[ Archē / ICO review 2 / Trias(Eng) ]

Trustworthy Reliable Intelligent Autonomous Systems (Trustworthy Reliable Intelligent Autonomous Systems)
<< T R I A S >>

  • This analysis only analyzed the technical part of the website and white paper. It may be different from the Trias team’s intentions.
  1. Overview and Vision

With the breakthroughs in technology such as cloud computing, AI, and IOT, intelligent autonomous systems (“IAS”) have just arrived in our lives. The new IAS will therefore be an essential infrastructure that will form an integral part of human society. But still autonomous machines have not been applied in real life. This is caused by the lack of trust in autonomous machines. It may be a matter of course if you consider the social impact of security issues. Nevertheless, in the foreseeable future, these intelligent autonomous machines will have to be built with reliable and thorough control.

The Trias project was born to achieve this goal.

Trias is the vision and direction of the Trias team to provide a next-generation public block chain that can run any application (DAPP), and to build a more reliable ISA.

2. Problems and Approaches

Returning to the problem, the autonomous machine, which can not be trusted, has the following problems.

⁃Personal Information extrusion

⁃Critical data leakage

⁃Data modulation

-IoT device arbitrary operation

These problems are damaging in various way. A typical example is that the hacking of the IoT home cams causes arbitrary manipulation of the device and leakage of personal information.

The Trias project uses two techniques to solve these problems.

  • Platform to control and inspect all processes
  • Smart Contract can not deny contract

We also designed the system tightly with the following emphasis:

⁃ Inefficient agreement

⁃ unnecessary redundancy

⁃ Limited interface

⁃ Reconstruction and relocation

⁃ Trusted data collection

⁃ Maintain data privacy

Based on the above two techniques and six key points, the Trias project consists of three subsystems.

Leviatom implements the Heterogeneous Consensus Graph (HCGraph) algorithm that combines heterogeneous TEE technology with graph computing algorithms. HCGraph’s gossip protocol, on the other hand, is highly scalable and maintains a strong trusted network while significantly reducing redundant TEE validation.

Prometh is a trackable development framework that can achieve distributed function and security attribute definitions for generic software. Prometh records critical information about the entire life cycle of software for block life, including development and deployment. You can enforce formal verification or DevSecOps methods to enable the community to automatically or manually check or verify the recorded information. This allows all software to implement only the intended behavior.

# DevSecOps?- (development environment, development and security integration)

MagCarta is a consensus-oriented programming paradigm for achieving embedded and self-defined consensus strategies about enterprise DAPP. The MagCarta contract implements a call to the Prometh application. Schedule the Prometh application on the Leviatom computing network to achieve enterprise application logic.

3. Governance and Goals

Above Picture represents the balance of power of the three subsystems that make up the Trias.

Trias’ three subsystems implement the discrete model (Trias Politica).

  • Leviatom is responsible for executing a series of programs.
  • Prometh is responsible for defining the functions and security attributes of each program.
  • MagCarta is responsible for determining the quality of service and allocating the interests of all parties.

Trias proposes a decentralization model for cyberspace for the first time.

Trias aims to implement a broader use case, aiming at a platform that can build trust, rather than simply creating applications related to books.

  • Strengthening the Leviatom Network
  • MagCarta’s consensus-oriented enterprise programming
  • Trias Trusted OS and App Store
  • Prometh’s reliable multi-party calculation (contract)
  • Trias Trusted Cloud Computing Platform

4. Leviatom (trusted network)

First, it validates the integrity of the machine with the help of the security chipset of each TEE-embedded machine (this eliminates the inconsistency of the integrity of the data uploaded to the blockchain)(The base is determined by the internal (HW) security chipset), and the selected machines send messages about their actions. The messages generated at this time are verified by the neighboring machines as if they are communicating with each other, and the block chain is constructed by entering the time stamp. The technology used here is HCGraph (heterogeneous agreement graph).

The messages generated as shown in the above picture will be stamped with ‘time stamp’ indicating ‘when’. In this process, the first person to be taken becomes the previous block, and the message generated here will be validated by other messages, thereby increasing the number of confirms.

This is the key way (the consensus algorithm) that constitutes the block chain of Trias.

It is the first of these trusted intelligent autonomous systems to engage only those machines in a trusted environment, to number and verify the order of the messages communicated by each machine.

It is true that even if you have a machine that has been proven to be so, it is not 100% reliable to attempt malicious access (attack).

This is why other systems can handle additional problems

5.Prometh (trusted execution environment)

Basically, it is necessary to block machines that attempt malicious access (attack) and to ban them from the network. However, this is not the solution to the fundamental problem. As a result, the Trias team is actually undergoing a security audit of the source code applied to the machine.

