Data integrity : A fundamental pillar of information management

Data integrity : A fundamental pillar of information management

Definition of data integrity

Data integrity refers to the accuracy and consistency of data throughout its lifecycle. It ensures that information is not altered in an unauthorised way and that it remains reliable and accurate, regardless of when it is consulted or used. This encompasses not only the prevention of accidental errors, but also protection against intentional manipulation.

The different forms of data integrity

Data integrity is a crucial concept in IT and database management, aimed at ensuring the accuracy and consistency of data throughout its lifecycle. It can be divided into several distinct categories, each with a specific role in data protection and maintenance.

1. Physical integrity

Physical integrity ensures that data is physically stored without material corruption. This includes measures such as :

  • Redundancy: Use of redundant storage systems, such as RAID (Redundant Array of Independent Disks), to prevent data loss in the event of a disk failure.
  • Non-erasable media: Use of non-erasable storage media such as WORM (Write Once Read Many) disks to prevent data from being deleted.
  • Regular back-ups: Creation of periodic back-ups of data so that it can be restored in the event of corruption or loss.
  • Protection against natural disasters: Implementation of systems and procedures to protect data against events such as fires, floods or earthquakes. This may include geographically remote data centres for data backup.
  • Environmental controls: Maintaining optimum conditions in data centres, including temperature, humidity and protection against electrical surges.

2. Logical integrity

Logical integrity ensures that data is correct and consistent within a logical model. There are several important aspects to this:

  • Database constraints: Using constraints to maintain data correctness. Common constraints include:
  • Primary keys: Ensure that each record in a table is unique and uniquely identifiable.
  • Foreign keys: Maintain the validity of relationships between tables, ensuring that the referenced data exists in the corresponding tables.
  • Uniqueness constraints: Ensure that the values of a specific field or set of fields are unique throughout the table.
  • Verification constraints: Specific validations to ensure that data complies with certain defined rules or conditions.

3. Referential integrity

Referential integrity maintains consistency between database tables. For example :

  • Relationships between tables: A record in an order table must correspond to a valid record in a customer table. If an order refers to a non-existent customer, this could lead to inconsistencies.
  • Update and delete operations: When updating or deleting a record in a table, databases must ensure that all corresponding references in other tables are also updated or deleted to maintain data consistency.

4. Integrity of user data

User data integrity ensures that the data entered by users is valid and complies with expectations. This is generally achieved through validation checks, such as :

  • Data format validation: Checks that the data entered complies with expected formats, such as e-mail addresses, telephone numbers or dates.
  • Verification of value ranges: Ensures that the data entered falls within acceptable ranges, for example, an age between 0 and 120.
  • Consistency checks: Cross-validation of data to ensure that it is logically consistent, e.g. an end date cannot be earlier than a start date.
  • Code injection protection: Implementing measures to prevent users from introducing malicious or unwanted code into input fields.

By combining these different forms of integrity, database management systems can offer robust protection against data corruption and ensure that information remains reliable and usable for end users.

Risks associated with data integrity

Data integrity is essential to ensure the reliability and accuracy of information stored in IT systems. However, various risks can compromise this integrity, leading to data loss, inconsistencies and errors. Here is a detailed description of the main risks associated with data integrity:

1. Human error

Human error is one of the most common causes of data integrity compromise. They can manifest themselves in several ways:

  • Typing errors: Typographical errors or incorrect data entry by users can introduce errors into databases. For example, a typing error in an amount field can affect financial results.
  • Accidental deletions: Users may inadvertently delete important data. Accidental deletion of critical records can lead to data loss that is difficult to recover.
  • Incorrect modifications: Users may modify data incorrectly, either through lack of training, understanding or care. This can lead to inconsistencies and errors in the information stored.

2. Hardware failures

Hardware failures can cause significant damage to data. This includes :

  • Hard drive failures: Hard drives can fail, resulting in the loss of unsaved data. Even with redundant storage systems, simultaneous failures can cause problems.
  • Power outages: Power outages can cause systems to shut down abruptly, which can damage files in use and corrupt databases.
  • Other hardware incidents: Other hardware incidents, such as motherboard or power supply failures, can also affect data integrity.

3. Malicious attacks

Malicious attacks represent a serious threat to data integrity. Types of attack include :

  • Ransomware: This malicious software encrypts data and demands a ransom to decrypt it. This can cripple organisations and seriously compromise data integrity.
  • Intrusions: Hackers can penetrate systems to steal, alter or destroy data. Intrusions can lead to leaks of sensitive data and unauthorised modification of information.
  • Malware and viruses: Malicious programs can infect systems, corrupt files and compromise the integrity of databases.

