| ← Back to Main Documentation | Core Systems Index |
Plings Identifier System Overview
This document provides a comprehensive overview of the Plings identifier system, explaining the design decisions, use cases, and real-world applications. For technical implementation details, see plings_identifier.md.
Table of Contents
- Why Plings Identifiers?
- Physical Identifier Types
- Design Decisions Explained
- Use Cases by Actor
- Real-World Scenarios
- Implementation Strategy
Why Plings Identifiers?
The Problem
In today’s world, physical objects lack a universal identification system that:
- Works offline without internet connectivity
- Prevents counterfeiting through cryptographic verification
- Scales from personal items to mass manufacturing
- Provides ownership proof and object history
- Enables lost & found functionality globally
The Solution
Plings identifiers solve these problems through:
- Direct Object Commerce: Objects can receive payments and transfer ownership instantly
- Cryptographic Security: Every identifier is mathematically verifiable
- Hierarchical Organization: From manufacturers to individual items
- Offline Verification: No internet required to verify authenticity
- Universal Compatibility: Works with QR codes, NFC tags, and future technologies
- Minimal Data Storage: Only identifiers that use Plings services are stored in the database
Revolutionary Breakthrough: Objects That Sell Themselves
The Plings Innovation: Transform every physical object into an autonomous commerce endpoint
Traditional Shopping:
Find Product → Go to Checkout → Wait in Line → Pay Cashier → Get Receipt
Plings Shopping:
Scan Object → Pay Object → Own Object (instant blockchain ownership)
This fundamental shift from passive identification (GS1/barcodes) to active commerce (Plings) eliminates:
- Checkout counters and POS systems
- Payment terminals and card readers
- Cashiers and checkout staff
- Waiting lines and transaction delays
- Paper receipts and manual processes
Core Architecture Principle: Minimal Data Storage
The Revolutionary Approach
Traditional Systems: Every product identifier must be registered in a central database before use
- Coca-Cola would need to store 2 billion identifiers per day in databases
- Massive storage costs and infrastructure requirements
- Real-time connectivity required during manufacturing
- Database becomes a single point of failure
Plings System: Identifiers are cryptographically generated without database storage
- Coca-Cola generates 2 billion identifiers per day without storing them
- Only identifiers that actually get scanned and use Plings services enter the database
- 99.9% of manufactured identifiers exist only on physical products
- Database contains only meaningful interactions, not bulk manufacturing data
Data Storage Strategy
What Gets Stored ✅
Database Entry Created When:
- Consumer scans can and claims ownership
- Object gets reported lost/stolen
- Manufacturer registers for warranty service
- Retailer integrates for inventory management
- Supply chain partner tracks shipment
What Doesn’t Get Stored ❌
No Database Entry For:
- Manufacturing production runs
- Cans sitting on store shelves unscanned
- Products in warehouses awaiting distribution
- Bulk production batches
- Identifiers never used for any Plings service
Real-World Impact: Coca-Cola Example
Manufacturing Scale: 2 billion cans per day globally
- Generated Identifiers: 2,000,000,000 per day
- Database Entries: ~200,000 per day (0.01% that get scanned)
- Storage Reduction: 99.99% less data storage required
Cost Implications:
- Traditional system: Store 730 billion records per year
- Plings system: Store ~73 million records per year (only active usage)
- 10,000x reduction in database storage requirements
Cryptographic Generation Process
Manufacturing Line Process:
1. Production line generates cryptographic identifier
2. QR code printed on can with identifier
3. Can leaves factory - NO DATABASE ENTRY CREATED
4. Can sits on shelf - NO DATABASE INTERACTION
5. Consumer scans can - DATABASE ENTRY CREATED (first interaction)
6. Consumer claims ownership - FULL OBJECT RECORD CREATED
Business Benefits
For Manufacturers
- No Database Dependency: Generate identifiers without internet connectivity
- Minimal Infrastructure: No need for massive production databases
- Cost Efficiency: Pay only for identifiers that provide actual value
- Scalability: System handles any production volume without database bottlenecks
For Plings Platform
- Sustainable Growth: Database grows with actual usage, not production volume
- Performance: Only meaningful data stored and queried
- Cost Control: Storage and processing costs scale with value, not volume
- Focus on Value: Resources dedicated to user interactions, not bulk storage
For Consumers
- Privacy: Only scanned items tracked, not entire production runs
- Performance: Fast queries on relevant data only
- Selective Participation: Choose which objects to bring into the system
System Scale: How Many Objects Can Plings Identify?
