close menu

Our technology was originally developed as a solution to data management challenges within the defence and security sectors. Therefore, security is at the forefront of our minds at all times and is built-in to our product and service.

Built on one of the most secure blockchains, ByzGen’s technology makes outside interference all but impossible, tracking every interaction from the moment your data enters the system. Our technology injects trust into the supply chain ensuring that processes and business practices are adhered to and quality is assured through a single source of truth.

With business data protected at every point in the chain of custody, you can be safe in the knowledge that your all your business decisions are based on clean, accurate information.

The power of technology and academia

We have built our technology with the world-renowned software experts at the École Polytechnique Fédérale de Lausanne (EPFL), regarded as Europe’s answer to MIT.

Our ongoing partnership with the Decentralized and Distributed Systems lab (DEDIS), which includes software development cooperation and embedding the institution’s research capability within the company, enables our technology solutions to benefit from top class academic insight.

What our technology delivers

Solutions built on our core technology platform can deliver fundamental changes to how data is secured, controlled and managed that will drive cost savings into your business processes.

The key characteristics our platform delivers for your business data are;

• Assurance

• Immutability

• Security

• Transactions at speed

• Near-real time decision enabling

• Transparency

• Distributed Access control rights

• GDPR compliance enabling; ownership of data devolved to the subject

• Allows for operations existing network or system boundaries

How our technology delivers

The system architecture and how it links key components together enables ByzGen to provide the platform for which the system characteristics can be realised.

Those key components are;

offchain storage

all sensitive or personal data added to the system is encrypted then stored offchain

data written to distributed storage

metadata, access control rights and encryption keys are written to distributed storage.

distributed access rights control

fine grain access rights to data can be controlled, then stored and referenced on distributed storage.

multiple layers of cryptographic encryption

data is encrypted and cryptographic keys are re-encrypted and stored on distributed storage.

consensus based validation to data access 

all reads of data are validated via the distributed access rights and consensus based decryption of keys.

conditions and contracts to data

conditions can be set on individual data that can form a contract that’s held on distributed storage and actioned when the conditions are met.

consensus based validation of new transactions

proof of consensus for new blocks is reached between a private set of nodes and transactions become immutable once validated into a block.

immutable history all data and workflows

once transactions concerning the data are made immutable then the history can be used to make efficient business decisions