Portable, offline‑capable verification for LID‑encoded assets

The LID Validator is AEROBLOX’s verification engine for proving asset authenticity, rights, and provenance anywhere—online or offline. It reads LID‑encoded payloads, validates cryptographic proofs, and confirms that an asset’s identity and claims still match what was anchored on Hedera.

Private demo only at this time.

Portable, offline‑capable verification for LID‑encoded assets

The LID Validator is AEROBLOX’s verification engine for proving asset authenticity, rights, and provenance anywhere—online or offline. It reads LID‑encoded payloads, validates cryptographic proofs, and confirms that an asset’s identity and claims still match what was anchored on Hedera.

Private demo only at this time.

How the LID Validator works

The LID Validator establishes a privacy‑preserving, tamper‑evident view of any LID‑encoded asset by anchoring cryptographic proofs—not documents—on Hedera. You supply evidence and claims; AEROBLOX standardizes them into content hashes and canonical digests, recording only those digests on‑chain. Rights attestations bind directly to an asset’s identity, and every change creates a linked revision—building an immutable, auditable lineage that tokens and downstream systems can reliably reference as a single source of truth.

01

Evidence in, privacy preserved

Upload files, photos/3D scans, and documents. We compute standardized content hashes and canonical digests, anchoring only digests on‑chain—never your private materials.

02

Rights you can trust

Submit a legally binding rights attestation that is bound to the asset’s identity record, so ownership and permissions are cryptographically anchored.

03

Immutable lineage

Each update—appraisals, claims, or new evidence—creates a linked revision for a complete audit trail over time.

04

Built for tokenization

Tokens reference the LID record directly, inheriting verifiable provenance and compliance‑ready metadata for downstream markets.

LID Validator

Verify authenticity and extract embedded intelligence in seconds

Instant: Confirm asset legitimacy, issuer identity, and timestamps in real time with cryptographic verification.

Adaptive: Seamlessly extract and validate LID data from documents, images, audio, video, or physical assets using any device.

Secure: Protect sensitive information through private data layers and deep fake detection for true digital integrity.

What makes the LID Validator different

The Validator is designed for trust at the edge: self‑contained payloads, offline execution, and policy‑aware rules that travel with the asset—not with a centralized service.

Self‑contained verification

Each LID record includes an encoding payload that bundles essential data plus compact bytecode. This executes locally to perform authentications, authorizations, validations, and approved secondary operations—without requiring an internet connection.

Mobile camera LID extraction

Use your phone’s camera to scan a LID‑encoded digital or physical asset. The Validator extracts the payload from the scan and runs offline checks on‑device, ideal for field inspections and point‑of‑sale.

Privacy by design

The payload uses canonical hashes and signatures instead of raw documents. Sensitive materials never need to be exposed; digests and proofs are evaluated instead of underlying content.

Versioned and tamper‑evident

Every revision of an asset’s claims is linked. The Validator detects mismatches between current materials and recorded digests, making tampering visible.

Policy‑aware authorization

Token and transfer policies—such as KYC gating, whitelists/blacklists, or jurisdiction rules—can be encoded into the payload, enabling deterministic, offline authorization checks.

Extensible secondary operations

The payload’s bytecode can enable controlled actions like local watermark verification, license checks, permit validations, or generating signed receipts— all executed offline.

How offline validation works

The LID Validator is designed to run at the edge, turning LID payloads into deterministic answers using just a camera and file—no network dependency required for core checks.

Step 01

Load the LID payload

A camera scan or file input loads the LID payload into the Validator. The payload transfers instantly into the mobile Validator for secure on‑site verification and automated compliance checks in real time.

Step 02

Mobile camera LID extraction

Use your phone’s camera to scan a LID‑encoded digital or physical asset. The Validator extracts the payload from the scan and runs offline checks on‑device, ideal for field inspections and point‑of‑sale.

Step 03

Privacy by design

The payload uses canonical hashes and signatures instead of raw documents. Sensitive materials never need to be exposed; digests and proofs are evaluated instead of underlying content.

Step 01

Load the LID payload

A camera scan or file input loads the LID payload into the Validator. The payload transfers instantly into the mobile Validator for secure on‑site verification and automated compliance checks in real time.

Step 02

Mobile camera LID extraction

Use your phone’s camera to scan a LID‑encoded digital or physical asset. The Validator extracts the payload from the scan and runs offline checks on‑device, ideal for field inspections and point‑of‑sale.

Step 03

Privacy by design

The payload uses canonical hashes and signatures instead of raw documents. Sensitive materials never need to be exposed; digests and proofs are evaluated instead of underlying content.

Trust you can carry anywhere

By pushing verification to the edge, the LID Validator shortens the distance between assets and answers—whether you are in the field, on a factory floor, or inside a regulated environment.

In short, the LID Validator brings portable, privacy‑preserving, and policy‑aware verification to assets—delivering trust you can carry anywhere, with or without the internet.