Simple Answer: More Objects Than Exist on Earth
The Numbers:
- 2.1 billion manufacturers maximum (2,147,483,647)
- Unlimited categories per level
- Unlimited product classes per manufacturer
- Unlimited batches per product class
- 4.3 billion instances per batch
Real-World Scale Examples
Global Manufacturing Reality:
Coca-Cola: 2 billion servings per day
→ Plings capacity: 4.3 billion cans per batch per plant
→ Result: Single batch number lasts 6+ years at maximum production
Apple: ~250 million iPhones per year
→ Plings capacity: 4.3 billion phones per model per batch
→ Result: Single batch lasts 17,000+ years at current volume
Amazon: 5 billion packages per year
→ Plings capacity: 4.3 billion packages per category per batch
→ Result: Virtually unlimited even at massive scale
Conservative Calculation:
Realistic Scenario:
- 1000 major manufacturers globally
- 1000 product categories each
- 1000 product classes each
- 1000 batches per class
- 1000 items per batch
Total Capacity: 1000^5 = 1,000,000,000,000,000 objects
Result: 1 quadrillion unique objects identifiable
Why This Matters:
- No Artificial Limits: Only constrained by BIP32 mathematics, not arbitrary business rules
- Future-Proof: System scales beyond any conceivable manufacturing needs
- Per-Level Scale: Each path component can handle billions of variations
- Nested Multiplication: Total capacity is multiplicative across all levels
Technical Foundation: BIP32 HD Wallet Limits
The scale comes from the BIP32 Hierarchical Deterministic wallet specification:
| Component | Technical Limit | Practical Meaning |
|---|---|---|
| Manufacturers | 2.1 billion | Every company on Earth + 1000x growth |
| Categories | Unlimited per level | Unlimited product hierarchy depth |
| Product Classes | Unlimited | Every possible SKU variation |
| Batches | Unlimited | Production runs for millennia |
| Instances | 4.3 billion per batch | Massive batch sizes supported |
Bottom Line: Plings can identify more objects than will ever be manufactured in human history.
Core Value Proposition
Manufacturing Independence:
- Coca-Cola can generate 100 identifiers per second on production lines without internet
- No database connectivity required during manufacturing
- Cryptographic uniqueness guaranteed without central coordination
- Production continues during network outages - no single point of failure
Operational Resilience:
- True manufacturing independence from external systems
- Global production without infrastructure dependencies
- Offline generation enables production in remote facilities
- Zero downtime from database or network issues
Competitive Advantage
Plings vs Traditional Systems: | Aspect | Traditional ID Systems | Plings System | |——–|———————-|—————| | Database Dependency | Every ID must be pre-registered | Generate without database | | Storage Requirements | All manufactured products | Only used identifiers | | Manufacturing Setup | Real-time database connectivity | Independent generation | | Cost Structure | Pay for all production | Pay for actual usage | | Scalability | Database bottlenecks at scale | Unlimited cryptographic generation | | Network Outages | Production stops | Production continues | | Remote Facilities | Requires infrastructure | Works anywhere | | Batch Generation | Sequential database requests | Parallel cryptographic generation |
Design Decisions Explained
1. Why HD Wallet Infrastructure Instead of PKI?
The Question: Why use Hierarchical Deterministic (HD) wallet infrastructure instead of traditional Public Key Infrastructure (PKI)?
The Critical Answer: HD wallets enable direct financial transactions to objects - the most revolutionary capability of Plings.
The Financial Transaction Breakthrough
Traditional PKI Systems: Objects can only be identified and verified HD Wallet Systems: Objects become autonomous economic endpoints that can:
- Receive payments directly via Solana blockchain addresses
- Transfer ownership instantly through NFT smart contracts
- Execute financial transactions without traditional payment infrastructure
- Participate in DeFi as first-class blockchain citizens
How HD Paths Become Solana Addresses
HD Path: "2.G.2.2.2.9j" (Rolex Submariner instance)
Class Pointer: "3K7mX9abDcE" (8-byte/64-bit cryptographic identifier)
HD Derivation: m/44'/501'/1/15/1/1/1/158 (Solana standard)
Result: Ed25519 keypair → Direct Solana address
Capability: Object can receive payments, transfer ownership, execute contracts
Every instanceKey is a native Solana address that enables:
- Vending machines without payment terminals (scan object → pay object)
- Luxury goods with instant authenticity + purchase (scan Rolex → buy Rolex)
- Service marketplaces (scan bike → rent/repair/insure directly)
- Autonomous object commerce (objects sell themselves)
Program Derived Addresses (PDAs) - Security Solution
Problem: If manufacturers control private keys, they could steal payments Solution: Payments go to PDAs controlled by Plings smart contracts
// Payment goes to PDA (secure), not raw HD address (manufacturer controlled)
let payment_address = Pubkey::find_program_address(&[
b"object_payment",
"2.G.2.2.2.9j".as_bytes(), // HD path as seed
"3K7mX9abDcE".as_bytes(), // Class pointer as seed
solana_address.as_bytes() // Instance address as seed
], &plings_program_id);
Why This Changes Everything
Infrastructure Elimination: No POS systems, card readers, or cashiers needed
Universal Compatibility: Works with any Solana wallet globally
Instant Transactions: 400ms payment speed with $0.00025 fees
Global Scale: Same system for $1 candy bars and $50M corporate jets
This is why Plings could replace Visa/Mastercard entirely - every physical object becomes a point-of-sale terminal.
