Keryx Protocol

How physical truth becomes cryptographic fact.

The Keryx Protocol is an open standard for binding a physical object to a permanent, unforgeable digital record — readable by any NFC-capable phone, verified without a server.

Activation Model

Three tiers. One protocol.

TIER 01

Standard

Independent makers

Register a work via the web app. Receive a pre-paired chip. Embed at home.

  • Web-based registration
  • Pre-paired secure chip
  • Permanent public record
TIER 02

Studio

Small brands & ateliers

Bulk chip orders. Atelier-branded verification experience. Team dashboard.

  • Bulk chip provisioning
  • Custom verification page
  • Team access controls
TIER 03

Enterprise

Manufacturers & institutions

Factory-line embedding. API integration with existing PLM/ERP systems. Compliance reporting.

  • Factory-line provisioning
  • PLM/ERP API integration
  • EU DPP compliance reports
Architecture

Three layers. Fully independent.

01

Hardware Layer

A secure element chip embedded in the physical object. Generates a unique cryptographic signature on every tap — uncloneable by design.

EAL5+ security ratingNo battery requiredRead in < 2 seconds
02

Protocol Layer

An open verification protocol. The chip signature is verified client-side against the public record — no Keryx server required for verification.

Open verification standardOffline-capableNo vendor lock-in
03

Record Layer

An immutable provenance record anchored to a permanent, decentralised store. Every ownership event, exhibition, and restoration is appended automatically.

Permanent anchoringEvent-based provenanceHuman-readable + machine-readable
Digital Twin Architecture

One object. One record. Infinite history.

anchor

Anchor

One per physical object

The root identity token. Created at registration. Bound to the chip. Cannot be transferred without physical chip present.

content_copy

Digital Twin

Mirrors the physical object

A full digital record of the object — materials, provenance, maker story, ownership history. Updates automatically as events are logged.

account_tree

Child Tokens

Event-linked sub-records

Created for each significant event — a sale, an exhibition, a restoration. Each carries a timestamp, the relevant parties, and a link back to the Anchor.

Competitive Landscape

Why the protocol is different.

KeryxArianeeLegitimateStandard NFC
Chip-bound identityYesPartialNoNo
Offline verificationYesNoNoNo
Open protocolYesNoNoYes
No app requiredYesNoYesNo
EU DPP compliantYesPartialNoNo
Permanent recordYesYesNoNo
Hardware security (EAL)YesNoNoNo

“The chip is the certificate. Everything else is just software.”

For Developers & Integrators

Open specification. REST API. Webhooks.

The Keryx verification protocol is fully documented and open for integration. Connect your PIM, e-commerce platform, or marketplace in hours — not months.