Skip to main content

Distributed Ledger

The distributed ledger is the foundation of the ecosystem responsible for transaction processing, consistency, and data storage. It provides participants with the availability, integrity, authenticity, authenticity, and confidentiality of information, regardless of the level of trust of each of them.

TKEY Registry is a decentralized database technology supported by many geographically distributed servers in various data centers; an authentic copy of the database with its complete and transparent history of changes is on all media of each ledger participant stored. Transactions are sequentially recorded in a single distributed ledger and are available for inspection and audit. The ledger is the authentic and final ledger maintained by the ecosystem participants.

TKEY distributed ledger

Key Benefits

Data is stored, simultaneously generated, verified, and continuously updated across all network nodes in a securely traceable digital database that guarantees ledger participants its complete authenticity and absolute protection against unauthorized changes.


Analytics

TKEY DLT

The transparency of the ledger and a professional set of analytical tools provide participants and others with high-speed processing and retrieval of information in real-time for advanced data analysis.


Continuous chain

Digital transactions, payment transactions, and other operations that include critical management, legal, financial and additional information are recorded strictly with a unique identifier and indefinitely.

TKEY DLT

The initiator of the transaction and other parties can verify its execution using the unique identifier of the transaction. Confidential data is encrypted and represented as alphanumeric strings, allowing you to exchange private information to execute specific orders securely.


Immutability and authenticity of data

The absence of a single data management center provides strong protection against the abuse, manipulation, and influence of one or a group of participants on the information contained in the ledger.

All servers process transactions according to the same strict write rules that guarantee consistency and data integrity for ledger participants, regardless of their level of trust.

TKEY DLT

The ledger is maintained by many geographically dispersed nodes in various data centers, thus ensuring its disaster-resilient operation. A complete synchronous shutdown of all servers is required for each ledger participant in all data centers to stop the system.

A set of consensus rules guarantees the impossibility of forging information by applying a group of mathematical, cryptographic, and algorithmic methods that ensure the authenticity and immutability of digital data.

The deterministic asynchronous state machine has security and survivability properties that eliminate the possibility of deliberately splitting and stopping the ledger, ensuring data consistency at any time and under any adverse circumstances.


Storage Model

The storage architecture is built on multi-tier layers, consisting of a PostgreSQL relational database for storing the ACID-state of the ledger, public archives and snapshots for easy synchronization of new or interrupted nodes, and local storage on disk in the form of compressed binaries for easy storage of the ledger.


Modular architecture

The modular storage architecture eliminates peer-to-peer overload and increases its throughput by using a secondary storage layer generated by ledger validators to ensure fast node synchronization.

TKEY DLT

New ledger participants synchronize the complete history of data using public archives and replicate it to a local disk in the form of compressed binaries, eliminating the need to send redundant P2P requests to validator servers.


Transactional System

The transactional system conforms to the properties of ACID, which provides enterprise-level protection to ledger participants and maintains the integrity of the database during transactions. A set of ledger components supports the most reliable and predictable operation in real-time, ensuring data reliability even in server failures, power, and other errors.


Atomicity

Atomicity improves system performance and is a crucial integrity property that combines independent operations into a single “atomic unit” to eliminate intermediate transaction states. The system operations either succeed or entirely rejected fail, and the system returns to its original condition.


Consistency

Due to the consistency properties, transactions reach a consistent state, executed and completed per the requirements and business rules of the system, which guarantee the complete reliability of the database, eliminating the violation of uniqueness requirements.


Isolation

Property isolates the intermediate states of a transaction from other processes in the system until the end of its execution, excluding the impact of parallel transactions on the results of other transactions.


Durability

The property provides reliable data recording regardless of server crashes and other system errors, ensuring that successful transactions were preserving.