Verification Trust Model: Who Can Verify What
Critical Understanding: Hardened Keys Require Private Access
The Fundamental Security Question: Who can cryptographically verify that an object instance is genuinely from a specific manufacturer?
The Answer: Only Plings or the manufacturer itself - external clients cannot independently verify authenticity.
Why External Clients Cannot Verify Independently
All HD derivation levels are hardened (' suffix):
m/44'/501'/1'/3'/1255'/2'/5847'/90000'
└────────────────────────────────────┘
ALL HARDENED - requires private keys
Hardened Derivation Requirement: To derive child keys from any hardened path, you need the private key at that level. External clients don’t have:
- Plings master private key
- Manufacturer private keys
- Plant private keys
- Batch private keys
Verification Authority Hierarchy
Only Two Parties Can Cryptographically Verify:
- Plings (Master Authority):
- Has the master key at
m/44'/501'/1' - Can derive and verify everything in the ecosystem
- Provides verification-as-a-service to external clients
- Has the master key at
- Manufacturer (Brand Authority):
- Has their manufacturer-level private key (e.g., Coca-Cola has
m/44'/501'/1'/3') - Can verify their own products only
- May provide brand-specific verification APIs
- Has their manufacturer-level private key (e.g., Coca-Cola has
External Clients CANNOT Verify:
- No access to private keys needed for hardened derivation
- Must rely on attestation from authorized verifiers
- Cannot independently confirm manufacturer authenticity
- Trust Plings and/or manufacturers as verification authorities
How Client Verification Actually Works
What clients do in practice:
// Client verification flow - relies on trusted authorities
async function verifyManufacturer(path, instanceKey) {
// Option 1: Ask Plings to verify (most common)
const plingsVerification = await fetch('/api/plings/verify', {
method: 'POST',
body: JSON.stringify({ path, instanceKey })
});
// Option 2: Ask manufacturer directly (if they provide API)
const cocaColaVerification = await fetch('https://api.coca-cola.com/verify', {
method: 'POST',
body: JSON.stringify({ path, instanceKey })
});
// Client CANNOT verify the full cryptographic chain independently
return plingsVerification.json();
}
Real-World Example: Coca-Cola Can Authentication
Scenario: Consumer wants to verify a Coca-Cola can is authentic
Path: 2.3j.4.5Q.3L8z (Coca-Cola → Atlanta → Batch 5847 → Can 90000)
Class Pointer: 2rt5KqL9mXw (8-byte/64-bit cryptographic identifier)
Client Process:
- Parse Path: Extracts manufacturer ID
3→ “Coca-Cola” - Verify Class Pointer Cryptographically: Can independently verify
2rt5KqL9mXwusing Coca-Cola’s public key - Extract Path-to-Pointer: Uses
2.3j.4.5Q(everything before batch.instance) - Generate Expected Pointer: SHA256(coca_cola_pubkey + “:” + “2.3j.4.5Q”)[:8] → base58 encode
- Compare Pointers: Expected vs provided
2rt5KqL9mXw→ ✅ MATCH = Authentic class - Optional Full Verification: For complete HD chain, query Plings API if needed
- Result: “✅ Cryptographically verified Coca-Cola product, class authenticated offline”
Dual-Layer Authentication: Class Pointer + HD Verification
Layer 1: Class Pointer Authentication (Offline)
- Product Class Verification: Cryptographically prove manufacturer authorized this product class
- Zero Dependencies: Works without internet using only manufacturer public keys
- POS System Friendly: Instant verification at point of sale
- Anti-Counterfeiting: Impossible to forge without manufacturer’s private key
Layer 2: Full HD Chain Verification (API-Based)
- Instance Authenticity: Verify specific item derivation using complete HD path
- Plings Authority: Master key access enables full cryptographic validation
- Complete Assurance: Both class and instance verified end-to-end
- Business Integration: Detailed audit trails and verification services
Why Both Layers Matter:
- Offline Capability: Class pointer enables instant anti-counterfeiting checks
- Complete Verification: HD chain provides full instance-level authenticity
- Flexible Implementation: Apps can choose verification depth based on use case
- Network Resilience: Core verification works even when APIs are unavailable
Enhanced Trust Network Architecture
Plings (Master Authority)
├── Verifies: Complete HD chains + class pointers
├── Authority: Master key access + manufacturer public keys
├── Services: Full verification API + public key distribution
└── Trust: Ecosystem coordinator + crypto verification
