
-
Mission Statement
BaaSid will achieve the most important positioning of security in the changing IT market.
-
-
Pain Points
Concern of Data breaches towards both external and internal threats.
-
Mission
In BaaSid, we strive to simplify Data Storage Security Management through BlockChain without intensive intervention of Data Security tools.
-
Protection
Creating a safe and secured environment on how Data is managed and stored to meet Global Compliance
-
-
Key point & Technology of BaaSid for Authentication
& Decentralized Storage -
-
Core Technology 1
BaaSid has implemented decentralized storage by applying Split Engine, Combine Engine,
and Sub Chain of BaaSid, and will develop various decentralized storage products. -
- Data Security
-
Protect Data issue
The demand for security of sensitive personal and corporate data is growing.
Currently, customers are requiring simultaneous provision of data security, storage, and encryption due to the rapid increase of sensitive data leakage incidents such as personal information of individuals and organizations, documents, secrets, and contracts.
This means that the rapid growth of storage usage by individuals is leading to the occurrence of privacy infringements, and new threats of data security are increasing in proportion to the increasing use of storages by businesses.- Decentralized
-
Decentralized Storage
Security needs for data and data storages are growing rapidly.
Decentralized Storage is a new type of data storage method, different from the conventional centralized data storage and protection methods, and can build an effective data defense system together with data encryption. Unlike the defense system that operates data protection zones such as firewalls and IPS, Decentralized Storage can implement more safe data security by combining and authenticating data pieces whenever users want without preserving the data sources through data split and physically separated storages of data.
- Authentication
-
Authentication based on Blockchain
Data Encryption / Data Split / Data Distribute.
Data Decryption and Combine.
Prepare to secure data from the original source by performing encryption, data fragmentation, and data fragmentation on the data source.
It carries out secure and convenient management throtechnology_flex_obj1ugh blockchain data immutability, BaaSid authentication, data call, decryption and data combination.
The best safety certification is achieved through the robust double safety structure of FIDO+Split data. documents, certificates, etc. and provide the functions of recovering certificates at any time.-
Why difficult be hacked BaaSid?
-
QSS : Quadruple Security Structure
-
Split Data
All the data is split and stored to each different Node
-
Split & combine
EngineData is safely saved and restored by combining fragments of segmented texts, images and all files from hundreds and thousands of pieces without saving the source data.
-
Data forgery prevention
Depends all the data change based on blockchain
-
8,000 TPS
BlockchainThe logical algorithm's node structure enables fast processing when large numbers of simultaneous connections occur.
-
FIDO match
Instant Access and BaaSid’s own FIDO are match for
Authentication & Verification -
Split key
BiometricBaaSid are powerful authentication methods of complex multi-factor authentication structures that match and verify all authentication information, including biometric Key, Device information, IP, and packets.
BaaSid Security Process
-
Core Technology 2
BaaSid’s Decentralized Storage does not leave original data by separating, distributing, and partially redundantly storing fragment data of all the original pieces carved out through Split Engine into each storage. This means that not all storage stores original data but only individual pieces of data, which in itself stores only useless garbage data. In addition, De-Storage will build various business models in the process of separating such content and combining fragmented data.
Copyright protection model for content data combination / Content verification model for content data combination / Online De-Storage Model for Cold Storage Replacement. -
-
Compare similar projects (Case of blockchain)
Blockchain-based authentication project comparison
-
Civic VS Bridge Protocol VS BaaSid Project Bridge Protocol Filecoin BaaSid Underlying
BlockchainBitcoin and Rootstock smart contracts NEO smart contracts EOS / HyperLadger and sidechain smart contracts * Various sub chains can be expanded according to functions and purposes.
