The Pillars of Blockchain


The first action is the registration/transcription

The first action is the registration and transcription of the data within the blockchain. This is a function that is generally performed by an accredited and community-recognised figure, such as a notary public.
“How does the blockchain perform this function?”

The registration/certification of data is entrusted to the community of interconnected users, who provide the blockchain technology with public IPs, understood as the physical addresses of their PCs or devices. The recognition of
IPs is done through hardware, called SpeedBoxServer, which performs the triple action of registration, decentralisation and data storage. Each user has similar or dedicated hardware.

When a datum is generated

A series of IPs is randomly queried When a piece of data is generated in the blockchain (e.g. an exchange of messages between two users), a series of IPs is randomly queried: from the same IPs, a unique message is bounced back at instant zero. To give an example: as if a photograph were taken instantly by many photographers at the same time, depicting the same subject and the same perspective for all. If just one of the IPs in question sends back a discordant response from the others, the recording is cancelled and immediately resubmitted, replacing all the IPs from the first query. This is a procedure to prevent intrusion and corruption of the system by a hacker.

The Hackers

They are entities that intrude into computer systems in order to replace accredited actors (such as in monetary transactions with credit cards). Their action takes place in identifying the IP to be hacked, in order to substitute themselves and pretend to be the beneficiary of a transaction or any other operation. Widespread registration/certification, therefore, is a procedure whereby a piece of data can be considered unique and irrefutable, with the consent of the community.

second pillar



The second pillar of our technology is the random decentralisation of data, in a widespread and encrypted manner. This process comes in aid of the need to create multiple copies of a piece of information, in order to preserve it from destruction: the more copies there are, in more different places, the more difficult it will be to modify or corrupt it.
Random decentralisation of data takes place second by second, using dedicated servers and hardware interconnected to the blockchain, within which the data to be stored is replicated.
These servers are distributed among the public community, spread in geographic areas all over the world, and no one has the possibility of hacking the systems and knowing the content of the archive stored within them. Protection is ensured by a dedicated algorithm.


The blockchain algorithm itself generates random, non-sequential alphanumeric codes for each of its actions, which also carry within them random and unpredictable parameters taken from weather, geolocation, atmospheric temperature and stellar coordinates.
The information generated, bearing the aforementioned code, is stored independently in each server in the network of interconnected users, making it unchangeable and incorruptible. Decentralisation is the exact opposite of the centralisation of data, which are instead entrusted to the management of a single entity, which guards them from malicious external agents or physical and disastrous destruction. But this system proves to be unreliable and very vulnerable.

The Third Pillar

Randomly averts the dangers The pact that governs the blockchain and the network of users, understood as a set of servers, hardware and public IPs, is represented by a software protocol that has the necessary security systems within it. In fact, EN Group's blockchain, in addition to the security processes listed so far, includes a further and unique recursive control, the CONTROL REBOUND. This process analyses all the keys that IPs and SERVERs produce in a random manner and processes them in the last resort, averting further dangers of data breaches.

The Fourth Pillar

Trust The process that brings trust between the parties is represented by the visibility of the technology, understood as the possibility of verifying the recorded and archived data. Each individual piece of data will bear the public keys and IP numbers involved in the recording. But at this point the question that arises is: "what data can we entrust to the blockchain and what use will we make of it?" The fields of operation of blockchain are many, from industrial production to the healthcare sector, via artwork and intellectual creations. All areas that demand verifiability and protection of products, goods and services have the possibility to make use of blockchain. Below we see how the transfer of trust is transmitted practically and physically.

EN Group, s.r.o.
Ľ. Fullu 9/A 841 05 Bratislava – mestská časť Karlova Ves

Copyright ©  2016 EnGroupAll rights reserved.