Security Built Into the Hardware
Most access control systems trust the cloud. Digiseal trusts the chip. Private keys are generated inside the hardware and never leave it — even Spark Technologies cannot extract them.
How It Works
Three layers working together.
Hardware-Bound Cryptographic Identity
Each Digiseal module contains a secure element that generates an ECC P-256 key pair on first boot. The private key is stored inside the chip and is physically impossible to extract — it never appears on any bus, register, or memory address that software can read. This means even if an attacker has physical access to the module, the key cannot be stolen.
ECC P-256 · Private key generated on-device · Never exported
Offline-First Operation
Every Digiseal operation — lock, unlock, seal, verify — works without any internet connection. Access credentials are signed cryptographic tokens stored in the app. The module verifies them locally using the public key. When connectivity is available, events sync to the cloud. When it isn't, nothing stops working.
No cloud dependency · Local verification · Sync when available
AES-256 Encrypted Communications
All communication between the app and the module uses AES-256 encryption — the same standard used by governments and militaries worldwide, and stronger than the AES-128 used by most competing systems. Each session uses a unique derived key, so capturing one session gives an attacker nothing useful for any future session.
AES-256 · Session-unique keys · Replay-attack resistant
Digiseal vs. Typical Alternatives
| Capability | Digiseal | Cloud Lock Systems | BLE/RFID Systems |
|---|---|---|---|
| True offline operation | ✓ | Partial | Partial |
| Works on existing locks | ✓ | ✗ | ✗ |
| Hardware-bound ECC keys | ✓ | Varies | ✗ |
| AES-256 encryption | ✓ | Varies | Varies |
| Offline QR key sharing | ✓ | ✗ | ✗ |
| Cargo seal monitoring | ✓ | ✗ | ✗ |
| White-label platform | ✓ | ✗ | ✗ |
| Self-hosted cloud | ✓ | ✗ | ✗ |
Get the Digiseal App
iOS and Android apps for managing access, verifying seals, and sharing offline QR credentials — available now.