Dhiway https://dhiway.com/ Trust Infrastructure Company Thu, 23 Oct 2025 17:47:35 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.5 https://dhiway.com/wp-content/uploads/2024/07/cropped-Dhiway-Networks-32x32.png Dhiway https://dhiway.com/ 32 32 Unlocking the Future with Data Tokenization: Getting the Most from Decentralized Ledgers https://dhiway.com/unlocking-the-future-with-data-tokenization-getting-the-most-from-decentralized-ledgers/ Tue, 17 Jun 2025 09:56:04 +0000 https://dhiway.com/?p=18590 Back in 2018, our conversations revolved around how India’s UPI is picking up, and similarly why document verification is still so time consuming. We were discussing mainly usecases like VISA processing, Higher education across the border, and dreaded Government office visits in India, where every time you visit, there will be one more document missing […]

The post Unlocking the Future with Data Tokenization: Getting the Most from Decentralized Ledgers appeared first on Dhiway.

]]>

Back in 2018, our conversations revolved around how India’s UPI is picking up, and similarly why document verification is still so time consuming. We were discussing mainly usecases like VISA processing, Higher education across the border, and dreaded Government office visits in India, where every time you visit, there will be one more document missing between us and what we want to get. That is where we focused on solving for ‘trust’ in digital transactions, leading us to dive deep into something called Verifiable Credentials (VC). 

Fast forward five years, and many usecases spanning from nation scale (ONDC, NPCI etc), and small apartment usecases (for the likes of certificates for cultural programs, sports events etc), we’ve gathered some insights we’d love to share.


Understanding Verifiable Credentials (VC)

VC is a w3c standard for how to share information/credentials. At its core, VC aims to:

  • Confirm that the credential hasn’t changed since it was issued.
  • Verify the issuer’s identity.
  • Check if the credential is still valid (not expired).
  • Determine if the credential has been revoked.

VCs are a powerful way to manage credentials, helping machines quickly verify digital documents and boosting trust. It also focuses on providing the user the much needed ownership of her/his data. But, alas widespread adoption hasn’t fully taken off yet. The reasons for it are many, and valid when you think from the lens of the adopters. Lets list some.

  • It is an ecosystem story: You need all 3 parties (Issuer, Holder, and Verifiers) to use it to make it meaningful
  • Interoperability: Even though standard is flexible and provides options to interoperability, majority of the solutions use custom proof section, and ZK (ZeroKnowledge) system, making the issuer data, not easily verifiable from the service providers.
  • Government is a major stakeholder: In many scenarios, and usecases, the ball stops at the government. Because the Government’s adoption is a key blocker to build ‘trust’ in solutions.
  • Changes to existing software products: For many private companies we spoke to, the economics of making changes to existing software stacks was not feasible, and VC standards needed that change to even get started.
  • Who pays?
    • As it is an ecosystem play, the question in mind of for-profit companies is, who should pay? Why should I pay if I am issuing VC, because the service providers are benefiting from ‘Verifiable’ data.
    • For non-profits, it is not sustainable to keep funding the efforts repeatedly
    • For Govt and Executives, the ‘perk’ is not very clear. If people don’t come to offices, how do they ‘exercise’ their power?
    • Few of the visionaries wanted it, but bureaucracy is such that the very few startups in this space can never work with the government because of stricter tender norms.

But someone has to break this huge blocker, and here is how we approached the problem and designed the solution stack.


Data Tokenization by Dhiway


This is where data tokenization comes into play—think of it as adding a powerful new capability of verification without changing your existing data. Here’s what makes it valuable:

  • Integrity Checks: Easily verify if content remains unchanged by comparing hashes.
  • Issuer Verification: Use digital signatures (private/public keys) to confirm who issued the document.
  • Validity Checks: Include expiry directly within your data to manage validity effortlessly.
  • Revocation Control: The issuer can dynamically manage document status through tokens.

But that’s just the beginning. Data tokenization offers even more advantages than traditional VCs:

  • Easy Integration: Seamlessly connect with your current systems without additional changes.
  • Universal Compatibility: Tokenize any document type, not just JSON-based VCs.
  • Enhanced Trust: Transparent, decentralized logging ensures complete trustworthiness.
  • Time-series Verification: See document changes over time, not just single-point verification.


Sounds Ideal, What’s the Catch?

The primary limitation is that unlike VCs, which may be verified offline, data tokenization requires internet connectivity to interact with network nodes for verification. Beyond this, data tokenization is remarkably versatile and simple to implement.


More Benefits You Should Know About

  • Compliance Ready: Fully aligns with data privacy standards like DPDP and GDPR.
  • Flexible Security: Easily rotate keys for added security.
  • Empowerment: Delegate issuance powers, enabling broader participation.
  • Enhanced VC (VC++): Even VC JSON data (without embedded proof) can be tokenized for convenient use, much like a digital wallet.
  • Enhanced mDoc (mDoc++): Supports modern credential formats like mobile Driver Licenses (mDL).
  • Simplified Storage: Store tokenized data flexibly across various platforms like Google Drive, WhatsApp, local folders, or FTP servers, eliminating the need for dedicated wallets.


One may ask, “ ‘Tokenization’ is the word which is loosely used with web3 and blockchain technologies, isn’t it for ‘Transaction’ only?”. We always say, tokenization is a key word that came to highlight, because more people are using it. It is already being done. The STOCK MARKET works on tokenized shares today. The Bankers Cheque (Demand Draft/DD) is another such example. We are talking about ‘Data’ here, which is surely a superset of every thing we talk about Tokenization.

Does Tokenization solve all the things mentioned above?

  • Common Standard. Simple API to access. 
  • NO (major) CHANGES to existing software products, they continue to generate documents as is, with a new API added to it. 
  • The government can integrate without concern of sovereignty concerns.
  • Who pays? : This will be explained in a separate blog, many interesting pointers here, and we believe you will come back to read about it 🙂
  • It is an ecosystem story: Decentralized networks are designed for ecosystems. With CORD’s OnChain Governance, an option to run an enterprise network, the ecosystem should be able to benefit out.


All good? Let’s see how Dhiway can help.

What does Dhiway do? Simply put, we’re amplifying trust to find and fulfill opportunities. 

Now, our vision is, there would never be ‘one chain to rule them all’, hence providing the document / data creators an option to choose what they need. Public, private, consortium led tokenization network/stack is the right way to make people consume these features faster. Keep customer’s needs, their regulations, and their compliance requirements in mind when we propose a solution.

With that, Dhiway’s CORD based platform allows people to get started quickly on this, and start your journey with ‘Verifiability’.

The post Unlocking the Future with Data Tokenization: Getting the Most from Decentralized Ledgers appeared first on Dhiway.

]]>
What It Took to Deliver Exam Results to 3.1 Million Students https://dhiway.com/what-it-took-to-deliver-exam-results-to-3-1-million-students/ Mon, 19 May 2025 07:20:52 +0000 https://dhiway.com/?p=18556 A Real-World Story of Scale, Trust & Blockchain in Action Earlier this month, over 3.1 million students across Maharashtra received their SSC and HSC exam results online. Dhiway had the opportunity to build and manage the backend infrastructure for this release in partnership with Navneet Education Limited It was a significant milestone — not just […]

The post What It Took to Deliver Exam Results to 3.1 Million Students appeared first on Dhiway.

