You are on page 1of 13

Presentation on CredChain

Presented B y: Pronoy Roy and BongoDev


Our understanding of the challenge
Academic Credentials are required by a student to prove his academic track records provided
by authorized institutions.
The task of verifying documents for authenticity is cumbersome and background verifying
agencies charge a handsome fee to verify documents from concerned authorities.
The process could take couple of weeks or sometimes up to month depending on the
response from the issuing authorities.
There is a strong dependency on the issuing authority in case the individual needs to reissue
or authenticate the certificate.
Even though the certificates have been awarded and belong to an individual.

5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 2


Proposed Solution
A Blockchain based technology can be used to store blocks of information. A Blockchain is a
database which stores permanent blocks of information, such as a transaction history, to be
shared within a particular community.
The advantages of using Blockchain tech in the context of this problem include:
Self-sovereignty: users can identify themselves while maintaining control over the storage and
management of their personal data;
Trust: users can have more confidence in an infrastructure that securely offers transactions such as
payments or the issue of certificates;
Authentication – proof to me that you are who you say you are
Authorization- prove to me that you have the permissions necessary to do what you ask.
Transparency and Provenance: Ease of sharing and visibility are essential features of a Blockchain;
Immutability: users can rest assured that records will be written and stored permanently, without the
possibility of modification or loss;
Collaboration: the ability of parties to transact directly with each other without the need for mediating
third parties

5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 3


Proposed Solution Contd.
The objective of CredChain is to provide Blockchain based Technology to use in storing
permanent records by issuing, viewing, and verifying blockchain-based certificates.
Since records are stored permanently on a Blockchain , documents like degree and course
certificates can be secured and verified regardless of whether a user has access to an
institution’s record-keeping system.
These digital certificates are registered on a blockchain, cryptographically signed, tamper-
proof, and shareable.
Even if the institutions that issued the certificates were to close down, or if the entire system
of education collapses , those certificates are still verifiable against the records stored in a
blockchain
Furthermore, once institutions issue a certificate, they do not need to spend any further
resources to confirm the validity of that certificate to third parties, since these will be able to
verify the certificates directly themselves on a blockchain
5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 4
Proposed Solution Contd.
The solution aims at providing:
The issuing authorities easy way of issuing such certificates,
The individuals capacity to possess and share their own official certificates and,
The consumers mechanism to verify the certificates.

Provides an easy way to issue educational certificates in a digital format that is stored on the
blockchain that recipients can own and conveniently share with the consuming parties.
It provides a new technical infrastructure allowing credentials to be shared on a P2P network
and verified as authentic rather than having to rely on issuing authorities to transmit official
credentials.
Since these credentials are cryptographically sealed, recipients and third parties can be
absolutely sure they are authentic and have not been altered since originally being issued.

5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 5


Proposed Solution Contd.
This creates benefits for everyone involved:
Fraud protection
Ownership for recipients
Convenience for verifiers

Additionally can be very helpful for recruiters to verify the track records of a job
candidate

5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 6


How does it work ?

INTERESTED
PARTIES

ISSUING
AUTHORITY

5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 7


What is the USP?
The consumers for the product are the authorities
requiring to verify the credentials .
They can pay an amount in order to access the
verification of the records in the blockchain and
thereby accessing the verification report.
The student, or owner of the qualification
certificate, receives a QR code along with a link to the
certificate.
Interested parties and Employers can then easily
verify the authenticity of educational credentials by
paying a small fee for the access to the verified details.

5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 8


What is the USP? Contd.
For Issuing Authorities:
Issue cryptographically-sealed records that cannot be faked
All records stored securely and referenceable
Instant verification. No dependency on issuing authority to verify records
Own and share official records easily as regular process
No risk of losing records since the transaction is recorded on the blockchain
Third parties can check records anytime

5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 9


What is the USP? Contd.
For Recipients and Consumers:
 Own and share cryptographically sealed records with a public and private key
 All your records in one place (in your wallet)
No waiting time to request authenticated official records
Instant verification. No dependency on issuing authority to verify records
 Virtual verification process for employers and background verification agencies
 No risk of losing records since the transaction is recorded on the blockchain
Access of certificates and mark sheets anytime

5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 10


Solution Architecture
NODE JS

REST API GRPC


JSON

Angular 6 HYPERLEDGER FABRIC

F/L M/L B/L


5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 11
Risk, Issues and Mitigation plan
The only risk as of now I think is the privacy concern of the user about his credentials made to
be publicly available.
To ensure privacy, records are encrypted using symmetric key cryptography. The record will be
encrypted and stored .
The symmetric key will be encrypted with the public key .Each time an entity is given
permission to access the students record:
The record is decrypted with the owner’s private key
The symmetric key is encrypted with the public key of the authorised user

5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 12


Thank You

5/19/2019 BENGALATHON 2018 - 19: AN IT & E DEPARTMENT INITIATIVE 13

You might also like