CACC 律师楼 引进中国最强区块链团队

论坛 期权论坛 期权     
柬埔寨CACC国际商务服务   2020-1-5 07:50   1714   0
柬埔寨 CACC律师楼 协助柬埔寨建立区块链技术,引进中国最新区块链技术


Supreme Star Technology Co., Ltd. & TRIAS Force Introduction

Supreme Star Technology Co., Ltd is a wholly owned subsidiary technology firm of Supreme Star Technology Ltd (Hong Kong). We aspire to provide Blockchain solutions to enterprises and any organization that require information technology upgrades, first-time data security or security enhancements and the likes. As our system is versatile in fitting user’s needs. With leading benchmarks, we are confident that our system is one of if not the best available. TRIAS stands for Trustworthy, Reliable, Intelligent, Autonomous Systems. TRIAS Force is a multifunctional blockchain solution platform based on three basic building blocks, Trusted Computing, Blockchain & Artificial Intelligence. Our system has so far covered enterprises and organizations in both public and private sectors; to name a few, China Everbright Bank, Soochow Securities, JiangXi Electric Industrial Park and more (& more coming!).

Introduction of our 3 Building Blocks

First of all, Trusted Computing is a technology where a computer will consistently behave in expected ways, this is enforced by computer hardware and software. Trusted Computing is responsible for TRIAS Force’s trustworthiness & reliability, an analogy for traditional cyber security versus trusted computing would be western versus Chinese medicine diagnosis methods. With the former closer to reductionism, and latter closer to holistic approach.
Fun fact: The U.S. Army requires that every new PC it purchases comes with a Trusted Platform Module. As of July 3, 2007, so does virtually the entire United States Department of Defense.

Then, Block Chain is responsible for safely storing data. A blockchain is a growing list of records, called blocks, that are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. By design, a blockchain is resistant to modification of the data. It is "an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way". Blockchain technology can be integrated into multiple areas. The primary use of blockchains today is as a distributed ledger for cryptocurrencies, most notably bitcoin. Blockchain technology can be applied to not only cryptocurrencies, but it could assimilate to financial services, supply chain, smart contracts and more application potentials.

Thirdly, Artificial Intelligence security acts to learn regular patterns of user behavior and that means our system would be able to characterize if a behavior is malicious through experience, therefore capable to anticipate possible risks. It would actively control affected areas if affected by unauthorized behaviors, and with its learning capability, the system would guide unauthorized users bogusly, causing them to make error to gain response time on users’ favor.

These three building blocks works together to give our system the power to protect sensitive data regardless of the type of data we are working with. As digitalization has been taking place, accumulation of data has been a typical phenomenon in organizations across all sectors. Just as viruses mutate, cyber breaches have also been evolving, therefore traditional reactive cyber security measures are inadequate.

TRIAS Force – Continuous Immunization

Our three building blocks works together to contribute to the working functions of our system. Our system has been serving and protecting data bases, file servers, big data storages and private clouds across industrial, finance, security and governmental administration sectors with personalized features designed to work specifically with the target users. There are four modules to TRIAS Immunization which would tie back to the 3 building blocks of TRIAS force.

Evidence Tracking:
The implementation of Blockchain, will secure all ledger information, making user records impossible to remove. With our experience, we have developed an interface that would allow user’s tech personnel to quickly browse through visualization of security data and trace pervious records.

Active Defense Mechanism:
Auto defensive measures will take place in about 15 seconds from the time our system anticipates threat, our artificial intelligence will learn the route where breaches happen, and actively alienate the breach for cyber security admin.

User Behavior Profile:
From learning users’ behavior, malicious behaviors cannot be carried out even if an unauthorized user possesses highest system right privilege. Usual behavior and patterns are constantly being learned, and when irregular patterns or behaviors are detected, user will be alerted. This is based on a white list technology, instead of defining what cannot be done, we define what can be done.

Server Protection:
By setting up a program accessible white list for every server, even if an unauthorized user obtains the highest privilege right from the server, the attackers can no longer load the malicious attack program like system backdoor, computer virus, penetration tools. This ensures anti-cyber-attack security protection is always at a maximum level.

