How biq Works
biq makes verifying attendance easy and automatic. Using Bluetooth, it ensures seamless presence verification without extra equipment or complex steps. Here’s how the process works.
Key Concepts and Processes
Nonce-Based Security: Each verification event generates a unique nonce, a cryptographic number tied to a specific time and place. This ensures that every verification is unique and protected against replay attacks.
Beacon of Authority (BoA): The BoA is the trusted entity, usually the event organizer or designated participant, responsible for validating other attendees. Once a participant’s device comes into proximity with the BoA, the verification process is triggered.
Ad-Hoc Network of Nodes: When an attendee is validated, their phone becomes a node in the biq network. Phones in proximity can validate each other’s presence, forming a decentralized network that operates without a central server or extra infrastructure.
On-Chain Proof: After validation, the proof of presence can be recorded on-chain for transparency, security, and trust. This allows organizers, participants, and third parties to access the verification data.
Last updated