4. Faulty software

Use private browsing mode to avoid leaving traces of your online activity. Browsers like Chrome, Firefox, and Safari all offer a private browsing option that doesn’t store browsing history, cookies, or form information. This is particularly useful when you’re using public or shared computers, as it prevents other users from seeing what you’ve been browsing.

5. Cleaning up your browsing history

Software plays a crucial role in data management and manipulation. However, faults in software can lead to integrity problems:

  • Bugs and errors: Bugs in applications can cause data corruption. For example, an error in a database management application can lead to incorrect data being inserted or information being lost.
  • Faulty updates: Software updates can sometimes introduce new bugs or incompatibilities, leading to data integrity problems.

5. Natural disasters

Natural disasters can cause physical damage to data storage infrastructures. This includes :

  • Fires: A fire can destroy IT equipment and storage media, resulting in the total loss of data.
  • Floods: Water can damage storage devices, making data inaccessible or irretrievable.
  • Other events: Earthquakes, storms and other disasters can also destroy physical infrastructure, seriously affecting data integrity.

Data integrity and RGPD compliance

The General Data Protection Regulation (GDPR) imposes strict requirements on the management of personal data, focusing on data protection, confidentiality and integrity. Data integrity is a crucial component of GDPR compliance, which stipulates that data must be accurate and up-to-date. Here’s how businesses can ensure they meet these requirements:

  • Accurate and up-to-date: The GDPR requires personal data to be kept accurate and up to date. Businesses must have effective processes in place to correct inaccurate data as soon as it is identified. This includes regularly checking information and quickly adjusting it if it changes.
  • Protection against unauthorised access: Companies should implement robust security measures to protect data from unauthorised access. This includes the use of firewalls, intrusion detection systems, and strict access management policies.
  • Tamper prevention: Ensuring that data is not altered in an unauthorised way. Companies should use integrity checks such as checksums and digital signatures to verify that data has not been altered.

Why is data security crucial?

Data security is essential for a number of reasons:

  • Protection against litigation: Accumulating evidence to strengthen the probative value of files and reduce the risk of litigation
  • Legal compliance: Comply with regulations such as GDPR, HIPAA, Reliable Copy, Reliable Audit Trail and other data protection laws, avoiding legal and financial penalties.
  • Fraud prevention: Avoid fraudulent activities and financial losses that could result from data manipulation or theft.
  • Corporate reputation: Maintaining the trust of customers and partners by demonstrating a strong commitment to data protection.
  • Business continuity: Ensure that systems remain operational and that data is available when needed, minimising service interruptions.


The 5 dangers to data integrity

  1. Human error: The most common cause of loss of data integrity. Data entry errors, accidental deletions and incorrect modifications can lead to inconsistencies and data loss.
  2. Cyber attacks: Hackers can alter or destroy data, for example through ransomware or SQL injections.
  3. Hardware failures: Hard drive failures, power cuts and other hardware incidents can damage or corrupt data.
  4. Malware: Such as viruses and ransomware that compromise data integrity by altering or encrypting it without authorisation.
  5. Natural disasters: Floods, fires, earthquakes and other events can destroy data storage infrastructures, resulting in significant losses.


How do you ensure data integrity?

To guarantee data integrity, companies must implement a series of protection and validation measures:

  • Keeexing data: Adding a light, invisible KeeeX watermark to your data ensures that it has not been modified since it was protected.
  • Implement rigorous access controls: Limit access to data to authorised persons only by using role-based access management (RBAC) systems.
  • Regular back-ups: Ensure frequent, secure back-ups so that data can be recovered in the event of loss or corruption.
  • Data validation and verification: Use validation techniques to check the accuracy of data entered, including format checks, consistency checks and regular audits.
  • Regular auditing: Carry out data audits to detect and correct anomalies, ensuring that data management processes are followed correctly.
  • Staff training: Train employees in good data management and protection practices, including security awareness and data handling procedures.

KeeeX: Guaranteeing data integrity in the digital age

The importance of data integrity is evident in a variety of sectors, such as finance, healthcare and digital identity management. Data breaches can have disastrous consequences, ranging from financial losses to breaches of privacy and damage to corporate reputations. As a result, robust and innovative solutions are needed to protect data against both internal and external threats.

It is in this context that companies such as KeeeX stand out by offering advanced solutions to ensure data integrity. KeeeX uses cutting-edge technologies such as blockchain and cryptography to provide mechanisms for certifying, authenticating and tracing documents and files. With KeeeX, users can verify the authenticity of their documents and ensure that they have not been modified since they were created, while maintaining the confidentiality and security of sensitive information.

