A cryptographic process by which plaintext data is processed to produce a unique and unforgeable value that is linked to an identity. It is later possible to verify that this identity produced the signature and attests that the underlying data is true and can be trusted.
Read moreThe process through which iov42 technology uses Public Key cryptography to verify that any requests are from a valid identity within a zone.
Read moreAny device that has the connectivity, storage capacity, and processing ability to support a Distributed Ledger Technology network, e.g. laptops, PCs, specialist farms of custom hardware. More nodes within a Distributed Ledger Technology network improve resilience against system-threatening events.
Read more