DoQubiz
Fractal Technology Architecture

The Fractal Technology Architecture of DoQubiz is designed to address the challenges of modern digital asset security. By leveraging advanced data fracturing techniques combined with distributed access and efficient encryption, this architecture effectively prevents single-point failures and data leaks. It provides robust solutions for file management, backup, and third-party application service integration.

CIA Triad
0 +
patented technology
0 +
data masking procedure
0 +
Partner Cooperative
0 +
Fractal Product Technical Architecture

Introduction to DoQubiz Fractal Encryption Engine

Utilizes patented fractal encryption technology
to ensure the ultimate data security

DoQubiz's fractal encryption patented technology utilizes advanced encryption algorithms published by the National Institute of Standards and Technology (NIST) combined with flexible data segmentation storage strategies, including data encryption chains and distributed hashing as key techniques. The original file is split into smaller data structures called blocks. These blocks are then encrypted using randomly generated dynamic encryption keys, and the encrypted blocks are encoded into multiple tamper-proof data fragments.

Data fragments will be distributed across multiple fractal nodes (DQFS Nodes) to prevent the leakage, tampering, or hijacking of protected original file data. If a node fails, other healthy nodes will provide data recovery and other safety guarantees.

This unique file security storage architecture ensures that your critical core data is rendered worthless to malicious individuals, even if stolen, because the fragmented data is completely unidentifiable and unbreakable.

How the DoQubiz Fractal Engine Works

Step 1
Upload files of any format
Fragmentation of data
Step 2
Data fragments
Dynamic Key Encryption
Step 3
Create a Copy
Randomly Send for Distributed Storage
Original File
File Shredding
Block Encryption
Dynamic Distribution
The Future of Data Security and Management

Comparison with Traditional Solutions

Fractal Encryption System
DQFS
Digital Rights Management System
DRM
Data Leak Prevention System
DLP
Data Protection Targets
Files (No Format Restrictions)
Document Files (Specific Formats)
Sensitive Document Content
Data Protection Methods
Convert Dynamic Distributed Encrypted Fragments
Encrypt Original File Format
Content-Aware Scanning + Notification
File Storage Location
Distributed Storage Nodes
Traditional File Servers such as NAS
Endpoint
Encryption Mechanism
ECIES (ECDSA p256 & AES)
AES
None
Key Security
Each fragment is encrypted with a different key, and there is no central storage after encryption
Managed and stored by a central control server, making it vulnerable to targeted attacks
None
Data Leak and Ransomware Protection
Data Format Preservation Fragments and Obfuscation
Original File Encryption/Decryption and Access Control
Restrict endpoint network transmission or access to external media devices such as disks according to the perception policy
Innovative fractal technology helps you comprehensively protect your digital assets

Demo Video

Play Video
Scroll to Top