]]>
A Real-World Story of Scale, Trust & Blockchain in Action

Earlier this month, over 3.1 million students across Maharashtra received their SSC and HSC exam results online. Dhiway had the opportunity to build and manage the backend infrastructure for this release in partnership with Navneet Education Limited

It was a significant milestone — not just in terms of volume, but because of what it represented:

  • The need for reliable and fast access
  • The demand for tamper-resistant, verifiable documents
  • And the expectation of a seamless digital experience for every student


The Task

Navneet approached us with a clear challenge: Can you help us publish board results for millions of students — quickly, securely, and without system failure?

They also wanted each result document to be verifiable using CORD blockchain, to ensure long-term trust and authenticity. This meant handling high user concurrency, delivering fast response times, and ensuring every student could access and download their results without delay.


Our Approach

We focused on three core principles: Performance, resilience, and trust.

Here’s how we addressed them:

  • Cloud-native setup using AWS, with auto-scaling and rate-limiting to manage traffic surges
  • Multi-layer caching to support sub-second response times
  • Client-side rendering, where appropriate, to reduce backend load
  • QR code integration on result PDFs, backed by blockchain hashes
  • Mobile-first design to support access from any device, even in low-bandwidth areas

We also ran extensive load tests with JMeter, simulating double the expected traffic to ensure we were prepared.

Results at scale, delivered with speed and trust — 3.1 M+ students, zero downtime.

Over two separate days of results publication, the system was resilient and provided a positive experience to students anxiously awaiting their results and seeking to download the documents.


Why Blockchain?

Every result PDF included a QR code linked to a verifiable digital record anchored on the CORD Blockchain, built for trust infrastructure.

This ensured that:

  • Each result document was tamper-resistant
  • Verification could happen instantly, from anywhere, without needing to log into a portal

We didn’t use blockchain as a buzzword. We used it to add real value, adding a layer of trust and permanence to a document that often marks a turning point in a student’s academic journey.


Key Takeaways

  • UX and accessibility are critical – A smooth front-end experience is essential; users only benefit from fast systems if they can easily access and use them.
  • Verification matters – Especially in education, where credentials must be trusted and stand the test of time.
  • Scale is manageable – With the right preparation and infrastructure, even millions of concurrent users can be served reliably.


Looking Ahead

This project brought together everything we care about at Dhiway-infrastructure: digital trust and solving meaningful, real-world problems. Together with Navneet and the Maharashtra State Board, the Dhiway team has demonstrated a new way of managing examination results and created a positive experience for the students and their guardians.

If you’re exploring how to deliver results, certificates, or credentials secure and scalable way, we are happy to share what we’ve learned.

🌐 Learn more:www.dhiway.com

The post What It Took to Deliver Exam Results to 3.1 Million Students appeared first on Dhiway.

]]>
Enabling Trusted Commerce using Beckn Protocol and CORD Blockchain https://dhiway.com/enabling-trusted-commerce-using-beckn-protocol-and-cord-blockchain/ Fri, 24 Jan 2025 06:31:31 +0000 https://dhiway.com/?p=17671 This content was originally posted on BECKN Authors: Amar Tumballi, Founder and CTO, Dhiway NetworksRavi Prakash v, Head of Architecture and Technology Ecosystem, Beckn Foundation Introduction Beckn is an open protocol to enable decentralized digital commerce by way of open and inclusive networks instead of closed platforms. Beckn protocol enables decentralized economic transactions beyond commerce, […]

The post Enabling Trusted Commerce using Beckn Protocol and CORD Blockchain appeared first on Dhiway.

]]>
This content was originally posted on BECKN

Authors:
Amar Tumballi, Founder and CTO, Dhiway Networks
Ravi Prakash v, Head of Architecture and Technology Ecosystem, Beckn Foundation


Introduction

Beckn is an open protocol to enable decentralized digital commerce by way of open and inclusive networks instead of closed platforms. Beckn protocol enables decentralized economic transactions beyond commerce, covering sectors like healthcare, mobility, travel and stay, and skilling and employment. Beckn is a semantic protocol that is agnostic of the underlying technology.

The blockchain technology provides enhanced trust to participants and their interactions on the chain.

This blog captures a demonstration of how beckn protocol can be adopted by a blockchain to provide decentralized digital commerce, and offer augmented trust on certain aspects of commerce interactions. The demonstration only attempts a sample set of use cases of trust with a sample business scenario but it showcases the possibility to extend this solution to multiple use cases for trust. Please see the section of future evolutions at the end.

The blockchain adopted for the demonstration is an open-source chain called CORD developed by Dhiway. CORD offers varied services to enhance trust to the economy interactions on the chain. This demonstration is a joint voluntary effort of Dhiway and Beckn Foundation along with few other volunteers from the beckn open community that supported the effort at different stages of implementation


A Business Scenario

There is a farmer in Shimla that owns an apple orchard. Every month, he farms 1000 kilos of genuine Shimla apples. He sells these apples to various retailers, big and small. The apples he produces are certified by various food certification agencies like FPO, FSSAI, Agmark etc. These retailers in-turn sell these apples to the end-consumers. The transactions between the farmer and retailer, and those between retailer and end-consumer happen through various e-commerce platforms.


A business transaction

Let’s consider the following scenario. Say, a typical end-consumer is searching for authentic Shimla Apples on their usual e-commerce app. Upon searching, they see a listing of retailers that sell “Authentic Shimla Apples” that claim to be sourced from genuine apple farmers based in Shimla. When viewed on the consumer’s application, the products show all the certifications (like the above) that have been issued to them.

He selects a retailer and adds a dozen Shimla Apples to his cart and does a checkout. The order is created and a short while later, he receives the product.

However, the buyer doesn’t really know whether the products he has ordered are really genuine Shimla Apples. The buyer has no choice but to trust the platform he is on, to ensure the quality of products being sold to them. Without a clear traceability to the manufacturer/producer, retailers can always sell fake Shimla apples with the same certifications attached. A typical consumer may not be able to tell the difference between a real Shimla Apple and a fake one.


Trust as it exists today is either broken, or concentrated in the hands of a few intermediaries

At the consumer-facing end, the users of these platforms have to trust the platform they are on, to offer only genuine, high-quality products and services. And at the provider-facing end, the platform must take the responsibility of ensuring genuineness and quality assurance of  products and services they are publishing in their catalog.

If a product or service turns out to be of low quality, or worse, fake, the consumer’s trust breaks. Post-facto, the consumer can always hold the platform responsible. And the platform could either replace the product, initiate a refund, or initiate a return. This incurs cost to the platform and thus can only be done by large platforms with sufficient resources to provide the trust. But, there is a risk that consumers may never trust the platform or the seller or both, ever again.


Introducing beckn protocol

Beckn protocol [1], is an open, interoperable and universal transaction protocol to enable a decentralized digital economy. It is a set of open interoperable specifications that helps re-imagine the world of consumer-provider transactions. The image below describes the 5-layered architecture of beckn protocol.

Beckn protocol fundamentally unbundles the idea of 2-sided platform-centric systems into multiple 1-sided platforms/apps forming an open network connected via the interoperable protocol layer. When implemented, this protocol allows consumers and providers to connect and transact with each other using any platform of their choice, thus creating a beckn-enabled network or simply, a beckn network.>

For more information on beckn protocol and its applications, visit https://becknprotocol.io.


In a beckn-enabled ecosystem

In a beckn-enabled ecosystem, the consumer exists on one platform to place orders for products and services published on a different platform via beckn protocol API calls. This forms a network of consumer-facing platforms also known as beckn application platforms or BAPs, and provider-facing platforms also known as beckn provider platforms or BPPs all using beckn protocol to do discovery, ordering, fulfillment and post-fulfillment of products and services.

