Use Cases

Energy

BlockFrame®, products and services started in the Energy Sector, supporting security for the numerous Distributed Energy Resources (DER) working on our modern Smart Grids. We bring the progressive technology of Distributed Ledger using Identity Non-Fungible Token (I-NFT) Technology to secure and data and communications for Transactive Energy. BlockFrame I-NFT Technology is being incorporated at Utility partners to support aggregation of energy users under FERC2222 has been included in recommendations for IEEE global standards.

If you are looking for advice on applying transactive energy or how to implement carbon credit tracking BlockFrame. is your trusted consulting and design partner.

Education

The migration of students to At-Home education has provided challenges in the delivery of content and the validation of test results from student test-takers. BlockFrame® ESP-Ed™ devices provide secure, protected delivery of testing materials and the added feature of recording results on Distributed Ledger. As a result, institutions can preserve their curriculum materials while verifying results from any student individually anywhere in the world.


If you are looking to get ahead of the distributed education and At-Home education with next-generation Distributed Ledger enabled student verification, contact BlockFrame for details on this product.

Medical

Hundreds of Internet of Things Devices (IoT) are used every day by medical professionals and patients. For example, modern hospitals have nearly 50 electronic devices in each room, collecting and producing data related to client health conditions. Therefore, the security of IoT devices is paramount in these settings to protect patients’ privacy and adhere to HIPAA regulations. BlockFrame® utilizes the power of Distributed Ledger to track, manage and secure IoT devices on a large scale.

If you are looking for the next generation of zero-trust security for IoT products, BlockFrame’s Eco-Secure Provisioningâ„¢ (ESP) is the right tool for the job. BlockFrame ESP unifies product manufacturing, supply chain, and customer operations or services to provide an individualized user data privacy capability exceeding all HIPAA regulatory requirements. 

Military Supply Chain

The ability to track the provenance of materials and software across the extensive ecosystem of military suppliers is a daunting task. Recent breaches and compromises have revealed that some of the largest government contractors are the most prominent targets. Military and Government entities needing to secure the digital supply chain rely on BlockFrame® for its next-generation Blockchain technology expertise. Blockchain has experience supporting large-scale government programs, supporting government legislators, and authoring international standards.

BlockFrame supports clients in finding the best approach to the entire digital supply chain. Whether we use our Eco-Secure Provisioning™, Philos™ Distributed Ledger products, or a solution from other vendors, BlockFrame will find the best solution for our clients.  

Publications

A Sustainable Framework for Distributed Ledger

With the development of the information technology age, interaction between people who previously would never cross paths in an entire lifetime has become a regular occurrence. As society steadily transfers activities once done via physical processes to data interactions using computer systems, new challenges are presented when initiating digital exchange with remote untrusted actors. This trend, often referred to as Digital Transformation, has grown in recent years as organizations depart from any physical document records or work processes into an entirely digital presence. Digital Transformation relies on an ability to interact digitally with remote actors; thus, methods of establishing remote trust for digital operation are essential. Distributed Ledger technologies popularized by the application of Blockchain in cryptocurrencies provide a promising notion of technology that offers an intermediary capability for untrusted actors to verify each other. However, the application of distributed ledger at scale has shown a number of difficulties regarding resource requirements and performance, ultimately restricting the economic feasibility of the technology in otherwise opportune use cases.

A Sustainable FrameWork For Distributed Ledger

With the development of the information technology age, interaction between people who previously would never cross paths in an entire lifetime has become a regular occurrence. As society steadily transfers activities once done via physical processes to data interactions using computer systems, new challenges are presented when initiating digital exchange with remote untrusted actors. This trend, often referred to as Digital Transformation, has grown in recent years as organizations depart from any physical document records or work processes into an entirely digital presence. Digital Transformation relies on an ability to interact digitally with remote actors; thus, methods of establishing remote trust for digital operation are essential. Distributed Ledger technologies popularized by the application of Blockchain in cryptocurrencies provide a promising notion of technology that offers an intermediary capability for untrusted actors to verify each other. However, the application of distributed ledger at scale has shown a number of difficulties regarding resource requirements and performance, ultimately restricting the economic feasibility of the technology in otherwise opportune use cases.