By integrating these technologies, KeeeX offers an effective response to today’s data management challenges, enabling businesses to protect their digital assets and strengthen the trust of their customers and partners. The adoption of such solutions is a crucial step towards a future where data is not only secure, but also verifiable and reliable, ensuring unwavering integrity in an ever-changing digital environment.


Data integrity is an essential pillar for effective and secure information management. By understanding and implementing robust practices to maintain this integrity, organisations can not only comply with regulatory requirements such as the GDPR, but also protect their digital assets and maintain the trust of their customers and partners. Constant vigilance and continuous improvement of data management processes are the keys to meeting current and future challenges in this crucial area.

The Digital Footprint: Understanding and controlling your online presence

The Digital Footprint: Understanding and controlling your online presence

Definition of the term “Digital Footprint

The digital footprint refers to all the traces we leave online. This includes all the information we share voluntarily (such as posts on social networks) and involuntarily (such as cookies and metadata). Every action we take on the Internet contributes to our digital footprint.

The different types of digital footprint

The active footprint

This is data that we intentionally share online. This may include:

  • Social media posts: Every time you post a photo, status or comment.

Example: Posting a holiday photo on Instagram.

  • Comments on blogs: Participate in discussions or give your opinion on articles.

Example: Comment on an article on a cooking blog.

  • Emails: Send emails to friends, colleagues or companies.

Example: Send an email to a colleague to arrange a meeting.

  • Profile information: Fill in personal information on websites or applications.

Example: Create a LinkedIn profile with details of your career path.


Passive footprint

  • Cookies on websites: Sites collect data about your browsing habits.

Example: An e-commerce site tracks the products you visit in order to personalise advertising.

  • Search engines: Search engines keep track of your queries.

Example: Google records the search terms you use to improve its results and advertising.

  • IP address and location: Sites can identify your IP address and determine your approximate location.

Example: A weather site using your IP address to provide local forecasts.

  • Application usage data: Mobile applications may record how and when you use them.

Example: A fitness app recording your workouts and progress.

Case studies to understand the impact of the digital footprint

  • Active Footprint: Marie loves sharing her cooking recipes on her personal blog. She writes detailed articles, posts photos of her culinary creations and interacts with her readers by replying to their comments. This is her active footprint because she chooses to share this information.
  • Passive Footprint: Jean regularly visits travel websites to plan her holidays. Each time he visits, the websites collect information about the destinations he visits and use this data to show him targeted adverts on other sites he then visits. John is not always aware of this data collection, which is part of his passive footprint.

Why are digital footprints important?

    • Understanding and managing your digital footprint is crucial for a number of reasons:

      • Online reputation: Employers, colleagues and even friends can search for information about you online. A good digital footprint can enhance your professional and personal image. For example, a potential employer might be impressed by a well-constructed LinkedIn profile or a professional blog that demonstrates your skills and achievements. Conversely, inappropriate photos or comments on social networks can damage your reputation and jeopardise professional opportunities.
      • Security: Information left online can be used by malicious people. Protecting your digital footprint helps prevent fraud and identity theft. Hackers can exploit personal data to access your bank accounts, make unauthorised purchases or even impersonate you in online transactions. By keeping your information secure, such as using strong passwords and two-step verification, you can reduce these risks.
      • Privacy: In a world where data is currency, controlling your digital footprint helps to preserve your privacy. Every online interaction, every website visited and every purchase made can leave digital footprints. This data can be collected, analysed and sold for commercial purposes, often without your explicit consent. By taking steps to limit the information you share online, you can better protect your personal preferences, habits and opinions from prying eyes.
      • Traceability and permanence: Anything published online can potentially be saved and resurrected years later. Even if you delete a post or photo, it’s possible that someone has already made a copy. So it’s crucial to think before you publish and to understand that your actions online can have lasting repercussions. Awareness of this traceability can encourage you to be more careful and thoughtful in your digital interactions.
      • Business Impact: For professionals and businesses, a well-managed digital footprint can be a major asset. A good online presence can attract customers, partners and collaboration opportunities. For example, entrepreneurs can use online testimonials, case studies and blog posts to demonstrate their expertise and reliability. In addition, positive visibility on search engines can increase credibility and brand awareness.
      • Education and awareness: Understanding your digital footprint and learning how to manage it is an integral part of modern digital education. Schools and universities are increasingly incorporating these concepts into their curricula to prepare students to navigate the digital world safely and responsibly. Good education on this subject can also help to counter misinformation and encourage healthier, more aware use of technology.