Assuming this architecture, let us consider the following situation.

Let us assume that there are multiple consumer platforms and provider platforms, all talking to each other via beckn protocol. To facilitate trusted communication between these platforms, there is an open registry acting as a public key infrastructure (PKI) that stores public keys, endpoints, and other details of all the participants of the network. The sender digitally signs their messages using their private keys and the receiver looks up the public keys of the sender on the registry to digitally verify the signature. Hence, the registry acts as a trust infrastructure for inter-platform communication.

However, it does not solve the issue of ensuring authenticity of products, service providers and agents. Some of these credentials may be platform-specific like number of rides performed by a driver; number of 5-star ratings given to an agent. Others could be cross platform credentials like food quality certifications, safety certifications etc. Every time a service provider or an agent moves from one platform to another, their entire platform-specific reputation and credentials remain with the platform they were on and need to be built up again on the new platform. And the new platform again has the responsibility of ensuring that the products, services and agents on their platform are genuine.


Beckn with Blockchain

To ensure portable cross-platform credentialing of products, services and agents, an additional infrastructure layer must be added to store these credentials so that they can be verified by any platform on the network. However, if we use a platform to store these credentials, it is just shifting the trust up one level, from one platform to another. BAPs and BPPs will have to trust the platform as a single source for all the credentials. Due to the centralized nature of this credentialing infrastructure, beckn network participants may be wary of putting their trust on a single platform to store the credentials of every entity on the network. Furthermore, this also introduces a single point of failure that puts the burden of availability on the credentialing platform itself to always be available for storing and verifying credentials. Therefore a more robust system is needed that not only is highly available, but also where the trust comes via a logical consensus of multiple distributed entities as opposed to a single source of truth that the network participants have to implicitly trust. In short, there is a need for consensus rather than trust otherwise known as trustlessness.

One way to create a distributed, consensus-based infrastructure is to use a Distributed Ledger Technology like blockchain to store the credentials. A blockchain network uses consensus algorithms to ensure the truth comes from multiple platforms agreeing to a common output, thus creating a decentralized database of information. This ensures that the credentials being stored on a decentralized database are immutable and non-repudiable.

Such an infrastructure can be used for several advantages. Firstly, a retailer registered on a beckn-enabled network can only add products to his catalog that match the exact description of the product that the farmer intended to be sold to the end-customer.

Also, a retailer registered on a beckn-enabled network would not be able to add products to his catalog that are more than the quantity as purchased from the farmer.

Consumers will purchase these products via their network-verified apps. Just before placing the order, the consumer app will verify the authenticity of the product credentials by referring to the previous blockchain transactions.Once verified, the order is confirmed.


How it Works

Overview

In our implementation we have assumed a beckn-enabled network where there are consumer platforms, retail platforms and Manufacturer platforms.

Alongside the beckn-enabled network, there is a blockchain-based network that stores the identities and credentials of authorized participants. The semantic nature of beckn protocol allows beckn-enabled networks to be layered on any blockchain or DLT network.  In this article, we will use a reference blockchain network called CORD [2] to demonstrate a verifiable credential being created, stored and verified across a multi-network transaction. The CORD blockchain network enables the anchoring of tokenized transaction records and links to information objects that present a durable model for entities participating in the ecosystem. CORD enables discovery, access and acclaim records for various activities that relate to humans interacting with organizations, other individuals or machines. CORD provides the foundational layer of digital trust required to create a resilient, sustainable and economically viable ecosystem around authenticated data flows.

The Retail BAP [3], Retail BPP [4], Supply-chain BAP, and Supply Chain BPP are all registered on a blockchain as authorized entities that can transact on a network. This eliminates the need for a central network registry and therefore creates a trustless infrastructure for authentication and digital signatures.

In this example, a beckn-enabled network layered on top of CORD acts as a decentralized token store for verifiable credentials and registries. The decentralized nature of CORD and native implementation of beckn protocol specifications enables the end user application to verify the Availability-to-Promise (ATP) of products before ordering and trace its ownership all the way back to the manufacturer/producer irrespective of the number of intermediaries it has gone through.

In this example scenario, each beckn network participant i.e, Consumer Platforms, Retail Platforms and Supply-chain Platforms communicates with CORD via an API implemented at the CORD nodes


High level Flow (TL;DR)

Farmers will upload their products i.e “Shimla Apple” to their inventory on their Beckn-CORD-enabled Supply-chain application.


This application refers to the product schema reference stored on the CORD blockchain while uploading the object as per the prescribed product schema. The BPP will generate a unique hash of the product, its schema reference, and quantity, and send it to the CORD network. The CORD network chain nodes verify the product against the product schema and generate a unique block hash ID that represents the verifiable credential of the product. This ID is transmitted along with the product ID across the beckn-enabled network.

Retailers will place orders to these farmers via network-verified Supply-chain BAP apps to buy a specific number of units of genuine Shimla apples.

Farmers will sell their produce to retailers on Supply Chain BAPs via Supply-chain BPP applications. This happens via standard beckn APIs adopted by network participants.

Retailers add products that they have purchased from the manufacturers into their catalog. Due to their purchase reference being recorded on a blockchain, they are unable to upload more than the amount of units they have purchased from the retailer.

Consumers purchase these products from the retailer. The consumer app verifies the ownership of these products before placing an order.

Let us look at each of these interactions in more detail.


Retailer-Manufacturer Transaction

The farmer will have an application where he can see the orders he has received and allocate a specific number of authentic apples to each retailer. In the current implementation, authorized farmers and product schema used by each farmer has been pre-configured on the CORD blockchain.

The retailer has a beckn-CORD-enabled application that he uses to place orders from the farmers. Before placing the order, the retailer’s application verifies the ownership of the apples by calling the CORD network with the block hash ID and verifying if the farmer is truly the owner of those apples.

The flow can be summarized in the below diagram.


Consumer-Retailer Transaction

Now the retailer uses a typical retail store management application where he uploads the products (apples) he has purchased from the farmer to his own catalog for consumers to purchase. In this example, the particular retailer chooses to use a Magento-based seller application to manage his inventory and orders. When he uploads his product, he will not be able to upload more than the quantity (1000 units) he has purchased from the Manufacturer. Before uploading, his application calls the CORD blockchain with the product SKU ID and the quantity. The CORD blockchain nodes verify if the retailer is truly the owner of a 1000 units of Shimla Apples by calculating the hash of the product and comparing it with the hash stored on the chain. If he is not, the CORD network returns an error.

The consumer searches for these apples on his app.

And he sees genuine products with a green verified icon on the listing. All the products that have a block hash ID are treated as verifiable products as shown below.

Before placing the order, the consumer application first verifies if the genuine items are actually available in the retailer’s inventory. The chain nodes verify the availability using the previous blockchain transactions if the retailer truly has ownership of the genuine product. The state where a product is available for fulfillment before placing an order is called Availability to Promise (ATP). This prevents double selling or overblocking of inventory where a retailer claims to have more inventory available to sell so that they can get more orders. Once the ATP is verified, the BAP then fires a beckn protocol confirm API call to the Retailer BPP. The retailer BPP then transfers the ownership of the product to the consumer by calling an order.confirm remote procedure call on the CORD blockchain. This adds a ownership transfer record of a fixed amount of units from the retailer to the consumer on the blockchain. This record gets replicated across all chain nodes to ensure immutability. Now there is a non-repudiable claim to ownership of the genuine product by the buyer that the seller cannot refute. This improves the overall trust of the consumer towards the system and the seller.

