Transfer Funds

If you are operating your own node you can use our web service based APIs explained HERE. It is always possible to use our progressive app to transfer token to a public key, a self-sovereign identity or a split contract. Kindly note that you can use one of our test accounts to logon: Mnemonic Phrase: … Read more

Self-Sovereign Identity (SSI)

Identity is at the core of each and every interaction. While the required level of trust between identities can vary from one interaction to another, the necessity to exchange it in a secure and privacy preserving manner is universal. We implemented our identity system as “distributed Self-Sovereign Identity (SSI)”. Kindly note that it is fully … Read more

Encryption

Any data stored in the blockchain or off-chain is readable for the world. So it is essential that any data stored is either hashed or encrypted. Elliptic Curve Public/Private Key Encryption requires the creation of a so called “SharedSecrect“. This is calculated with the own private key and the public key of the other end. … Read more

Digital Signatures

Internally all transactions are being digitally signed automatically. If you need manually to sign some data you can do that easy with the function SignData from the identity namespace. The parameters for SignData are: Message: The data to be signed ChainAddress: Your blockchain address Password: The password to unlock your private key Note: Obviously your … Read more

Inbuilt SMS Gateway

Every node of the chain has its own SMPP v3.4/v5.0 compliant SMS Gateway build in. Like this any node can be used as SMS Aggregator / SMS Proxy or Load Balancer with instant SMS Settlement. Features: Processes SMS messages with delivery receipts Forward received SMS to destination SMSC (Short Message Service Center) via least cost … Read more

The Best Android Authentication App of 2023: A Detailed Review

In the era of digital transformation, security remains a top priority for users and businesses alike. As cyber threats become more sophisticated, the need for robust authentication methods has never been more critical. Android, being one of the most popular mobile operating systems, offers a plethora of authentication apps. But which one stands out in … Read more

What are the Components of Digital Identity?

There are many aspect to one’s identity. The World Economic Forum breaks down the technical identity stack into the right layers. The layers are discussed in more detail below, somewhat proportional to the level of startup activity in each. Attribute Collection involves the processes by which characteristic data is collected and stored and encompasses personal … Read more