How can you reduce your digital footprint in 5 steps?

Reducing your digital footprint can help protect your privacy and security. Here are some practical tips:

1. Limit the information shared

Be selective about the information you share online. Avoid revealing personal details such as your address, phone number and other sensitive information. Think twice before publishing photos or updates that could reveal too much about your personal life. Use pseudonyms or nicknames whenever possible, especially on public platforms.

2. Use privacy settings

Configure the privacy settings on social networks to control who can see your information. Make sure you check and adjust these settings regularly, as platforms often update their privacy policies and options. For example, on Facebook you can limit your posts to your friends or a specific group, and on Instagram you can make your account private so that only your approved followers can see your posts.

3. Delete old accounts

Delete any online accounts you no longer use. This includes old social networking accounts, forums, and online services. Use tools like to find account deletion instructions for various websites. By deleting these accounts, you reduce the amount of personal information that is available online and minimise the risk of forgotten accounts being hacked.

4. Browsing in private mode

Use private browsing mode to avoid leaving traces of your online activity. Browsers like Chrome, Firefox, and Safari all offer a private browsing option that doesn’t store browsing history, cookies, or form information. This is particularly useful when you’re using public or shared computers, as it prevents other users from seeing what you’ve been browsing.

5. Cleaning up your browsing history

Delete your browsing history and cookies regularly. Most browsers allow you to do this easily via their settings. In addition to your browsing history, remember to delete caches, cookies and website data to prevent third parties from tracking your browsing habits. You can also use browser extensions such as Privacy Badger or Ghostery to block advertising trackers and improve your online privacy.

En suivant ces étapes, vous pouvez considérablement réduire votre empreinte numérique et mieux protéger vos informations personnelles contre les abus potentiels. La gestion proactive de votre présence en ligne est essentielle dans un monde de plus en plus interconnecté, où la protection de la vie privée et la sécurité numérique sont des priorités majeures.

How are Digital Footprints processed?

Digital footprints are collected, analysed and used by a variety of players for a variety of reasons. Here is an overview of how this data is processed by different entities:


Companies use digital footprints for a variety of reasons, mainly for marketing and improving their products and services. They collect data through cookies, registration forms, online purchases and interactions on social networks. This information is used for :

  • Targeted marketing: Companies can analyse your browsing habits, purchases and online interactions to provide you with personalised advertising and offers. For example, if you recently searched for running shoes, you may see ads for sports equipment.
  • Improving Products and Services: Feedback and user behaviour online allows companies to understand consumer needs and preferences, so they can improve their products or services.
  • Personalisation of the User Experience: By collecting data on your preferences and behaviour, companies can personalise your experience on their platforms, such as recommending specific products or adapting the user interface to your preferences.


Governments can collect and use digital footprints for a number of reasons, including national security, fraud prevention and regulatory enforcement. Here are a few examples:

  • National Security: Government agencies monitor online activity to identify and prevent potential threats to national security, such as terrorism or cyber attacks.
  • Fraud Prevention: Governments use digital data to detect and prevent tax fraud, identity fraud and other types of financial crime.
  • Regulation: Digital footprints help governments ensure compliance with laws and regulations, such as those relating to data protection and cyber security.



Cybercriminals exploit digital footprints for malicious activities, taking advantage of the personal and professional information available online. Methods include

  • Identity Theft: Cybercriminals can use your personal information, such as your name, address and national insurance number, to open bank accounts, take out loans or commit other fraud in your name.
  • Online Scams: They can orchestrate phishing scams using personal information to create convincing messages that trick you into divulging even more sensitive data.
  • Account Spoofing: By accessing your online accounts via weak or stolen passwords, cybercriminals can impersonate you on social networks, email platforms and other online services.



Digital footprints and information security : KeeeX excellence

KeeeX offers advanced technology for embedding certification metadata directly into files, without altering their content or format. One of the most remarkable features of KeeeX is its ability to generate unique hashes for each piece of data, guaranteeing the integrity of the information. Thanks to this approach, each document can be independently verified, offering total traceability and transparency. Whether you are a business looking to secure sensitive documents or an individual looking to protect your personal information, KeeeX offers a robust and reliable solution.

By using KeeeX, users can be confident that their data is protected against unauthorised alteration, reinforcing confidence and security in digital exchanges. Files can be protected locally, guaranteeing the confidentiality of users’ data. The KeeeX process ensures that any attempt to modify data will be detected immediately, providing an additional layer of protection against cybercrime.


