SlideShare a Scribd company logo
1 of 14
Download to read offline
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
NDCode
Secure the Physical-to-Digital Link
SUMMARY
NDCode is a data-carrying physical
security feature combining
nanotechnology, photonics and secured
digital technology. The technology is
being released for use in physical
document security. The solution called
DOCKryptoTM
enables a secure link
between paper-based value documents
and the digital world. With this
technology, content data associated
with physical objects are bound to the
object via NDCode and the use of digital
signatures. A proof-of-existence of
document content are stored on the
blockchain using cryptographic
fingerprints. This white paper details the
strong physical / digital anticounterfeit
and tamper resistance emerging from
this solution.
Author
Tom McGregor
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
1
www.inpiasia.com
https://www.youtube.com/watch?
v=pM1my3DtVSI&t=32s
https://www.linkedin.com/company/inpiasia/
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
2
What is NDCode
TM
?
Physical security features used today such as holograms, taggants, fluorescent fibres,
optically variable inks, anti-scan patterns, guilloche and tactile features, are analogue,
meaning they do not carry digital information nor are they machine readable to a unique
identity. These features are commonly used for document and identity security to thwart
potential counterfeiting attempts.
1 Image Source: https://discover.passportindex.org/security/what-secrets-is-your-passport-hiding/
NDCodeTM is a new generation of physical feature securing the physical-to-digital link:
• Leveraging the most advanced nanotechnology ink
• Transforming the physical feature into a data carrying code
• Linking the assets with their digital data, the internet, and world standard digital
security
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
3
Physical Security
NDCodeTM combines nanomaterials and photonics (nanophotonics). At the nano-level
NDCodeTM utilises patented technology which is licenced from Macquarie University in
Sydney Australia. The nano-tech enables realisation of document security by engineering of
time coded nanocrystals, as published in one of sciences most prestige’s journal, Nature
photonics.
Physical-to-Digital
NDCodeTM utilises the nanotechnology for physical encryption and extends it to the digital
world with 2D code technology. Today, QR-Codes encode data in binary 1’s or 0’s using light
reflected from black and white modules printed on a label or document. As a major
advantage, NDCodeTM is light emitting, where modules are engineered to multiplex time,
colour and space dimensions to encode data at levels beyond binary.
NDCode
TM QR-code
• Covert (invisible) • Overt (visible)
• Used for authentication, serialization and
tracing
• Used marketing, payments, product coding.
• Multi-D code (n-ary) with proprietary data
encoding and light emitting providing
advanced readability
• 2D code only (binary) with public open source
encoding and decoding.
• Protected against duplication • Not protected against digital or physical copying.
• Secured by physical encryption using
nanotechnology & best practice digital
cryptography standards.
• Supports encryption of data prior to storage
(but not commonly used)
• Readable using DKryptID handheld scanners • Readable by anyone with a smartphone
• Direct integration into products or films • Printed on label (typical)
• Physical size 3-6 mm • Physical size 15-30 mm (typical)
Comparison of NDCODE technology with other digital identification systems
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
4
Binding the Physical Object to Digital Content
NDCodeTM binds with the physical object and is non-separable especially in the primary use
cases such as document security. NDCodeTM carries seed information which when
combined with hardware reader secret, forms a deterministic key-pair.
This key-pair enables digital security capabilities.
• Content data can be digitally signed by the physical object, effectively binding the
data to the object.
• A “proof-of-scan” based on a challenge response protocol can be set-up between
the NDCodeTM, hardware device and a remote server.
This enables both the identification of original items (strong physical anticounterfeit) and
strong proof through cryptography that data digitally signed by the object is authentic. For
example
• The “proof-of-scan” provides strong audit evidence that the real original object was
scanned at a location. This enables authenticated traceability where only the real
object with specific NDCodeTM can provide the track-and-trace server with a valid
digital signature.
• In document security, when authorities issue an original document the content is
digitally signed by NDCodeTM, any subsequent altering of the data can be easily
identified by use of digital signatures.
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
5
Combining Technologies
High security does come with some compromise in terms of utility. For example, NDCodeTM
cannot be directly read with a smartphone and requires use of proprietary reader
technology. To open the use of NDCodeTM to the public user, INPI ASIA is releasing
DOCKryptoTM: a document security solution, the first product using NDCodeTM.
DOCKryptoTM combines NDCodeTM, with standard QR-Codes and public blockchain
technology, so that authorities can control the issuance of documents, but the public can
access the data via smartphone app by scanning a QR-Code printed on the document.
DOCKryptoTM : The digital link for security paper
The advances in digital technologies and availability of equipment at low-cost has made the
counterfeit of paper-based value documents relatively easy. Analog-type security features
are failing to meet the demands of digital business processes.
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
6
DOCKryptoTM is the digital link to bring paper-based value documents to the digital age. The
solution addresses trust and transparency for document security. Value emerging from the
solution are
• Digital transformation where any paper document becomes a digital ePaper.
• Preventing any ability of physical certificate cloning or counterfeiting.
• End-to-end security where the blank paper is traced prior to any personalisation
from the secure printery to the registry authority.
• Enabling issuing of certified digital copies that are assigned to owners and
cryptographically linked to the original physical copy.
• Enabling digital notarization whilst maintaining traditional notarization.
