Prooftag offers a complete and scalable range of solutions to secure democratic electoral processes:
Voter enumeration, personalization and certification of voter cards:
Each citizen express his or her vote in a unique way.
Security tools and documents for polling stations:
The electoral process is secure and transparent.
A secure flow of information from voting offices to the electoral commission.
The voter registration cards certified with a Bubble Tag® are unique and non-reproducible. Each card issued by the system assigns a single vote per citizen, following a process of identification and verification of duplicates (classical method of comparing biometric).
Card authentication by all and at any time
Tracking cards issued
The ability to revoke cards centrally
The electoral lists are printed with the image of the Bubble Tag® of each voting card. On election day, a simple visual control allows to check the authenticity of the voter cards.
The lists themselves are certified by a Bubble Seal® available at the polling station for all citizens.
Falsification and substitution of lists
Validation of the voting rights of voters
The ballots are protected and managed to ensure the integrity of voting citizens in the voting booth.
The pre-filled ballots
The validity of ballots
An easy counting of ballots
The exchange of polls
The security of ballot boxes
The minutes constitute material evidence before the competent courts. The logistics of the reports, secured by the Prooftag kit, ensures their integrity, traceability and authenticity until the results are announced.
Traceability of the rise of minutes
The authenticity of the minutes
Sealing ballot boxes
Ensure the integrity of the minutes of proceeding
Securing the logistics of electoral materials
Conventional security technologies are mass-produced and therefore mass-reproducible. Only technologies that cannot be reproduced by their own manufacturers can offer the assurance of effective protection against counterfeiting.
Since 2004, Prooftag has been developing its own security solutions based on the concept of chaos. Following the example of biometrics which identifies human beings by their physical characteristics, chaosmetry relies on the registration of physical elements that cannot be cloned to create a serialized authentication element.