In short, understanding and managing your digital footprint is essential in our connected world. By taking steps to control and protect your online data, you can better safeguard your privacy, reputation and security. Adopting practices such as using strong passwords, enabling two-factor authentication, and regularly monitoring your online accounts can help you reduce the risks associated with exposing your digital footprint.

KeeeX in C la Tech BB on BFM Business Marseille

KeeeX in C la Tech BB on BFM Business Marseille

KeeeX was invited by French Tech Aix-Marseille to present its company on the C’est la Tech BB! show, the theme of which was “Tracking your data”. 📺

Our founder Laurent Henocque answered questions from Raphaëlle Duchemin and Matthieu Somekh and was able to present the uses our customers make of our unique, patented technology.

A huge thank you to the teams at AMFT, BFM BUSINESS Marseille and all the show’s partners: Capital & Innovation by Crédit Agricole Alpes Provence, Métropole Aix-Marseille-Provence and Aix-Marseille Université 👍

The replay video 👇

Scaling the Verifiable Digital Product Passport

Scaling the Verifiable Digital Product Passport

👉 The Digital Product Passport (DPP) is a digital sheet that provides information on a product’s origin, composition, repair and disassembly options, and how individual components can be recycled. It enables stakeholders throughout the value chain (producers, importers, distributors, repairers, recyclers, consumers, etc.) to share and access this data more easily.

👉 Attaching a Digital Product Passport to goods is made mandatory by law for all products in the combined context of reducing climate externalities (as governed by the European “Ecodesign for Sustainable Products Regulation” (ESPR)) and to demonstrate fulfillment of CSR requirements.

👉 Purely informational DPPs first apply to product items considered as equivalent. The initial objectives of such digital product passports are to:
· Kick-start the transition to sustainable consumer products towards a more circular economy.
· Enable companies to share product data to facilitate reparability, reuse and recycling.
· Inform consumers about the environmental impact of products and give them the means to adapt their purchasing behavior.
· Meet regulatory requirements on product eco-design.

👉 More advanced operational objectives are to provide per unit traceability, applied to traceable reuse, recycle, destruction, second market change of ownership, anti counterfeiting, anti grey market to name a few. However this requires to uniquely and permanently identify any single item in a product line or even occurring as a component to a bigger system.

🤔 Finding the proper ways to globally achieve and scale such per unit auditable and secure traceability is a challenge. Specifically no blockchain solution can scale to the volumes of the worldwide retail market!

🚀 The article shows how the KeeeX technology can be leveraged to address the Verifiable Digital Product Passport at Scale in all its flavors, from generic product-based customer information to per item serialized codes allowing for the traceability of maintenance, recycling, decommissioning and proof of ownership to enable a second market.

KeeeX has a working experience of Electronic Transferable Records and the Digital Product Passport (since the Bonjour Le Bon and the MeRS project is 2019). Our commitment to ubiquitous and free permanent verifiability of proofs is unique to the market, as well as our commitment for climate, as we compensate all our greenhouse emissions.

MLETR – Implementation of the Electronically Transferable Records

MLETR – Implementation of the Electronically Transferable Records

 Do you know anything about ETR or Electronic Transferable Records ?

If not, you’re about to find out how it works too!

📃 The future of paper is digital, as it finally becomes possible to manipulate files delivering ownership of valuable goods with more probative force than watermarked paper 💶,

This concerns the whole of international trade (notably Trade Finance), which for reasons of trust and disharmony between regional regulations is still very little dematerialized: for example transport 🚢✈️, customs and police 🛃🛂, banks for Documentary Credit 🏦 etc. …

The kick-off was given by the UNCITRAL model law known as MLETR (Model Law for Electronic Transferable Records – 2017), whose transcription project into national law has been progressing since a July 2023 report submitted to the government.

The document below details how KeeeX technology addresses the full requirements of the MLETR.

There can be no doubt in the minds of insiders that NFTs are the first operational example of an electronically transferable title, and that ETR is therefore intrinsically a Web3 subject, and in our view its finest example as an instance of a global data lineage problem.

KeeeX was able to leverage its NFT technical proposal by filing a new patent opening up the potential of files certified as tamper-proof and carrying variable secondary properties attested by registers (blockchain if possible). The ETR in fact carries several such properties: the rights holder, the controller(s), the status (active/expired), the return to paper, the most recent version… The strength of this proposal comes from the unalterable bidirectional link between the keeexed file and the smart contract describing the value of each variable property.

This, of course, takes advantage of KeeeX’s historic technology and other innovations, including the recently revealed kxmash multihash.