Project Purpose Verification of previously audited personal identity information by third parties without the need to share the info between those parties Digitalization and automation of legal agreements combined with blockchain integration and KYC and AML standards Provide a variety of identity authentication methods SMS, Email, Device, Biometric(face, fingerprint, iris), Credit card, identification combined with KYC standards Project Concept Identity verification services provided by Civic and third parties Marketplace for identification and legal microservices Identification services provided by BaaSid or a 3rd party Cost-Cutting
PrincipleVerification by trusted providers attested on blockchain can be reused by others Universal KYC adhering to standards can be used in multiple processes Supplier (provides a variety of authentication means by service and section); Individuals (only available, one-time authentication) How it Works Providers attest to verified identity info on blockchain, other providers pay to access this verification User provides the info, selects a verifier’s service on the marketplace, verifier creates user’s digital ID tied to blockchain Check the identity of the individual requested by the supplier(for example, pass or fail) and provide only additional information(provided user choice of name, age, address, etc.) What is on Chain Hashed attestations to users‘ ID attributes and NOT personal info Historical record and operational tasks and NOT personal info Privacy + Proof of hash value for user's identity attribute Proof by separating the hash value by 51:49 * It has excellent security by separating the hash value and storing it in an individual and a blockchain.
Storage of
Personal DataPersonal data stored on device and backed in distributed data storage Personal data remains off chain, and, if viewed or collected, gets destroyed by a verifier Store personal data in a distributed data store (De-Storge) * All original data is divided into pieces and stored in separate nodes for excellent security
Ecosystem’s
Tech BasisCivic App Bridge Protocol In app, separate app, Web, secondary authentication app, WALLET... Use as various services(RESTFul API method) Accessing
the EcosystemVia the app integrating Civic and 3rd party providers’ services Via storefronts where providers offer their microservices Consolidated or individual services through 3rd party providers and BaaSid Apps Ecosystem
EconomicsService providers pay validators for ID attestation, validator determines a price Service providers charge users for accessing their microservices The service provider pays BaaSid for ID evidence, free of charge -
-
-
-
Project
Filecoin
-
Underlying
BlockchainBitcoin and Rootstock smart contracts
-
Project Purpose
Verification of previously audited personal identity information by third parties without the need to share the info between those parties
-
Project Concept
Identity verification services provided by Civic and third parties
-
Cost-Cutting
PrincipleVerification by trusted providers attested on blockchain can be reused by others
-
How it Works
Providers attest to verified identity info on blockchain, other providers pay to access this verification
-
What is on Chain
Hashed attestations to users‘ ID attributes and NOT personal info
-
Storage of
Personal DataPersonal data stored on device and backed in distributed data storage
-
Ecosystem’s
Tech BasisCivic App
-
Accessing
the EcosystemVia the app integrating Civic and 3rd party providers’ services
-
Ecosystem
EconomicsService providers pay validators for ID attestation, validator determines a price
-
Project
-
-
-
-
-
Project
Bridge Protocol
-
Underlying
BlockchainNEO smart contracts
-
Project Purpose
Digitalization and automation of legal agreements combined with blockchain integration and KYC and AML standards
-
Project Concept
Marketplace for identification and legal microservices
-
Cost-Cutting
PrincipleUniversal KYC adhering to standards can be used in multiple processes
-
How it Works
User provides the info, selects a verifier’s service on the marketplace, verifier creates user’s digital ID tied to blockchain
-
What is on Chain
Historical record and operational tasks and NOT personal info
-
Storage of
Personal DataPersonal data remains off chain, and, if viewed or collected, gets destroyed by a verifier
-
Ecosystem’s
Tech BasisBridge Protocol
-
Accessing
the EcosystemVia storefronts where providers offer their microservices
-
Ecosystem
EconomicsService providers charge users for accessing their microservices
-
Project
-
-
-
-
-
Project
BaaSid
-
Underlying
BlockchainEOS / HyperLadger and sidechain smart contracts * Various sub chains can be expanded according to functions and purposes.
-
Project Purpose
Provide a variety of identity authentication methods SMS, Email, Device, Biometric(face, fingerprint, iris), Credit card, identification combined with KYC standards
-
Project Concept
Identification services provided by BaaSid or a 3rd party
-
Cost-Cutting
PrincipleSupplier (provides a variety of authentication means by service and section); Individuals (only available, one-time authentication)
-
How it Works
Check the identity of the individual requested by the supplier(for example, pass or fail) and provide only additional information(provided user choice of name, age, address, etc.)
