Blockchain Applications

These are some of the Blockchain solutions and products we developed for our customers

Zero-Trust Trade Registry - Blockchain applications
Zero-Trust Trade Registry - Blockchain applications

Zero-Trust Trade Registry

The system effectively brings together trade partners, who may not know each other, to operate in a zero-trust environment, facilitating secure financial transactions with ease. It boldly addresses crucial challenges that arise in such settings:

Document Exchange in Zero-Trust Environments: How can trade partners confidently exchange documents and messages securely while completing transactions without relying on mutual trust?
On-Premise Document Security: How can a trade partner assert control over their documents on-premise while ensuring all participants can verify their availability and authenticity?
Document Integrity: How can partners guarantee that unshared documents remain unchanged without their knowledge?
Request Authenticity: How can a partner ensure that a request is genuine and initiated by the intended party?
System Trustworthiness: How can a system undoubtedly ensure it neither retains documents nor emulates users while remaining trustworthy to all participants?

Key Components and Solutions:
Blockchain Nodes: Each trade partner utilizes blockchain nodes in their cloud environment to maintain a decentralized, tamper-resistant record of all transactions.
PKI and Cryptography: Public Key Infrastructure and cryptographic methods verify identities and secure communications effectively.
Desktop Wallets: Windows, Linux, and Mac desktop wallets safeguard encryption keys for each participant with strong security measures.
On-Premise CMS: A local Content Management System confidently ensures sensitive documents remain secure within the organization's premises.
Peer-to-Peer Communication: Confidential data and documents are not stored in a central system, but rather are exchanged directly between partners using secure peer-to-peer networks.
Document Hashing and Watermarking: Digital hashing and watermarking provide unequivocal assurance of document authenticity and prevent unauthorized changes.

The advanced architecture, developed over two years, is already making a significant impact across several ports and customer networks throughout Southeast Asia.

Technologies
- Golang - Rust - PostgreSQL SQL - Big-chain DB - Azure cloud - Centos 7 - Cryptography - Qt, QML, and C++ - SQLite - Jenkins for DevOps