Realtime Session2Session Communication

As the blockchain and also distributed storage systems are immutable they seem in many cases not the best way for point2point message transfers. Even though messages should be always encrypted they will remain in the chain. For that reason we introduced a Realtime Session2Session protocol bases on our Websocket Interface and JSON Messages. This protocol … Read more

Detect & Protect Against Wangiri Callback Fraud

Wangiri Callback Fraud is a widespread and diverse global challenge, damaging operator and service provider reputations and relationships with their subscribers. While fraudsters are well known for their malicious innovations, they are loyal to what works; once a scamming method proves to deliver dependable results, they relentlessly take advantage over the long term. One tried … Read more

Create DID Document

Decentralized identifiers (DIDs) are a new type of identifier that enable verifiable, decentralized digital identities. A DID identifies any subject (e.g., a person, organization, thing, data model, abstract entity, router, switch, contract, etc.) that the controller of the DID decides that it identifies. You might need a DID Document also to send it to your … Read more

Add key roles and permissions to Self-Sovereign Identity (SSI)

The creator of an identity contract holds per default full rights to his own identity. Additionally he can assign roles and rights to other keys and identities. For example to a backup key, a financial controller, the government to add verifiable claims, or a service like a SMS Hub to debit funds, etc. For example … Read more

Create Self-Sovereign Identity

Everything is an identity. Be it a natural or legal person, a switch, a router, a contract, etc. This means identities are at the core of each and every interaction. While the required level of trust between identities can vary from one interaction to another, the necessity to exchange it in a secure and privacy … Read more

Distributed IMEI Blacklisting

Small, portable and high value, mobile devices – and the information stored in them – are attractive to criminals. As high-end handsets can be worth hundreds of dollars,there is a major international black market for mobile devices obtained through theft, fuelled in part by organized crime. For the victim, the experience can be traumatic, as … Read more

Add Claim to Self-Sovereign Identity (SSI)

A claim is a qualification, achievement, quality, or piece of information about an entity’s background such as a name, government ID, payment provider, home address, or university degree. Such a claim describes a quality or qualities, property or properties of an entity which establish its existence and uniqueness. If a claim has been attested by … Read more

Encrypted Data Sharing

With the traditional RSA cryptography it is easy to share encrypted data between multiple parties. Mechanism known from RSA do not work like that if you have to work with elliptic curves in blockchain environments. For example in blockchain environments not the public key is known by the public public but the hash of the … Read more

CodeB Mesh

Built into every CodeB Node the CodeB Mesh Network is a side channel network in which nodes communicate with each other in a point-to-point fashion, rather than communicating with each other via a centralized access point such as in a star topology. Infrastructure nodes connect directly, dynamically and non-hierarchically to as many other nodes as … Read more

The way to Zero Trust Security. Never Trust. Always Verify!

The journey to Zero Trust starts with identity. CodeB allows you to authenticate and authorize every user and device – a key component of a Zero Trust strategy. Don’t let identity security be a barrier for your changing workforce. As remote work accelerates and IT manages more apps and devices than ever before, identity helps … Read more