-
What is on Chain
Privacy + Proof of hash value for user's identity attribute Proof by separating the hash value by 51:49 * It has excellent security by separating the hash value and storing it in an individual and a blockchain.
-
Storage of
Personal DataStore personal data in a distributed data store (De-Storge) * All original data is divided into pieces and stored in separate nodes for excellent security
-
Ecosystem’s
Tech BasisIn app, separate app, Web, secondary authentication app, WALLET... Use as various services(RESTFul API method)
-
Accessing
the EcosystemConsolidated or individual services through 3rd party providers and BaaSid Apps
-
Ecosystem
EconomicsThe service provider pays BaaSid for ID evidence, free of charge
-
Project
-
-
-
Compare similar projects (Case of blockchain)
Blockchain-based Decentralized Storage project comparison
-
File coin VS BaaSid for Decentralized Storage(File delivery system) Project Filecoin BaaSId(Hybrid IPFS) BaaSid(De-Storage) Type of file delivery Based on IPFS Hybrid IPFS Split and Distribute System Security External Internal Internal Encryption Non Encryption before split Encryption Index hash Stored to Node Stored to Node Separately stored in nodes and devices Searching
delay timeDelay(Slow) Minimize delay time through search node No delay(Real time) Large capacity
processingNo Yes Yes Data share Χ Χ O Streaming Χ Χ O Disability response Failover not supported Failover support Failover support Disability response Only Blockchain Only Blockchain Various platform support
(General interface)-
-
-
-
Project
Filecoin
-
Type of file delivery
Based on IPFS
-
Security
External
-
Encryption
Non
-
Index hash
Stored to Node
-
Searching
delay timeDelay(Slow)
-
Large capacity
processingNo
-
Data share
Χ
-
Streaming
Χ
-
Disability response
Failover not supported
-
Blockchain Platform
Only Blockchain
-
Project
-
-
-
-
-
Project
BaaSId(Hybrid IPFS)
-
Type of file delivery
BaaSId(Hybrid IPFS)
-
Security
Internal
-
Encryption
Encryption before split
-
Index hash
Stored to Node
-
Searching
delay timeMinimize delay time through search node
-
Large capacity
processingYes
-
Data share
Χ
-
Streaming
Χ
-
Disability response
Failover support
-
Blockchain Platform
Only Blockchain
-
Project
-
-
-
-
-
Project
BaaSid(De-Storage)
-
Type of file delivery
Split and Distribute System
-
Security
Internal
-
Encryption
Encryption
-
Index hash
Separately stored in nodes and devices
-
Searching
delay timeNo delay(Real time)
-
Large capacity
processingYes
-
Data share
O
-
Streaming
O
-
Disability response
Failover support
-
Blockchain Platform
Various platform support
(General interface)
-
Project
-
BaaSid's Decentralized Storage system basically all kind of data split and stores it on separate storage nodes. In addition, by instantaneously importing, assembling, and authenticating pieces, the file's forgery and security are more safe. BaaSid has developed an independent file distribution system, and it is a technology commercialized by providing all technologies to Hitachi's cloud storage system 'eXcel Drive'.
