laitimes

Exclusively invested tens of millions of Oxford Dr. Oxford to use trusted computing to build a public chain to solve the data security of 10 users

author:Pencil Road
Exclusively invested tens of millions of Oxford Dr. Oxford to use trusted computing to build a public chain to solve the data security of 10 users

The eight components are the units of measurement in meteorology that calculate the extent to which clouds cover the sky. Nguyen Hopes That The Eight Components he founded could be used as a unit to assess a company's Internet cloud security capabilities.

Wen | Pencil Road reporter Nan Ke

"In the era of 'cloud and material migration', data has become a gold mine resource, and data leakage and tampering have become the main threats to personal and corporate information security." Eight components founder Nguyen An Bang said. With the increase in advanced threat vectors, the exponential growth of the number of endpoints, and the increasing amount of data in the cloud, traditional information security technologies have become difficult to meet the demand. Next-generation network security technologies such as cloud security and data security, identity and access control, and security intelligence and analytics are becoming the just needs of individuals and enterprises. The Eight Components, founded by Nguyen An Bang in 2016, mainly solves this problem. Based on the trusted computing and blockchain technology, Based on the trusted computing technology of "active immunity", combined with the immutability of blockchain technology, Bawei is a security solution provider based on the trusted computing technology of "active immunity" to solve the problems of data leakage and data tampering faced by traditional industrial data. In the past two years since its establishment, the team has established cooperative relations with more than 10 customers in the fields of banking, securities, government affairs, education, and medical care, among which the electronic contract blockchain depository system built for Soochow Securities has been put into use. At the end of 2016, Bafen received tens of millions of angel round financing from Hongtai Fund. In September last year, the team again received tens of millions of yuan in pre-a round of financing. At this stage, Bafen is seeking Series A financing, and the funds are used for team building and marketing.

Note: Ruan Anbang promises that the data in the article is correct and is responsible for the authenticity of the content. Pencil Road is an objective and true record, and the speed recording tone has been backed up.

Ten years of trusted computing research

Nguyen An Bang's association with computers began in 1997.

At that time, 12-year-old Ruan Anbang showed a talent in the field of computing. Although he was just beginning to touch computers, it took only one day for him to crack the week's homework left by the computer teacher.

Ten years later, Ruan Anbang entered the Department of Computer Science of Peking University for graduate school and began to systematically contact trusted computing. "For two years at Peking University, I stayed in the lab almost every day to study the technical principles related to trusted computing."

In computer systems, both software and hardware can be malicious or illegally damaged. Traditional information security protection mainly uses firewall, intrusion monitoring and virus prevention technology to block and kill the discovered vulnerabilities. Vulnerabilities can only be resolved after they are discovered, which is relatively passive in terms of security protection.

"Trusted Computing, by contrast, is active protection. It adopts two sets of architectures of operation and defense, and carries out security protection while calculating operations, so that the whole process of calculation can be measured and controlled, and is not interfered with, so that the calculation results are always the same as expected. Nguyen An Bang explained.

The research of trusted computing ran through Nguyen An Bang's graduate and doctoral studies. In his view, trusted computing is the foundation of information security. Therefore, during his PhD at Oxford University, he began to study the trusted implementation of cloud computing, including trusted computing, trusted cloud platform, cloud computing security and virtualization platform, and published many related papers.

After graduating with a ph.D., Ruan Anbang chose to stay as a researcher at the OERC Research Center of Oxford University, and participated in a number of trusted cloud and trusted big data platform direction projects, including the FP7 EU major project. Among them, in a fund project led by the British government to integrate industry, academia and research, Ruan Anbang's work focuses on the transformation of scientific research results.

During Ruan Anbang's Ph.D., the global cloud computing industry began to heat up, which allowed him to see more room for trusted computing. In 2016, a number of policies were introduced in China to encourage returnee elites to participate in the "double creation". Ruan Anbang returned to China to start a business, determined to industrialize the trusted computing technology of the laboratory.

In the early days of its establishment, Ruan Anbang's eight-component project is to do enterprise data security solutions with trusted computing as the core technology, and the product is a continuous immune system based on trusted computing, helping enterprise users solve the problem of "intranet security", so that enterprises can clearly know "who moved my data" and "who moved my machine".

Access to blockchain technology

Because the entire computation process is measurable, controllable, and undisturbed, trusted computing can build a trust environment so that executions carried out in accordance with the program can always achieve the expected behavior. But how to ensure that the data of trusted computing itself cannot be tampered with and stolen?

Blockchain technology brings new ideas to Nguyen An Bang.

"Blockchain technology enables data to be immutable due to distributed ledgers, which complements the trust environment constructed by trusted computing technology." Ruan Anbang explained that although the blockchain can ensure that the data is difficult to tamper with, it needs the confirmation of each node when it reaches consensus, which makes the consensus efficiency very low. Since trusted computing is performed exactly as programmed, the results are safe and trustworthy.

Therefore, Ruan Anbang believes that after combining the blockchain, trusted computing is equivalent to putting a lie detector on each node of the blockchain to ensure that each node is very difficult to lie, so that the time for consensus confirmation can be shortened and the application efficiency can be improved. In this way, because of the combination of blockchain technology, Eight Components can not only solve the security of the enterprise's intranet, but also ensure the data security of each machine. Introducing blockchain and integrating the accumulation of trusted computing, the trias blockchain project came into being.

In Ruan Anbang's view, the industrial Internet is the trend of the times, and the online data security precautions of traditional enterprises in various industries are the space for trias applications to land, "trias can provide trusted data infrastructure for the industrial Internet of the whole industry." ”

In November last year, the team used trias to develop the "Electronic Contract Blockchain Depository" project for Soochow Securities. As we all know, the daily network business of securities companies involves the management of depository certificates such as option electronic contracts, equity electronic contracts and asset management electronic contracts. Once contract data is lost or tampered with, brokers will face serious financial losses.

In the information environment with increasingly frequent network attacks, Bafen uses trusted computing + blockchain technology to create a customized module, and the blockchain depository module of the electronic contract is connected to the original system of Soochow Securities through API, which helps it realize the standardization and credibility of the electronic contract blockchain depository and certification service without destroying the original process.

At the same time, the eight-component team also sets up anti-virus and anti-attack for critical data for them in terms of security. At present, trias has served more than 10 customers in the fields of banking, securities, government affairs, education, medical care, marine, agriculture and other fields. Its main profit model is paid revenue for technology services.

At the end of 2016, Eight Shares received tens of millions of angel round financing from Hongtai Fund. In September last year, the team again received tens of millions of yuan in pre-a round of financing. Now, Eight Components is seeking Series A funding for team building and marketing.

"In the future, people will rely more and more on machines, so how to believe in machines, trusted computing and blockchain are the core technologies to solve the problem of 'trust', what we have to do is to make people fully believe in machines and trust machines." Nguyen An Bang said.

Edit | Wu Jinna

Proofreading | Liu Xiaoqian

Read on