System Architecture

System Overview

The legal framework we use for tokenization.

The assets users can tokenize through our infrastructure.

The on-chain contract and tokens managing assets and the connected rights.

Dataflow Diagram

The diagram describes the process from initializing a tokenization request, chossing the verification entry point, verifying the information, setting up an appointment, and minting the tokens.

Tokenization Process

  1. Creating a digital identity: First, users need a passkey issued by Paddle Identity to match compliance and AML regulatory.

  2. Tokenization Request: Users initialize a tokenization request with their wallet, they input all necessary information and upload the wanted documents.

  3. Entrypoint Choosing: Based on the geolocation-proof provided by Paddle, the user can choose out of the nearest Entrypoints in his country to setup a tokenization contract.

  4. Information Verification: Either during the meeting through a physical approval (e.g. with Pokemon cards) or, (if a digital approval is possible) the provided information is verified before the meeting.

  5. Subsidiary Approval (If needed): In real estate, we need an actual approval of the asset value and condition, therefore, we have a structure of offical approval companies and subsidiaries that are capable of doing so.

  6. Appointment Setup: Once the data is approved, the user is able to choose a free date on the Entrypoints calender and an appointment on that day. The appointment is confirmend 8if needed) if a notary that is also connected to the calendar, confirmend the date. If no notary is needed, the appointment is immediatly confirmed.

  7. Appointment and Upload: During the appointments, the contract is explained, the user signes the contract (if needed with a notary stamp on it) and the entrypoint uploads it into our systems.

  8. Token Minting: After the tokenization contract is uploaded, and the Entrypoint provides his final off-chain signature, the data is automatically send to the right minting contract, which mints the tokens to his address.

Stability

Because we use the concept of a distributed entry and store the data, as well as the value on-chain, our users have no risk if a company, like us goes bankrupt. Because our legal framework ensures that our users can end the framework by theirselfes, the users can still operate if no single entrypoint would be left. And to ensure system entegrity, we have a large set of validators that backup our Entrypoints and guarantee 24/7 secured tolerance.

Last updated

Logo