DataShield

an advanced technology to ensure data security

DSCB (DSC Bank) Data Shield

In order to build "shared secure storage" digital currency issued by the Internet

Safety of person and assets is under severe threat from data leakage
In China, the illegal trade of data has become the third largest black industry
in the underground after gambling and pornography with a 100 billion annual value
The existing wall-building way is outdated
The most common one among the existing security tools is to build gateways before the servers. However, with the development of cloud computing and mobile Internet, the boundaries between the systems have become more and more obscure
The Centralized structure is the peimary cause
From the perspective of storage technology, whether it's personal data or enterprise data, whether it's MySQL, Oracle, DB2 or SQLServer, whether it's hot data at data base level or cold data at storage level, the data is stored in a mode of centralization, aiming at facilitating data access and storage as well as the construction of relational access relations
Changing the data storage technology is the only way out
In the field of information security, there is a famous saying: “While the priest climbs a post, the devil climbs ten”, indicating that there is no impermeable walls in facing of various measures of avoidance and attack, which is due to the unequal cost of attack and defense. According to some statistics, the cost of attack is only 1/7 to 1/5 of the defense cost, resulting a losing battle for the defenders. Thus, it is crucial to adopt the technology of de-centralizationa and safe storage
DIF
Data Intelligent Fragmentation is a data security technology used by Data Shield that fills, slices and reverses the original data (personal photos, private key of E-wallets, account passwords, confidential documents) on bit base and distributes them to each node in the network. In this process, technical means like encryption of file fragments, N-Backup, N-Copy are adopted
ZKP
In the reversion process of the data fragments, Data Shield uses the Zero Knowledge Proof (ZKP) mechanism to ensure that only the host of the data can open the reverse algorithm thus to protect data security. Compared with the traditional encryption technology, the innovative ZKP mechanism of Data Shield allows the host to save no keys, preventing the dilemma of key preservation
N-Recover
The technology developed by Data Shield to recover the data stored in each node of the network in any severe circumstances is called N-Recovery which includes N-Backup and N-Copy
The existing wall-building way is outdated
The most common one among the existing security tools is to build gateways before the servers. However, with the development of cloud computing and mobile Internet, the boundaries between the systems have become more and more obscure
The Centralized structure is the peimary cause
From the perspective of storage technology, whether it's personal data or enterprise data, whether it's MySQL, Oracle, DB2 or SQLServer, whether it's hot data at data base level or cold data at storage level, the data is stored in a mode of centralization, aiming at facilitating data access and storage as well as the construction of relational access relations
Changing the data storage technology is the only way out
In the field of information security, there is a famous saying: “While the priest climbs a post, the devil climbs ten”, indicating that there is no impermeable walls in facing of various measures of avoidance and attack, which is due to the unequal cost of attack and defense. According to some statistics, the cost of attack is only 1/7 to 1/5 of the defense cost, resulting a losing battle for the defenders. Thus, it is crucial to adopt the technology of de-centralizationa and safe storage
DIF
Data Intelligent Fragmentation is a data security technology used by Data Shield that fills, slices and reverses the original data (personal photos, private key of E-wallets, account passwords, confidential documents) on bit base and distributes them to each node in the network. In this process, technical means like encryption of file fragments, N-Backup, N-Copy are adopted
ZKP
In the reversion process of the data fragments, Data Shield uses the Zero Knowledge Proof (ZKP) mechanism to ensure that only the host of the data can open the reverse algorithm thus to protect data security. Compared with the traditional encryption technology, the innovative ZKP mechanism of Data Shield allows the host to save no keys, preventing the dilemma of key preservation
N-Recover
The technology developed by Data Shield to recover the data stored in each node of the network in any severe circumstances is called N-Recovery which includes N-Backup and N-Copy
DSCB Foundation
Basic chain technology
Minig technology
Terminal applicatins
Security technology

DSCB Foundation

The ERC20 of Ethereum and co-developeted chain like bubi

The subscription process
More than 35000+ people have participated in DSCB project
DSCB Operation Mechanism
TO C    TO B

TOB

enterprise data- protection and leakage prevention

With the help of cryptography, the original data is sliced and stored distributively ( through VM or Docker) as to prevernt data leakage. Only the host can reassemble the slices and the hackers have no access to independently meaningful data

TOC

personal data- safe and shared

Individual users, through the sharing of personal family NAS space, can provid data storage space for others. Though preserving the private data of others, they cannot see the original data, because the data is saved as independentlly meaningless slices in NAS.
Relevant information
To contact us