Solutions
Verifiable Digital Twins for Products and Documents
ObjectID provides two core solutions—Objects and Documents—to create tamper-evident, traceable digital twins anchored to a domain-linked digital identity. Each twin is associated with a URL, supports ownership transfer, and can be integrated into existing systems via APIs and standard identifiers (QR/NFC).
A twin is considered valid only when its Creator can cryptographically prove control of the Internet domain referenced by the twin’s URL (Domain Linked Verifiable Credential).
How validity verification works (Domain-Linked Identity)
ObjectID binds a Creator’s digital identity to a specific Internet domain (e.g., example.com). When an Object or Document is created, it includes a URL under that domain.
Verification checks typically include:
Read the twin on-chain
Retrieve the twin data (Object/Document) and its declared URL/domain, plus the Creator identity.Resolve the Creator identity
Resolve the Creator’s DID (Decentralized Identifier) document and its keys.Verify the domain linkage
Confirm that the domain hosts a Domain Linkage statement (e.g., under/.well-known/) that cryptographically links the domain to the Creator DID, and validate the signature chain.Match domain ↔ URL ↔ Creator
The domain in the twin’s URL must match the domain that is linked to the Creator identity.
If these checks pass, the twin is valid. If they fail, the twin may still exist, but it is treated as unverified / not domain-authenticated.
Objects — Digital Twins for Real-World Products and Assets
ObjectID “Objects” represent physical products or assets with a lifecycle. Each Object contains:
Immutable data: attributes that must never change (e.g., manufacturer identity, initial serial reference, model family, genesis info).
Mutable data: attributes that can be updated with traceability (e.g., status, location, operational metadata, maintenance fields, assigned agent).
Roles
Creator: creates the Object twin and anchors it to a verified domain identity.
Agent: performs operational actions during the lifecycle (updates, inspections, handovers).
User: reads and verifies the Object, its events, and its validity.
Logical building blocks
An Object can “own” and link to:
Events: lifecycle records that anyone can create to record facts (shipment, installation, inspection, incident, service).
Counters: structured tracking for repetitive events (cycles, usage counts, refills, check intervals).
Components: logical relationships between Objects to describe complex systems (assemblies, plants, machines, fleets).
Ownership over time
Each Object can have an Owner, and ownership can change over time to represent sale, custody transfer, leasing, or operational responsibility changes.
Object logical states (typical state model)
ObjectID supports a state machine concept that can be customized per use case. A common logical model includes:
Draft: created but not finalized for operational use (internal staging).
Active: operational and expected to receive events/updates.
Suspended: temporarily inactive (maintenance hold, investigation, missing asset).
Retired: end-of-life; no longer expected to be updated except for archival notes.
Revoked / Invalidated: explicitly flagged as untrusted (e.g., fraud, wrong domain linkage, policy breach).
Transferred: not a terminal state, but a recorded transition when Owner changes.
These states can be driven by Creator/Agent actions and by policy rules defined at integration level (e.g., “only Creator can move Draft → Active”, “Owner can request Suspended”, etc.).
Integrations for Objects
ObjectID Objects are designed to sit between operational systems and field reality.
Common integration patterns:
ERP / PLM / MES
Create Object twins at manufacturing time
Sync immutable manufacturing identifiers (batch, SKU, internal reference)
Push operational status changes from MES
WMS / Logistics / Supply Chain
Record shipping, handover, proof-of-delivery as Events
Track custody and ownership changes
Generate QR labels for packaging and pallets
IoT / Edge devices (sensors, gateways)
Devices submit periodic Events (telemetry summaries, alarms, compliance checks)
Counters track cycles/hours/usage (predictive maintenance)
Gateways sign data or forward it via authenticated agents
Mobile apps (operators, inspectors, customers)
QR/NFC scan → resolve twin → verify validity → show lifecycle timeline
Field actions create Events with metadata and attachments stored off-chain (hash anchored in twin)
Compliance / QA systems
Inspection events, audit trails, certificates linked as Document twins
Controlled workflows for regulated environments
Documents — Digital Twins for Digital Documents
ObjectID “Documents” are digital twins for files (PDFs, contracts, manuals, certificates, reports). The twin tracks the entire lifecycle and the hash of each version—making it possible to prove a document’s originality and integrity over time.
This is useful to guarantee originality because it enables:
Cryptographic integrity: each version is anchored by its hash, so any change (even a single byte) produces a different fingerprint and is immediately detectable.
Provenance (who created it): the Creator identity is recorded and can be domain-verified, preventing “fake originals” issued under unrelated or spoofed domains.
Version authenticity: you can prove which exact version is the current one (and which are superseded), avoiding confusion from multiple circulating copies.
Immutable audit trail: every step (draft, edits, approvals, publication, revocation) is recorded in a tamper-evident way, enabling independent verification.
Non-repudiation support: approvals and publications are tied to identities and timestamps, so stakeholders can’t credibly deny actions after the fact.
Offline-to-online verification: QR/NFC links to the twin URL allow quick checks on printed or exported copies, comparing the file hash to the official recorded one.
In practice: the “original” is the version whose hash is recorded as Approved/Published by a valid, domain-linked Creator, and any distributed copy can be tested against that reference.
Roles and workflow
Creator: creates the Document twin and initializes the workflow.
Editors: can update the document by publishing a new version hash (multiple Editors supported).
Approvers: approve a given version (multiple Approvers supported).
Publisher: marks an approved version as public/official.
Document logical states (typical state model)
A robust default lifecycle:
Draft: initial version; editable.
In Review: submitted for approval.
Approved: accepted by required approvers for a specific hash/version.
Published: declared official/public (often tied to a specific immutable approved hash).
- Revoked: document is withdrawn (error, fraud, legal withdrawal) while keeping audit trace.
Crucially: the system preserves cycles (Draft → Review → Approved → back to Draft) and records them immutably.
Ownership over time
Each Document may have an Owner that can change over time (e.g., assignment between departments, transfer between organizations, escrow/repository handover).
Integrations for Documents
Documents typically integrate with repositories and signature/approval tooling.
Common integration patterns:
DMS / SharePoint / Google Drive / S3 / IPFS
Store files off-chain
Anchor each version via hash in the Document twin
Keep verifiable integrity even if storage changes provider
e-Signature / approval platforms
Use Document state transitions to orchestrate who must approve what
Record approval outcomes on-chain and link to signed artifacts off-chain
Support multi-approver workflows
Enterprise workflows (BPM / ticketing)
Trigger “In Review” when a process step completes
Auto-create new Draft on change requests
Link audit events to incident/change management systems
Public verification portals
Published documents can be verified via URL + hash
QR codes on printed documents enable instant authenticity checks
Technical integration surfaces (overview)
Depending on deployment, ObjectID can be integrated via:
Smart contract calls (direct integration with the ObjectID package on the network)
Higher-level REST APIs (for system integrators who prefer business-level endpoints)
Event ingestion pipelines (webhooks, gateways, batch import from ERP/MES)
Front-end widgets (QR verify, timeline viewer, status badges)
The typical design is: off-chain storage for large files / rich content, and on-chain anchoring for identity, roles, state transitions, hashes, and audit trail.
Why this approach works
Tamper-evident lifecycle history (events, counters, versions, approvals)
Domain-authenticated issuance (prevents “lookalike” twins under fake domains)
Interoperable verification (URL-based resolution + standard domain linkage)
Separation of concerns: data storage can evolve, while integrity and provenance remain verifiable
