Download documents
Download documents

Service oriented
blockchain platform

Build and manage quantum-safe blockchain solutions with Cellframe SDK

Scroll Down
02
Framework
Framework advantages
Scalability
Original sharding implementation allows you to launch Blockchain/DAG subchains with variable consensus types in each Cell (shard).
Lego for Blockchain
Create your blockchain solution with Cellframe SDK. Our support will help you on each step of your DLT needs.
Python over C
Open Python API allows you to build simple and elegant blockchain solutions with the performance of C-code of the kernel.
03
Blockchain Services
Future of blockchain = services
One of the key elements of the network architecture
to create and manage decentralized Internet services.

Smart contracts can't interact with the resources of the operating system. Cellframe services can use computing power, Internet channel, or disk space, and carry out business logic without a third party.

The blockchain service does not have an owner address. To reduce the risk of theft, service cash flow gets distributed between the providers and no one has a private key from a contract with all the funds in it.

The development of blockchain services is like building web scripts and other system services. It is easy, and there is no need to hire expensive blockchain engineers.

04

Quantum

The Quantum Threat is Real

A Quantum computer with logical qubits is coming in the next 10-15 years. The NSA (US National Security Agency) and NIST (National Institute of Standards and Technology) are preparing for it and developing standards for post-quantum cryptography since 2015.

Read more about quantum computing and its threat to financial system and blockchains in our blog.

PQ Encryption by default
We had successfully implemented several quantum resistant signatures including finalists of the second round of NIST PQC contest, and we will implement several more by 2021.
Encryption Variability
Due to current uncertainty regarding the question “which perspective PQ signatures would be truly quantum-resistant, and which not?” feature of encryption variability is the one option to build quantum-safe systemTruly quantum resistant system
Quantum Keys
Quantum Keys. Implementation of a quantum key exchange by Q3 2020.
05
Implementations: Framework
Implementations: Framework
Blockchain Interoperability
Features :
Cellframe provides interoperability by using Cell bridges to public blockchains. You can connect several blockchains into a single system including integration of public blockchains.
Distributed VPN and Content Delivery Network (CDN)
Features :
Free to use (torrent base logic of use, bandwidth sharing economy), quantum safe encryption, DPI resistant (AI driven algorithm protects your data from deep packet inspection (i.e. Golden Shield, etc.), throughput is limited only by the number of nodes around the user, traffic management system (traffic flows not the shortest way but the fastest one)
Status :
VPN (ready to launch), CDN (soon)
Blockchain framework
Features :
The open source framework for launching fully customizable and scalable subchains, interoperable by design in Cellframe ecosystem
Learn more
MIRROR CHAINS: a solution for protection public and private blockchains from terminal attacks.
Features :
Doesn’t affect blockchain performance, restores latest state in case of the attack and can be used for interoperability features.
Status :
80% ready
Learn more
Second Layer Solutions
Features :
Cellframe Cells can act as second layer solutions for existing public chains, e.g., Ethereum or almost any other layer one platform. It may work as a sidechain for throughput outsourcing.
Learn more
Audio/video streaming
Features :
Protocol for streaming audio and video content across Cellframe network using quantum safe encrypted channel without affecting the user experience.
Status :
70% ready
Learn more
Edge computing
Features :
Edge computing is a form of fog computing carried out on edge devices (smartphones, laptops, pcs) as close as possible to the source of the task. Computational task is divided between swarm (or fog) of devices concentrated around the initiator to reduce time, avoid potential pollution of the traffic channel and lower the cost of the mistake
Status :
SOON
Learn more
01/ 01
Do the right thing
Let's get back the freedom of the Web!

Download the first decentralized VPN on blockchain and join the true Privacy Network: protects your privacy and traffic even from quantum and supercomputer attacks without harm for your comfort of Internet experience.

Coming soon
Coming soon
06
Customers
Implementation: Areas and Examples
Notaries, lawyers
Transparent document verification within the network of notary institutions
Management companies
Reputation system for the tenants, marketplace for the advertisers marketplace
Universities, training centres, online schools
Create, design and issue certificates, diplomas, credentials and their validity check
Managing driver/weapon licences
Issuance of the rights to bear arms, registration of weapons, drive licenses (auto, boat, airplane).
Reviews
Confirmation of invariability and authorship of comments and reviews (+ KYC verification)
Real Estate
Registration of land and buildings: realtor information, rental rates, apartment history, history of owners
Labor Records
Employee and employer history of relationships: review of competencies, recommendations, cases, partnerships
Security
Tracking the facts of access to protected objects, a decrease of the number of operations with an increased level of system security
Plants and factories
Registry of the facts of unauthorized access to information, incorrect system behavior, productivity, and other indicators
Airport, railway
Check-in procedure with a verified multi-passport, baggage tracking, customs checks
Casino, gambling
Transparency of rates and coefficients
Branch organisations
Instantly protected sync. of document workflow, a protected network for all the branches of the organization
Hotels
Reservations, feedback on hospitality services, loyalty programs, reputation system for the clients
Travel
Easy access to documents (visas, reservations, tickets, passes)
Taxi, car sharing
Identification and authorisation of drivers based on verified data
Professional sport
Medal register, achievements, awards, records, commission meetings, judiciary boards
Visa centres, embassies
Visa issuance process with less actions, visa check
Police, hospitals
Medical certificates, analyses, health indicators, doctor visits, police records, protocols.
Internet of Things
M2M data and commands exchange
Internet-resources
Identification of a person through KYC
Supermarkets
Audit of merchandising tasks (layout, availability of goods, the authenticity of the manufacture date)
Transport companies
Documentation: transit visa, export declaration, CMR, bill of lading for shipping by sea, AWB, DF, accounts and others
Banks
Payments, single ledger format of credit and transaction history for banks
01/ 01