The server program white list is generated from the continuous immune system, which analyzes the server's daily running/maintenance strategy, syntax auto-generation. Thus, dramatically reduces the white list management cost and minimize the security risks from managing the white list.
In summary, the idea of continuous immunization is a combination of the 3 building blocks and 4 modules. Based on continuous monitoring analysis and established its protection scheme from the start of running our system. Our system can handle all the unknown potential risks such as 0day threat, APT attacks, loss of user management right and many other situations.
TRIAS Force: Other Applications
Combining the 3 building blocks of the system, TRIAS Force aims to provide enterprise-level DSaaS services (Decentralized Software as a service).  Alongside with the TRIAS Continuous Immunization system, our system can ensure the security and reliability of core data and key services for enterprises. By utilizing the security characteristic of blockchain, we can ensure that data and information can be traceable but not be altered. Our system’s potential can be extended when it is implemented in fields such as big data interaction, Internet of Things (IoT), and industrial Internet. It allows upstream and downstream flow to simplify information exchange using technology, therefore upgrades the industrial chain and supply chain. We also have the experience of building a blockchain system for enterprises in the industrial sector, (TF-ERP) TRIAS Force Enterprise Resource planning system, an integrated information platform covering enterprises’ industrial data , (TF-Auditing) an secure auditing system for accessing core data & (TF-Security) to secure user’s data.
TF-Industrial ERP (integrated industrial data service system)
TRIAS Force Industrial Data Integrated Service Platform TF-ERP targets factories and industrial businesses to build up a secured, trusted operation management data service platform. Along with providing easy-to- use, efficient ERP management tool, TRIAS Force also provides first-hand information to user’s management team, which can help industrial businesses become more digital and intelligent.
TF-Data Auditing (secured core data auditing system)
Throughout enterprise's daily management and information system maintenance, there tends to be a huge amount of data generated. For users, security, system reliability and core data tamper proof has always been key concerns.
Integrated with blockchain and security maintenance management, TRIAS Force’s Secured Core data auditing system is capable of having a high frequent record ledger and storage, combined with a high security node verification and confirmation. All the business workflow can be traced and checked in the future, which increase the work efficiency and reduce audit workload.
TF-Data Security (data security service system)
Existing data security protection system on the market mainly rely on a black list mechanism; through looking back and provide update patches from previous threats records to ensure the enterprise database system security. However, they have no defense ability on the 0day loophole threats.  Meanwhile, moral hazards bring huge data security challenges. By integrating the trust computation technology into operation system level, together with the blockchain's tamperproof characteristic, TRIAS Force can bring enterprise data security protection to a whole new level.


Attachment 1
Technical Benchmark Comparisions between TRIAS and other blockchain networks






至尊星科技有限公司&TRIAS Force简介

敬启者:

Supreme Star Technology Co.,Ltd是Supreme Star Technology Ltd(香港)的全资子公司。我们希望为需要信息技术升级,首次数据安全性或安全性增强等功能的企业和任何组织提供区块链解决方案。由于我们的系统具有多种功能,可以满足用户的需求。凭借领先的基准,我们有信心我们的系统是最好的系统之一。TRIAS代表可信赖,可靠,智能,自治的系统。TRIAS Force是一个多功能的区块链解决方案平台,基于三个基本构建块:可信计算,区块链和人工智能。到目前为止,我们的系统涵盖了公共和私营部门的企业和组织;仅举几例,包括光大银行,东吴证券,江西电力工业园等等。

介绍3个构建基块

首先,可信计算是一种计算机将始终如一地以预期方式运行的技术,该技术由计算机硬件和软件强制实施。可信计算负责TRIAS Force的可信赖性和可靠性,传统网络安全与可信计算的比喻是西方与中医的诊断方法。前者更接近还原主义,而后者更接近整体方法。
趣的事实:美国陆军要求其购买的每台新PC都带有一个Trusted Platform Module。截至2007年7月3日,几乎整个美国国防部也是如此。

然后,区块链负责安全地存储数据。区块链是越来越多的记录列表,称为记录块,这些记录使用密码术进行链接。每个块都包含前一个块的加密哈希,时间戳和事务处理数据。通过设计,区块链可以抵抗数据修改。它是“一种开放的,分布式的分类帐,可以有效且可验证且永久地记录双方之间的交易”。区块链技术可以集成到多个领域。今天,区块链的主要用途是作为加密货币(最著名的是比特币)的分布式分类帐。区块链技术不仅可以应用于加密货币,而且可以与金融服务,供应链,智能合约和更多的应用潜力结合。

第三,人工智能安全性的作用是学习用户行为的常规模式,这意味着我们的系统将能够通过经验来表征行为是否为恶意行为,从而能够预测可能的风险。如果受到未经授权的行为的影响,它将主动控制受影响的区域,并且凭借其学习功能,该系统将虚假地引导未经授权的用户,使他们犯错,从而获得响应时间,从而赢得用户的青睐。