Once done, the CORD blockchain will have transaction records like


Note

The CORD blockchain doesn’t store actual data but merely the hashes of the transactions to ensure privacy of the participants are protected. The creation of the hashes of the transactions still takes place on the network participant platform i.e BAP and BPP nodes. Such value exchanges augmented through the combination of off-chain verifiable credentials capturing the transaction details and on-chain verifiable proofs create a higher level of assurance for ecosystem participants.

As you can see, we have successfully managed to transmit a verifiable credential i.e the ownership of genuine Shimla Apples across two cascaded networks using beckn protocol and ensured its immutability using blockchain technology.

The entire integration of beckn-enabled networks on a blockchain can be summarized using the below transaction history on a blockchain.


Summary

Beckn protocol allows the unbundling of tightly coupled 2-sided platforms into a network of multiple 1-sided platforms. The inter-platform trust is established using a public key infrastructure that serves as a network registry. Blockchain or Distributed ledger technologies can increase this trust by allowing beckn-enabled networks to layer on top of blockchain networks. Furthermore, the layering of beckn and blockchain networks tremendously increases the consumer’s trust on the platform (BAP) where they’re buying products from especially when the inventory of products being bought are not managed on that platform. Similarly, due to the portability of these credentials, seller platforms do not have to re-verify credentials of an entity when they move from one platform to another.

The below table summarizes the difference between a beckn-network that is using blockchain versus a beckn-network that is not using blockchain in the example discussed in this article

These are just some of many possibilities that can emerge when layering beckn protocol networks on blockchain networks. Let us take a look at some ideas that we intend to implement going forward.


Future Evolution

This is just the beginning of beckn protocol’s ability to leverage advancements in the web 3.0 world, and we are already thrilled at the possibilities

Some of the use cases which we are working on imminently are as follows (in no particular order):

  • Executing a fully decentralized beckn protocol interaction on a blockchain
  • Building of identity registries (of entities like retailer, buyer, manufacturer, dealer, delivery partner etc etc), on the ledger/chain/network, so those who have access can co-relate entities in the transactions.
  • Build a Verifiable Credential based ecosystem making any product authentication made easy from the buyer.
  • Better anonymized reputation building system for retailers, buyers and other entities in the ecosystem by handling the rating system with more validations.
  • Possibility of having a token based economy tied to real-world use commerce transactions.
  • Creating of a blockchain-based dispute resolution system for beckn-enabled networks


References

[1] Beckn Protocol Specification

[2] CORD Network – Below links provide more information on the network

[3] Open-source BAP Reference app

  • Source-code for Retail BAP – Click here
  • Source-code for Supply BAP – Click here
  • Retail BAP:live demo: Click here
  • Supply Chain BAP live demo: Click here

[4] Open-source BPP Magento Extension

  • Source-code for Retail BPP – Click here
  • Source-code for Supply-chain BPP – Click here

The post Enabling Trusted Commerce using Beckn Protocol and CORD Blockchain appeared first on Dhiway.

]]>
Dhiway: A Journey Rooted in Knowledge and Trust https://dhiway.com/dhiway-a-journey-rooted-in-knowledge-and-trust/ Thu, 03 Oct 2024 03:50:46 +0000 https://dhiway.com/?p=17597 When we set out to create Dhiway, we sought a name that would embody the depth of our vision and the clarity of our mission. We wanted a name that would represent not just a combination of letters but a philosophy, a journey, and a commitment to building trust in an increasingly digital world. We […]

The post Dhiway: A Journey Rooted in Knowledge and Trust appeared first on Dhiway.

]]>
Dhiway in different language

When we set out to create Dhiway, we sought a name that would embody the depth of our vision and the clarity of our mission. We wanted a name that would represent not just a combination of letters but a philosophy, a journey, and a commitment to building trust in an increasingly digital world. We aimed to create something that resonated deeply with the essence of knowledge, trust, and purpose. That’s when we turned to one of the most profound Spiritual sources – the Gayatri Mantra.

The word “Dhi” (धी) in Sanskrit means knowledge, wisdom, and understanding. It is a central concept in the Gayatri Mantra:

“Om Bhur Bhuvaḥ Svaḥ 
Tat Savitur Vareṇyaṃ   
Bhargo Devasya Dhīmahi  
Dhiyo Yo Naḥ Prachodayāt.”

The mantra is a prayer to the divine light of knowledge and wisdom, asking for the illumination of our minds. It is this “Dhi” that represents the quest for higher knowledge, intellectual clarity, and the ability to discern the right path. In the context of our company, “Dhi” reflects our focus on building systems based on truth, transparency, and integrity—values that guide us in creating technology that can be trusted.

The second part of our name, “Way,” serves a dual purpose. On the one hand, it represents the path—the journey of discovery, learning, and collaboration that every organization and Individual embarks on. Conversely, it resonates with a deeper question: “Who are you?” It’s a reminder to stay grounded in self-awareness, to constantly ask ourselves whether we are on the right path, and to align our actions with our purpose.

Thus, Dhiway was born, a fusion of the ancient and the modern. While “Dhi” draws from the wisdom of the ages, “Way” looks forward, symbolizing progress, purpose, and the drive to make a meaningful impact.

Leading the Future of Trust Infrastructure

Dhiway, as a name, is not just symbolic—it’s a reflection of the leadership role we have undertaken in open trust infrastructure technology. In a world where digital interactions are growing at an unprecedented pace, trust has become a critical currency. Whether it’s governments, corporations, or individuals, every stakeholder must be sure that the systems they rely on are secure, verifiable, and trustworthy.

At Dhiway, we collaborate with diverse partners to build solutions that deliver absolute certainty in the digital realm. Our work with cutting-edge blockchain technology and open standards ensures that data, identity, and digital transactions are managed with the highest levels of security and assurance. This aligns with our core philosophy: knowledge is not just about information; it’s about trust and integrity.

A Path Forward

As we continue to grow, the name Dhiway is a constant reminder of our chosen path—a path defined by knowledge, wisdom, and trust. In everything we do, from designing digital credentials to enabling secure data exchanges, we strive to stay true to these principles.

Our name is not just a label. It’s a guiding force that pushes us to lead, innovate, and create a world where trust is the foundation of every interaction. Whether it’s creating digital credentials that ensure privacy or working with open standards for data exchanges, Dhiway’s solutions are designed to bring certainty where it’s needed most. At its core, our work reflects the values encapsulated in our name: knowledge, integrity, and a clear path forward.

Our name reflects this journey — one of enlightenment, truth, and unwavering commitment to building a better, more trusted world.

The post Dhiway: A Journey Rooted in Knowledge and Trust appeared first on Dhiway.

]]>
Digital Public Infrastructure is the linchpin of trustworthy data exchange https://dhiway.com/digital-public-infrastructure-is-the-linchpin-of-trustworthy-data-exchange/ Thu, 26 Sep 2024 05:01:21 +0000 https://dhiway.com/?p=17572 The honourable Finance Minister presented a much-anticipated budget for FY 24-25, and those who are familiar with Digital Public Infrastructure (DPI) will find some topics interesting. The budget mentioned DPI to support farmers by improving access to digital tools. An extension to that is data digitization and reusability through the Unique Land Parcel Identification Number […]

The post Digital Public Infrastructure is the linchpin of trustworthy data exchange appeared first on Dhiway.

