System Architecture
Last updated
Last updated
Intract Protocol is a secure protocol which enables users to store all their private data securely using same standards. The data is encrypted and controlled only by the user. Users have complete control, being able to share selected data segments with trusted authorities—such as AI agents—without exposing the raw underlying information. This ensures that any computations are performed securely, and only the processed results are shared.
The architecture comprises of 4 layers (or 4 horsemen). These 4 layers form the core of the protocol that allows us to achieve all of the system objectives. Let's explore each of these layers.
Each of these layers handle a specific aspect of data management. (We will dive deeper into each one later)
Role: Executes secure computations on the encrypted data using a decentralised TEE network, exposing only the processed results to third parties.
Non-Technical Analogy: Like hiring a trusted expert who can work on your secret recipe without ever seeing the full details—only the final dish is served.
The following steps outline the journey of user data through our system:
User Authorization:
The process begins with the user granting permission to ingest data from various platforms.
Data Ingestion:
The Ingestion Layer manages collection of this data and prepares it for secure storage.
Secure Storage:
Collected data is encrypted and stored in the Storage Layer.
Access Management:
When a third party or an application requests data, the Access Layer verifies the permissions and ensures that only authorized data or computed results are shared.
Secure Computation:
The Compute Layer performs decentralized, secure processing on the data, providing only the results to the requester without exposing raw data.
Layered Security: Each layer incorporates specific security measures, ensuring robust protection at every stage.
Decentralized Computation: Utilizing a decentralized Compute Layer reinforces trust and minimizes the risk of data manipulation or leakage.
User-Centric Design: The architecture is designed with the user in mind, prioritizing privacy, control, and seamless data portability.
Scalability & Flexibility: Our modular design facilitates the addition of new data sources and adapts to evolving security challenges.