ControlThings offers a middleware technology for recording Verifiable Audit Trails using crypto identities in devices and user interfaces. It also involves authentication and secure communication between devices. If you are a solution provider, you can use our software libraries on each participating device. On your sensitive systems, you need to define (during device provisioning) which organisations and types of user accounts to trust. On user interfaces like mobile apps, the users are anchoring their app with their own corporate account. These steps are sufficient, the crypto identity middleware takes care of the rest, using cryptography and certificates. The crypto identities remains invisible, while the middleware produces a cryptographically verifiable chain of events, with tampering detection.
Drop us a line or give us a ring. We love to hear from you and are happy to answer any questions.