Use Cases

KATLAS Innovation – Web3.0 Router

Through leadership in distributed governance, and a KATLAS Web3.0 router serving every household and business, we shall empower and inspire individuals and organisations to participate privately in a truly interactive and sustainable society.

KATLAS-DG-logo-new-1
young  boy enjoying and playing computer game at home

Problem: The web2.0 infrastructure is not fit-for-the-purpose, lacking the necessary security, privacy, and hence efficiency for regulated digital interactions. However, we are still operating in a web2.0 environment, which relies on a client/server paradigm that suffers problems of trust and market inefficiencies. Web2.0 does not serve the user, the client or the organisation, regulating it has proved painful and highlighted the need for a new approach.

Solution: Web3.0 describes the future of the internet, where Human Trust is replaced by a Computer Based Trustlees paradigm, where decentralised identities enable the sharing Verifiable Credentials on a Trust Graph. KATLAS Wallet Systems facilitate Web3.0 interactions that are peer-to-peer (P2P) and symmetrical, with a new serverless paradigm underpinning it. In this model, participation, collaboration, trading, reporting, shopping, and decision-making are conducted via privacy wallets, and third parties are replaced with smart contracts sitting in blockchains. Business models are distributed and automated, enabling individuals to automate essential functions such as monetization of their private data, accessing tailored marketplaces, government assessments, social interactions, trading, managing investments, and health systems.

The KATLAS wallet system: acts as a universal interoperability layer, seamlessly integrating new data points and sensors captured from various systems. The integrated applications will expand to capture data from devices connected through USB, Bluetooth, Wi-Fi, or Ethernet, establishing a local network and connectivity. Notably, the system demonstrates its functionality without relying on cloud access, enabling data transmission during the transit of multi-purpose vehicles such as submarines, aircraft, or military craft. This is achieved by leveraging existing communication devices with proven low power consumption, such as routers or Raspberry Pi Zero.

Privacy concerns: our solution is an L1+L2 system. L1 is a distributed settlement system or blockchain, while L2 is a P2P network of wallet agents, also known as digital twins, personal hubs, or other names that refer to the same architecture designed to automate and represent its owner. The proposed technology includes the plug-in architecture called R2R, or role-to-role protocols, where users can have their twin work for them in multiple scenarios based on peer-to-peer trades. The goal is for everyone to participate actively in P2P networks running nodes, which will enable them to run nodes at home.
As members of the UKRI DSbD program, our solution has been tested using the CHERI architecture and the ARM Morello board. CHERI is a spec produced by Cambridge University that protects against cyberattacks and software failures, preventing private data leaks, a crucial feature for privacy wallets.

The proposed solution provides privacy, autonomy, and safety for its users.

KATLAS functional capability (CIA)

Confidentiality: is maintained through the use of Zero-knowledge proofs combined with three-way authentication, executed based on the ECDSA (Elliptic Curve Digital Signature Algorithm). These measures are augmented by the integration of STARKS, providing a secure execution environment for user-defined proofs. Communication between nodes employs AES encryption for node-to-node transmission, featuring periodic re-negotiation of shared secrets. Private encrypted data, such as health records, remains safeguarded within users’ respective nodes, protected by trusted algorithms.

Integrity assurance: is maintained by employing encrypted streams and signed documents, where certificates play a pivotal role in safeguarding against tampering. Should any bit of a message undergo alteration during transit, the digital signature would promptly expose the modification, promptly alerting the recipient. For detecting deep fakes, an algorithm is essential unless content is digitally signed, in which case detection becomes straightforward. Our approach to data stream security involves AES Symmetric encryption, valued for its efficiency and low CPU utilization. Potential enhancements encompass the incorporation of a honeypot beacon with executable branches. To ensure data-centric principles, we deploy extensible Access Control Lists (ACLs).

Addressing data veracity, we embrace P2P transmission to bypass third-party obfuscation. This is facilitated by nodes within a Content Distribution Network (CDN) utilizing our proprietary KdCDN protocol.

Availability – Our groundbreaking element, codenamed ‘kpeer,’ assumes a pivotal role in orchestrating a dynamic array of connection groups. Each of these groups possesses the adaptability to accommodate a tailored number of neighbouring nodes, each abiding by its distinct topology regulations. This degree of flexibility empowers nodes to seamlessly participate in various networks or configure diverse levels of Quality of Service (QoS). Furthermore, the assurance of Availability is fortified by our adaptable software stack, which is engineered to run on ruggedized hardware explicitly designed to withstand a spectrum of environmental conditions. This includes extreme temperatures (such as those encountered by solar orbiter satellites), vibrations (pertaining to vehicles), humidity/corrosion (relevant to maritime Search and Rescue operations), electromagnetic pulses (impacting military equipment and critical infrastructure), or even challenging high latitudes.

Safeguarding Quantum Resistance: is maintained through a highly adaptable configuration approach. The emergence of quantum computers raises legitimate concerns regarding the time required for these machines to compromise encryption, thereby rendering it obsolete and necessitating security upgrades. This upgrade mechanism can be as straightforward as extending the length of secret keys. For every additional bit appended to our current 256-bit key-length configuration, the quantum computer’s (QC) time required to breach the cipher and execute a successful attack doubles. 

Value to Industry: Digital twins represented by personal wallets, interconnected via smart contracts with privacy protocols on a foundational decentralised platform, will advance the data interoperability essential to drive monumental transformation in health innovation, green industrial growth and a resilient UK.

 

“Katlas has a unique technology which can be used for responsible use of AI to enhance health research, education, space sustainability, and public services. Brunel University is delighted to work with Katlas to optimise its innovation.”

Dr Michael Joseph, Business Development Manager and RIEm Programme Lead, Brunel University London

KATLAS offer industry innovators an immediately accessible Web3.0 Router, as the starting point, the hardware and software to test and scale to global projects; to converge with emerging technologies and support next generation remote service delivery with a metaverse presence.

Let's see if we're the right fit for your business.

Get in touch now for obligation-free advice and more information on our service offering.

Let's discuss your project

Wondering if KATLAS is right for your business? Looking for a demo? Just curious? We're super excited to hear your ideas and help you imagine a new future for your enterprise.