Practical Applications of a DigSig
Critical data can be captured from a document and stored in a DigSig data structure. The DigSig is then signed so that any future verifier can easily detect any changes made to either the document or the barcode.
Digital signatures can be compared to traditional handwritten signatures in many respects, but properly implemented digital signatures (and therefore the complete DigSigs) are virtually impossible to forge, unlike handwritten signatures and hand-signed documents. DigSigs can also provide non-repudiation, meaning that the signer/sender cannot successfully claim they did not sign a message. The originality/authenticity and integrity of data can be verified online and offline by using the TrueVolve mobile app. The digital verification of the integrity of the origin, content
Protecting high value assets
One of the most useful applications of DigSigs is in the application of proving the originality of arbitrary assets without the necessity of having a database of codes at hand. This is achieved by attaching RFID stickers to assets and then writing a signed DigSig data structure unto the tag during the manufacturing or commissioning process. The DigSig data structure written into the tag will have the TID field of the specific RFID tag signed into it thereby preventing cloning of the tag.
By using the DDD “pragma” feature we can instruct an offline verifier to fetch data from an arbitrary source instead of actually saving the field data in the data structure itself. By setting the source field to point to the available RFID tag, and more specifically its TID data bank we can collect the TID independently.
Electronic Vehicle Identification
Rapidly identifying and performing lookups for vehicles driving at high speeds on a highway can be a challenge for database solutions. Especially when RFID gantries are set up in remote locations and latency is high.
By utilizing the encoding optimizations and tag verification strategies of ISO/IEC 20248 we can store all the vehicle data on the RFID tag itself. We can verify if the tag is authentic, and we can even write content back to the tag.
Since DigSig tokens can be verified in an offline fashion they are ideal for the implementation of access control solutions. Each DigSig can contain a set of claims to be evaluated at the point of control and these claims can be evaluated to decide if entry should be given or not.