The Philos Trust Algorithm: Preventing Exploitation of Distributed Trust

The Philos Marketplace blockchain system is a proposed hierarchical blockchain architecture which allows a large number of individual blockchains to operate in parallel. These parallel chains achieve consensus among one another on a limited set of core operations, while allowing each on-chain application to manage its own data independently of others. This architecture addresses the scalability issues of traditional linear blockchains, but requires novel consensus mechanisms. A central feature of the Philos consensus mechanism is its trust algorithm, which assigns each network node a numerical trust value (or score) indicating the quality of recent past performance. This trust value is then used to determine a node’s voting weight at the higher levels of consensus. In this paper, we formally define the Philos trust algorithm, and provide several illustrations of its operation, both theoretically and empirically. We also ask whether a misbehaving node can strategically exploit the algorithm for its personal gain, and show that this type of exploitation can be universally prevented simply by enforcing a mild limit on the number of participants in each of the parallel chains.

The Philos Trust Algorithm: Preventing Exploitation of Distributed Trust

The Philos Marketplace blockchain system is a proposed hierarchical blockchain architecture which allows a large number of individual blockchains to operate in parallel. These parallel chains achieve consensus among one another on a limited set of core operations, while allowing each on-chain application to manage its own data independently of others. This architecture addresses the scalability issues of traditional linear blockchains, but requires novel consensus mechanisms. A central feature of the Philos consensus mechanism is its trust algorithm, which assigns each network node a numerical trust value (or score) indicating the quality of recent past performance. This trust value is then used to determine a node’s voting weight at the higher levels of consensus. In this paper, we formally define the Philos trust algorithm, and provide several illustrations of its operation, both theoretically and empirically. We also ask whether a misbehaving node can strategically exploit the algorithm for its personal gain, and show that this type of exploitation can be universally prevented simply by enforcing a mild limit on the number of participants in each of the parallel chains.

Carbon-Neutral Distributed Ledger

This work introduces a carbon-neutral approach for Distributed Ledger. With computationally intensive consensus models creating exceptional levels of wasted energy worldwide, it is crucial that distributed ledger technology progresses in a direction that alleviates this trend. This work offers both a novel consensus model and a user incentive that departs from the usage of computational processes for consensus. This work considers the need for longevity of distributed ledger and reflects the desires of the different user archetypes engaged in the recent upswing of cryptocurrency. We anticipate that some users engage for investment or growth speculation, some engage for transactional purposes…

Carbon-Neutral Distributed Ledger

This work introduces a carbon-neutral approach for Distributed Ledger. With computationally intensive consensus models creating exceptional levels of wasted energy worldwide, it is crucial that distributed ledger technology progresses in a direction that alleviates this trend. This work offers both a novel consensus model and a user incentive that departs from the usage of computational processes for consensus. This work considers the need for longevity of distributed ledger and reflects the desires of the different user archetypes engaged in the recent upswing of cryptocurrency. We anticipate that some users engage for investment or growth speculation, some engage for transactional purposes…

Blockchain Synchronous Trust Consensus Model

This work introduces a novel approach for the governance of a blockchain containing social constructs and technical viability for widescale applications for the next generation of distributed ledgers. Functional requirements for this new blockchain distributed ledger (BDL) were garnered from an analysis of the needs for large-scale applications. Applied research was employed as part of this endeavor to test the practicality and scalability of the solution outline. Novel features in this application draw together controls and enforcement for cybersecurity, digital content management, licensing, and configuration management. The Synchronous Trust Consensus Model applied research project named Project Philos was sponsored by the Blockchain Development Community (BCDC) with support from the University of Colorado.

