3.6 System expansion and safety

1) Outreach

-Meet the blockchain structure of multiple services: the blockchain structure of RPC can meet the needs of different business areas and improve the scalability and maintenance efficiency of the system. It can be used to mark assets and asset transfers, or to provide tamper-proof multidimensional event records, and can also be used to trace the sources to track the circulation process of items.

-Permission control policies: provide two types of permission control policies for data information writing and reading. Data information write permission, multiple users are set under the same account, and corresponding rights are set for different operations to meet the usage scenarios of multi-party signature control. Data information read permission, the user can grant and withdraw the single user or the user group on the data operation permission, the user group can be flexibly configured by the user. Data includes user account information, transaction information, etc., and the granularity can be refined to the various attribute fields of the transaction or account.

2) Security

-Secure private key access: In order to facilitate the use of blockchain products and services, in addition to the traditional client generation and storage mechanism, RPC also provides two solutions: network managed access and private key hardware access (U-key). Network hosting access, that is, user names and passwords are mapped into private keys through a specific algorithm and stored on the server. The private keys stored on the server side are all encrypted data, and the private key can only be decrypted on the user side; the hardware private key is to meet the use needs of the financial industry and the Internet of Things industry.

-Multiple privacy protection scheme: to provide multiple privacy protection functions. First of all, the underlying layer of the blockchain provides homomorphic encryption, where all the user data is encrypted and stored, only visible to the user itself. Second, RPC Adaptors provides encryption middleware services, which users can choose according to their business needs. Finally, the upper layer application can encrypt the data when input, and RPC is responsible for writing and reading the user-generated encrypted data.

Last updated