Enjoy your reading!

PS: document keeexed and verifiable at 👇

KeeeX shares its new Multihash algorithm !

KeeeX shares its new Multihash algorithm !

🚀 KeeeX shares its new KXMash Multihash algorithm with the community!

Some documents or files need to be preserved for arbitrarily long durations. For example pay slips and diplomas, BIM (digital model of a building), or NFTs.

Fortunately, the usual algorithms for calculating cryptographic hashes are resistant to quantum computing. Nevertheless, the search for more efficient algorithms is ongoing. The future failure of a popular algorithm like SHA2 could make it possible to substitute one NFT or diploma for another in an undetectable way. How then can we protect assets for very long periods with today’s algorithms? 🤔

KeeeX tries to deliver the best in data protection to our customers, and we have historically dealt with this with “classic” combinations of algorithms requiring user control. There were drawbacks. 😒

To address the challenges of massive dematerialization and Web3, we wanted to offer a natively more robust keeexing algorithm, and enable our customers to multiply the protection of their files through simple parameterization.

🎉 KeeeX is pleased to share with the community the KXMash (pronounced keeexmash) family of algorithms, enabling hash functions to be combined according to a model that combines the effects of parallelism and cascade into a unified calculation. The process is also resistant to algorithm substitution attempts.

KXMash takes as a parameter a list of hash functions (H1,…Hn), applying them all to the entire dataset (as in parallel mode), AND adding the result of each step to the input of all subsequent steps. This parameter obeys the syntax “Hn<…<H1”. The first of the string is the last in the cascade and defines the length of the output. The “Hn<…<H1” parameter is added at the head of the data to be protected.

Let’s imagine you want:
👉 secure a file for longer durations than today’s best algorithms allow: use kxmash’s default mode, which is “SHA3-256<SHA2-256”
👉 produce a 32-byte hash, but include a 64-byte hash in the calculation, without using truncation: use “SHA3-256<SHA2-512”, for example.
👉 issue NFTs for indeterminate durations: combine three different algorithm families over a length of 512 bytes: “SHA3-512<SHA2-512<SWIFFT-512” (In its usage KeeeX only uses the algorithms available in OpenSSL, but KXMash is not limited)

KXMash is the result of an innovation being deployed in version 2 of our metadata language and tools. The pdf will tell you more.

Link to article:….pdf



KeeeX partner of the Etoiles du Courtage 2023

KeeeX partner of the Etoiles du Courtage 2023

KeeeX is very proud to be once again a partner of this second edition of the Étoiles du Courtage! 🤩

After a successful first edition, 4 prizes will be awarded this year:

– 🤴 Courtier Stratège
– 👨‍💻 Digital Broker
– 😎 Remarkable Agent
– 💡 Clever Supplier

As last year, the 4 winners will receive their prizes in the form of utility NFTs that they can use or exchange.

Thank you Les étoiles du courtage, Guillaume and Eugénie for your renewed confidence!

Entries are now open:

KeeeX in the mapping of startups serving industry

KeeeX in the mapping of startups serving industry

KeeeX is included in the 2023 mapping of startups serving Industry carried out by France Digitale, ArcelorMittal France and Jolt Capital. 🎉

A mapping that puts the spotlight on the startups that are shining a spotlight on French tech know-how to dust off and reinvent industry 🇫🇷

A fine recognition for us, who have been striving for almost 10 years to provide industrial solutions for certification, proof, protection, time-stamping, traceability and compliance for all business needs.

France’s influence will not be achieved without a strong, sovereign industry at the cutting edge of innovation!

Link to the full mapping 👉

KeeeX, winner of SmartPortChallenge #4

KeeeX, winner of SmartPortChallenge #4

The entire KeeeX team was present on Friday June 30 at the Palais de la Bourse in Marseille to present the solution we developed to meet the challenge set by Servaux :

👉 Secure digital interface for ship’s regulatory documents

Together, we have co-constructed a digital platform for dematerializing, certifying and tracking all types of documents required for the navigation of a ship.

Thanks to our comprehensive software suite and ready-to-integrate components, a fully operational platform was developed in just a few weeks. 🚀

KeeeX would like to thank Servaux for its confidence, as well as all the Smart Port Challenge partners: CCI Aix Marseille Provence, Grand Port Maritime de Marseille et Aix Marseille Université

Launch of the Photo Proof Pro website

Launch of the Photo Proof Pro website

More and more companies are using our universal mobile application and we thank you for it 🙌

We have built this mini-site to show you the field of possibilities allowed by our solution:

You have a particular need?
Our team analyzes your need and develops a custom scenario in the colors of your organization.

