Our mission - Providing a trusted platform that handles digital identities for machines and multi-lateral business processes securely

In other words: maximizing end-to-end security for the future IoT and industry 4.0 era.

And making sure that private data really stays private – free from hacking, unauthorized supervision or data abuse of all kinds. Because only trust can set the real business potential of this new era for many industries free.

Maximizing Personal Data and
Identity Security

RIDDLE&CODE’s platform allows users to handle their privacy the convenient way. The combination of a blockchain micro-computer, crypto algorithms, smart contracts, user credential management via blockchain et al. make it possible to keep private data & communications truly really private, off the bus and uncompromisable.

It delivers zero set-up crypto security for all kinds of devices and empowers users to fully control the permissions to access any kind of digital data.

Physical Blockchain/Public Ledger Nodes

RIDDLE&CODE’s platform can also be used to frame IoT (Internet of Things) devices against misuse. Already during production, we personalize hardware by implanting our crypto chip, combine it with user credentials, certificates and map these data to blockchain-compliant smart contracts and store them on a blockchain as transactions.

Once a verified transaction is in place we use it to manage inter-device and inter-service communication between all parties and entities involved, regardless of them being humans or machines. We protect and if necessary encrypt and decrypt all data going back and forth. We help to securely define with whom to share the data with and how/by whom it can be analyzed in the end.

This way our platform can solve all issues concerning machine identity, secure M2M communication, setting up public key infrastructures between IoT devices and protect the security of the device owners.

Know your machine, trust your data, secure your users

Instead of only writing passive references to products or things (serial IDs, QR codes et al.) into a blockchain we turn these objects into active blockchain nodes themselves. All this is achieved with a new breed of ‘Elliptic Curve’ cryptography chips integrated into energy efficient micro-processors (with the capability to harvest energy). By exchanging keys and data via NFC modules, it is easy to inscribe blockchain addresses, transactions and smart contracts into physical assets and turn them into trusted nodes of any distributed, data-generating network.


Expanded View on Hardware Extended Public Ledgers

  1. Initiating and operating a platform for decentralized Service-Apps
  2. Based on a distributed public ledger (aka blockchain) on a public network
  3. An off and online ecosystem unifying mobile and payment providers, merchants, autonomous services and customers into a transparent transaction register which is historically immutable
  4. All contributors share exactly the same permissions having the full right to read and write to the register
  5. The access to this distributed transaction registry enables more and better services to anybody’s benefit. As a result of open and harmonized transaction data

Creation of a new kind of open business ecosystem built on a network of trust and guaranteed high transaction volume

Differentiation Issues

  1. System goes way beyond payment transaction. It includes asset exchange, identity & provenance assurance, public audit trails, computer aided contracting, automatic control and fulfillments of service agreements, etc.)
  2. Public and secure thanks to tokenisation and cryptography
  3. Open access to business intelligence for each and every third party
  4. Potential to become the trusted and secure database for sensible transaction and data for all contributors
  5. Secure aggregating and sharing of relevant transaction data with any third party without a root of trust instance or intermediary
  6. Immutable entry of data
  7. Allows to issue, manage and exchange any kind of asset token and certificate. Allows to securitize everything
  8. Foundation for a completely new business development
  9. Instead of many, disconnected and proprietary transaction databases one harmonised and secure database

Smart Energy



The vast majority of today’s tagging solutions is not tamper proof. The combination of RIDDLE&CODE tagging, cryptography and blockchain provides a much more secure tagging solutions. In addition new features such as Proof of Ownership or Proof of Authenticity can now be easily added to a product.

What we like about RIDDOE&CODE is that their solutions takes advantage of energy harvesting. Therefore, their tags can be operated everywhere and independent of any power supply or battery. Now, everyone can simply check with his phone whether an industrial spare part, an Adidas T-Shirt or a bottle of Champagne is genuine or fake.
— Dr. Carsten Stöcker, Machine Economy Lighthouse innogy SE