Mission Statement

BaaSid will achieve the most important positioning of security in the changing IT market.

  • Pain Points

    Concern of Data breaches towards both external and internal threats.

  • Mission

    In BaaSid, we strive to simplify Data Storage Security Management through BlockChain without intensive intervention of Data Security tools.

  • Protection

    Creating a safe and secured environment on how Data is managed and stored to meet Global Compliance

Key point & Technology of BaaSid for Authentication
& Decentralized Storage
Core Technology 1

BaaSid has implemented decentralized storage by applying Split Engine, Combine Engine,
and Sub Chain of BaaSid, and will develop various decentralized storage products.

Data Security
Protect Data issue

The demand for security of sensitive personal and corporate data is growing.

Currently, customers are requiring simultaneous provision of data security, storage, and encryption due to the rapid increase of sensitive data leakage incidents such as personal information of individuals and organizations, documents, secrets, and contracts.
This means that the rapid growth of storage usage by individuals is leading to the occurrence of privacy infringements, and new threats of data security are increasing in proportion to the increasing use of storages by businesses.

Decentralized
Decentralized Storage

Security needs for data and data storages are growing rapidly.

Decentralized Storage is a new type of data storage method, different from the conventional centralized data storage and protection methods, and can build an effective data defense system together with data encryption. Unlike the defense system that operates data protection zones such as firewalls and IPS, Decentralized Storage can implement more safe data security by combining and authenticating data pieces whenever users want without preserving the data sources through data split and physically separated storages of data.

Authentication
Authentication based on Blockchain

Data Encryption / Data Split / Data Distribute.
Data Decryption and Combine.

Prepare to secure data from the original source by performing encryption, data fragmentation, and data fragmentation on the data source.
It carries out secure and convenient management throtechnology_flex_obj1ugh blockchain data immutability, BaaSid authentication, data call, decryption and data combination.
The best safety certification is achieved through the robust double safety structure of FIDO+Split data. documents, certificates, etc. and provide the functions of recovering certificates at any time.

Why difficult be hacked BaaSid?
QSS : Quadruple Security Structure
Split Data

All the data is split and stored to each different Node

Segments and stores all kinds of data

Data is safely saved and restored by combining fragments of segmented texts, images and all files from hundreds and thousands of pieces without saving the source data.

Data forgery prevention

Depends all the data change based on blockchain

8,000 TPS/node high-speed processing

The logical algorithm's node structure enables fast processing when large numbers of simultaneous connections occur.

FIDO match

Instant Access and BaaSid’s own FIDO are match for
Authentication & Verification

A Multi Verification System That Has Maximized Security

BaaSid are powerful authentication methods of complex multi-factor authentication structures that match and verify all authentication information, including biometric Key, Device information, IP, and packets.

BaaSid Security Process
Core Technology 2

BaaSid’s Decentralized Storage does not leave original data by separating, distributing, and partially redundantly storing fragment data of all the original pieces carved out through Split Engine into each storage. This means that not all storage stores original data but only individual pieces of data, which in itself stores only useless garbage data. In addition, De-Storage will build various business models in the process of separating such content and combining fragmented data.
Copyright protection model for content data combination / Content verification model for content data combination / Online De-Storage Model for Cold Storage Replacement.

Compare similar projects (Case of blockchain)

Blockchain-based authentication project comparison

Civic VS Bridge Protocol VS BaaSid
Project Bridge Protocol Filecoin BaaSid
Underlying
Blockchain
Bitcoin and Rootstock smart contracts NEO smart contracts EOS / HyperLadger and sidechain smart contracts

* Various sub chains can be expanded according to functions and purposes.