Manufacturers (Brand Authorities)
├── Verifies: Own products via class pointer + optional HD chains
├── Authority: Ed25519 keypairs for class pointer generation
├── Services: Class pointer generation + optional verification APIs
└── Trust: Brand authenticity + cryptographic proof
External Clients (Enhanced Capabilities)
├── Verifies: Class pointers independently (offline)
├── Authority: Manufacturer public keys (distributed)
├── Services: Offline anti-counterfeiting + verification consumers
└── Trust: Cryptographic math + Plings/manufacturers for HD chains
POS Systems (New Capability)
├── Verifies: Class pointers for instant product authentication
├── Authority: Pre-loaded manufacturer public keys
├── Services: Offline pricing + fraud detection
└── Trust: Mathematical proof + cached verification results
Implementation Implications
For App Developers:
- Class Pointer Verification: Implement offline verification using manufacturer public keys
- Fallback Strategy: Use Plings API for complete HD chain verification when needed
- Performance Optimization: Cache manufacturer public keys and verification results
- Offline Capability: Design UX to work with class pointer verification when APIs unavailable
- Verification Levels: Offer users choice between fast offline vs complete online verification
For Manufacturers:
- Key Management: Securely generate and store Ed25519 keypairs for class pointer creation
- Public Key Distribution: Coordinate with Plings for public key distribution to POS systems
- Class Pointer Strategy: Design path structures that create meaningful class pointers
- Optional APIs: Decide whether to provide own verification APIs beyond class pointers
- Migration Planning: Transition from legacy dash-marker system to class pointer architecture
For POS System Operators:
- Public Key Updates: Regularly sync manufacturer public keys from Plings network
- Offline Verification: Implement class pointer verification for instant anti-counterfeiting
- Product Pricing: Link class pointers to internal SKU/pricing systems
- Fraud Detection: Flag products with invalid class pointers for manual review
- Fallback Procedures: Handle unknown class pointers gracefully with API lookup
For End Users:
- Verification Indicators: Look for “cryptographically verified” vs “API verified” badges
- Offline Confidence: Understand that class pointer verification works without internet
- Verification Depth: Know the difference between class authentication vs full instance verification
- Trust Signals: Learn to recognize legitimate verification vs fake claims
Frequently Asked Questions
Q: Can I verify products without internet access? A: Yes! Class pointer verification works completely offline using manufacturer public keys. You can cryptographically verify that a manufacturer authorized a specific product class without any network connection.
Q: What’s the difference between class pointer and full HD verification? A: Class pointer verification proves the product class is authentic (e.g., “genuine IKEA BILLY bookcase”). Full HD verification additionally proves the specific instance derivation chain. Most use cases only need class verification.
Q: What if Plings is down? A: Class pointer verification continues working offline. Manufacturers may also provide backup verification APIs. Basic product information can be extracted from paths even without verification.
Q: How do I know the verification is trustworthy? A: Class pointer verification uses mathematical proof (SHA-256 + Ed25519), so you can verify the cryptography yourself. Full HD verification relies on Plings and manufacturers staking their reputation on accuracy.
Q: Could this be fully decentralized? A: Class pointers ARE decentralized - anyone can verify them with public keys. Full HD verification requires private keys that manufacturers must control to prevent unauthorized product creation. This hybrid approach balances decentralization with manufacturer control.
Q: Do I need to trust Plings for basic verification? A: No! Class pointer verification requires only manufacturer public keys and cryptographic math - no trust in Plings required. You only need to trust Plings for advanced features like complete HD chain verification.
Physical Identifier Types
Plings identifiers can be embedded in various physical mediums, each optimized for specific use cases, environments, and requirements. The choice of identifier type depends on factors such as object size, durability needs, scanning convenience, and cost constraints.