]]>

The honourable Finance Minister presented a much-anticipated budget for FY 24-25, and those who are familiar with Digital Public Infrastructure (DPI) will find some topics interesting. The budget mentioned DPI to support farmers by improving access to digital tools. An extension to that is data digitization and reusability through the Unique Land Parcel Identification Number (ULPIN) or “Bhu-Aadhaar” and the digitization of land records in urban areas with contextual GIS data.

Bringing DPI into a discussion around data digitisation, enabling reusable data exchange and creating digital identifiers opens the IT architecture to the concept of “trust layers”. Today, as many citizen services are transitioning from traditional Web 2.0 models to Web 3.0 design patterns, trustworthy data exchange is critical to reducing transaction friction. The “trust” component of data exchange is enabled through distributed ledger technologies (DLTs) such as blockchain. As new service deployments bring about digital identifiers, digital cards, and records, and, more importantly, there is a need to have authentic data sources to query, it is vital to view DPIs from the perspective of Open Trust Infrastructure.

Public instances of a blockchain, such as CORD, form the foundation of the Open Trust Infrastructure. Combining open standards, networks, and protocols with open innovation makes the available building blocks critical for designing applications and services around them. Trustworthy data exchange is enabled through the issuance and acceptance networks of verifiable credentials (VCs) and verifiable data streams, allowing purpose-specific data sharing and verification with a notice/consent design embedded within.

The trust layer of the blockchain will bring about open infrastructure such as data fingerprinting registries, credentialing registries, and key management services. Data registries on the blockchain allow regulatory authorities to openly govern data while ensuring it is accessible to services with high fidelity and quality. Among the nine priority areas highlighted in the Budget 2024 speech, each can have a multiplier impact when DPIs with data registries are enabled for the services and innovative solutions can be incubated around such infrastructure.

Verifiable Credentials are increasingly becoming mainstream – sometimes without the end consumer realizing that the records they manage are secure, tamper-resistant VCs. This is a positive sign that the end-consumer experience can be transformed from a paper-based system of low-trust and low-fidelity to a high-trust and high-fidelity digitally secure method. With this, it is not surprising that organizations and educational institutions are today using credentialing platforms to issue VCs for learning and educational records (LERs), Skilling and Knowledge Records (SKRs) and Workplace Credentials (WPCs). Secure, verifiable credentialing is a natural outcome of an Open Trust Infrastructure.

With DPIs and Open Trust Infrastructure, it is crucial to view the multiple views and access to data services from the perspective of digital trust ecosystems. This, in turn, ensures better governance and operational management of such infrastructure through consortium-like approaches, which provide participants with necessary incentives to maintain and improve these digital rails.

As ISVs and SIs come together to implement the critical parts of the digital infrastructure required to deliver the records such as skilling and knowledge credentials or the Kisan Credit Cards – with the DPI design model, it will be possible to use the CORD blockchain to rapidly prototype and deliver production-ready software that is capable of being used at nation-scale. The CORD Blockchain also allows for a decentralized and federated approach to data governance, data management and data pipelines which addresses the topic of legacy data silos and interoperability.

CORD Blockchain sandboxes allow ISVs to design and deploy applications which follow the guidelines of Digital Public Goods (DPGs) on infrastructure that is aligned with the principles of DPI. The growing number of use cases, an uptick in the number of tenders and RFPs that mention blockchain as the preferred underlying infrastructure, and a better appreciation of the concept of reusable digital identifiers have contributed to the rapid adoption of Web 3.0 models. Together with empowering the data principals with more fine-grained control over the data, such an approach also brings in newer ideas in economic models around sustainable and scalable infrastructure.

The post Digital Public Infrastructure is the linchpin of trustworthy data exchange appeared first on Dhiway.

]]>
My Journey with Sunbird RC: Revolutionizing Registries and Credentials https://dhiway.com/my-journey-with-sunbird-rc-revolutionizing-registries-and-credentials/ Thu, 26 Sep 2024 04:38:16 +0000 https://dhiway.com/?p=17571 My journey with Sunbird began in 2017 when we at the EkStep Foundation joined forces with the Ministry of Education (formerly MHRD) on the National Teacher Portal initiative. This initiative soon evolved into DIKSHA (Digital Infrastructure for Knowledge Sharing), a national platform dedicated to enhancing school education in India. The Vision Behind Sunbird Sunbird was […]

The post My Journey with Sunbird RC: Revolutionizing Registries and Credentials appeared first on Dhiway.

]]>

My journey with Sunbird began in 2017 when we at the EkStep Foundation joined forces with the Ministry of Education (formerly MHRD) on the National Teacher Portal initiative. This initiative soon evolved into DIKSHA (Digital Infrastructure for Knowledge Sharing), a national platform dedicated to enhancing school education in India.

The Vision Behind Sunbird

Sunbird was conceived as a collection of modular, configurable, and extendable building blocks designed to “share the ability to solve.” Think of it as a set of LEGO blocks or puzzle pieces that can be assembled in myriad combinations to foster innovative solutions within the educational ecosystem.

From the outset, we identified several essential building blocks that would form the backbone of any large-scale transformation. Among these were telemetry, knowledge graphs, data platforms, and crucially, registries and credentials. Our initial work on registries and credentials began as OpenSABER (Open Software Architecture for Building Electronic Registries), utilizing openbadges as a foundational element.

At the heart of it, the idea has been and remains, to enable attested sources of information with ownership for individual’s data in their control and credentialing (or badging) to make this data easily shareable and verifiable.

Registries form the seed of trust in any decentralized ecosystem and credentials empower an individual with control over their data, making it portable, verifiable, inclusive, trustworthy and accessible.

Empowering Individuals Through Data Ownership

At its core, Sunbird RC enables an attested source of information while granting individuals ownership and control over their data. This credentialing process—referred to as badging in the initial days—ensures that personal data is easily shareable and verifiable.

Registries serve as the seeds of trust in any decentralized ecosystem, while credentials empower individuals by giving them control over their data. This makes their information portable, verifiable, inclusive, trustworthy, and accessible to all.

Through the pandemic, as the eGov Foundation developed DIVOC for COVID vaccination management & certification, the global efforts rapidly evolved standards around ‘verifiable credentials’. OpenSABER was re-branded as Sunbird RC (Registry and Credential).

Adapting to Change: The Impact of the Pandemic and Birth of Sunbird RC

The COVID-19 pandemic accelerated the development of digital solutions, prompting the eGov Foundation to create DIVOC for managing vaccination records and certifications. During this period, global standards around ‘verifiable credentials’ rapidly evolved. As a result, OpenSABER was rebranded as Sunbird RC (Registry and Credential) to give a fresh boost of enthusiasm

Sunbird RC has emerged as a vital building block for establishing trusted registries and verifiable credentials across various domains. It powers other Digital Public Goods (DPGs) such as DIGIT, Inji, Sunbird Serve, and Sunbird ED. To date, it has facilitated billions of credentials and diverse registries across sectors like healthcare and education in India.

Sunbird RC offers microservices for credential issuance and management, enabling rapid deployment of electronic registries through configurable schemas. One standout feature is its ability to generate instantly verifiable credentials that can be accessed offline via printable QR codes.

Looking Ahead: Collaboration and Innovation

With the growing traction for credentialing systems globally across various use cases, Dhiway has joined Sunbird RC as a co-maintainer alongside the Centre for Open Societal Systems (COSS). Together, we aim to advance this project further by promoting adoption and enhancing innovations in digital identity, data registries, digital wallets, and credentialing systems.