Photo Proof Pro is used today to obtain :

👉 Remote audits/expertise (raw material, goods, container, vehicle, construction, project)
👉 Entry/exit inventory of fixtures (real estate, automobile, movable, equipment loan)
👉 Geolocalized proof of presence (event, loading dock, meeting, AGM, field actions)
👉 Dematerialization of documents (digital twin of paper document, receipt, invoice)
👉 PDF reports generation (expertise report, CERFA form pre-filling, inventory of fixtures)
👉 Proof of an event (professional, humanitarian, sports, solidarity, educational, training)
👉 Proof of consent (transfer of responsibility, signature of an inventory of fixtures)
👉 Consistency / conformity checks (contradictory photo evidence, consistency with theoretical data)

Interested ?
Let’s talk about it!

KeeeX, the first carbon neutral blockchain solution using Bitcoin

KeeeX, the first carbon neutral blockchain solution using Bitcoin

🌎 KeeeX is committed to collective carbon neutrality 🌎

Already active in minimizing its impact and GHG emissions at the organizational level, KeeeX is proud to announce that its software suite is now carbon neutral. 😁

KeeeX provides its users with an extremely low energy process to make any file or process easily verifiable. ✔

In addition to this digital passport, the user can additionally request a blockchain anchor to have a proof of existence of their file at a given date. 📆

He has the choice, or even can combine:
– An anchor on our private blockchain KeeeX Chain (in POA on 10 nodes)
– An anchor on a public blockchain (by default we pool all requests and perform two anchors per day on the Bitcoin blockchain, for very long audit sources)

KeeeX has offset on Gold Standard all its 2022 annual GHG emissions and will continue to do so. Our climate financing outside our value chain has contributed to the avoidance of 160tCO2e and the sequestration of 5tCO2e for the year 2022. 🌱

We are to our knowledge the first and only solution using Bitcoin in Layer 2 to offer a carbon neutral and sustainable solution to its customers, with no CO2 externality for their Scope 3. 🤝

This voluntary compensation, inscribed in the long term, is in addition to all the practices that are generalized within the organization:

– Travel by foot, bicycle, single-wheeler or public transport favored 🚲🚌🚈
– Premises located in a building equipped with solar panels (and of the 🌞 in Marseille, there are some!)
– Limiting the purchase of new computer equipment (reuse, second hand, BYOD) 💻📱
– Selective sorting and limiting in the use of consumables and energy ♻
– Institutionalized telecommuting

Click to view our GHG assessment (in french) 📰

Launch of KeeeX Secure NFT

Launch of KeeeX Secure NFT

Creators, protect your digital works and future purchasers ! 👍️🤩🚀

NFTs are one of the trends of the moment. However, current events have shown us that NFTs are not so decentralized and immutable as advertised.The assets linked to the majority of NFTs can indeed be modified or deleted.

KeeeX is proud to announce the beta launch of its NFT security service: 🔥

This one allows creators to protect their works as soon as they are deposited and to exchange them on the KeeeX private blockchain before eventually deciding to put them on sale on a public platform.

To do so, nothing could be simpler:

1️⃣ I deposit the original file, which the keeex service and timestamps by providing immediate proof of copyright
2️⃣ The site creates and displays a thumbnail with watermark, also keeexed and referencing the original certified file
3️⃣ I share this thumbnail on the social networks or artist sites of my choice, never exposing the original
4️⃣ I create one or more NFTs of this original, and remain the only one able to download the clones in high resolution
5️⃣ The site displays the thumbnail of these NFTs that may be of interest to collectors
6️⃣ The collector sends a direct message to the owner of the NFT and after off-site agreement, the owner transfers the NFT to the collector
7️⃣ The collector gets access to the high resolution original having been able to verify the authenticity of the thumbnail beforehand
8️⃣ At any time the creator or collector can contribute to the history of the NFT through attached and historicized documents and thus contribute to the symbolic value of the work

KeeeX is proud of our partners:
– KYC with Eunomart Violette Taquet,
– Artist support and consulting with Bertrand Dussauge Meta-K,
– Licensing and rights of use of works with Tokenart Clément Fontaine.

This NFT is shared here as a thumbnail with watermark. You have understood that only the successive owners have access to the original. It is subject to a TA-DI license adjusted to KeeeX properties.

KeeeX NFTs can be transferred to public blockchains or marketplaces like OpenSea NFT Market, Rarible, SuperRare Labs, WISeKey SA, objkt,…. hey can be mobilized for high quality display as enabled by IONNYK or for industrial deployments for example with SORGA Technology 💎

The properties of KeeeX allow to correct many of the defects found by OpenGem.