QR Codes - Primary Implementation
Overview: QR codes are the primary identifier type for Plings due to their universal smartphone compatibility and optimal data density for URL storage.
Technical Specifications
Data Capacity: Up to 4,296 alphanumeric characters
Plings URL Size: ~65 characters (optimal for small QR codes)
Minimum QR Size: 21x21 modules (smallest QR code)
Error Correction: Level L (7% recovery) to Level H (30% recovery)
Print Resolution: 300 DPI minimum for reliable scanning
Size Optimization Strategy
Critical Requirement: QR codes must be as small as possible while maintaining scannability
URL Optimization Examples:
Original: https://plings.io/scan?identifier=<64-char-key>&path=2.2.2.2.2
Optimized: https://s.plings.io?t=q&p=2.2.2.2&cp=4K7mX9abDcE&i=<solana_address>
Note: New format includes cryptographic class pointer verification (+11 chars) but gains offline authentication
QR Impact: Allows smaller module size and better error correction
Object Size Guidelines
| Object Size | QR Dimensions | Module Size | Use Case Examples | |————-|—————|————-|——————-| | Large (>30cm) | 25mm x 25mm | 1.0mm | Appliances, furniture, vehicles | | Medium (10-30cm) | 15mm x 15mm | 0.6mm | Electronics, tools, books | | Small (3-10cm) | 10mm x 10mm | 0.4mm | Jewelry, watches, medications | | Tiny (<3cm) | 8mm x 8mm | 0.3mm | Components, tags, labels |
Durability Considerations
Indoor Use: Standard paper/vinyl stickers
Outdoor Use: UV-resistant materials, laminated protection
Industrial: Laser etching, anodized aluminum, ceramic printing
Extreme: Chemical-resistant, temperature-resistant materials
NFC Tags - Enhanced Proximity Detection
Overview: Near Field Communication (NFC) tags provide convenient tap-to-scan functionality and can store additional data beyond the Plings URL.
Technical Specifications
Frequency: 13.56 MHz (High Frequency)
Communication Range: 1-4cm (intentionally short for security)
Data Capacity: 96 bytes (NTAG213) to 924 bytes (NTAG216)
Standards: ISO 14443 Type A, NFC Data Exchange Format (NDEF)
Power: Passive (no battery required)
Lifespan: 10,000+ read/write cycles, 10+ years data retention
NFC Advantages Over QR Codes
| Feature | NFC | QR Code | |———|—–|———| | Convenience | Tap to scan | Camera alignment required | | Speed | Instant read | 1-2 second scan time | | Privacy | Close proximity required | Visible from distance | | Additional Data | Store 900+ bytes locally | URL only | | Durability | Hidden inside objects | Surface-visible | | Cost | $0.10-0.50 per tag | $0.01-0.05 per sticker |
Implementation Examples
Embedded NFC Use Cases:
- Jewelry: Inside watch case, ring band, pendant
- Electronics: Under battery cover, inside device housing
- Appliances: Behind removable panels, inside control units
- Vehicles: Dashboard compartments, glove boxes
- Clothing: Sewn into garment tags, button replacements
NFC Data Structure
{
"primary_url": "https://s.plings.io?t=n&p=2.2.2.2.2&cp=4K7mX9abDcE&i=<solana_address>",
"offline_data": {
"manufacturer": "IKEA",
"model": "LACK Table",
"batch": "1.158",
"verification_hash": "sha256_hash"
},
"backup_urls": [
"https://backup1.plings.io/scan/...",
"https://backup2.plings.io/scan/..."
]
}
RFID Tags - Long-Range and Inventory Management
Overview: Radio Frequency Identification (RFID) tags enable longer-range scanning and bulk inventory management capabilities.
