrevocable, they are entirely based on the UTXO (Unspent Transaction Release) model, which can be spent/used to enter a new transaction. In other words, smart contracts do not depend on the state of the internal database, but only on transactions that have already been verified.
Whether it's a simple transfer, a building access rule, an online store, website hosting, nationwide voting, or even all the code used on the network itself, any transaction follows the following pattern:
ArchEthic is a fast, secure & low-consumption layer 1. We are making the blockchain world accessible with the tip of a finger https://linktr.ee/archethic