TECHNOLOGY
BLOCKCHAIN: Decentralized Ecosystem of Trust
Blockchain:
Proofs of Factory
To remove the need of trust between counterparts, events triggered in a Blockchain environment create undeniable proofs: signed, time-stamped, perennial, immutable, public digital proofs. These proofs are replicated and synchronized on global network secured by thousands of miners that provide an unique data integrity protection.
Public Blockchain:
Open and Confidential
As opposed to a private Blockchain where the infrastructure, governance, permissions policy has to be built within a consortium of stakeholders, public a blockchain is accessible to everyone, lifelong, and usable immediately against a fee paid with a token. Since only cryptographic proofs are stored and not the data, it provides both open accessibility to data owner and confidentiality.
Blockchain: Proofs of Factory
To remove the need of trust between counterparts, events triggered in a Blockchain environment create undeniable proofs: signed, time-stamped, perennial, immutable, public digital proofs. These proofs are replicated and synchronized on global network secured by thousands of miners that provide an unique data integrity protection.
Public Blockchain: Open and Confidential
As opposed to a private Blockchain where the infrastructure, governance, permissions policy has to be built within a consortium of stakeholders, public a blockchain is accessible to everyone, lifelong, and usable immediately against a fee paid with a token. Since only cryptographic proofs are stored and not the data, it provides both open accessibility to data owner and confidentiality.
Smart Contracts:
Unstoppable Actions
Smart contracts contain code functions that can store small data and make simple decisions : when a predefined event happens, the execution of the code is triggered. Since the code is accessible to read and the execution secured by the Blockchain, one can trust it to happen if the expected condition is met.
Decentralized
Storage
Decentralized storage is the ability to store data without depending on a single entity provider. It is based on peer to peer network technology where nodes store partial encrypted chunk of data, providing to entitled user greater speed, confidentiality and security.
Smart Contracts: Unstoppable Actions
Smart contracts contain code functions that can store small data and make simple decisions : when a predefined event happens, the execution of the code is triggered. Since the code is accessible to read and the execution secured by the Blockchain, one can trust it to happen if the expected condition is met.
Decentralized Storage
Decentralized storage is the ability to store data without depending on a single entity provider. It is based on peer to peer network technology where nodes store partial encrypted chunk of data, providing to entitled user greater speed, confidentiality and security.
BIMCHAIN Proofs. A proven track records of BIM processes
Proofs of Ownership
Register and sign your work to create digital proofs of authenticity and anteriority of publication that will prevent dispute around copyright and ownership.
Proofs of Context
Your work depends on others’ publications. Prove that your contribution has been produced based on verifiable external inputs and scope your liability.
Proofs of Approval
You want to be sure that you and your partners are working on synchronized versions on which everyone committed. Embed this electronic agreement within your tools and avoid paper signature.
Proofs of Consistency
Chain all your extracts made out of your model. Whether 3D IFC or 2D contractual deliverables, prove they come from your original 3D native format and make it the single source of truth.
Proofs of Certifications
Verify that BIM objects you’re using are certified by the Issuer. Proof your compliance to Regulations by getting your model certified by a Testing, Inspection & Control office.
Proofs of Ownership
Register and sign your work to create digital proofs of authenticity and anteriority of publication that will prevent dispute around copyright and ownership.
Proofs of Context
Your work depends on others’ publications. Prove that your contribution has been produced based on verifiable external inputs and scope your liability.
Proofs of Approval
You want to be sure that you and your partners are working on synchronized versions on which everyone committed. Embed this electronic agreement within your tools and avoid paper signature.
Proofs of Consistency
Chain all your extracts made out of your model. Whether 3D IFC or 2D contractual deliverables, prove they come from your original 3D native format and make it the single source of truth.
Proofs of Certifications
Verify that BIM objects you’re using are certified by the Issuer. Proof your compliance to Regulations by getting your model certified by a Testing, Inspection & Control office.
Identity Management: 3 levels
ANONYMOUS
Only you can reveal and prove your identity when needed. Useful when anonymity is mandatory (tender process), identity not required (simple integrity check) or to be revealed when needed ( copyright or liability topics).
SIMPLE
Your identity is shared among Project stakeholders, based on simple data such as your email, phone number, name, for information purpose. (by EU law: eIDAS simple signature).
ADVANCED
Your identity is verified by a Trusted third party and makes your commitments legally binding (by EU law: eIDAS advanced signature). You can go paperless.
ANONYMOUS
Only you can reveal and prove your identity when needed. Useful when anonymity is mandatory (tender process), identity not required (simple integrity check) or to be revealed when needed ( copyright or liability topics).
SIMPLE
Your identity is shared among Project stakeholders, based on simple data such as your email, phone number, name, for information purpose. (by EU law: eIDAS simple signature).
ADVANCED
Your identity is verified by a Trusted third party and makes your commitments legally binding (by EU law: eIDAS advanced signature). You can go paperless.
BIMCHAIN Data Vault
COLLABORATION
Centralized BIM Cloud proved their efficiency to accelerate BIM collaboration. To go further, we build private encrypted peer-to-peer networks, based on decentralized File System technology, to achieve further goals in terms of confidentiality, security and speed.
HISTORIZATION
The cryptographic proofs handled by the Blockchain secures the traceability independently of your Data management strategy: wherever you move the data history of events are kept safe. At commitment time, snapshots are stored in a cold storage for historization purpose, with high degree of security: Secured ISO 27001, Multi-Provider Redundancy, End to End Encrypted data.
COLLABORATION
The cryptographic proofs handled by the Blockchain secures the traceability independently of your Data Management Strategy: wherever you move the data history of events are kept safe. At commitment time, snapshots are stored in a cold storage for historization purpose, with high degree of security: Secured ISO 27001, Multi-Provider Redundancy, End to End Encrypted data.
HISTORIZATION
The cryptographic proofs handled by the Blockchain secures the traceability independently of your Data management strategy: wherever you move the data history of events are kept safe. At commitment time, snapshots are stored in a cold storage for historization purpose, with high degree of security: Secured ISO 27001, Multi-Provider Redundancy, End to End Encrypted data.