Frequency Bands and Applications
| Band | Frequency | Range | Applications | |——|———–|——-|————–| | LF | 125-134 KHz | 10-30cm | Animal tracking, access control | | HF | 13.56 MHz | 30cm-1m | Payment cards, library books | | UHF | 860-960 MHz | 1-10m | Retail inventory, supply chain |
Technical Specifications by Type
Passive UHF RFID (Most Common for Plings):
Frequency: 902-928 MHz (US), 865-868 MHz (EU)
Read Range: 1-10 meters depending on antenna and power
Data Capacity: 96-512 bits (typically 96-bit EPC)
Power: Harvested from reader radio waves
Cost: $0.05-0.20 per tag in volume
Lifespan: 20+ years in normal conditions
RFID Integration Strategy
RFID in Plings System:
- EPC Code: Contains compressed Plings path
- User Memory: Stores full URL and verification data
- TID: Unique tag identifier for anti-cloning
- Reserved: Access passwords and kill passwords
Example EPC Structure:
96-bit EPC = 8-bit header + 28-bit company + 24-bit item + 36-bit serial
Maps to: Manufacturer.Category.Class.Batch.Instance
Advantages for Specific Use Cases
Bulk Inventory Scanning:
- Read 100+ tags simultaneously
- No line-of-sight required
- Works through packaging materials
- Automated conveyor belt sorting
Asset Tracking:
- Long-range location updates
- Automated check-in/check-out
- Real-time position monitoring
- Integration with existing RFID infrastructure
Shortcodes - Human-Readable Backup
Overview: 4-character alphanumeric codes provide manual entry option when scanning technologies fail or are unavailable.
Format Specification
Character Set: Base58 (A-Z, a-z, 1-9, excluding easily confused: 0, O, I, l)
Total Characters: 58 (26 uppercase + 26 lowercase + 6 numbers)
Code Length: 4 characters
Total Combinations: 58^4 = 11,316,496 unique codes
Source: First 4 characters of Base58-encoded Solana address
Mixed Case: Provides superior visual pattern recognition for humans
Generation Algorithm
def generate_shortcode(instance_key: str) -> str:
"""
Generate 4-character shortcode from Solana address (instance key)
Benefits:
- Direct relationship to full identifier
- Optimal collision resistance (58^4 = 11.3M combinations)
- Mixed case enhances visual pattern recognition
- Simple O(1) extraction, no complex hashing
- Inherits cryptographic randomness from HD wallet derivation
"""
# Extract first 4 characters from Base58-encoded Solana address
# Mixed case provides visual variety for faster human recognition
return instance_key[:4]
Human Readability Advantages
Why Mixed Case is Superior for Visual Recognition:
- Pattern Recognition: Mixed case creates distinctive visual “shapes” that the human eye processes faster
3EWvvs3EWV- mixed case provides more visual variety- Similar to how we read words by overall shape, not individual letters
- Error Detection: Case variation provides additional verification cues
P4q2is visually distinct and easier to verify thanP4Q2- Transcription errors are more easily caught with mixed case
- Natural Reading: Aligns with normal text patterns humans are trained to recognize
- Eyes are optimized for mixed case from reading text
- Capital-only text requires more cognitive effort to process
Examples:
Base58 Mixed Case: 3EWv, 53Gn, 77pu, 6VBc, 9UMm
Base32 Uppercase: 3EWV, 53GN, 77PU, 6VBC, 9UMM
The mixed case versions are significantly easier to:
- Read aloud accurately
- Distinguish visually
- Remember temporarily
- Verify for correctness
Use Case Examples
Phone Support:
Customer: "I'm looking at my drill but can't scan the code"
Support: "Can you read me the 4-character code below the QR?"
Customer: "3EWv" (note the mixed case)
Support: "Found it - DEWALT 20V Drill, purchased March 2024"
Manual Entry Scenarios:
- Damaged QR codes or NFC tags
- Poor lighting conditions
- Camera/NFC not working on device
- Verbal communication over phone
- Text-based systems and databases
Multi-Identifier Strategies
Overview: High-value or security-critical objects can combine multiple identifier types for enhanced protection and redundancy.
Anti-Counterfeiting Approach
Luxury Watch Implementation:
Primary: Laser-etched micro-QR on case back
Secondary: NFC chip embedded in crown mechanism
Tertiary: RFID tag inside dial (hidden from casual view)
Backup: Shortcode engraved on movement
Verification: All identifiers must resolve to same object
Redundancy Benefits
| Scenario | Primary Fails | Secondary Active | Result | |———-|—————|——————|———| | QR Damaged | Laser etching worn | NFC still functional | Seamless authentication | | NFC Dead | Chip malfunction | QR code readable | Continued operation | | No Smartphone | Cannot scan QR/NFC | Manual shortcode entry | Human backup process | | Bulk Scanning | QR too slow | RFID batch read | Inventory efficiency |
Public vs Hidden Identifiers
Overview: Plings supports both publicly visible identifiers and hidden/protected identifiers for different security and access scenarios.
