The Matrics2 Blockchain

The great security vulnerability with current blockchain approaches are that they are an open distributed ledger system that are managed by a peer-to-peer network. They collectively adhere to a crypto-security protocol for validating new blocks, which are basically an open invitation to the “world of hackers”. This “world of hackers” has become a common occurrence with break ins, stealing merchandise and ransomware worth tens to hundreds of millions of dollars of lost value. These crypto-security protocols used by current blockchain approaches are and will be vulnerable to the rapid advancement in computer technology and will become even more vulnerable in the future with the advancements of quantum computing.

1. It uses a Centralized Secure Database (SDB) that is secured both physically and by limiting access to it only through a Database Interface App (DIA) with a communication channel secured by 256-bit Random Number (RN) one-time pad symmetric keying, which is unbreakable even with quantum computers.

2. Unique 256-bit App RNDID (ARNID),

3. The SAPs are enabled with an electronic Touch Access Portal (TAP) for 13.56 MHz near field communication with NFC reader enabled Smart Phone. The SAPs RNIDs are SRNIDs.

4. For financial transaction Matrics2s blockchains, a “treasury” is established that provides for the creation and tracking of the each of the Blockchain transaction and ownership blocks, using RNIDs provided by the SDB.

5. A new transaction block is created for every transaction, which in turn creates new ownership blocks. The transaction Random Number block is identified with a time stamped RNt and the ownership Random Number blocks is identified with an RNos feeding that new transaction.


6. For physical asset tracking Matrics2 NFC Touch Access Point (TAP) labels are affixed to the assets. 

7. Multiple assets can be associated with one RN in the SDB as shown in the attached figure for “nesting”. The transaction block created for this would be identified by the RNos of the individual asset ownership blocks, and an RNt. A new ownership block would be identified by the RNt and an RNo for that new block. Transaction and ownership blocks are created as described above to transfer this asset from one person (or entity) to another. At some endpoint (delivery to the final customer or store) that last ownership can be “cashed in” to ungroup the individual assets each with their own unique identity. This is done by back-chaining using the RNts and RNos of each block referenced to the previous to arrive at the original transaction block that first grouped them. The “cashing in” transaction block would then create ownership blocks for the individual assets that are identified by the RNt of that transaction block and a new RNo for each asset.

8. The Matrics2’s Blockchain approach can be used for any enterprise which requires a permanent record of asset and/or transaction tracking. Examples include, electronic voting and electrical power creation, distribution, and usage. Existing data networks can be secured with SAPs to provide unbreakable network security, which can be further explained separately.