这三个构建块共同作用,使我们的系统能够保护敏感数据,而不管我们使用的数据类型如何。随着数字化的进行,数据积累已成为所有部门组织中的典型现象。就像病毒变异一样,网络违规行为也在不断发展,因此传统的被动网络安全措施不足。

TRIAS部队–持续免疫

我们的三个构建基块共同努力,为我们系统的工作功能做出了贡献。我们的系统一直在为工业,金融,安全和政府管理部门的数据库,文件服务器,大数据存储和私有云提供服务和保护,其个性化功能旨在与目标用户专门合作。TRIAS免疫有四个模块,这些模块将与TRIAS部队的3个基础模块联系在一起。

证据追踪:
区块链的实施将保护所有分类账信息,使用户记录无法删除。根据我们的经验,我们开发了一个界面,该界面使用户的技术人员可以快速浏览安全数据的可视化并跟踪以前的记录。

主动防御机制:
自我们的系统预期到威胁发生之时起,自动防御措施将在大约15秒钟内发生,我们的人工智能将了解发生漏洞的路线,并主动向网络安全管理员疏忽该漏洞。

用户行为配置文件:
通过学习用户的行为,即使未经授权的用户拥有最高的系统权限特权,也无法执行恶意行为。经常学习惯常的行为和模式,当检测到不规则的模式或行为时,将提醒用户。这是基于白名单技术的,而不是定义不能完成的事情,而是定义可以完成的事情。

服务器保护:
通过为每台服务器设置程序可访问的白名单,即使未经授权的用户从服务器获得了最高特权,攻击者也无法再加载恶意攻击程序,例如系统后门,计算机病毒,渗透工具。这样可确保防网络攻击安全保护始终处于最高级别。

服务器程序白名单是从连续免疫系统生成的,该系统分析服务器的日常运行/维护策略,语法自动生成。因此,大大降低了白名单管理成本,并将管理白名单的安全风险降至最低。
总而言之,连续免疫的想法是3个基本组成部分和4个模块的组合。在持续监控分析的基础上,从运行系统开始就建立了保护方案。我们的系统可以处理所有未知的潜在风险,例如0day威胁,APT攻击,用户管理权丢失和许多其他情况。
TRIAS Force:其他应用
TRIAS Force结合了系统的3个构建块,旨在提供企业级DSaaS服务(分散式软件即服务)。除了TRIAS连续免疫系统,我们的系统还可以确保企业核心数据和关键服务的安全性和可靠性。通过利用区块链的安全性特征,我们可以确保数据和信息是可追溯的,而不可更改。当在大数据交互,物联网(IoT)和工业互联网等领域中实施该系统时,可以扩展我们的系统的潜力。它允许上游和下游流程简化使用技术的信息交换,因此升级了产业链和供应链。我们还具有为工业部门的企业构建区块链系统的经验-ERP)TRIAS Force Enterprise资源计划系统,涵盖企业工业数据的集成信息平台,-Auditing)用于访问的安全审核系统核心数据和-Security)以保护用户数据。
TF-Industrial ERP(工业数据集成服务系统)
TRIAS Force工业数据集成服务平台TF-ERP以工厂和工业企业为目标,以建立安全,可信赖的运营管理数据服务平台。除了提供易于使用的高效ERP管理工具外,TRIAS Force还向用户的管理团队提供了第一手信息,可以帮助工业企业变得更加数字化和智能化。
TF-Data Auditing(安全的核心数据审核系统)
在企业的日常管理和信息系统维护中,往往会生成大量数据。对于用户而言,安全性,系统可靠性和核心数据防篡改一直是关键问题。
TRIAS Force的Secured Core数据审核系统与区块链和安全维护管理集成在一起,能够频繁记录分类帐和存储,并具有高度安全性的节点验证和确认功能。将来可以跟踪和检查所有业务工作流程,从而提高工作效率并减少审核工作量。
TF-Data Security(数据安全服务系统)
市场上现有的数据安全保护系统主要依靠黑名单机制。通过回顾并提供以前威胁记录中的更新补丁来确保企业数据库系统的安全。但是,他们没有对0day漏洞威胁的防御能力。同时,道德风险带来了巨大的数据安全挑战。通过将信任计算技术集成到操作系统级别,再加上区块链的防篡改特性,TRIAS Force可以将企业数据安全保护提升到一个全新的水平。


附件1
TRIAS与其他区块链网络之间的技术基准比较




分享到 :
0 人收藏
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

积分:
帖子:
精华:
期权论坛 期权论坛
发布
内容

下载期权论坛手机APP