Public Identifiers
Characteristics:
- Visible on object surface
- Scannable by anyone
- Provide basic object information
- Enable lost & found functionality
- Support ownership claims
Use Cases:
- Consumer products
- Personal belongings
- Retail inventory
- Public art installations
Hidden Identifiers
Characteristics:
- Concealed inside objects
- Require disassembly or special tools to access
- Provide administrative functions
- Enable ownership transfer
- Support warranty claims
Implementation Examples:
- Under battery covers
- Inside protective cases
- Behind removable panels
- Embedded in object structure
- Special UV-visible inks
One-Time-Use (OTP) Identifiers
Security Model:
- Generate single-use authentication codes
- Expire after first scan or time limit
- Prevent replay attacks
- Enable secure ownership transfer
Applications:
- High-value asset transfers
- Warranty activation
- Administrative access
- Security-critical operations
Identifier Selection Matrix
Choose the optimal identifier type based on object characteristics and use requirements:
| Object Type | Primary | Secondary | Reason |
|---|---|---|---|
| Consumer Electronics | QR Code | NFC | Universal scanning + convenience |
| Jewelry/Watches | Micro-QR | NFC | Size constraints + premium feel |
| Industrial Equipment | QR Code | RFID | Durability + bulk inventory |
| Retail Inventory | QR Code | RFID | Cost efficiency + automation |
| Personal Items | QR Sticker | Shortcode | Simplicity + backup |
| High-Value Assets | Multiple | All types | Security + redundancy |
| Vehicles | QR Code | NFC + RFID | Multiple access points |
| Pharmaceuticals | Micro-QR | NFC | Regulation compliance + security |
Implementation Guidelines
Cost Optimization
Volume Pricing (per 10,000 units):
QR Stickers: $0.01-0.05 (vinyl/paper)
NFC Tags: $0.10-0.50 (depending on memory)
RFID Tags: $0.05-0.20 (passive UHF)
Shortcode: $0.00 (printed with existing labels)
ROI Calculation:
Higher-cost identifiers justified by:
- Convenience improvement
- Security requirements
- Operational efficiency gains
- Brand differentiation value
Environmental Considerations
Indoor Applications:
- Standard materials sufficient
- Focus on cost optimization
- Aesthetic integration important
Outdoor/Industrial:
- UV-resistant materials required
- Temperature cycling resistance
- Chemical/solvent resistance
- Impact and abrasion protection
Extreme Environments:
- Aerospace: Radiation resistance
- Marine: Salt water corrosion protection
- Automotive: Heat cycling, vibration
- Medical: Sterilization compatibility
For detailed technical implementation of each identifier type, see Plings Identifier Technical Specification.
2. Why Full Paths Are Essential
The Question: Why do we need paths like “1.2.1.2.1.3” instead of just a unique identifier?
The Answer: Full paths enable critical functionality:
Offline Manufacturer Verification
Path: 2.3.2.2.3
Class Pointer: 4K7mX9abDcE (8-byte/64-bit cryptographic identifier)
Breakdown:
- 3: IKEA (manufacturer, base58 encoded from 2)
- 2: Furniture division
- 2: LACK table model (class identifier)
- 2: Batch
- 3: Instance #3
Why it matters: Anyone can verify this is genuinely from IKEA without internet
Supply Chain Integrity
- Problem: Counterfeit products claiming to be from major brands
- Solution: Path + class pointer cryptographically proves manufacturer origin
- Example: A “2.3.x.x.x” path + class pointer can ONLY be generated by IKEA’s private key
Organizational Hierarchy
- Manufacturing: IKEA → Furniture → Tables → Model → Instance
- Retail: Store → Department → Shelf → Product
- Personal: Home → Room → Container → Item
Audit and Compliance
- Batch Tracking: Path “2.1.2.1000-2000” identifies production batch
- Recall Management: Quickly identify affected items by path prefix
- Quality Control: Track issues to specific production lines
2. When Are Class Keys Important?
Class Keys (AnchorKeys) are crucial in these scenarios:
High-Value Items
Scenario: Luxury watch authentication
- Class Key: Proves it's a genuine Rolex Submariner
- Path: Identifies specific production batch
- Instance Key: Unique to this exact watch
Result: Complete authentication chain
Safety-Critical Products
Scenario: Medical device verification
- Class Key: Confirms device model and specifications
- Path: Traces to certified manufacturing facility
- Instance Key: Links to specific device history
Result: Patient safety through verification
Warranty and Service
Scenario: Appliance warranty claim
- Class Key: Identifies product model and features
- Path: Confirms manufacturing date and location
- Instance Key: Links to purchase and service history
Result: Automated warranty validation
When Class Keys Are NOT Needed:
- Personal Items: Your labeled storage boxes
- Generic Tags: “Property of” stickers
- Temporary Labels: Event badges, parking permits
3. URL Format Rationale
Why URLs instead of just cryptographic strings?