Blockchain Synchronous Trust Consensus Model

This work introduces a novel approach for the governance of a blockchain containing social constructs and technical viability for widescale applications for the next generation of distributed ledgers. Functional requirements for this new blockchain distributed ledger (BDL) were garnered from an analysis of the needs for large-scale applications. Applied research was employed as part of this endeavor to test the practicality and scalability of the solution outline. Novel features in this application draw together controls and enforcement for cybersecurity, digital content management, licensing, and configuration management. The Synchronous Trust Consensus Model applied research project named Project Philos was sponsored by the Blockchain Development Community (BCDC) with support from the University of Colorado.

Standardization of the Distributed Ledger Technology cybersecurity stack for power and energy applications

Standardization of the Distributed Ledger Technology cybersecurity stack for power and energy applications

The global trend toward integration of distributed energy resources is opening doors to advanced, complex, and distributed marketplaces. Such advanced ecosystems, where utility-owned and non utility-owned assets can contribute toward grid operations, generally require distributed communication and grid architectures. We posit the potential of using Distributed Ledger Technologies (DLTs) in supporting such applications, although their full potential has not been fully used, for example in designing long-term scalable solutions in operational technology applications.

A Synergistic Approach to Digital Privacy

This paper outlines an approach for IEEE to take leadership for digital privacy to align many existing IEEE Societies and efforts in the areas of computer systems & applications security, organizational & global architectures, policy-supporting legislation, originating new standards, integrating compliance into technologies, and helping design decision-board infrastructures for governance bodies. Much of the current emphasis on evolving privacy technologies centers on big corporate enterprises and institutions, causing the industry to support corporate assets protection mainly. Fostering technology to empower individual privacy-enabling tools has lagged, and personal privacy has diminished because corporate big data applications have made sizable investments into exploiting private data.

A Synergistic Approach to Digital Privacy

This paper outlines an approach for IEEE to take leadership for digital privacy to align many existing IEEE Societies and efforts in the areas of computer systems & applications security, organizational & global architectures, policy-supporting legislation, originating new standards, integrating compliance into technologies, and helping design decision-board infrastructures for governance bodies. Much of the current emphasis on evolving privacy technologies centers on big corporate enterprises and institutions, causing the industry to support corporate assets protection mainly. Fostering technology to empower individual privacy-enabling tools has lagged, and personal privacy has diminished because corporate big data applications have made sizable investments into exploiting private data.

Integrating Hardware Security into a Blockchain-Based Transactive Energy Platform

This applied research paper introduces a novel framework for integrating hardware security and blockchain functionality with grid-edge devices to establish a distributed cyber-security mechanism that verifies the provenance of messages both from and to the devices. Expanding the idea behind Two Factor Authentication and Hardware Root of Trust, this work describes the development of a Cryptographic Trust Centerâ„¢ (CTCâ„¢) chip integrated into grid-edge devices to create uniform cryptographic key management. Product managers, energy system designers, and security architects can utilize this modular framework as a unified approach to manage distributed devices of various vendors, vintages, and sizes. 

Integrating Hardware Security into a Blockchain-Based Transactive Energy Platform

This applied research paper introduces a novel framework for integrating hardware security and blockchain functionality with grid-edge devices to establish a distributed cyber-security mechanism that verifies the provenance of messages both from and to the devices. Expanding the idea behind Two Factor Authentication and Hardware Root of Trust, this work describes the development of a Cryptographic Trust Centerâ„¢ (CTCâ„¢) chip integrated into grid-edge devices to create uniform cryptographic key management. Product managers, energy system designers, and security architects can utilize this modular framework as a unified approach to manage distributed devices of various vendors, vintages, and sizes. 