Sunbird is an open-source collective seeded by the EkStep Foundation. The community has developed about 20 digital solutions—referred to as “building blocks”—that can be utilized individually or combined to create larger and more complex solutions.

I have had the pleasure of working with multiple community members from eGov Foundation, MOSIP, BMGF, some of the hyperscale cloud service providers such as AWS & Google, a few large scale multinational IT companies, a bunch of start-ups, government ministries, and many open-source communities.

I am thrilled to continue my tryst with Sunbird RC and grow it together with the community, leveraging Dhiway team’s extensive experience in building and maintaining open-source projects.

To learn more about Sunbird RC and join our vibrant community, visit https://rc.sunbird.org 

The post My Journey with Sunbird RC: Revolutionizing Registries and Credentials appeared first on Dhiway.

]]>
Decentralized Identity: It’s Not What You Think https://dhiway.com/decentralized-identity-its-not-what-you-think/ Sun, 15 Sep 2024 17:47:52 +0000 https://dhiway.com/?p=17543 In an increasingly digital world, proving who we are has never been more critical or misunderstood. The conversation around decentralized identity often suggests that it will replace the systems we’ve relied on for so long, tearing down the old to make way for the new. But that’s not the reality. These identity models aren’t adversaries […]

The post Decentralized Identity: It’s Not What You Think appeared first on Dhiway.

]]>

In an increasingly digital world, proving who we are has never been more critical or misunderstood. The conversation around decentralized identity often suggests that it will replace the systems we’ve relied on for so long, tearing down the old to make way for the new. But that’s not the reality. These identity models aren’t adversaries locked in a battle for dominance; they are complementary forces that, when combined, can create a more secure, flexible, and empowering future for us all.

Think about it: our identity isn’t just a name, an ID card, or a social media profile. It’s a complex web of credentials, reputations, and relationships rooted in something deeply personal and sovereign—the name given to us at birth. This idea of identity is naturally decentralized. Yet, in today’s digital world, we are forced to rely on borrowed identifiers—like email addresses, mobile numbers, and social media accounts—that leave us vulnerable and powerless.

What if we could reclaim that sense of sovereignty in the digital realm? Imagine having a digital identity as uniquely ours as our name—one that we fully own and control, without ever compromising our privacy or security.

To bring this vision to life, we must rethink digital identity—not as a choice between centralized or decentralized systems, but as a fusion of their strengths. When these two approaches unite, they create a powerful framework of trust that offers more security, flexibility, and empowerment than either could achieve alone.

The Nature of Identity: Rooted in Sovereignty

To understand the future of digital identity, we need to start with a simple but powerful truth: our identities are inherently sovereign. From the moment we are born, our identities begin with our names—given to or chosen for us, not issued by any central authority. These names belong to us, and only us. Over time, they become associated with a rich tapestry of experiences, accomplishments, and relationships that form our reputations.

In the physical world, we build our identities by linking credentials to our names—birth certificates from governments, diplomas from universities, and membership cards from professional organizations. Each of these credentials contributes to the reputation of our names, like threads weaving together the fabric of who we are. No single entity controls all these threads; they come from diverse sources, adding depth and nuance to our identities.

But in the digital realm, this natural decentralization begins to unravel. Online, our identities are often reduced to borrowed credentials—an email address from a tech company, a social media profile, or a phone number managed by a telecom provider. Third parties control these digital identifiers, and don’t truly belong to us. They can be revoked, altered, or exploited without our consent.

What’s more, we lack control over our data. In the current model, we are compelled to hand over vast amounts of personal information to third parties for authentication and authorization. This means our data—our actions, preferences, and relationships—ends up in centralized databases that are often opaque and vulnerable. We have little say over how this data is collected, used, shared, or sold, making us passive participants in our digital lives.

This brings us to a critical realization: our current digital identities do not reflect the sovereignty and flexibility of our real-world selves. Instead, they are fragmented and vulnerable, exposed to misuse and exploitation, and ultimately subject to the control of entities whose interests may not align with ours.

But what if our digital identities could be as sovereign and flexible as the names we were given at birth? What if we could build digital reputations similarly—by linking credentials to identities we fully own and control? This is where the concept of cryptographic identifiers—a new digital foundation—comes into play.

The Core of Digital Identity: A Key Pair as Our Digital Name

Public key cryptography, a cornerstone of digital security for decades, lays the groundwork for a digital identity we truly own and manage ourselves. It revolves around a pair of cryptographic keys: a private key known only to us and a public key, which we can share with others. This key pair becomes the digital root of trust—an anchor for our online identity that remains under our control alone.

Think of the private key as our personal signature, kept secret and secure, while the public key acts like our digital name—something we can share openly and widely. Together, they create a powerful method to authenticate who we are online, without relying on any third-party provider. Just like the names given to us at birth, our digital key pair is unique and completely within our control.

But how does a key pair build trust? Here’s where it gets interesting.  Just as our real-world name gains recognition and credibility through our experiences, accomplishments, and relationships, our digital identity earns its reputation through credentials tied to our key pair. These credentials—whether issued by a government, a university, or a professional organization—are cryptographically signed and secured.

What makes this powerful is that these credentials are verifiable at any time by anyone who needs to confirm our identity, qualifications, or achievements—without ever having to return to the original issuer. This instant, trust-based verification protects our privacy. It empowers us to build and present our digital reputation with the same confidence and autonomy we enjoy in the physical world.

Building Our Digital Reputation: The Key Pair in Action

Think of our digital key pair as a blank canvas, ready to be filled with the credentials that define us. Over time, we can attach verifiable credentials to this key pair—our digital driver’s license, a degree from our university, or proof of employment from our company. Each of these credentials contributes to our digital reputation, enabling us to build trust without giving up control.

Imagine needing to prove our professional qualifications to a potential employer. Instead of submitting physical documents or scans, we present a set of digital credentials tied to our key pair. The employer can instantly verify these credentials, thanks to cryptographic proofs that confirm the appropriate authorities issued them. No lengthy checks or third-party databases are required—just immediate, secure trust.

This concept extends beyond professional credentials. Suppose we need to access an age-restricted service online. Rather than disclosing our full name, date of birth, and address, we can provide a signed cryptographic proof that simply confirms we meet the age requirement without revealing any other personal information. The service provider trusts this proof because it is tied to our key pair and backed by verifiable credentials issued by trusted entities.

Anchoring Identity with Multiple Key Pairs: Flexibility and Context

The power of a decentralized digital identity doesn’t stop with a single key pair. We can have multiple key pairs for different contexts—each serving a specific purpose or representing a unique aspect of our digital selves. For example, one key pair might be used for professional credentials, while another could be designated for personal interactions or healthcare records. This flexibility allows us to maintain privacy and security across various domains, ensuring that only relevant information is shared with the appropriate parties.

The World Wide Web Consortium (W3C) Decentralized Identifier (DID) standard makes adopting this approach feasible across different systems and platforms. DIDs enable us to create and manage multiple digital identities, each anchored by its cryptographic key pair, in a way that is interoperable and recognized by various services and organizations worldwide.

Owning Our Digital Identity: A New Paradigm

We reclaim sovereignty over our online lives by anchoring our digital identity to a key pair that only we control. We decide which credentials to share, with whom, and for how long. This approach fundamentally shifts the power dynamics, allowing us to build and manage our digital reputation just as we do in the real world—by accumulating trusted credentials over time.