Project Purpose Verification of previously audited personal identity information by third parties without the need to share the info between those parties Digitalization and automation of legal agreements combined with blockchain integration and KYC and AML standards Provide a variety of identity authentication methods SMS, Email, Device, Biometric(face, fingerprint, iris), Credit card, identification combined with KYC standards
Project Concept Identity verification services provided by Civic and third parties Marketplace for identification and legal microservices Identification services provided by BaaSid or a 3rd party
Cost-Cutting
Principle
Verification by trusted providers attested on blockchain can be reused by others Universal KYC adhering to standards can be used in multiple processes Supplier (provides a variety of authentication means by service and section); Individuals (only available, one-time authentication)
How it Works Providers attest to verified identity info on blockchain, other providers pay to access this verification User provides the info, selects a verifier’s service on the marketplace, verifier creates user’s digital ID tied to blockchain Check the identity of the individual requested by the supplier(for example, pass or fail) and provide only additional information(provided user choice of name, age, address, etc.)
What is on Chain Hashed attestations to users‘ ID attributes and NOT personal info Historical record and operational tasks and NOT personal info Privacy + Proof of hash value for user's identity attribute Proof by separating the hash value by 51:49

* It has excellent security by separating the hash value and storing it in an individual and a blockchain.

Storage of
Personal Data
Personal data stored on device and backed in distributed data storage Personal data remains off chain, and, if viewed or collected, gets destroyed by a verifier Store personal data in a distributed data store (De-Storge)

* All original data is divided into pieces and stored in separate nodes for excellent security

Ecosystem’s
Tech Basis
Civic App Bridge Protocol In app, separate app, Web, secondary authentication app, WALLET... Use as various services(RESTFul API method)
Accessing
the Ecosystem
Via the app integrating Civic and 3rd party providers’ services Via storefronts where providers offer their microservices Consolidated or individual services through 3rd party providers and BaaSid Apps
Ecosystem
Economics
Service providers pay validators for ID attestation, validator determines a price Service providers charge users for accessing their microservices The service provider pays BaaSid for ID evidence, free of charge
    • Project

      Filecoin

    • Underlying
      Blockchain

      Bitcoin and Rootstock smart contracts

    • Project Purpose

      Verification of previously audited personal identity information by third parties without the need to share the info between those parties

    • Project Concept

      Identity verification services provided by Civic and third parties

    • Cost-Cutting
      Principle

      Verification by trusted providers attested on blockchain can be reused by others

    • How it Works

      Providers attest to verified identity info on blockchain, other providers pay to access this verification

    • What is on Chain

      Hashed attestations to users‘ ID attributes and NOT personal info

    • Storage of
      Personal Data

      Personal data stored on device and backed in distributed data storage

    • Ecosystem’s
      Tech Basis

      Civic App

    • Accessing
      the Ecosystem

      Via the app integrating Civic and 3rd party providers’ services

    • Ecosystem
      Economics

      Service providers pay validators for ID attestation, validator determines a price

    • Project

      Bridge Protocol

    • Underlying
      Blockchain

      NEO smart contracts

    • Project Purpose

      Digitalization and automation of legal agreements combined with blockchain integration and KYC and AML standards

    • Project Concept

      Marketplace for identification and legal microservices

    • Cost-Cutting
      Principle

      Universal KYC adhering to standards can be used in multiple processes

    • How it Works

      User provides the info, selects a verifier’s service on the marketplace, verifier creates user’s digital ID tied to blockchain

    • What is on Chain

      Historical record and operational tasks and NOT personal info

    • Storage of
      Personal Data

      Personal data remains off chain, and, if viewed or collected, gets destroyed by a verifier

    • Ecosystem’s
      Tech Basis

      Bridge Protocol

    • Accessing
      the Ecosystem

      Via storefronts where providers offer their microservices

    • Ecosystem
      Economics

      Service providers charge users for accessing their microservices

    • Project

      BaaSid

    • Underlying
      Blockchain

      EOS / HyperLadger and sidechain smart contracts * Various sub chains can be expanded according to functions and purposes.

    • Project Purpose

      Provide a variety of identity authentication methods SMS, Email, Device, Biometric(face, fingerprint, iris), Credit card, identification combined with KYC standards

    • Project Concept

      Identification services provided by BaaSid or a 3rd party

    • Cost-Cutting
      Principle

      Supplier (provides a variety of authentication means by service and section); Individuals (only available, one-time authentication)

    • How it Works

      Check the identity of the individual requested by the supplier(for example, pass or fail) and provide only additional information(provided user choice of name, age, address, etc.)

