Plater Information Flow System
The Plater Information Flow System (PIFS) manages data flow within the network, allowing secure data transfer between nodes with distinct roles.
Plater Information Flow System being designed as an internal algorithm that is being used to distribute, flow, and share the data with use of blockchain technology. It involves all the aforementioned and the further mentioned concepts that will be the foundation for a seamless process of data and information flow within Plater Network. Understanding the transaction functioning and design is crucial, and was therefore explained below in a graphical method. Plater Information Flow System (PIFS) is simplified and minimizes the risk of data leaks. It ensures reinforced data protection thank to the use of compounded hashing and encryption methods. What is more, the decentralized nature of the network adds to the protection and provides a robust network that assures a liquid flow of information.
The transaction process involves a few governance roles and nodes. The concept of Plater Network and its information flow system works as follows: User1 of the network decides to send the information to User2. User1 uploads files (documents, information etc.) to the network. Thanks to the plotting and mining, the storage is secured and cannot be used in other purposes than data transfer. Nodes have unique addresses. Therefore, the transaction can be requested. The validator accepts the request, and the transaction can be settled. It gets encrypted to ensure the highest security, and the information hash is assigned. User2 successfully receives the information directly to his claimed hardware storage, and then it may be safely opened locally on the device. Please, see the diagram below for better understanding of the functionality.
Sender Node: Encrypts data and submits it to the network for storage.
Validator Node: Validates and authenticates the data, ensuring integrity without requiring access to the actual data.
Receiver Node: Decrypts and accesses data upon retrieval, ensuring authorized access only.
Last updated