-
-
Compare similar projects (Case of Non-blockchain)
Non Blockchain-based Commercialization authenticator product comparison
-
Google OTP VS Onespan VS BaaSId for Authenticator(2FA) Category Google OTP OneSpan Mobile Auth BaaSid 2-factor authentication 2-factor
Authentication DifferentiationSecurity Generate
an authentication
codeGenerates OTP Module (Time based) Generates OTP Module
(Event based, Time based)User-based (optional)
personal request for creationReal time generation
upon authentication requestStores
Source DataStore the origina Store the origina No original Maximizes security by storing personal information and authentication information on the distribution node and blockchain Stores source data
on server for comparisonStores source data
on server for comparisonSeparation/distribution on the
blockchain and distribution nodeAuthentication
MethodRandom 6 - 8 digits number OTP, Pin code, Face ID Pin code, pattern,
Bio(biometric information)Multiple authentication methods Prevention of
Guessing AttacksVulnerable Secure Secure Protection
against guessing attack vulnerability
by using Biometric authenticationGenerates 6 - 8 digits code Support for biometric, numeric,
and character authenticationSupport for biometric, numeric,
and character authenticationNonrepudiation Vulnerable Secure Secure Electronic signature using user keys Prevention of
Phishing attackVulnerable Risky BaaSid in-house development
and development of Biometric-related
security modulesProtection from open source
vulnerabilitiesPrevention of
Man-in-the
-middle attackVulnerable Risky Only receive authentication results
from separate authentication sessionsOnly identify devices that pass
through relevant IPs and packetsGuaranteed
integrity of time
or event
informationVulnerable Risky Secure If the OTP operates normally
after the time
or event information is changed,
the future OPT value can be extracted.Prevention of
extraction attackVulnerable Possible when creating OTP
at the same pointSecure - Convenience
ScalabilityIdentification X O O Identify users based on authentication Scalability X O O Develop/manage an exclusive 2-factor
authentication AppBaaSid's Decentralized Storage system basically all kind of data split and stores it on separate storage nodes. In addition, by instantaneously importing, assembling, and authenticating pieces, the file's forgery and security are more safe. BaaSid has developed an independent file distribution system, and it is a technology commercialized by providing all technologies to Hitachi's cloud storage system 'eXcel Drive'.
BaaSId for Authenticator(2FA & MFA) -
- A
- SMS OTP
- High Price
- Input Numbers (inconvenient)
- Public Service
- Suitable For Internet Services
-
- B
- Google OTP
- Inconvenient for User/Developer
- Multiple Cases of Hacking
- Public Service
- Suitable For Internet Services
-
- C
- OTP Device
- High Security
- Concern of Losing Device
- Private Service
- Suitable For Banking Services
-
- C
- OTP PC S/W
- Separate Development Needed
- Weak Security
- Private Service
- Suitable for Corporations
Security / feature comparison eXelkey
(BaaSid)Text Message Google OTP OTP Machine Authentication
CertificatePIN ID & PW User-bound device authentication O O O X O X X Checked by the user O X X X X X X Biometric authentication function
(Biometric)O X X X X X X Specific user device authentication O X X X X X X Convenient
and fast “NO typing” accessO X X X X X X Brute force attack prevention O O X O O X X Applies blockchain technology
(anti-counterfeit control)O X X X X X X Data separation/distribution O X X X X X X -
-
Technology & Business Area
BaaSid's technology strives to be used in a variety of solutions and business areas.
-
-
- 1. Authentication
-
- Authentication
-
Protect ID & PW
Safe and convenient to keep your own website, App username and password information, and allow users to access this information at any time.
- Certification
-
Certification & 2FA authentication
Safe and convenient passwords keep all kinds of documents, certificates, etc. that you own, and allow users to access this information at any time.
- Payment
-
Safe Payment by 2FA / MFA
Securely and conveniently keep all kinds of credit card information. Provide secure settlement.
- Secure Documents
-
Document(Combine Authentication & Data)
Safe storage which allows access to a variety of legal and sensitive documents.
- Chart & Private Information
-
Chart & Private information
Safely store hospital records and sensitive personal information and allow users to access this information at any time.
-
- 2. Decentralized Storage
-
- De-Storage
-
Cloud Service
Provide ultra-secure decentralized Storage Cloud.
- Recovery
-
Disaster Recovery(DR)
Protect critical data, applications and IT systems in case of blackout.
- Archive
-
Archive & Block Volume
Securely handle archive data to comply with Personal Data Protection Law.
- Hash Box
-
Data Storage / Hash box
Data Storage Paradigm Dictionary or hash table used for data retrieval.
- High Volumes
-
Object Storage & Data-at-rest
Tiered decentralized storage for files in high volumes.