    • What is on Chain

      Privacy + Proof of hash value for user's identity attribute Proof by separating the hash value by 51:49 * It has excellent security by separating the hash value and storing it in an individual and a blockchain.

    • Storage of
      Personal Data

      Store personal data in a distributed data store (De-Storge) * All original data is divided into pieces and stored in separate nodes for excellent security

    • Ecosystem’s
      Tech Basis

      In app, separate app, Web, secondary authentication app, WALLET... Use as various services(RESTFul API method)

    • Accessing
      the Ecosystem

      Consolidated or individual services through 3rd party providers and BaaSid Apps

    • Ecosystem
      Economics

      The service provider pays BaaSid for ID evidence, free of charge

Compare similar projects (Case of blockchain)

Blockchain-based Decentralized Storage project comparison

File coin VS BaaSid for Decentralized Storage(File delivery system)
Project Filecoin BaaSId(Hybrid IPFS) BaaSid(De-Storage)
Type of file delivery Based on IPFS Hybrid IPFS Split and Distribute System
Security External Internal Internal
Encryption Non Encryption before split Encryption
Index hash Stored to Node Stored to Node Separately stored in nodes and devices
Searching
delay time
Delay(Slow) Minimize delay time through search node No delay(Real time)
Large capacity
processing
No Yes Yes
Data share Χ Χ O
Streaming Χ Χ O
Disability response Failover not supported Failover support Failover support
Disability response Only Blockchain Only Blockchain Various platform support
(General interface)
    • Project

      Filecoin

    • Type of file delivery

      Based on IPFS

    • Security

      External

    • Encryption

      Non

    • Index hash

      Stored to Node

    • Searching
      delay time

      Delay(Slow)

    • Large capacity
      processing

      No

    • Data share

      Χ

    • Streaming

      Χ

    • Disability response

      Failover not supported

    • Blockchain Platform

      Only Blockchain

    • Project

      BaaSId(Hybrid IPFS)

    • Type of file delivery

      BaaSId(Hybrid IPFS)

    • Security

      Internal

    • Encryption

      Encryption before split

    • Index hash

      Stored to Node

    • Searching
      delay time

      Minimize delay time through search node

    • Large capacity
      processing

      Yes

    • Data share

      Χ

    • Streaming

      Χ

    • Disability response

      Failover support

    • Blockchain Platform

      Only Blockchain

    • Project

      BaaSid(De-Storage)

    • Type of file delivery

      Split and Distribute System

    • Security

      Internal

    • Encryption

      Encryption

    • Index hash

      Separately stored in nodes and devices

    • Searching
      delay time

      No delay(Real time)

    • Large capacity
      processing

      Yes

    • Data share

      O

    • Streaming

      O

    • Disability response

      Failover support

    • Blockchain Platform

      Various platform support
      (General interface)

BaaSid's Decentralized Storage system basically all kind of data split and stores it on separate storage nodes. In addition, by instantaneously importing, assembling, and authenticating pieces, the file's forgery and security are more safe. BaaSid has developed an independent file distribution system, and it is a technology commercialized by providing all technologies to Hitachi's cloud storage system 'eXcel Drive'.

Compare similar projects (Case of Non-blockchain)