Solving Global Cybersecurity Problems by Connecting Trust Using Blockchain

This publication explores global problem areas where properties offered by blockchain provide workable solutions for the existing widely unsolved problems of Accountability, Traceability, Identification, Visibility vs. Privacy, and Connection of Non-Deterministic to Deterministic timed events. Using BlockChain-based transactions, we demonstrate that operations related to trust are reducible to five directly implementable cryptographic actions, which then create relationships to five categories of trust that we define in this document. The solution outlined will take the approach that the identified global problems will be solved by blockchain as cybersecurity of the future moves in a direction of individualized transactional-based security & privacy.

Solving Global Cybersecurity Problems by Connecting Trust Using Blockchain

This publication explores global problem areas where properties offered by blockchain provide workable solutions for the existing widely unsolved problems of Accountability, Traceability, Identification, Visibility vs. Privacy, and Connection of Non-Deterministic to Deterministic timed events. Using BlockChain-based transactions, we demonstrate that operations related to trust are reducible to five directly implementable cryptographic actions, which then create relationships to five categories of trust that we define in this document. The solution outlined will take the approach that the identified global problems will be solved by blockchain as cybersecurity of the future moves in a direction of individualized transactional-based security & privacy.

Using Blockchain to Establish Distributed Trust for IoT

This White Paper provides an overview of the common problems existing in the Cyber Security Industry and gives a first look at next generation blockchain enabled solutions which are being used to solve these problems by enabling a framework for securing the Internet of Things (IoT).

Using Blockchain to Establish Distributed Trust for IoT

This White Paper provides an overview of the common problems existing in the Cyber Security Industry and gives a first look at next generation blockchain enabled solutions which are being used to solve these problems by enabling a framework for securing the Internet of Things (IoT).

The Requirement of
Non-Repudiation

Is your business required to have non-repudiation? What is non-repudiation? Many boards, commissions, regulatory bodies, and institutes either require non-repudiation or suggest its use for best practices.

The Requirement of
Non-Repudiation

Is your business required to have non-repudiation? What is non-repudiation? Many boards, commissions, regulatory bodies, and institutes either require non-repudiation or suggest its use for best practices.

Colorado State University (CSU) Benchmark Testing for State of Colorado Programmatic Blockchain Capability

There are a variety of state programs that require the regulatory oversight of several different state agencies. BlockFrame® teamed up with CSU-Pueblo to work with these agencies to determine how blockchain can be used to improve current tracking methods. The team collaborated with industry experts to determine what the needs of such a system would be, and then created a test environment to simulate a statewide launch of the system using available blockchain technology.

Colorado State University (CSU) Benchmark Testing for State of Colorado Programmatic Blockchain Capability

There are a variety of state programs that require the regulatory oversight of several different state agencies. BlockFrame® teamed up with CSU-Pueblo to work with these agencies to determine how blockchain can be used to improve current tracking methods. The team collaborated with industry experts to determine what the needs of such a system would be, and then created a test environment to simulate a statewide launch of the system using available blockchain technology.

SB18-086

Cyber Coding Cryptology For State Records

This legislation sponsored by BlockFrame, Inc. COO Sen. Kent Lambert (Ret.) 

Concerning the use of cyber coding cryptology for state records, and, in connection therewith, making an appropriation.

The chief information security officer in the governor’s office of information technology (OIT), the director of OIT, the department of state, and the executive director of the department of regulatory agencies are required to take certain actions to protect state records containing trusted sensitive and confidential information from criminal, unauthorized, or inadvertent manipulation or theft.

SB18-086

Cyber Coding Cryptology For State Records

This legislation sponsored by BlockFrame, Inc. COO Sen. Kent Lambert (Ret.) 

Concerning the use of cyber coding cryptology for state records, and, in connection therewith, making an appropriation.

The chief information security officer in the governor’s office of information technology (OIT), the director of OIT, the department of state, and the executive director of the department of regulatory agencies are required to take certain actions to protect state records containing trusted sensitive and confidential information from criminal, unauthorized, or inadvertent manipulation or theft.

Scroll to Top