The site allows you to send a message to the owner of a work. 📧

Augure x KeeeX partnership

Augure x KeeeX partnership

We are very proud to announce that we have signed a partnership with Augure to enable their customers to certify their documents with KeeeX :

Fake news, document forgery and media distrust, companies are increasingly exposed to reputational and financial risks and their consequences. The document certification option is now available in the Augure relational platform.

KeeeX protection allows to secure and make verifiable in a safe and simplified way the content that is distributed from Augure :

➡️ 100% transparent to users – 0 manipulation.
➡️ No alterations, either in format or appearance.
➡️ All formats are supported ( word, pdf, videos, html, zip…).
➡️ Documents are secured in a perennial way.
➡️ No impact on the technical infrastructure.
➡️ Files are easily verifiable thanks to a module hosted on the client’s site (on your press area for example), on Augure’s site or on KeeeX’s site.

See you at Vivatech !

See you at Vivatech !

We’ll see you again at Viva Technology this year 😁

We will be present alongside our partner SORGA Technology 💎 on the #startups village as well as on the online platform!

📆 From Wednesday 15th to Friday 17th June 2022
📍 Paris Expo Porte de Versailles
🕗 From 9am to 6pm

Lots of announcements, novelties and exchanges in perspective! 🔥

To make an appointment.

KeeeX x Snowpack partnership

KeeeX x Snowpack partnership

Deeptechs KeeeX and Snowpack pool their technology !

To secure and make confidential web browsing and information exchange, companies and individuals often resort to specific technologies or networks: electronic signature, encryption, VPN, Tor… Unfortunately, these solutions do not fully ensure anonymity and security, are not easily accessible to everyone and always rely on trusted third parties. 🔐

KeeeX and Snowpack, two deeptechs from French research, are happy to announce at FIC 2022 that they are pooling their technologies that will now be available in each of their respective offerings. 🚀

KeeeX customers will be able to take advantage of the invisibility (security and anonymity) offered by Snowpack to transfer their keeexed files. As for Snowpack customers, they will be able to take advantage of the guaranteed integrity of information between a sender and its recipient enabled by the KeeeX process. 👊

KeeeX is the leader in embedded file protection and has developed a unique and internationally patented process to seal tamper-proof evidence in all types of documents to guarantee their integrity, source and date and make them easily verifiable. ✅

Snowpack develops and operates the first invisibility network. Based on a patented technology blending anonymity and security, Snowpack makes its users independent of the underlying infrastructure and any trusted third party when using the Internet to browse or exchange files. 👻

KeeeX receives the France Cybersecurity 2022 Label

KeeeX receives the France Cybersecurity 2022 Label

KeeeX is awarded the Label France Cybersecurity for its product KeeeX Fusion

Première et seule solution “Blockchain” labellisée France Cybersecurity en 2018, KeeeX obtient le label 2022 pour son produit KeeeX Fusion. 📋

“Ce label met en avant l’excellence des offres françaises dans le domaine de la cybersécurité et permet d’éclairer le choix des utilisateurs soucieux de contribuer à la souveraineté numérique nationale.”

Fusion permet de protéger, prouver, signer et horodater localement les fichiers sans qu’ils sortent de l’environnement de l’entreprise. ⚙

Nous remercions l’Alliance pour la Confiance Numérique (ACN) pour leur confiance, ce label est un vrai gage de qualité pour l’ensemble de nos clients et utilisateurs. 🙌

Enedis chooses KeeeX to secure its press releases

Enedis chooses KeeeX to secure its press releases

Enedis confirms the certification of its press releases with the start-up KeeeX, at the end of an experiment conducted in 2021. The embedded protection technology in the files, developed by the start-up, based on the blockchain, allows to verify their authenticity.

After a year of successful experimentation, we are very proud to announce that Enedis Group confirms the use of KeeeX technology to protect and make verifiable its press releases. 😁

Simple and quick to use, journalists and the general public can verify the authenticity of an information in one click by dropping the keeexed document on the verifier present on Enedis’ Media space. ✅

Serving the Group’s digital trust and cybersecurity, our unique and patented process notably helps to fight against the risk of Fake News and to set up responsible and verifiable communication. 🔐

After Société Générale and the many customers of our partner ePressPack, we are delighted that the Enedis Group uses our solutions to secure its press releases, reinforcing KeeeX’s ambition to become the standard for verifiable files. 🚀

PS: feel free to download and verify the CP below 👇