• Building trust / transparency and closing issuances loops with blockchain technology.
How it works – document creation and registration
Authorities use the DOCKryptoTM desktop application and the DKryptIDTM handheld reader
to register and print documents. NDCodeTM stock paper (blank) is provided to the authority
based on their requirement. A standard paper stock is available for enterprise level use.
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
7
How it works – document verification
Authorities use the DOCKryptoTM desktop application and the DKryptIDTM handheld reader
to verify the document. This full process ensures the document being presented is the
physical original. In many applications, the authenticity of the document content is more
relevant than the physical original. As such, the application can alternatively just scan the
QR-code to verify the data content.
Public Mass Market Use - Verification on KryptoMobileTM
Document business processes for enterprise, public registry and education credentials
require a simple means via smartphone apps for everyone to access verification
capabilities. In use cases such as contracts, land titles, birth certificates and university
certifications, it is important that the public can verify the content is original and unchanged.
The KryptoMobileTM phone App enables full data verification by scanning the QR-Code on
the printed (or digital copy) of the document. While this does not prove the user is holding
the physical original, they can be assured the content data is authentic.
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
8
Solution Features
The DOCKryptoTM solution provides a variety of different features and capabilities. These
are shown below:
Features
Requires
Proprietary
Reader
TypicalUser
RequiresDesktop
Application
Blockchain
OfflineMode
Capability
KryptoRegister: enables authorities to add digital content to
pre-defined templates. The process digitally signs the
content, prints and registers the document to the cloud and
blockchain.
Yes
Gov
Enterprise
Yes Yes No
KryptoVerify: enables authorities to verify documents and
prove they are physically and / or digitally original. No*
Gov
Enterprise
Notary
Yes Yes Yes
KryptoCertify (coming soon): enables notaries to
authenticate original documents and then register certified
copies. Copies can be assigned to a specific user or use case
(e.g. copy of land title for the bank to hold)
Yes
Notaries /
Authorities
Yes Yes No
KryptoSign (coming soon): enables any document (e.g any
.pdf file) to be digitally signed, printed on NDCode paper and
a digital copy to be uploaded to cloud and blockchain.
Yes
Gov
Enterprise
Notary
Yes Yes Yes
KryptoOrigin (coming soon): enables users who do not have
access to the proprietary DKryptID reader to purchase pre-
signed NDCode stock paper from the secured printery. This
paper will already be pre-registered with simple verifiable
content about the document originator. (e.g name, affiliation
etc.)
No
Public/
Anyone
No Yes No
KryptoMobile: enables end-users with a smartphone
application to perform full data authentication of documents
secured by DOCKrypto.
No
Public/
Anyone
No Yes Yes
DocWalletMobile (TBC): enables end-users with a
smartphone application to receive and share certified digital
copies of documents issued to the user by an authority.
No
Public/
Anyone
No Yes No
*Scanning the QR-code enables full data authentication. For verification of the physical original, scanning using the proprietary reader is
required
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
9
Summary of Security by Design
NDCodeTM is directly bound into the fibres of the value paper, and cannot be separated.
The NDCodeTM itself is an encrypted seed and the combination of the NDCodeTM and
DKryptID scanner generates a unique private-public keypair based on elliptic curve
cryptography standards. The public key acts as the unique identifier (UID) for the document,
and the private-key is used by the reader to generate digital signatures.
The use of digital signatures binds the original physical document to the data content that is
published. A challenge-response scheme between the server, DKryptIDTM reader and
NDCodeTM enables a “proof-of-scan”. The process allows the server to prove even over the
internet that the authority or user is scanning a genuine document and that the data is not
tampered.
While use of digital signatures and challenge-response algorithms is not new, the
revolutionary step is to provide this link all the way to the original physical document.
NDCodeTM enables securing the physical-to-digital link and furthermore the document can
sign itself onto the blockchain, bringing forth the benefits of an immutable record of the
original digital content.
Role of the Blockchain
NDCodeTM secures the link between physical assets and their digital data. Adding a public
blockchain provides a trust layer to the digital data ensuring the history and originality
cannot be altered (immutability). The two technologies are leveraged to provide
• Authenticated traceability
• Proof of data authenticity
• Audit capability to protect against data fraud on server infrastructure
• Bridge between a full digital solution and existing standards of practice
The blockchain essentially acts as a timestamping tool known as “proof-of-existence”.
Because of the immutable nature of public blockchains, the digital fingerprint of the original
document remains permanently available. It is then utilised to detect fraudulent changes or
hacking of real document data; maintain a public auditing tool while preserving data privacy
(blockchain only stores hashed data); enable transparency to public users of the system.
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
10
Try it now – Download KryptoMobileTM from the Play Store
Get the App on google play https://play.google.com/store/apps/details?id=krypto.mobile
The App is coming soon to iOS.
SEE NEXT PAGE FOR DEMO
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
11
Demo Certification 1 – Genuine Certified Digital Copy
This example shows a genuine certified copy of a degree certificate. Scan the QR-code
using KryptoMobile to interact with the demo.
INPI ASIA PTE LTD
101 Cecil Street, #11-04,
Tong Eng Building,
Singapore 069533
TEL: +65 85 155 637
E: info@inpiasia.com
www.inpiasia.com
This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party
without the prior written consent of INPI Asia Pte Ltd.
12
Demo Documents
The examples below can be verified using KryptoMobile, please scan using the app.

