FAQ

What does RIDDLE&CODE do?

RIDDLE&CODE offers unique solutions that allow physical objects to interface with blockchain securely and autonomously. Such secure and autonomous communication guarantees superior data integrity and owner protection and is enabled by our in-house designed crypto chips that are connected to a blockchain by our firmware.

This creates a platform that provides automated trust which is needed to realize the potential of interorganization business models in the realms of IoT, Industry 4.0 and supply chain finance. Our platform offers incorruptible digital identities for assets and machines. It also enables business partners to control access to their data based on rules managed by blockchain-enabled smart contracts.

How does it work?

We produce crypto hardware that comes in different forms (modules, full boards or smart tags) and which in the course of production is both personalized with the metadata that the client needs to identify his devices and is registered on the blockchain.  With this approach, every device has a unique digital identity that is confirmed even before it is switched on and as long as the device is not broken, it will act as secure node on the blockchain capable of the autonomous and highly reliable exchange of data with the platform. 

What is the business model of RIDDLE&CODE?  

RIDDLE&CODE offers hardware (elliptic curve crypto chip) and software solutions (such as our proprietary middleware) and can act as a digital notary to validate data flows.

We also offer consulting services with our partners to set up customized trials (proof of concepts) to help clients get their idea to mass market roll out. Information on our partners and their complementary capabilities is available here.

What’s the philosophy behind RIDDLE&CODE?

We witness the transition into an age where machines will have to communicate with each other and where decentralized networks will form the backbone of the machine economy. In order to run a decentralized network consisting of machines relying on different degrees of fully automated processes, we have to be sure that the system is trustworthy. This means that every machine needs to be uniquely and irrefutably identified on a consistent basis and that the data exchanged by the machines is accurate and immutable.

Until now this was not possible. RIDDLE&CODE developed a solution by combining blockchain and RIDDLE&CODE’s proprietary chip and built a gateway into the machine economy.

What are the use cases for this technology?

The potential for application of the RIDDLE6CODE solution is vast, but all use cases share the following common features:

  • Need for ensuring authenticity of devices and for securing the value and integrity of a device, e.g. in luxury, machinery parts or complete vehicles
  • Securing hardware as a trusted component of a larger network such as sensors in a power plant or parts of an aircraft
  • Allowing a controlled and secure flow of data where multiparty cooperation is required but trust is lacking. This is achieved by the hardware cryptographically signing the data it produces and storing it in distributed ledgers, where every transaction is validated

Please visit the following section of the website for use cases here.

TECHNOLOGY

You refer to Half Bean, Full Bean, Armulino and Smart Tag on your website. Are these different products?

At the heart of our technology is the cryptographic chip, which contains a private key stored 'off the bus', i.e. on the chip itself. Half Bean, Full Bean, Armulino and Smart Tag are all different versions of the same chip, differentiating by a form factor.

  • A Half Bean is the combination of an active NFC transponder with crypto chip connected to an I2C bus and socket
  • A Full Bean is the combination of an active NFC transponder with crypto chip in addition to a powerful MCU
  • An Armulino is the combination of an active NFC transponder with crypto chip connected to an I2C bus and socket in addition to a powerful MCU supporting BLE, Thread and 6LoWPAN
  • A Smart Tag contains a cryptographic chip inside of a tamper-evident adhesive sticker

Why is RIDDLE&CODE’s solution superior to other ways of identity validations for objects, such as bar codes or QR codes?

These codes only offer ‘passive’ identities, since they are read-only and can easily be copied or tampered with. Our crypto hardware turns any device into an active and trusted node by directly interfacing with an immutable blockchain through a unique private key that is generated and securely stored on the crypto chip.

How is customer information stored? What about privacy?

Blockchain is a public ledger, accessible to anybody,  anywhere and at any time. Despite such transparency, RIDDLE &CODE's solution is able to guarantee superior user's privacy. RIDDLE&CODE only stores transactions and service data in the form of hashes, which are not readable, as they represent references to data and not data itself. These references are connected to secure keys. Therefore, only a person / institution that holds the right keys and the reference database is able to decipher the hashes recorded on the blockchain. Thus, everyone can see hashes, but without the right keys and context data, such data is worthless.

Our business partners have full discretion over the extent of referenced data shared and counterparts they share it with. It is a perfect way to enable multiparty cooperation without compromising the internal data sources and rules of confidentiality.

Which blockchains do you support?

Our blockchain partner is BigchainDB, however, RIDDLE&CODE as a platform is blockchain-agnostic. This means that the technology can be used with any blockchain most fitting to the use case.

What is needed to check the identity of a device that has a crypto chip embedded?

All that is required is to scan the chip with a phone that has Twin of Things App installed.

Why can't this technology solution be hacked or cloned or breached?

RIDDLE&CODE’s crypto chips offer the ultimate security: the private key in the chip is stored 'off the bus' and cannot be extracted or cloned. The private keys are kept truly private, unknown to anyone, including RIDDLE&CODE. Since the chip and its private key cannot be duplicated or transferred to another device without destroying its smart capabilities, the network cannot be compromised by adding a copy of the device. The only thing that can happen is that the device is destroyed by a brute force, however, this would initiate a distress message to the network sending information regarding the incident. Even if the chip is destroyed, data that has been sent by the chip, when intact, is not lost as it is permanently stored on the blockchain.

AUTHENTICITY

How does a crypto chip (Half Bean, Full Bean, Armulino or Smart Tag) get attached to a device or an object?

For new products, the pre-produced and personalized chips or tags are embedded or added at the factory. For devices that are already ‘out’, our crypto module can be added with a microcontroller unit (MCU). All other ‘offline’ devices can be connected with an adhesive smart tag.

What does 'embedded into an object' mean? Will it be inside a physical object? Or glued to a physical object? What are the limitations?

For some industries, e.g. the fashion and art industry, it means that the tag is embedded into the product below its surface material, whatever it might be: wood, leather, textile etc. There are also adhesive tags that are simply glued onto a surface.

Tags do not require battery power, as they operate from energy harvesting. As such, there are very little limitations as to how we can embed the tags.

 

In simple terms, how does authenticity and verification work?

A physical product contains a cryptographic chip and connects to the ‘outside’ world via radio signals (we do support a range of standards from BLE to LORA and Sigfox already and more will be added).

PRICE POINTS 

How much do RIDDLE&CODE'S crypto hardware and smart tags cost?

The price for these unique chips is scalable to the required volume of production, but we do strive to keep prices low. In any case, the current price range is within lower single digit EURO price tags per chip. Please contact us to discuss a proposal.

Do cryptographic microchips work with both iPhone and Android?

The BLE enabled products work with both iPhone and Android. The NFC products currently work with Android only.

Chips & Form Factor

How are the chips powered?

Our chips, e.g. Smart Tags and crypto modules run without battery power as they rely on energy harvesting to activate themselves. In case of the full IoT device board that we offer as well, the external power supply is needed. 

What information from the physical world can be gathered by RIDDLE&CODE's chip?

One RIDDLE&CODE crypto chip can connect with various sensors in different industrial wired and wireless standards. This means that a combination of location, temperature, humidity, light, weight, motion and acceleration sensors can be added as per requirements of a specific use case. We can also modify the existing sensors to make them compatible with RIDDLE&CODE, thus eliminating the need for replacement of existing elements.

What is the level of encryption RIDDLE&CODE’s hardware is based on?

The chip combines PKI (Public Key Infrastructure) with NFC. It supports certifications, elliptic curve (public and private key) cryptography and creates multi signature.