FAQ

What does RIDDLE&CODE do?

RIDDLE&CODE marries hardware and data security by offering our in-house designed crypto chips that are connected to a blockchain by our middleware. This makes it possible for RIDDLE&CODE to make the interface between blockchains and the physical world possible.

This allows us to offer a platform that provides automated trust which is needed to realize the potential of inter-organization business models in the realms of IoT, Industry 4.0 and supply chain finance. Our platform offers incorruptible digital identities for assets and machines. It also enables business partners to control access to their data based on rules that managed by blockchain-enabled smart contracts.

How does it work?

We produce crypto hardware that comes in different form factors (modules, full boards or smart tags) and is – during the production process – both personalized with the metadata the client needs to identify his devices and registered on the blockchain.  With this approach, every device has a digital identity that is confirmed even before it is switched on – and as long as the device is not broken, it will act as secure node and send and receive only reliable and secured data.

What is the business model of RIDDLE&CODE?  

RIDDLE&CODE offers hardware (elliptic curve crypto chip) and software solutions (such as our proprietary middleware) and can also act as a digital notary to validate data flows.

We also offer consulting services with our partners to set up customized trials (proof of concepts) to help clients get their idea to mass market roll out. Information on our partners and their complementary capabilities is available here.

What’s the philosophy behind RIDDLE&CODE?

Undoubtedly we are entering into an age where machines will (have to) communicate with each other and where decentralized networks will form the backbone of the machine economy. In order to run a decentral network consisting of machines and with more or less fully automated processes, we have to be sure that the system is trustworthy. This means that every machine needs to be uniquely and irrefutably identified on a consistent basis and that the data exchanged by the machines is accurate and not tampered with.

Until now this was not possible but with the combination of blockchain and RIDDLE&CODE’s proprietary chip we are able to provide the essential stepping stone towards the machine economy.

What are the use cases for this technology?

There are many different and powerful use cases for this technology but all of them share the following core elements:

  • Proving the authenticity of devices and securing the value and integrity of a device (this is true for luxury watches as well as machinery parts or for complete vehicles)
  • Securing hardware as a trusted component of a larger network such as sensors in a power plant or parts of an aircraft
  • Allowing a controlled and secure flow of data where multiparty cooperation is required this can be achieved by  the hardware cryptographically signing the data that it produces and then storing it in distributed ledgers, where every transaction is validated

Please visit the following section of the website for use cases here.

TECHNOLOGY

You refer to Half Bean, Full Bean, Armulino and Smart Tag on your website. Are all of these different products?

The basic building block of our technology is the cryptographic chip, which contains a private key stored off the bus.  Half Bean, Full Bean, Armulino and Smart Tag are all different versions of the same chip but with a different form factor. A Half Bean is the combination of an active NFC transponder with crypto chip connected to an I2C bus and socket, a Full Bean is the combination of an active NFC transponder with crypto chip in addition to a powerful MCU, an Armulino is the combination of an active NFC transponder with crypto chip connected to an I2C bus and socket in addition to a powerful MCU supporting BLE, Thread and6LoWPAN, and a Smart Tag contains a cryptographic chip inside of a tamper-evident adhesive sticker.

Why is RIDDLE&CODE’s solution superior to other ways to identify objects, such as bar codes or QR codes?

These codes only offer ‘passive’ identities, since they are read-only and can easily be copied or tampered with. Our crypto hardware turns any device into an active and trusted node by directly interfacing with an immutable blockchain through a unique private key that is generated and securely stored on the crypto chip.

How is customer information stored? What about privacy?

The blockchain is a public ledger, accessible to anybody, anywhere and at any time. With the RIDDLE&CODE solution a user’s privacy can still be guaranteed. The reason for that is that RIDDLE&CODE only stores transactions and service data in the form of hashes, which are simply not readable, as they are only references to data and not data themselves. These references are connected to secure keys. Only the person / institution who has the right keys and the reference database is capable of making sense out of the things written into the blockchain.

To put it simply everybody has access to the hashes - but without the right keys and context data, the data is worthless.

It is entirely up to the business partners to decide which referenced data to share with whom. It’s a perfect way to enable multiparty cooperation without compromising the own internal data sources and rules of confidentiality.

Which blockchains do you support?

Although our blockchain partner is BigChainDB, RIDDLE&CODE as a platform is blockchain-agnostic. This means that the technology can be used with the blockchain that is most suitbale for the use case.

What is needed to check the identity of a device that has a crypto chip embedded?

All that is needed is a scan with a phone that has Twin of Things App installed on it.

Why can't this technology solution be hacked or cloned or breached?

RIDDLE&CODE’s crypto chips offer the ultimate security: the private key in the chip is stored off the bus and cannot be extracted or cloned, it is even unknown to us. Since the chip and its private key cannot be duplicated or transferred to another device without destroying its smart capabilities, the network cannot be compromised by adding a copy of the device. The only thing that can happen is that a device is destroyed by brute force, but the last signal our chip will send will be a distress message to the network with information on the incident. Data that has been sent cannot be lost either since it is always stored on the blockchain.

AUTHENTICITY

How does a Half Bean, Full Bean, Armulino or a Smart Tag get added to a product?

For new products, the pre-produced and personalized chips or tags are embedded or added in the factory. For devices that are already ‘out’, our crypto module can be added for devices with an MCU, and all other ‘offline’ devices can be connected with a smart tag.

What does 'embedded into an object' mean? Will it be inside a physical object? Or glued to a physical object? What are the limitations?

For some industries, e.g. the fashion and art industry it means that the tag gets embedded into the product below its surface material, whatever this might be: wood, leather, textile etc. Or the tag gets glued onto a surface.

As we don't require a battery, there are very little limitations for the way we embed tags.

 

In simple terms, how does authenticity and verification work?

A physical product contains a cryptographic chip and connects to the ‘outside’ world via radio signals (we do support a range of standards from BLE to LORA and Sigfox already and more will be added).

PRICE POINTS 

How much do RIDDLE&CODE'S crypto hardware and smart tags cost?

The price for these unique chips depend on the volumes they’re produced in, but we do strive to keep prices low. In any case, we talk about lower single digit EURO price tags per chip. Please contact us to discuss a proposal.

Do cryptographic microchips work with both iPhone and Android?

The BLE enabled products work with both iPhone and Android. The NFC products currently work with Android only.

Chips & Form Factor

How are the chips powered?

Our system runs without battery as it uses chips & modules that rely on energy harvesting to power themselves. This is of course not the case for the full IoT device board that we offer as well, but for the crypto module and our smart tags.

What information from the physical world can be gathered by RIDDLE&CODE's chip?

One RIDDLE&CODE crypto chip can connect with various sensors in different industrial wired and wireless standards. This means that a combination of location, temperature, humidity, light, weight, motion and acceleration sensors can be added used to suit your specific use case. Please note that sensors that are currently in use could be modified with RIDDLE&CODE's crypto chip so there is no need to buy new sensors. 

What is the level of encryption RIDDLE&CODE’s hardware is based on?

The chip combines PKI (Public Key Infrastructure) with NFC. It supports certifications, elliptic curve (public and private key) cryptography and creates multi signature.