top of page

FileChain Node

"Verify authenticity of transactions to run an always-on consortium blockchain"

FileChain Node

Features

End-to-end privacy

Enables granular data sharing between all actors onboarded on a ledger. Access is controled by cryptography and not by code or policy so no data is ever exposed beyond those with a need-to-know.

Smart logic

FileChain Smart Logic enables any system onboarded on a ledger to react instantaneously to any update or transaction published on the ledger.

Any worklfow logic and rule-based automation can be implemented with both privacy and transparency and without the drawbacks associated with smart contracts of public blockchains (The business logic remains confidential, without any potential for hacking or abuse and there is no gas fee to pay for instance).

Source-Of-Truth

Any structured data (JSON, XML, etc) and unstructured data (document, agreement, legal prose) on-chain with absolute access-rights enable a FileChain ledger to become a "source-of-truth".


Digital signature, official timestamp, self-audit, full identity management on-chain and built-in immutability enable digital trust among all actors within a consortium.

Integration ready

The FileChain platform includes an extensive Java SDK, powerfull REST APIs easy to integrate as well as many connectors to enable extremelly rapid development and deployment of a Proof Of Concept (POC) or production system with no hosting requirement and no dependency on any other blockchain.

Transaction validation

The digital signature associated with each transaction is validated to be accepted by a node into a candidate block to guarantee the provenance of each transaction from the appropriate actor / cryptographic identity.

Block election

Each candidate block is evaluated against other potential blocks from other nodes to determine the next block to expand the blockchain using a lightweight consensus mechanism to guarantee fast propagation time and low finality time. 

Network propagation

All current valid transactions are packed into a block which is then distributed accross the network of all nodes for a ledger.

Node customization

Any number of Java-based applications can run within a FileChain node to customize its behavior or to expose additional REST APIs.

Superiority

Strict Authenticity

The FileChain platform is based on blockchain principles and Distributed Ledger Technology (DLT). 


Asymetric cryptography refers to a public key, associated with a cryptographic identity, which is widely shared over a ledger while the private key part of that same cryptographic identity is never shared with anyone.


Digital signatures at FileChain rely on such asymetric cryptography to verify the irrefutable strict authenticity of every single transaction before it is even considered for inclusion into a decentralized ledger.


Irrefutable and strict authenticity is fondamental to enable digital trust.

Definite Timestamp

The FileChain platform is based on blockchain principles and Distributed Ledger Technology (DLT). 


The immutability of a blockchain means that the timestamp associated with each transaction becomes final and a definitive timestamp once that transaction is validated and inserted permanently within a FileChain ledger.


Definite timestamping is fondamental to enable digital trust.

Highly Scalable

The FileChain platform is based on permissioned ledgers to eliminate all well-known scalability limitations of public blockchains. Also the  FileChain technology does not impose any specific hosting requirement.


Each FileChain ledger can run within any environment to unleash excellent scaling capabilities for each deployment. Many instances of the FileChain nodes run by multiple organizations can run the ledger to guarantee an always-on model.


Each FileChain agent can manage many cryptographic identities and actors to offer  excellent horizontal scaling.


Finally, each FileChain ledger enables very natural "sharding" of the data domain with the possibility of running multiple sub-ledgers instead of one to meet the scalability and performance requirements of any large enterprise-grade, industry-wide deployment.

Immutable

Immutability refers to the ability for a FileChain ledger to detect with cryptographic guarantees if anyone tries to alter any past transaction already approved and validated within a FileChain ledger.


Immutability or the no-rewrite rule  is fondamental to enable digital trust.

Crypto-Agile

Crypto-agility is the ability to easily integrate a new cryptography, once officially approved by NIST. Each FileChain ledger supports full crypto-agility for EC, RSA as well as Quantum Resistant cryptographies so that a simple software update is all it takes for new transactions to be generated with a brand new cryptography.


Crypto-agility is required for any deployment to be future-proof, especially with new Post-Quantum cryptographies which will definitely become de-facto standards over the next few years.

Split-Brain Recovery

Each FileChain node is designed to recover and to synchronize itself against the appropriate history of transactions in case of network partitions or split-brain situations.


It is fundamental for all nodes to recover into a common and identical set of transactions. 

FileChain Node

In Action

Ledger Map

Ledger Map

Ledger Node Blocks

Node Blocks

FileChain Enables Digital Trust.

A Question,
Problem,
Suggestion ?

bottom of page