More Related Content

What's hot

Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsMartina Naughton
 
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...Caroline Charumathy
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business Jinhwan Shin
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...Till Riedel
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationLarry Kluger
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoTFIDO Alliance
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 

What's hot (20)

IQ-R_catalog
IQ-R_catalogIQ-R_catalog
IQ-R_catalog
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firms
 
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Privacy in the Work Place
Privacy in the Work PlacePrivacy in the Work Place
Privacy in the Work Place
 
PKI in Korea
PKI in KoreaPKI in Korea
PKI in Korea
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...
 
DSS - Investor Presentation
DSS - Investor PresentationDSS - Investor Presentation
DSS - Investor Presentation
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital Transformation
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoT
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 

Similar to The Revolutionary Solution in Secured Digital Identification

Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...flashnewsrelease
 
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...Webcraftzs Technologies
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing SectorSuradhaIyer
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatPalash Mehar
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
Whitepaper: Secure By Design
Whitepaper: Secure By DesignWhitepaper: Secure By Design
Whitepaper: Secure By DesignDocuSign
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfDrysign By Exela
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfDrysign By Exela
 
Whitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityWhitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityDocuSign
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmIRJET Journal
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storageLeMeniz Infotech
 
Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...flashnewsrelease
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewallSanjay Singh
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 

Similar to The Revolutionary Solution in Secured Digital Identification (20)

Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
 
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing Sector
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
Whitepaper: Secure By Design
Whitepaper: Secure By DesignWhitepaper: Secure By Design
Whitepaper: Secure By Design
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
Cloud signature chatbot
Cloud signature chatbotCloud signature chatbot
Cloud signature chatbot
 
Cloud signature chatbot
Cloud signature chatbotCloud signature chatbot
Cloud signature chatbot
 
Whitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityWhitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and Security
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
 
Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewall
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
BSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdfBSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdf
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

