Prooftag offers a complete and scalable range of solutions to secure democratic electoral processes:
Voter enumeration, personalization and certification of voter cards:
Each citizen express his or her vote in a unique way.
Security tools and documents for polling stations:
The electoral process is secure and transparent.
A secure flow of information from voting offices to the electoral commission.
The Bubble Tag® certified voter registration cards are unique and not reproducible. Each card issued by the system assigns a single vote to each citizen after a procedure for the identification and verification of duplicates (classical method of biometric comparison) has been carried out.
Authentication of cards by all and at all times
Tracking of issued cards
Ability to revoke cards centrally
Falsification and substitution of lists
Validation of the voting rights of voters
The ballots are protected and managed to ensure the integrity of voting citizens in the voting booth.
The pre-filled ballots
The validity of ballots
An easy counting of ballots
The polls are traced and closed by Bubble Seals® to avoid the exchange and the alteration of their content. The citizens can verify the integrity and the authenticity of the ballot box by a simple visual control.
The exchange of ballot boxes
Ballot box stuffing
The authentication of ballot boxes
The minutes constitute material evidence before the competent courts. The logistics of the reports, secured by the Prooftag kit, ensures their integrity, traceability and authenticity until the results are announced.
Traceability of the rise of minutes
The authenticity of the minutes
Sealing ballot boxes
Ensure the integrity of the minutes of proceeding
Securing the logistics of electoral materials
Conventional security technologies are mass-produced and therefore mass-reproducible. Only technologies that cannot be reproduced by their own manufacturers can offer the assurance of effective protection against counterfeiting.
Since 2004, Prooftag has been developing its own security solutions based on the concept of chaos. Following the example of biometrics which identifies human beings by their physical characteristics, chaosmetry relies on the registration of physical elements that cannot be cloned to create a serialized authentication element.