Practical Applications of a DigSig

Protecting documents

Critical data can be captured from a document and stored in a DigSig data structure. The DigSig is then signed so that any future verifier can easily detect any changes made to either the document or the barcode.

Digital signatures can be compared to traditional handwritten signatures in many respects, but properly implemented digital signatures (and therefore the complete DigSigs) are virtually impossible to forge, unlike handwritten signatures and hand-signed documents. DigSigs can also provide non-repudiation, meaning that the signer/sender cannot successfully claim they did not sign a message. The originality/authenticity and integrity of data can be verified online and offline by using the TrueVolve mobile app. The digital verification of the integrity of the origin, content and originality of a document is made possible with readily available smartphone technologies. This means that anybody with a smartphone can verify a DigSig on a document. By adding a QR-code that complies with the ISO/IEC 20248 standard, a more secure method of authenticity verification is possible. An embedded QR- code specifically verifies the exact details on a certificate. The DigSig QR-code process eliminates the need for original documents to be handled on a regular basis, which adds to the deterioration and possible destruction of the document. A copy of the document can now be subject to the rigors of scanning, emailing without risk of damage to the original,because the QR-code is transferred as an exact copy from one paper format to the next. DigSigs are cryptographically secure. This means that TrueVolve adheres to the strictest international standards regarding the creation of DigSigs, and by doing this a TrueVolve DigSig can ensure that the information protected by a DigSig is authentic.

Protecting high value assets

One of the most useful applications of DigSigs is in the application of proving the originality of arbitrary assets without the necessity of having a database of codes at hand. This is achieved by attaching RFID stickers to assets and then writing a signed DigSig data structure unto the tag during the manufacturing or commissioning process. The DigSig data structure written into the tag will have the TID field of the specific RFID tag signed into it thereby preventing cloning of the tag.

By using the DDD “pragma” feature we can instruct an offline verifier to fetch data from an arbitrary source instead of actually saving the field data in the data structure itself. By setting the source field to point to the available RFID tag, and more specifically its TID data bank we can collect the TID independently.

Electronic Vehicle Identification

Rapidly identifying and performing lookups for vehicles driving at high speeds on a highway can be a challenge for database solutions. Especially when RFID gantries are set up in remote locations and latency is high.

By utilizing the encoding optimizations and tag verification strategies of ISO/IEC 20248 we can store all the vehicle data on the RFID tag itself. We can verify if the tag is authentic, and we can even write content back to the tag.

Access control

Since DigSig tokens can be verified in an offline fashion they are ideal for the implementation of access control solutions. Each DigSig can contain a set of claims to be evaluated at the point of control and these claims can be evaluated to decide if entry should be given or not.