Getting started is Untrusted Development Environments. No matter how the machine is initially allowed to access the network, it can be a malicious attack machine through the update process. Therefore, the Trias team is required to censor source code that works between trusted machines to a trustworthy compiler from Trias called Prometh. The process is as follows.

  • The source code that passes step 1 is compiled into the compiler of Trias and changed from source code to executable code. Again, security analysis is done and recorded in the block chain.
  • The executable file passed through the step 2 has a rule that can be used to verify the integrity of packaging when it reaches the machine and there is no tampering. Security analysis and record in the blockchain.
  • Packages that have passed step 3 are unpacked by the distribution tool. Likewise, security analysis and block-chain logging.
  • The executable file that passed the step 4 is monitored and analyzed by the monitor

Through these five steps, you can create distributed and ultimately traceable software.If DevOps were both a developer and a worker at the same time as the development environment and development, the type that the Trias team pursues is DevSecOps (development environment, development and security integration). The communication and operation between the machines was only executed through the proven code as above, blocking malicious attacks and eliminating the exception cases that could occur in the middle.

So far, we have made sure that you can work with machines. Then you only have to record the work of the machines and give feedback. It is also necessary to block any indiscriminate assignments (malicious collectors) that may occur at this time. This feature will be hosted by MagCarta.

You need Smart Contract to record your work without delay. The Trias team knows that machines can not record work between machines (such as storage limitations or slow processing speeds), therefore they need a vendor to handle this record instead. MagCarta is built on Linux’s Bash script to help you analyze and manipulate the work of machines into a more diverse and complex environment. For simplicity and speed of source, each command has the form ‘command <KEY, VALUE>’ (in the form of a hash table)

The other is that the hash table thus constructed can not infer the contents from the original.It has a structure that returns the corresponding VALUE, so you can not know the corresponding VALUE before assigning various KEY values. (Malicious collectors will also be found in Prometh, but will not be able to work in MagCarta.)

A description of the additional consensus algorithm is provided in other technical white papers (not currently available).

7. Token ecosystem

there are three roles in the token ecosystem


• You will continue to validate that you are meeting the TEE of the machine that is attempting to access the network. You also need to balance the machines that work on the network (this is called “mining through validation”).

Router (forwarder)

  • Collect and forward messages from machines and machines that have been verified by the verifier to other machines. At this time, the communication between these machines is called a decryption algorithm. You should also contribute to network reliability by analyzing the values ​​and attributes of the collected messages. (This is referred to as ‘routing through mining.’)


  • In MagCarta, you need an executor who runs the actual application through the Prometh process. It returns, validates, and contributes to storage and bandwidth (this is referred to as ‘mining through gas (work commission)’).

In addition, Prometh requires the participation of communities that validate applications. Therefore, you should contribute to the reliability of your network by examining and authorizing source code through various non-proprietary community members of the community. At this time, we assume that all latent risks can not be caught and run on a separate Leviatom network and insure that there is no abnormality. By properly recording these verified activities in the block chain, we reduce the burden on community participants and build a virtuous circle structure of the cyber security ecosystem and reward community members.

Additional roles will be announced in addition to the white paper.

8. Conclusion

Through the technical analysis, the most realistic model was presented, and the forms such as censorship and verification for improving reliability from beginning to end were confirmed through RUAN and Anbang (CEO) papers. team members have experienced or important skills about blockchain. In addition, you can see that the work is actually done through the road map, and it is more reliable because it is not a technology that exists only in the white letters.

In addition, As part of translating and analyzing the white paper, MagCarta, one of the subsystems, seems to have only a conceptual or Smart Contract part. So, in the white paper, you can see the difference between the goal (consensus oriented programming) and MagCarta. Nevertheless, when I tried to build governance, it was a big, long-term project, not a mere project. Personally speaking, it is a wonderful project that showed the efforts and readiness of the Trias team.

  • Rating Socre

< B+ (3.75 / 4.5) >

Trias team criticizes the problems of existing block chains and point out the deficiencies correctly, but the absence of the technical white papers became the cause of the biggest deduction. Even if the score is B +, I would like to give a very good evaluation personally and I think it is a very attractive coin.

Arche Blog(Korean)- https://blog.naver.com/koenigs3053
Arche Blog(Chinese)- http://blog.sina.com.cn/u/6521462407
Arche Chat room(Kakaotalk)- https://open.kakao.com/o/gpTB1GV
Arche Telegram(Korean)-https://t.me/ArcheBlock
Arche Telegram(English)-https://t.me/ArcheBlockEng