The Matrix Platform, A Drop Network Architecture

    
Data Drop Core Layer
Image

Matrix Data Drops are information containers that support drop networking, storage and management attributes. Data Drops provide Data Access to Drops and support Data Visibility Levels of the information stored inside a drop. Data Drops are long standing, while the information inside a Drop is TTL bound.

Matrix Transport Protocol
Image

The MXTP protocol runs over TCP/IP and is compatible with today's physical networking infrastructure. MXTP is the transport layer between Internet Controllers and the Data Drop Clusters inside of a Matrix Data Center. MXTP is a proprietary protocol developed by the Los Altos Research Center.

Drop Access Layer
Image

Drop Access is controlled by multiple independent channels to uniquely addressed Drops. Both read and write channels are available to Internet Controllers. Drop Addresses are private and not discoverable by default. Drop visibility is controlled by the Drop Creator.

    
Matrix Super Privacy
Image

The Matrix Drop Network combines Drop Access and Amplified Encryption to create super level computing privacy. Privacy at all levels including the data, networking, transport and user (machine) levels. Super Privacy includes TTL, Haystacking, and P-Algorithm facilities.

Amplified Encryption
Image

The Matrix Platform actually provides complete privacy without the need for encryption. Integrating shared secret and Caesar Cypher encryption into P-Algorithms creates limitless variations of strong privacy models. Slicing, randomizing and stacking such models increases the amplitude non-linearly.

CypherK Algorithms
Image

CypherK Privacy Algorithms combines Drop Access Layer with "Drop Scatter - Gather" addressing and Caesar Cyphers. Drop Meta or Drop Payload structures can be CypherK'd. Drop Addresses are often chained in this model and also can be inter-Matrix formed.

Drop Meta Architecture
Image

While Data Drop Models can be implemented with singular drops, Multi-Drop Model provide extreme efficiencies and privacy to the operation of a Drop Network. The Matrix implements many Drop Models including a Two Write Model; Static and Dynamic Meta Models; Short and Long Standing TTL Models; and of course any combinations there in. Meta-less Drop Models are very common especially in static drop payload model situations.

Drop Routing Layer
Image

The Matrix Drop Router provides drop mobility between controller and Matrix Grid, from Grid to Grid, and supports hydration of Drops into a computer node (endpoint, server, IoT Device, DC, etc). Routing algorithms provide routes with extremely high confidence levels. Drop Route Maps, Route Meta, and Dynamic Routes are all utilized on the Matrix. Standard drop routing is appropriate for most cases; highly sensitive situations could dictate custom routes.

Matrix Identity
Image

Matrix Identities are not required for Matrix usage. Some Matrix facilities do require a registered ID (e.g. Drop Casting, Public Search). We recommend a minimum of a "peer negotiated ID" to allow your friend network to trust presented membership. The end user configures their own Matrix ID using the "Self" controller application. The Los Altos Research Center provides various levels of ID Verification to its consumer users and commercial customers.

Matrix DDNS
Image

The Matrix includes a distributed Data Drop Name Service. We refer to this as the global DDNS. Commercial customers can deploy their own layered or independent DDNS as part of their Matrix Deployment.

Matrix Key Factory
Image

The Matrix Drop Network includes a shared secret or "key" Factory which provides automated and sophisticated Key Generation and Distribution. The Key Factory can optionally serve end users, machines, servers, or devices.

Distributed Search Indices
Image

Matrix Search can index both Matrix and Web content. Search indices are a combination of public or private indices. Search Indices from the Research Center are distributed to Internet Controllers and third party Matrices.

Drop Grid Haystack
Image

Information "on the wire" in a Drop Network exists for a period of time called a TTL. TTLs define when information inside of Data Drops expire. Once expired, the original information is destroyed and the replaced with "filler information". The accumulation of this zero value "filler" is termed Haystacking. The bigger the haystack, the more the privacy.

Machine Data Bus
Image

The Machine Data Bus is most often used for machine2machine or server2server transport. The "BusDrop" utilizes specific routing, P-Algorithms, and the key factory to support critical transport & transactional data models. A BusDrop Model often includes "directory" or "directory vault" transfers.


IoT Drop Network
Image

Similar to the Matrix "Friends" and "Family" private networks, device networks can be configured by the end user. Device networks maintain their own routes and data drop visibility. IoT Devices must embed the Matrix Drop Library to utilize the Matrix drop network. The MicroSCIF and Matrix Cube devices are both examples of Matrix IoT devices.

SCIF Platform
Image

The Research Center provides both software SCIFs (virtual SCIFs) and hardware SCIFs. SCIFs provide ingress support of information to an offline and searchable content repository.
SCIFs provide users the ability to safely store their information and easily retrieve/track said information. SCIFs manage information safely OFFLINE.


Endpoint Search Layer
Image

Internet Controllers with their respective SCIF attributes, provide end user local data search capability. Search Term are defined by the end users along with data associations. The endpoint search engine integrates with user (or machine) data, integrates with DDNS, and also allows for custom search indices. Matrix Search does not share search information off board.

Data Resilience
Image

User data backups and archives are protected by user defined encryption phrases. Backups are stored in Matrix Data Vaults and can grow to very large sizes. Matrix Vaults can be transported in various ways over the Matrix to remote targets. Users can easily implement remote (offsite) "Buddy Backups" with high trust confidence and without worry of "ghost copy" proliferation.

The Matrix™ Platform

The Matrix Platform, Internet Controllers and respective Data Drop Network has been invented, designed, engineered and patented by the Los Altos Research Center. The Matrix Platform fully adheres to the principles, philosophies and mandates of Organic Computing.

The Matrix Platform can be commercially licensed. Hosted, private, public and on-premise deployment models are available. Contact sales@thematrix.co for more information.

NOTE: Current Matrix Mobile Applications on the Apple App Store will be deprecated and replaced by Mobile Internet Controllers. Existing mobile applications will continue to function, however, no version updates will be maintained.

NOTE: The Windows10 WinRip application and the Linux Rip binary will no longer be supported.

Publications regarding the Theory, Design, and Practicum of Data Drop Networks, Drop Privacy Algorithms and Amplified Encryption are published on the Matrix. Email "info@thematrix.co" for inquiries about technology partnership and integration.

Image

Copyright © 2019 Los Altos Research Center. All rights reserved.