Unique technology solution for document security

based on blockchain and digital watermark

that unites the digital and physical worlds

Unique technology solution for document security

based on blockchain and digital watermark

that unites the digital and physical worlds

Mission

T2MAD is a technology start-up specialized in facilitating access and protection to physical and digital assets.

Vision

Our vision is to become a worldwide reference in technology aimed at uniting the physical world and the digital world.

Values

Security, innovation, reliability, commitment, quality service, authenticity.

Our solution: T2Core

T2Mad, along with T2Core, offers a unique, end-to-end solution that supports the transition of electronic documents to the physical world–ensuring integrity, traceability and unalterability in a transparent way for the organization, and with minimum integration.

It is based on two main technologies:

DIGITAL BARCODE

Invisible layer that is applied over images and documents allowing a code with strong, unchangeable encryption to be embedded.

Barcodes can, literally, be added to any media on which they can be printed

BlockChain

The worldwide revolution in terms of security and traceability.

T2Mad makes intelligent use of this technology, storing summaries (hash) of the digitally watermark signed documents in the blockchain, a reliable way of verifying the authenticity of the original documents.

Thanks to the BlockChain technology, we can guarantee the traceability and unchangeability of the original documents.

Main characteristics

  • Invisible
  • Unchangeable
  • Multi-support
  • Detectable by multiple devices
  • Secure
  • Reliable
  • Transition to the physical world
  • Smooth

Applications

Document authenticity verification

Our verification tools allow to confirm the consistency of the data present in the physical document with the related information in the digital domain. We can check if the physical document has been manipulated easily and immediately.

Unauthorized and leaked copies

This technology is already used in the cinema, music, financial, academic, political, legal and intellectual property industries, among others, to enable the source of the leak to be identified.

Administrative process and documental flow efficiency

Our technology allows the streamlining of validation processes, and searches for information and contents associated with physical and digital objects.