ALIEN
Welcome to ALIEN
Welcome to ALIEN
  • Alien: Connecting the Future of Communication
  • πŸ–‡οΈALIEN Overview
    • πŸ”₯Origin of the Name ALIEN
    • ❗ALIEN's Iconic Symbolβ€”WOW!
    • πŸ’ŽMain Features and Advantages of ALIEN
  • πŸ’­Vision and Philosophy of ALIEN
    • ⏳ALIEN's Philosophy
    • 🎯ALIEN's Future Goals
  • πŸ“±ALIEN Feature Introduction
  • 〽️Web3 vs Web2
    • ♾️Differences Between Web3 and Web2
    • 3️⃣Why Web3 is Needed
    • πŸ”Alien VS Telegram: More Privacy
    • 🧷Alien VS WeChat: More Secure
    • β™’Alien VS WhatsApp: More Streamlined
    • πŸ“ŠSummary Comparison
  • ⛓️Blockchain Technology Used by ALIEN
    • πŸ†”DID Identity Authentication
    • βš™οΈEnd-to-End Encryption
    • πŸ”‘On-Chain Encryption Technology
    • πŸ› οΈPrivacy Protection in Video Calls
    • πŸ“ŒWallet Generation Technology
    • 🧬Multi-Chain Interaction Functionality
    • πŸ“Encrypted File Transfer Mechanism
  • πŸ“²Advanced Applications of ALIEN
    • ✍️Text Chat
    • πŸ“žAudio Calls
    • πŸ‘₯Video Calls
    • πŸ€‘Personal and Group Red Envelopes
    • πŸ™ŒMulti-Person Video Conferencing (Massive Online Meetings)
    • πŸ›œWeb3 Community
    • 🌍DApp Browser
    • πŸŒ‡NFT Marketplace
    • πŸ’²Highly Customizable Wallet
  • πŸ’‘ALIEN's Technology Architecture and Concepts
    • 🚧Client Architecture
    • πŸ’»User Interface Layer (UI Layer)
    • πŸ”¦Application Logic Layer
    • ✳️Network Layer
    • πŸ”“Security Layer
    • #️Data Layer
  • πŸ”ALIEN Security Architecture
    • 🚨Security Architecture Details
    • πŸͺͺUser Authentication
    • βš™οΈEnd-to-End Encryption
    • 🧷On-Chain Encryption
    • πŸ”‘Data Storage Security
    • β˜‘οΈTransmission Security
    • πŸͺƒMulti-Layer Protection Mechanisms
  • πŸ–₯️ALIEN Server Architecture
    • πŸ’ΏDetailed Server Architecture
    • πŸ”‹API Gateway
    • βœ”οΈAuthentication Service
    • πŸ—žοΈMessage Transmission Service
    • 🈁Data Storage and Management Service
    • πŸ”ŽEncryption and Security Service
    • πŸ“†Monitoring and Log Management
  • πŸ’ΎALIEN Data Storage and Management
    • β™ŸοΈDetailed Data Storage and Management
    • 🧩Distributed Database
    • πŸ“Distributed File System
    • πŸ“©Data Encryption
    • πŸ“§Data Synchronization and Consistency
    • πŸͺ„Data Backup and Recovery
  • πŸ“‘ALIEN Network Communication
    • 🌐Detailed Network Communication
    • πŸ“¨Communication Protocols
    • ⏫Real-Time Communication
    • βœ…Data Transmission Security
    • πŸ’―Network Optimization
    • πŸ›°οΈCross-Regional Communication
  • βš“Protocols and Standards Used by ALIEN
  • πŸ”„Network Optimization and Performance
  • πŸ“‹ALIEN Development Roadmap
    • 4️2024
    • 5️2025
    • 6️2026
  • πŸ“”ALIEN APP Update Log
    • Untitled
Powered by GitBook
On this page
  1. ALIEN's Technology Architecture and Concepts

Data Layer

The data layer manages the application's data storage and access, including local storage and remote storage. By combining blockchain technology, Alien ensures that user data can only be accessed and decrypted by the user, and no third party, including Alien's developers and operators, can access the user's private data.

Local Storage

Alien uses local storage on the user's device to store temporary data and cache to improve the application's performance and user experience.

  • SQLite Database: Used to store user chat records, application settings, and cache files. All locally stored data is encrypted to ensure data cannot be accessed even if the device is lost or stolen.

  • Encryption Technology: Uses AES for local data encryption, with keys stored in the device's secure storage area (e.g., iOS's Keychain and Android's Keystore).

Remote Storage

Alien uses distributed storage technology and blockchain technology to ensure data consistency and security across multiple devices.

  • Distributed Storage: Uses a distributed storage network to store user chat records and files. These data blocks are encrypted, and only users with the correct decryption key can access them.

  • On-Chain Encryption Technology: Uses blockchain to record verification information of data storage and transmission, ensuring the immutability and transparency of the data. Every storage operation generates an on-chain record to prevent data tampering.

On-chain Encryption

Alien's on-chain encryption technology ensures absolute security of data during transmission and storage. All data is encrypted before being uploaded to the distributed storage network and blockchain.

  • Asymmetric Encryption: Uses RSA (public key encryption algorithm) for data encryption. Each user has a pair of public and private keys, where the public key is used for encryption and the private key is used for decryption. Only the user with the private key can decrypt the data.

  • Symmetric Encryption: In some cases, to improve encryption and decryption efficiency, Alien also uses AES for data encryption. The symmetric encryption key is transmitted using asymmetric encryption to ensure the security of the key itself.

  • On-Chain Storage: The hash value of the encrypted data is stored on the blockchain as a basis for data verification and traceability. The immutability of the blockchain ensures the integrity and security of the data.

PreviousSecurity LayerNextSecurity Architecture Details
πŸ’‘
#️
Page cover image