V-ID is a service that detects any unlawful manipulation of any digital file. In order to make files verifiable, they must be validated. V-ID’s validation process involves extracting the fingerprints of files and saving them in the blockchain. If a file is changed with just one byte, pixel, character or anything else, the fingerprint is changed and V-ID will detect it 100%.

It is crucial to have a secure validation method, because the key to confirm the authenticity of a file is to know the source.

V-ID offers 3 methods for validation:

Validation Service

V-ID staff members will do the actual validation for you on-site. If the client wishes, a V-ID-trained notary will be present as well to confirm ID’s and oversee the validation process.


This method allows an employee of the issuing organization to validate files at any time. First, an employee of the publishing organization is appointed to become a Validator. This person’s identity is established on site by a V-ID agent and V-ID-appointed notary. After V-ID has created the Validator’s profile on the platform, he or she is able to log in at a Validation Terminal. The Validation Terminal has a user friendly interface, where files that need to be validated can simply be submitted by dragging and dropping.

API Validation

This validation method is a server-to-server process. The V-ID API extracts the fingerprint of a file from the code that the company software uses to create that file. This means that, for example, in the case of a typical dynamically generated PDF file, the V-ID API does not need to handle the file itself to still be able to validate the file. This validation process is completely non-intrusive to the normal workflow at the company.

Blockchain technology

The contextual information of a file, like the publishing party and the file’s purpose, is always saved on the V-ID Platform. The digital fingerprint is saved on the blockchain. There are a couple of conditions that need to be met, for a blockchain to be useful for V-ID Validation, but this also depends on the use case and the clients’ protocols. We currently offer 4 blockchains to save the fingerprint to:

Ethereum, which has many nodes, about 100000, that ensure continuity and safety in numbers.

IBM’s Hyperledger: this blockchain is more closed, with less nodes, but more control over the network.

DigiByte: a very well known blockchain with great community support, a high node count and low transaction rates.

Bitcoin: the most well known blockchain, with estimates of over 200000 nodes around the world.

The V-ID Token (VIDT) is the key factor that makes validations possible. V-ID appoints a wallet to the issuing organization, containing a balance of V-ID tokens. Organisations buy monthly bundles of VIDT, of which the size depends on the expected monthly amount of validations. Each time a validation is done, a transaction with VIDT will occur, which records all necessary details to track back the filetype, validation location, timestamp and identity of the validator. The transaction of VIDT will be deducted from the VIDT bundle of the publishing organisation.

A validated file can be verified in 5 seconds


After a file is validated, one part of the V-ID security process is done. The other side of V-ID’s mission to secure our digital world, is Verification. This is where files can be checked for authenticity. You can read more about V-ID’s verification process on V-ID’s website, or verify a file directly at the Verification Terminal.

The VIDT Datalink Awareness Team is a group of enthusiasts that will help grow adoption of the VIDT Datalink tech: http://vidt-datalink.com