The Revolutionary Solution in Secured Digital Identification

  • 1.
  • 2. This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. NDCode Secure the Physical-to-Digital Link SUMMARY NDCode is a data-carrying physical security feature combining nanotechnology, photonics and secured digital technology. The technology is being released for use in physical document security. The solution called DOCKryptoTM enables a secure link between paper-based value documents and the digital world. With this technology, content data associated with physical objects are bound to the object via NDCode and the use of digital signatures. A proof-of-existence of document content are stored on the blockchain using cryptographic fingerprints. This white paper details the strong physical / digital anticounterfeit and tamper resistance emerging from this solution. Author Tom McGregor
  • 3. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 1 www.inpiasia.com https://www.youtube.com/watch? v=pM1my3DtVSI&t=32s https://www.linkedin.com/company/inpiasia/
  • 4. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 2 What is NDCode TM ? Physical security features used today such as holograms, taggants, fluorescent fibres, optically variable inks, anti-scan patterns, guilloche and tactile features, are analogue, meaning they do not carry digital information nor are they machine readable to a unique identity. These features are commonly used for document and identity security to thwart potential counterfeiting attempts. 1 Image Source: https://discover.passportindex.org/security/what-secrets-is-your-passport-hiding/ NDCodeTM is a new generation of physical feature securing the physical-to-digital link: • Leveraging the most advanced nanotechnology ink • Transforming the physical feature into a data carrying code • Linking the assets with their digital data, the internet, and world standard digital security
  • 5. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 3 Physical Security NDCodeTM combines nanomaterials and photonics (nanophotonics). At the nano-level NDCodeTM utilises patented technology which is licenced from Macquarie University in Sydney Australia. The nano-tech enables realisation of document security by engineering of time coded nanocrystals, as published in one of sciences most prestige’s journal, Nature photonics. Physical-to-Digital NDCodeTM utilises the nanotechnology for physical encryption and extends it to the digital world with 2D code technology. Today, QR-Codes encode data in binary 1’s or 0’s using light reflected from black and white modules printed on a label or document. As a major advantage, NDCodeTM is light emitting, where modules are engineered to multiplex time, colour and space dimensions to encode data at levels beyond binary. NDCode TM QR-code • Covert (invisible) • Overt (visible) • Used for authentication, serialization and tracing • Used marketing, payments, product coding. • Multi-D code (n-ary) with proprietary data encoding and light emitting providing advanced readability • 2D code only (binary) with public open source encoding and decoding. • Protected against duplication • Not protected against digital or physical copying. • Secured by physical encryption using nanotechnology & best practice digital cryptography standards. • Supports encryption of data prior to storage (but not commonly used) • Readable using DKryptID handheld scanners • Readable by anyone with a smartphone • Direct integration into products or films • Printed on label (typical) • Physical size 3-6 mm • Physical size 15-30 mm (typical) Comparison of NDCODE technology with other digital identification systems
  • 6. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 4 Binding the Physical Object to Digital Content NDCodeTM binds with the physical object and is non-separable especially in the primary use cases such as document security. NDCodeTM carries seed information which when combined with hardware reader secret, forms a deterministic key-pair. This key-pair enables digital security capabilities. • Content data can be digitally signed by the physical object, effectively binding the data to the object. • A “proof-of-scan” based on a challenge response protocol can be set-up between the NDCodeTM, hardware device and a remote server. This enables both the identification of original items (strong physical anticounterfeit) and strong proof through cryptography that data digitally signed by the object is authentic. For example • The “proof-of-scan” provides strong audit evidence that the real original object was scanned at a location. This enables authenticated traceability where only the real object with specific NDCodeTM can provide the track-and-trace server with a valid digital signature. • In document security, when authorities issue an original document the content is digitally signed by NDCodeTM, any subsequent altering of the data can be easily identified by use of digital signatures.
  • 7. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 5 Combining Technologies High security does come with some compromise in terms of utility. For example, NDCodeTM cannot be directly read with a smartphone and requires use of proprietary reader technology. To open the use of NDCodeTM to the public user, INPI ASIA is releasing DOCKryptoTM: a document security solution, the first product using NDCodeTM. DOCKryptoTM combines NDCodeTM, with standard QR-Codes and public blockchain technology, so that authorities can control the issuance of documents, but the public can access the data via smartphone app by scanning a QR-Code printed on the document. DOCKryptoTM : The digital link for security paper The advances in digital technologies and availability of equipment at low-cost has made the counterfeit of paper-based value documents relatively easy. Analog-type security features are failing to meet the demands of digital business processes.
  • 8. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 6 DOCKryptoTM is the digital link to bring paper-based value documents to the digital age. The solution addresses trust and transparency for document security. Value emerging from the solution are • Digital transformation where any paper document becomes a digital ePaper. • Preventing any ability of physical certificate cloning or counterfeiting. • End-to-end security where the blank paper is traced prior to any personalisation from the secure printery to the registry authority. • Enabling issuing of certified digital copies that are assigned to owners and cryptographically linked to the original physical copy. • Enabling digital notarization whilst maintaining traditional notarization. • Building trust / transparency and closing issuances loops with blockchain technology. How it works – document creation and registration Authorities use the DOCKryptoTM desktop application and the DKryptIDTM handheld reader to register and print documents. NDCodeTM stock paper (blank) is provided to the authority based on their requirement. A standard paper stock is available for enterprise level use.
