95% of blockchain integrity use-cases solved by Chainkit

95% of blockchain integrity use-cases solved by Chainkit


Chainkit simplifies integrity value versus complex DIY ‘raw’ blockchain

What is Chainkit?

Chainkit is a cloud-native Secure Journal service, accessible to developers as a ‘Twilio for Blockchain’. This PaaS needs merely 3 RESTful API endpoints (invoked at any granularity) to add the full integrity strength and immutability of blockchain to your all existing apps, systems and business processes in just 5 minutes.

Organizations use Chainkit to proactively reconcile data updated by multiple parties, eliminate data tampering, detect even the most advanced malware threats (we sense when hackers with or without privileged authority attempt to cover their tracks) and irrefutably prove data integrity to your auditors, clients, and counterparties.

Chainkit is an alternative to "DIY Raw Blockchain" and provides a full abstraction layer on top of all popular blockchains, protecting you from technology risk and chain 'lock-in', and completely removes the need to interface with smart contracts and cryptocurrency.

Does Chainkit replace a blockchain / DLT?

Chainkit has the flexibility to sit beside any blockchain / DLT. Chainkit can also abstract its supported blockchains for simple integrity value, minus other considerations (see ‘raw blockchain’ question below). This enables our customers to enjoy the transactional, identity, smart contracts and other benefits of raw blockchain protocols, without the burden when those features are unnecessary. As per the pie chart above, we estimate 95% of enterprise use-cases fall into the latter.

Is Chainkit safe to use locally, on premises?

Yes. In order to ensure full data privacy and security, only hashes of your data and optional anonymized ID tokens are sent to the cloud. Subsequently, only those items are stored on your blockchain of choice (public, private or hybrid). Although we don’t restrict which hash function you can use, we strongly recommend SHA-256 or higher, which is presently considered safe (irreversible to uniquely blind identify the original file or associated digital item).

How does Chainkit work?

Developers add chainkit.register() to their apps or platforms, sending a digital fingerprint of any file, string, data, code, event, messages, or other digital items where they want to be able to prove integrity. Later, you can call chainkit.verify() to certify the integrity of that item. Because we use digital fingerprints, your actual data stays safe inside your own apps and is never transferred to PencilDATA. 

Independent Chainkit PaaS layers - predictable cost and performance regardless of underlying blockchain

Should I use Chainkit or do it myself with "raw" blockchain?

We find that most problems people try to solve with blockchain simply don't require direct interface with a blockchain.

Organizations frequently look to blockchain when they have data integrity issues in their existing systems and business processes, but unless you fit a small number of uses cases around decentralized applications or tokens, there's generally no need to directly talk to a specific chain and deal with all of the complexity that entails. That's why we built Chainkit.

What are some use cases for Chainkit?

Regulated industries and data such as insurance, healthcare, financial services, legal, and human resources are subject to many compliance and audit requirements around data integrity. Being able to prove, beyond a reasonable doubt, that a particular file or other data is original, authentic, and tamper-free is absolutely critical for regulated data. Other use cases include administrators or developers looking to prove they have clean hands, supply chain and logistics, manufacturing, and other situations where data and process integrity has tremendous business value. We've also used Chainkit to build a fully-integrated solution for Salesforce.com that's available in the Salesforce AppExchange, and requires no coding.

Why would I use Chainkit instead of Blockchain directly?

Blockchain is essentially a database without update or delete capabilities. Ask yourself- do you interface directly with the databases you use? Or do you use an abstraction layer? We've built what we believe to be the worlds most advanced (and Patent-Pending) abstraction layer for Blockchain, and our API supports many blockchains such as public Ethereum and private Hyperledger-based chains, all through the same chainkit.register() and chainkit.verify() API calls.

We take care of all of the complexity, and keep up with the endless changes happening in Blockchain technology to present you with our simple API. If that wasn't enough, we also insulate you from the risk of picking the "wrong" chain technology, because you're able to switch to any supported chain by changing just 1 word in your API calls. The question you should be asking isn't why would you use Chainkit, but why would you try and use blockchain directly?

What are people saying about Chainkit?

Smart people are saying great things about Chainkit, and we can't wait to add you to our list of happy users :)

“The PencilDATA team spent a lot of time listening to the blockchain needs of large enterprises. Chainkit is more than an API for blockchain, it’s an enterprise-grade data integrity solution that's been built to meet even the most strict audit and compliance requirements.”
- Andy Nallappan - Vice President and Chief Information Officer, Broadcom Limited

 “Chainkit delivers the strong data integrity features of blockchain in an easy to use API. Our recent projects have been able to avoid the cost and time building and managing custom smart contracts by using Chainkit.”
 - Rich Miller, CEO, Telematica, Chainsight

How is Chainkit priced, and how do I get started?

We charge for registrations and verifications of data in Chainkit. For example, in a hospital setting a digital fingerprint of a patient x-ray might be automatically registered with Chainkit when the x-ray is created and added to the patient record system. In Chainkit, that registration counts as 1 transaction. Later, a radiologist wants to view the x-ray, so they log in to the patient records system and retrieve the x-ray, and the integrity of that x-ray is automatically verified with Chainkit before it's shown to the radiologist. That verification is a second transaction. Finally, the next day, the patients primary doctor logs in to the patient records system and fetches the x-ray, which is again verified automatically with Chainkit before being shown to the doctor. That's a 3rd transaction. Chainkit pricing is based on the number of transactions in a month.