Security of your customers’ private data is our concern

Request sales info

We are passionately devoted to data protection and privacy. Out of that passion we created and developed the Blinking platform and its proprietary solutions. From day one we developed our solutions in accordance with the principle of privacy-by-design and with end-users in mind. This is why both you and your users can rest assured that you are in safe hands.

Our solutions are used for verification, authentication, and storing of different kinds of private data like personal user information, biometric data, financial and medical records as well as different data structures and documents.

Blinking relies on private blockchain technology to enable many of our system’s functions. One of the reasons why we rely on the private blockchain infrastructure is to enable the control of private data by the customer. Private data we collect about customers is never stored on the ledger. We store data in a distributed database system that can be accessed using smart contracts and the ledger holds only signatures of data to ensure that no tempering is done off chain.

All personal data is stored in a secure distributed data storage. Private data is encrypted at all times using a built-in network encryption mechanism. Data is signed and the signature is stored in the ledger. Every description needs to be authorized by the network and upon checking the identity of the request issuer. The algorithm for key management is protected and runs in a secure environment.

Upon each decryption of the data, signatures are compared to ensure no tampering of data occurred. After data is used, a new set of keys is generated and data is re-encrypted in order to prevent any data breach that might have occurred by compromising the previous set of keys. The entire process of data management and authorization over the network is part of our patent. We are ISO 9001 and 27001 certified service provider.

All user data is stored in a secure distributed data storage.

Data is encrypted at all times using a built-in network encryption mechanism.

Private data is signed and the signature is stored in the ledger.

Every data description needs to be authorized by the network and upon checking the identity of the request issuer.

The algorithm for key management is protected and runs in a secure environment.

After data is used, a new set of keys is generated and data is re-encrypted to prevent any data breach that might occur.

Complex Blinking architecture includes digital certificates, digital signatures, and multiple encryption steps involving SHA-256 and AES-256 encryption algorithms.