Air Scope

Verification System

The advanced trending Tech--AIoT and Blockchain enable the brand new identity authentication system to deliver a more comfortable and convenient lifestyle. We Develop a series of application about Decentralized identities service by applying DLT(Distributed Ledger Technology) and Facial Recognition.

Next-Generation Identity Servic


The problem of traditional identity verification

-   Forgot to bring ID Card.
-   Many Cards in heavy wallet caused healthy issues. (ex. Scoliosis, pyriformis syndrome)

-   Some Personal Data Need not to reveal.
-   Just know who I am & how old am I.

-   Increase cost of Information Security Protection.
-   Central Management = Crisis.

The initial scenario of FACEPASS Decentralized Identifiers Authentication System

Door Access Service Attendance System

Home/ enterprise

Using Air scope verification system to verity identity and entering home

Hotel Check in System management


Air scope verification system could be a great helper in intelligent hotl

Age Verification Vending Machine


Air scope verification system could verity human's identity machinery and makeup the defect when manual verification is needed

The initial scenario of FACEPASS Decentralized Identifiers Authentication System

Keys are generated by a third-party wallet, providing a firewall between FBL and user's keys--Bulletproof DIDs Wallet.
Identity data is fully encrypted in the app on the user's device and can be accessed with biometrics--Encrypted Biometrics UUID.
Public identifier for the authenticating authority, hashed identity data, and a flag indicating the data is still valid--Hashed Confidential Data on IOTA DLT.


David Wu


20 years of ICT integration experiences

J.R. Wang


Blockchain ecosystem Expert

S.H. Zhuang

System Engineer

IoT protocol Engineer

Lawrence Chen

Full-stack Engineer

iBeacon, front-end and back-end R&D

Kuan-Ju Hou

UI/ UX Designer

Major in graphic Design,Web design and UI/ UX design


What is FBL?

FBL through the combination of AIOT and blockchain, developed the next generation digital identity recognition system.We are research and development the best modules for biometrics, hardware and software, data encryption, Zero-Knowledge Proof (ZKP) and Distributed Ledger Technology (DLT) to provide simpler, safer and faster products.

What is IOTA?

IOTA is a distributed ledger technology(DLT) for the Internet of Things(IoT). It uses a technique called Tangle. This technology eliminates the need for each node to store data for the entire network, and each node can confirm transactions and verify each other.

Why did you choose IOTA?

IOTA can solve most digital identity and IoT data storage related issues. Traditional technology due to cumbersome procedures and data are easy to tamper or steal, caused many people have doubts about the security of online transactions. So through IOTA, these problems can be minimized. The following introduces for the main advantages of the IOTA.

  1. Decentralization and no handling fee:
    There are no miners or verifiers in the IOTA system. Everyone who establishes a transaction on the Internet is also the person who verified the transaction. This means that everyone plays the same identify and status in the establishment of a consensus mechanism, so no fees are required.

  2. Powerful Scalability:
    Will become more stable as the number of online transactions increases. IOTA can perform multiple transactions at the same time. If more transactions are established, the verifiable speed will increase.

  3. Fast Transaction:
    The more people trade through Tangle, the faster they become faster.

  4. Perform microtransaction:
    The IOTA is particularly suitable for data exchange in the IoT, and it also makes it easier to implement micropayments with lower amounts and high transaction frequency.

  5. Safe data transfer and confirmation:
    The IOTA shreds the data packets and then performs the blockchain. To retrieve the data, first verify it, then retrieve all the data packets from the IOTA and reorganize the complete data, so that the data is not easy to steal.

What is the Tangle technology architecture?

Tangle is based on a directed acyclic graph (DAG) for trading, and all transactions sent through the various nodes of the network construct a Tangle. With DAG, IOTA can achieve a higher number of transactions without handing fees. As more participants use Tangle to initiate a transaction, the speed of the transaction becomes faster and safer. The following introduces Tangle's innovative.

  • Stable Structure:The distributed ledger technology(DLT) of the traditional blockchain is realized by a chain network, and the Tangle structure is much more stable than the chain structure.

  • Consensus Mechanism:With DAG, the network can be verified in parallel and no handing fees.

  • Encryption Algorithm:Can defend against large-scale quantum computer attacks.

Which kinds of the Identity recognition?

Personal data is less likely to be stolen through interactive verification of identity recognition. The following are the four types of identity that FBL refers to.

  1. Biological Characteristics:
    Here mainly refers to physiological features, including face, fingerprint, palm print, palm shape, iris, voiceprint, DNA, body type and so on.

  2. Legal Status:
    Refers to the identity documents approved and published by the country, including national identity documents such as national identity cards, passports, driver's licenses, health insurance cards, and residence permits.

  3. Community Identity:
    It also refers to the identity on the Internet, which is the social identity of Internet users to build communities and websites.

  4. Network User Behavior Preference:
    According to the usage of web users on the community and website.

Where is my data stored?

Through decentralized ledger Technology (DLT), personal data is stored on each node of the network, and each node has a complete book backup and can be independently updated. DLT records in blocks, each block contains a part of the data, and each block also remembers the id of the previous block data, and finally forms a chained data structure, called "block chain". The FBL saves data through the blockchain of the Tangle structure. When a node needs to obtain data, it will notify other nodes first. At this time, all nodes can use the consensus algorithm to determine who can verify the data, and each data will always verify the two unverified data. When the verification is completed, the verified data is written into the blockchain, and once the data is written into the blockchain, it can not be tampered with again.

Contact Information



Copyright © 2019, FBL