This doesn’t mean eliminating centralized systems; instead, it integrates them into a more flexible, user-centric model. Governments, universities, banks, and other institutions continue to issue credentials, but now they do so in a way that respects our control over our identities. This isn’t about replacing one system with another; it’s about creating a bridge that combines the best of both worlds, where centralized trust meets decentralized control.

A Future Anchored by Sovereignty and Flexibility

The promise of a truly self-sovereign digital identity is no longer a distant dream. By combining the strengths of cryptographic technology and decentralized frameworks like DIDs, we can create a new digital identity paradigm that respects our privacy, protects our data, and places control back in our hands. This isn’t about tearing down existing systems; it’s about enhancing them, building bridges, and creating a digital future where our identities are secure, trusted, and uniquely ours.

With cryptographic key pairs and the W3C DID standard as the anchors of this new approach, we move towards a future where our digital identities are as secure, private, and flexible as our real-world selves. The journey starts now, with each of us reclaiming the power to own and manage our digital selves, navigating the digital realm with confidence and autonomy.

The post Decentralized Identity: It’s Not What You Think appeared first on Dhiway.

]]>
PROPERTY TOKENIZATION – REVISITING THE WHY BEHIND DEMATERIALISATION https://dhiway.com/property-tokenization-revisiting-the-why-behind-dematerialisation/ Sun, 15 Sep 2024 17:32:35 +0000 https://dhiway.com/?p=17544 The overall goal is to use technology to address India’s property-related legal and economic challenges. The Indian real estate market is a unique one, governed by countless laws, regulations, and state-level amendments which control, and prohibit, the purchase of land by non-domiciled Indian residents. As a rough rule of thumb, foreign nationals who do not […]

The post PROPERTY TOKENIZATION – REVISITING THE WHY BEHIND DEMATERIALISATION appeared first on Dhiway.

]]>
  1. India’s real estate market is complex, with strict regulations on property ownership.
  2. Land disputes are a major issue, accounting for 66% of civil cases and causing significant economic drain.
  3. Poor record-keeping and outdated land titles contribute to these disputes.
  4. The document proposes using blockchain technology and Verifiable Credentials (VCs) to create a more efficient, transparent, and secure system for managing land records and resolving disputes.
  5. Real estate tokenization is emerging as a solution, allowing fractional ownership and increased liquidity.
  6. A partnership between Rooba.Finance and Dhiway aims to combine asset tokenization and blockchain technology to innovate in this space.

The overall goal is to use technology to address India’s property-related legal and economic challenges.

The Indian real estate market is a unique one, governed by countless laws, regulations, and state-level amendments which control, and prohibit, the purchase of land by non-domiciled Indian residents. As a rough rule of thumb, foreign nationals who do not reside in India cannot have property registered in their names. PIOs and NRIs are restricted from buying agricultural, plantation, farm and other such land, though they are not prohibited from purchasing, selling or inheriting residential or commercial land save for one caveat – some states prohibit non-domiciled individuals from purchasing land of any type. 

An indicative list of central laws that govern the purchase of land follows:

  • Transfer of Property Act, 1882
  • Registration Act, 1908
  • Indian Stamp Act, 1899
  • Real Estate (Regulation and Development) Act, 2016
  • Benami Transactions (Prohibition) Act, 1988
  • Foreign Exchange Management Act (FEMA), 1999

For NRIs to purchase residential property, the following documents are necessary:

  1. Passport and/or OCI Card
  2. PAN Card
  3. PoA registered for the specific transaction, if the NRI is not physically available for registration.

As regards agricultural land, all NRIs and PIOs are prohibited from purchasing it, though there is no bar on inheritance. However, in many states, even resident Indian citizens face restrictions relating to the purchase of land, or conversion of agricultural land to N.A. land by mutation. 

The long and short of it is, that India makes it hard to buy real estate, makes you undergo stringent documentation and has, for all intents and purposes, a set of federal and state level laws in place to adapt to its diversity. 

Despite this extensive legal system in place, an estimated 7.7 million people in India are affected by conflict over 2.5 million hectares of land, threatening investments worth more than Rs 14 lakh crore. Since land is central to India’s developmental trajectory, finding a solution to land conflict is a crucial policy challenge for the Indian government. Land disputes account for the largest set of cases in Indian courts – 25 percent of all cases decided by the Supreme Court involved land disputes, and surveys suggest that 66 per cent of all civil cases in India are related to land or property disputes. The average pendency of land acquisition cases, from  creation to resolution in the Supreme Court, is 20 years on average. Some reports indicate that more than two-thirds of litigation pertains to property. 

Data around Supreme Court (SC) cases is alarming. Cases pertaining to property  that manage  to reach the Apex Court at ‘Special Leave Petition’ or ‘Leave to Appeal’ stages are a mixed bag, ranging from land acquisition to conventional title disputes. To put it into perspective, the pecuniary jurisdictions of most states’ district courts have been raised to unlimited to ensure that High Courts do not get clogged by litigation. Up until 2015, litigants could approach High Courts directly to file property cases concerning properties over a certain value. Now, commercial disputes must all go to district courts at first, and require mandatory mediation in order to prevent lis (legal dispute) from being joined in the first place. Despite this, there is an alarming rate of litigation prevalent across all asset-value classes. This trigger-happy litigious mentality has ramifications beyond protracted pendency of cases. Individuals from lower socio-economic strata are unable to receive justice due to pendency in courts. Since they are unable to access quality legal advice, they often spend as long as 20 years or more litigating, generally on questions of title and devolvement of title. In principle, the Supreme Court must only deal with disputes concerning questions of law that have not been settled or require revisiting or interpretation. Broadly speaking, disputes with the highest incidence of percolating to the SC are Land Acquisition cases. By and large, as indicated by the figures above, 66% of all pending courts cases comprise property-related disputes, which can be bifurcated into private and against the state (land acquisition). Private disputes (between private parties, juristic or natural), can be further divided into those involving the title (competing title interests or encroachment) and those relating to devolvement (wills).

 

Cases which are not mediated or settled result in litigation, which has two economic outcomes. The first is that litigants lose money in hefty legal fees and the other is that the economy is detrimentally affected due to assets being locked in encumbrance. Without proposing some utopic litigationfree universe, what all can technology solve in such a status quo?

By 2040, real estate market will grow to Rs. 65,000 crore (US$ 9.30 billion) from Rs. 12,000 crore (US$ 1.72 billion) in 2019 and contribute 13% to the country’s GDP by 2025. Retail, hospitality, and commercial real estate are also growing significantly, providing the much-needed infrastructure for India’s growing needs. The problems at hand are economic drain to the people, a judicial strain to the infrastructure and is resulting in a lack of access to justice. 

The solution? Verifiable provenance through digital records. Over the last decade, concerted efforts have been made to shift towards building and deploying Digital Public Infrastructure to solve the problems pertaining to data within India. Currently, the lack of trustworthy records accounts for a significant amount of litigation as well as the inability of government schemes to function. There are significant errors and discrepancies in the maintenance logs of land records. In a study conducted in Rajasthan, in 24 percent cases, the difference between the area on record and the area measured was more than 20 percent. To compound this, land titles are often considered presumptive, meaning that the person currently occupying the land is assumed to be its owner. The same study revealed that the state ceased maintaining records of land possession in 1972, and there is no data on land possession at the tehsil level. As a result, title records are frequently outdated; the registered owner might have died or sold the property without updating the records, making it challenging to determine current ownership. 

