Published in


How Trias Empowers Authmen?

Last week, Trias has reached a strategic partnership with Authmen to expand Trias ecosystem and help Authmen build an information security tamper proof and traceability system based on Decentralized Storage.

Many People in our community would be curious that how will Trias empower Authmen? And how does Authmen use Trias’ technology?

I think the following content can answer you.

Authmen adopts the three-layer computing power system based on Leviatom in Trias architecture, and the combination of TEE trusted computing and zero knowledge proof technology to complete the right confirmation and security protection of distributed storage data.

The trusted network constructed by Leviatom layer of Trias maintains a unique white list for each storage node, which can prevent the loading of abnormal programs and effectively block network security attacks. At the same time, HCGraph is a trusted computing technology based on heterogeneous TEE. With the help of Gossip protocol, a “trusted acquaintance” network is constructed between consensus nodes using different TEE technologies, and a “conspiracy default” model of global nodes is constructed to locate trusted nodes efficiently, which makes consensus more efficient and cost-effective.

At the same time, the TEE technology of Trias does not rely on a single category of hardware, so it has stronger compatibility. The use of TEE technology can verify and protect the whole life cycle of the computer running environment on the basis of the — 1 layer of the hardware root. At the same time, under the TEE security defense model of Trias, it becomes a new incentive oriented security model, which allows the defender to actively contribute the defense nodes and computing power of TEE, and get the corresponding advantage economic stimulation according to the defense contribution provided in the Trias security network. Through the trusted computing of Trias, multi-party, remote and heterogeneous data storage, sharing and computing can be realized under the premise of maintaining data ownership and privacy.

In addition, the data of trusted hardware and program based on Trias can ensure that the information or data will not be disclosed in the trusted program, and ZK snarks are used to ensure the privacy of the data.

Through trusted computing, Authmen enables different TEE protocols to collect the latest status of neighboring nodes, check and record historical information, and propagate the results among other nodes through gossip protocol, and form a reputation network. It repeatedly selects “the most difficult point to lie” as its repeated function contract presentation, forming a robust and efficient running environment, and building a trusted computing based environment based on the blockchain distributed storage security network.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Trustworthy and Reliable Intelligent Autonomous Systems