BaaSid
  • BaaSid White Paper
  • “100% Decentralization”
    • 1. Background of "BaaSid"
      • 1.1 What is "BaaSid"?
      • 1.2 Decentralization?
      • 1.3 Decentralization!
      • 1.4 Why "BaaSid"?
      • 1.5 Split & Distribution Engine
      • 1.6 Split ID
      • 1.7 Combination Engine Descrambling and Verification Stage
      • 1.8 One Pass: an all-in-in sophisticated verification
      • 1.9 BaaS Certification API Service
      • 1.10 "DB Governance” of BaaSid Participants
  • “Authorization based on Blockchain”
    • Key point & Technology of Authentication / 2FA & MFA
    • 2. Introduction
      • 2.1. Limitations of and problems with blockchain
      • 2.2. Borrowing the DB of BaaS based participants
      • 2.3. Split & Distribute Data
      • 2.4. Verification that is user-centered based on the Public or Private Network
      • 2.5 Proof of integrity for Split & Distribute data
  • “Blockchain as a Service”
    • 3. BaaS (Blockchain as a Service)
      • 3.1 “Core Technology”
      • 3.2 The Benefit of OSP using API of BaaSid
  • “No Original Copy”
    • 4. "BaaSid" algorithm
      • 4.1. Instant Access
      • 4.2. Non Original Copy
      • 4.3. Technical configuration of BaaSid
      • 4.4 Private Node Configuration
      • 4.5 Compare similar projects (Case of Blockchain)
      • 4.6 Compare similar projects (Case of Non-Blockchain)
      • 4.7 Compare similar projects (Case of Non-Blockchain)
  • “BaaSid commercial product”
    • 5. BaaSid develops various blockchain solutions and cloud
      • 5.1. Mission Statement
      • 5.2. BaaSid Product and Solutions
      • 5.3. Detail of Soteria Space
      • 5.4. Detail of Soteria API intergration Module
      • 5.5. Detail of Pistis
  • “Use case of BaaSid”
    • 6. Use case of "BaaSid"
      • 6.1. TWCC (Taiwan government agency DID development and supply)
      • 6.2. Hitachi Sunway (2FA, MFA Authenticator based on Blockchain & Decentralized Storage)
      • 6.3. API interworking compatible with major clouds and fast and easy decentralized storage construct
  • “Service(commercialization) Platform based on BaaSid”
    • 7. Service of "BaaSid"
      • 7.1. My Data Exchange Service
      • 7.2. BaaSid B&P
        • 7.2.1. BaaSid B&P System
        • 7.2.2. BaaSid B&P Structure
        • 7.2.3. BaaSid Bridge
        • 7.2.4. BaaSid Payment
        • 7.2.5. BaaSid Point System
      • 7.3. NFT Open Market Place
  • “About BaaSid”
    • 8. BaaSid Organization
      • 8.1. Organization
      • 8.2. BaaSid Key members
      • 8.3. Advisor
      • 8.4 Communiti Channels
      • 8.5 BaaSid (BAAS) Smart Contract
      • 8.6 Exchange partner
      • 8.7 BAAS Allocation
      • 8.8 Roadmap
      • 8.9 Contact us
      • 8.10 Press Release
Powered by GitBook
On this page
  • Core Technology
  • Protect Data issue
  • Decentralized Storage
  • Authentication based on Blockchain
  1. “Blockchain as a Service”
  2. 3. BaaS (Blockchain as a Service)

3.1 “Core Technology”

Previous3. BaaS (Blockchain as a Service)Next3.2 The Benefit of OSP using API of BaaSid

Last updated 2 years ago

Core Technology

BaaSid has implemented decentralized storage by applying Split Engine, Combine Engine, and Sub Chain of BaaSid, and will develop various decentralized storage products.

Protect Data issue

The demand for security of sensitive personal and corporate data is growing.

Currently, customers are requiring simultaneous provision of data security, storage, and encryption due to the rapid increase of sensitive data leakage incidents such as personal information of individuals and organizations, documents, secrets, and contracts.

This means that the rapid growth of storage usage by individuals is leading to the occurrence of privacy infringements, and new threats of data security are increasing in proportion to the increasing use of storages by businesses.

Decentralized Storage

Security needs for data and data storages are growing rapidly.

Decentralized Storage is a new type of data storage method, different from the conventional centralized data storage and protection methods, and can build an effective data defense system together with data encryption. Unlike the defense system that operates data protection zones such as firewalls and IPS, Decentralized Storage can implement more safe data security by combining and authenticating data pieces whenever users want without preserving the data sources through data split and physically separated storages of data.

Authentication based on Blockchain

Data Encryption / Data Split / Data Distribute / Data Decryption and Combine.

Prepare to secure data from the original source by performing encryption, data fragmentation, and data fragmentation on the data source.

It carries out secure and convenient management through blockchain data immutability, BaaSid authentication, data call, decryption and data combination.

The best safety certification is achieved through the robust double safety structure of FIDO+Split data.

documents, certificates, etc. and provide the functions of recovering certificates at any time.