Private disputes pertaining to joint ownership also take root in poor record-keeping. It gets particularly tricky when succession cases are instituted well into the future, sans any verifiable records. In India, devolvement follows religious or custom-based inheritance by default, unless expressly revoked by a will, thereby choosing testamentary succession (a quagmire of litigation in itself). All this has a detrimental impact on the ease of doing business rankings, specifically in respect of contract enforcement and property registration. India is currently ranked 163rd and 166th, respectively, on the abovementioned fronts. Both these factors, once again, are greatly affected by India’s persistent problem: an overwhelming number of land litigations.

In the early 90s, humanity was at the dawn of personal computing and the era of the internet. Juxtaposed to this groundbreaking advancement, India witnessed one of the largest scale financial frauds ever, the Harshad Mehta Scam. In this backdrop, the Securities and Exchange Board of India (SEBI) identified authenticity of securities as a paramount concern, and a hole to be plugged. By 1996, demat was mandated across public securities markets, ushering in an era of depositories, clearing corporations, registrar-cum-transfer agents and stock exchanges. SEBI used regulated intermediaries to ensure the safety and security of individuals participating in India’s securities markets. 

Till date, some sectors of financial markets, such as private markets, have been left largely untouched by digitisation or dematerialisation. This has resulted in information asymmetry and data silos, culminating in opaque markets, inefficiencies in transactability and a lack of trust. At this juncture, we need to look towards innovative technology solutions to improve the sourcing, sharing and verification of data which assists the public in making financial decisions. At present, in 2024, we are witnessing increasing use cases of DLT and AI, and it seems only fitting that as we consider the evolving avatar of the internet, we must adopt and adapt or risk being mired in legacy market inefficiencies. In recent years, real estate tokenization has emerged as an unconventional investment option with advantages for both issuers and investors. The real estate sector now makes up about 40% of the digital securities market, amounting to approximately $200 million. Real estate tokenization typically turns a property’s value into a token that can be transferred and owned digitally by storing it on a blockchain. These fractional shares of ownership in the real estate are represented by these divisible tokens. A reliable database is necessary for private markets to become more liquid. Instead of being centralised, we think that this new database will be distributed and owner-controlled.

So, how does the Finternet Project and its contributors aim to solve this population-scale problem of verifiable data? 

The vision of the Finternet is to build a set of rails for a user-centric ecosystem that unifies various fractured and siloed ecosystems using universal principles translated through technology. In the narrow compass of real estate, availability of authenticated data relating to property will unlock the hidden financial potential of a traditionally illiquid asset, remedying a major cause of litigation in India. 

Verifiable Credentials

Finternet can revolutionise the administration and evidence process for dispute-resolution by integrating advanced digital tools and decentralised technologies. Through blockchain, it ensures that records and evidence are digitised and immutable, providing a reliable and tamper-proof source of truth. Verifiable Credentials (VCs) allow for instant authentication and verification of evidence, streamlining the process and ensuring authenticity. Real-time data access and transparency are enhanced, allowing for quicker decision-making. 

VCs are digital certificates that can be used to prove the authenticity of information regarding an individual, organization or an asset. These credentials are stored securely and can be presented and verified in a decentralised manner, without the need for intermediaries. VCs are particularly useful in scenarios where trustworthiness is a priority, like in the case of property disputes.

In the context of property, verifiable credentials can be employed to:

  1. Authenticate Property Ownership: VCs can be issued by government authorities or trusted entities to certify ownership of a property. These credentials can be cryptographically verified by any party, ensuring that the ownership claim is legitimate and reducing the likelihood of fraudulent claims.
  2. Streamline Property Transfers: During property transfers, VCs can be used to verify the identities of the parties involved, as well as the authenticity of the property title. This can significantly reduce the time and cost associated with the transfer process, as it eliminates the need for extensive paperwork and third-party verification.
  3. Resolve Title Disputes: In cases where there is a dispute over property ownership, VCs can serve as tamper-proof evidence of ownership history. The use of VCs can expedite the resolution process by providing courts or arbitration bodies with a clear, verifiable record of ownership, thus reducing the duration and complexity of litigation.
  4. Improve Transactability: By using VCs, all parties involved in a property transaction can have access to verified and up-to-date information. This transparency helps in faster business decisions such as loans-against-property, home loans, credit decisions, etc. 
  5. Integrate with Smart Contracts: VCs can be integrated with smart contracts to automate the execution of agreements based on verified conditions. For instance, a smart contract could automatically release payment upon the verification of a property transfer credential, ensuring that both parties fulfill their obligations.

By leveraging VCs within the property sector, India can move towards a more efficient, transparent and secure system of managing land records and resolving disputes. This technology has the potential to reduce the burden on the judiciary, minimise economic losses due to encumbered assets, and enhance the overall ease of doing business in the country.

Conclusion

The Indian real estate market faces significant challenges due to complex regulations, widespread land disputes, and outdated record-keeping systems. These issues result in economic inefficiencies, overburdened courts, and barriers to investment and development.

However, emerging technologies offer promising solutions to these long-standing problems. The integration of blockchain technology, Verifiable Credentials, and asset tokenization has the potential to revolutionize property management and transactions in India. By creating a more transparent, secure, and efficient system for recording and verifying property ownership, these innovations could:

  1. Reduce the number of property-related disputes
  2. Streamline property transfers and reduce associated costs
  3. Improve access to justice by providing clear, verifiable records
  4. Enhance the liquidity of real estate assets through tokenization
  5. Attract more investment to the real estate sector

The path forward involves continued development of these technologies, their integration into existing legal and administrative frameworks, and widespread adoption by stakeholders in the real estate sector. While challenges remain, the potential benefits of this technological revolution in property management are substantial and could transform India’s real estate landscape in the coming years.

Dhiway and Rooba alliance

Rooba.Finance and Dhiway are strategically collaborating to harness their respective strengths in asset tokenization and blockchain technology, driving innovation in the financial and property sectors. Rooba.Finance, with its expertise in asset tokenization, is pioneering the creation of digital representations of real-world assets, allowing for fractional ownership and enhanced liquidity in the market. Dhiway, a leader in blockchain-based infrastructure, provides the robust, secure, and transparent technology backbone necessary to support these digital assets. By integrating Dhiway’s advanced blockchain solutions, Rooba.Finance ensures that each tokenized asset is securely documented, traceable, and compliant with regulatory standards. This partnership not only facilitates the creation of new investment opportunities but also advances the secure and efficient management of digital assets, paving the way for a more decentralized and democratized financial ecosystem.

The post PROPERTY TOKENIZATION – REVISITING THE WHY BEHIND DEMATERIALISATION appeared first on Dhiway.

]]>
Product tracking, tracing and authenticity using CORD https://dhiway.com/product-tracking-tracing-and-authenticity-using-cord/ Thu, 29 Aug 2024 06:28:23 +0000 https://dhiway.com/?p=17386 The post Product tracking, tracing and authenticity using CORD appeared first on Dhiway.

]]>









The post Product tracking, tracing and authenticity using CORD appeared first on Dhiway.

]]>
Issue verifiable credentials using MARK Studio https://dhiway.com/issue-verifiable-credentials-using-mark-studio/ Thu, 29 Aug 2024 06:22:00 +0000 https://dhiway.com/?p=17360 The post Issue verifiable credentials using MARK Studio appeared first on Dhiway.

]]>









The post Issue verifiable credentials using MARK Studio appeared first on Dhiway.

]]>