  • 9. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 7 How it works – document verification Authorities use the DOCKryptoTM desktop application and the DKryptIDTM handheld reader to verify the document. This full process ensures the document being presented is the physical original. In many applications, the authenticity of the document content is more relevant than the physical original. As such, the application can alternatively just scan the QR-code to verify the data content. Public Mass Market Use - Verification on KryptoMobileTM Document business processes for enterprise, public registry and education credentials require a simple means via smartphone apps for everyone to access verification capabilities. In use cases such as contracts, land titles, birth certificates and university certifications, it is important that the public can verify the content is original and unchanged. The KryptoMobileTM phone App enables full data verification by scanning the QR-Code on the printed (or digital copy) of the document. While this does not prove the user is holding the physical original, they can be assured the content data is authentic.
  • 10. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 8 Solution Features The DOCKryptoTM solution provides a variety of different features and capabilities. These are shown below: Features Requires Proprietary Reader TypicalUser RequiresDesktop Application Blockchain OfflineMode Capability KryptoRegister: enables authorities to add digital content to pre-defined templates. The process digitally signs the content, prints and registers the document to the cloud and blockchain. Yes Gov Enterprise Yes Yes No KryptoVerify: enables authorities to verify documents and prove they are physically and / or digitally original. No* Gov Enterprise Notary Yes Yes Yes KryptoCertify (coming soon): enables notaries to authenticate original documents and then register certified copies. Copies can be assigned to a specific user or use case (e.g. copy of land title for the bank to hold) Yes Notaries / Authorities Yes Yes No KryptoSign (coming soon): enables any document (e.g any .pdf file) to be digitally signed, printed on NDCode paper and a digital copy to be uploaded to cloud and blockchain. Yes Gov Enterprise Notary Yes Yes Yes KryptoOrigin (coming soon): enables users who do not have access to the proprietary DKryptID reader to purchase pre- signed NDCode stock paper from the secured printery. This paper will already be pre-registered with simple verifiable content about the document originator. (e.g name, affiliation etc.) No Public/ Anyone No Yes No KryptoMobile: enables end-users with a smartphone application to perform full data authentication of documents secured by DOCKrypto. No Public/ Anyone No Yes Yes DocWalletMobile (TBC): enables end-users with a smartphone application to receive and share certified digital copies of documents issued to the user by an authority. No Public/ Anyone No Yes No *Scanning the QR-code enables full data authentication. For verification of the physical original, scanning using the proprietary reader is required
  • 11. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 9 Summary of Security by Design NDCodeTM is directly bound into the fibres of the value paper, and cannot be separated. The NDCodeTM itself is an encrypted seed and the combination of the NDCodeTM and DKryptID scanner generates a unique private-public keypair based on elliptic curve cryptography standards. The public key acts as the unique identifier (UID) for the document, and the private-key is used by the reader to generate digital signatures. The use of digital signatures binds the original physical document to the data content that is published. A challenge-response scheme between the server, DKryptIDTM reader and NDCodeTM enables a “proof-of-scan”. The process allows the server to prove even over the internet that the authority or user is scanning a genuine document and that the data is not tampered. While use of digital signatures and challenge-response algorithms is not new, the revolutionary step is to provide this link all the way to the original physical document. NDCodeTM enables securing the physical-to-digital link and furthermore the document can sign itself onto the blockchain, bringing forth the benefits of an immutable record of the original digital content. Role of the Blockchain NDCodeTM secures the link between physical assets and their digital data. Adding a public blockchain provides a trust layer to the digital data ensuring the history and originality cannot be altered (immutability). The two technologies are leveraged to provide • Authenticated traceability • Proof of data authenticity • Audit capability to protect against data fraud on server infrastructure • Bridge between a full digital solution and existing standards of practice The blockchain essentially acts as a timestamping tool known as “proof-of-existence”. Because of the immutable nature of public blockchains, the digital fingerprint of the original document remains permanently available. It is then utilised to detect fraudulent changes or hacking of real document data; maintain a public auditing tool while preserving data privacy (blockchain only stores hashed data); enable transparency to public users of the system.
  • 12. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 10 Try it now – Download KryptoMobileTM from the Play Store Get the App on google play https://play.google.com/store/apps/details?id=krypto.mobile The App is coming soon to iOS. SEE NEXT PAGE FOR DEMO
  • 13. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 11 Demo Certification 1 – Genuine Certified Digital Copy This example shows a genuine certified copy of a degree certificate. Scan the QR-code using KryptoMobile to interact with the demo.
  • 14. INPI ASIA PTE LTD 101 Cecil Street, #11-04, Tong Eng Building, Singapore 069533 TEL: +65 85 155 637 E: info@inpiasia.com www.inpiasia.com This document is proprietary and confidential. No part of this document may be disclosed in any manner to a third party without the prior written consent of INPI Asia Pte Ltd. 12 Demo Documents The examples below can be verified using KryptoMobile, please scan using the app.