Non Blockchain-based Commercialization authenticator product comparison

Google OTP VS Onespan VS BaaSId for Authenticator(2FA)
Category Google OTP OneSpan Mobile Auth BaaSid 2-factor authentication 2-factor
Authentication Differentiation
Security Generate
an authentication
code
Generates OTP Module (Time based) Generates OTP Module
(Event based, Time based)
User-based (optional)
personal request for creation
Real time generation
upon authentication request
Stores
Source Data
Store the origina Store the origina No original Maximizes security by storing personal information and authentication information on the distribution node and blockchain
Stores source data
on server for comparison
Stores source data
on server for comparison
Separation/distribution on the
blockchain and distribution node
Authentication
Method
Random 6 - 8 digits number OTP, Pin code, Face ID Pin code, pattern,
Bio(biometric information)
Multiple authentication methods
Prevention of
Guessing Attacks
Vulnerable Secure Secure Protection
against guessing attack vulnerability
by using Biometric authentication
Generates 6 - 8 digits code Support for biometric, numeric,
and character authentication
Support for biometric, numeric,
and character authentication
Nonrepudiation Vulnerable Secure Secure Electronic signature using user keys
Prevention of
Phishing attack
Vulnerable Risky BaaSid in-house development
and development of Biometric-related
security modules
Protection from open source
vulnerabilities
Prevention of
Man-in-the
-middle attack
Vulnerable Risky Only receive authentication results
from separate authentication sessions
Only identify devices that pass
through relevant IPs and packets
Guaranteed
integrity of time
or event
information
Vulnerable Risky Secure If the OTP operates normally
after the time
or event information is changed,
the future OPT value can be extracted.
Prevention of
extraction attack
Vulnerable Possible when creating OTP
at the same point
Secure -
Convenience
Scalability
Identification X O O Identify users based on authentication
Scalability X O O Develop/manage an exclusive 2-factor
authentication App

BaaSid's Decentralized Storage system basically all kind of data split and stores it on separate storage nodes. In addition, by instantaneously importing, assembling, and authenticating pieces, the file's forgery and security are more safe. BaaSid has developed an independent file distribution system, and it is a technology commercialized by providing all technologies to Hitachi's cloud storage system 'eXcel Drive'.

BaaSId for Authenticator(2FA & MFA)
  • A
    SMS OTP
    • High Price
    • Input Numbers (inconvenient)
    • Public Service
    • Suitable For Internet Services
  • B
    Google OTP
    • Inconvenient for User/Developer
    • Multiple Cases of Hacking
    • Public Service
    • Suitable For Internet Services
  • C
    OTP Device
    • High Security
    • Concern of Losing Device
    • Private Service
    • Suitable For Banking Services
  • C
    OTP PC S/W
    • Separate Development Needed
    • Weak Security
    • Private Service
    • Suitable for Corporations
Security / feature comparison eXelkey
(BaaSid)
Text Message Google OTP OTP Machine Authentication
Certificate
PIN ID & PW
User-bound device authentication O O O X O X X
Checked by the user O X X X X X X
Biometric authentication function
(Biometric)
O X X X X X X
Specific user device authentication O X X X X X X
Convenient
and fast “NO typing” access
O X X X X X X
Brute force attack prevention O O X O O X X
Applies blockchain technology
(anti-counterfeit control)
O X X X X X X
Data separation/distribution O X X X X X X
Technology & Business Area

BaaSid's technology strives to be used in a variety of solutions and business areas.

1. Authentication
Authentication
Protect ID & PW

Safe and convenient to keep your own website, App username and password information, and allow users to access this information at any time.

Certification
Certification & 2FA authentication

Safe and convenient passwords keep all kinds of documents, certificates, etc. that you own, and allow users to access this information at any time.

Payment
Safe Payment by 2FA / MFA

Securely and conveniently keep all kinds of credit card information. Provide secure settlement.

Secure Documents
Document(Combine Authentication & Data)

Safe storage which allows access to a variety of legal and sensitive documents.

Chart & Private Information
Chart & Private information

Safely store hospital records and sensitive personal information and allow users to access this information at any time.

2. Decentralized Storage
De-Storage
Cloud Service

Provide ultra-secure decentralized Storage Cloud.

Recovery
Disaster Recovery(DR)

Protect critical data, applications and IT systems in case of blackout.

Archive
Archive & Block Volume

Securely handle archive data to comply with Personal Data Protection Law.

Hash Box
Data Storage / Hash box

Data Storage Paradigm Dictionary or hash table used for data retrieval.

High Volumes
Object Storage & Data-at-rest

Tiered decentralized storage for files in high volumes.