Universal Accessibility
- Anyone can scan with any smartphone
- No app required for basic functionality
- Instant redirection to web interface
- Familiar user experience
Progressive Enhancement
- No App: Basic web page with object info
- With App: Full functionality and offline features
- Manufacturer App: Custom brand experience
Lost & Found Economics
- Problem: Billions in lost items annually
- Solution: Every scan can reconnect owner with item
- Incentive: Finder rewards, shipping integration
Use Cases by Actor
End Consumers
Personal Organization
Emma's Garage Organization:
- Scans generic Plings tag on storage box
- Associates with "Christmas Decorations"
- Sets location: "Garage, Left Wall, Top Shelf"
- Next year: Scan any decoration to find the box
Product Authentication
Online Marketplace Purchase:
- Buyer scans QR code on designer bag
- Plings verifies: Genuine Louis Vuitton
- Shows: Manufacturing date, retail history
- Confirms: Not reported stolen
- Result: Confident purchase
Lost & Found
Ski Resort Scenario:
- Child loses glove with Plings tag
- Finder scans QR code
- System notifies parent
- Arrange pickup at lost & found
- Optional: Finder reward
Retail Operations
Inventory Management
Store Opening Routine:
- Scan display items
- System shows: Current vs expected location
- Identifies: Misplaced items
- Suggests: Optimal arrangement
- Tracks: Shrinkage patterns
Customer Service
Product Information:
- Customer scans item
- Sees: Specifications, price, reviews
- Gets: Complementary products
- Checks: Stock in other sizes/colors
- Accesses: Assembly instructions
Loss Prevention
Security Integration:
- Exit scanners detect Plings tags
- Check: Purchase status
- Alert: Unpaid items
- Log: Movement patterns
- Identify: Theft hotspots
Manufacturers
Quality Control
IKEA Production Line:
Path: 1.2.1.2.1.1001-2000 (Batch 1001-2000)
- Each LACK table gets sequential identifier
- Quality issues traced to specific batch
- Recall notices target affected paths
- Warranty claims auto-validated
Brand Protection
Anti-Counterfeiting:
- Official products: Valid IKEA path (2.x.x.x)
- Counterfeits: Cannot generate valid path
- Customs: Scan to verify imports
- Consumers: Instant authentication
Supply Chain
Distribution Tracking:
- Factory: Creates items with paths
- Warehouse: Scans on receipt
- Transport: Updates location
- Store: Confirms delivery
- Customer: Registers purchase
Organizations
Asset Management
University Equipment:
- IT assigns Plings tags to laptops
- Path: 50.1.1.x (University.IT.Laptops)
- Tracks: Location, user, maintenance
- Automates: Annual inventory
- Manages: Depreciation
Access Control
Secure Facility:
- Employee badges with Plings NFC
- Path indicates: Department, clearance level
- Doors verify: Path cryptographically
- Log: All access attempts
- Work offline: During network outage
Real-World Scenarios
Scenario 1: Flea Market Find
Actor: Sarah, vintage collector Object: Old camera claiming to be Leica
Without Plings:
- Relies on seller’s word
- Risks buying counterfeit
- No proof of authenticity
- No history available
With Plings:
- Scans vintage Plings tag (added by previous owner)
- Sees: “Leica M3, manufactured 1962”
- Verifies: Cryptographic proof of Leica origin
- Reviews: Ownership history, service records
- Negotiates: Based on verified information
- Purchases: With confidence
Scenario 2: Apartment Move
Actor: Tom, moving to new city Challenge: Organizing and tracking boxes
Implementation:
- Packing: Applies generic Plings stickers to boxes
- Labeling: Scans each, assigns contents
- Loading: Movers scan, confirm pickup
- Transit: Track last-scanned location
- Delivery: Verify all boxes arrived
- Unpacking: Scan box, see contents list
- Storage: Update locations in new home
Benefits:
- Never lose a box
- Insurance claims backed by scan records
- Find specific items without opening boxes
- Share access with movers temporarily
Scenario 3: Tool Library
Actor: Community Makerspace Challenge: Tool lending and tracking
System Design:
Path Structure: 75.1.x.x
- 75: Makerspace Organization
- 1: Tool category
- x: Tool type (drill, saw, etc.)
- x: Individual tool
Features:
- Members scan to borrow
- Automatic due date reminders
- Usage statistics per tool
- Maintenance scheduling
- Loss prevention
User Flow:
- Member scans drill
- System shows: Available, last maintained
- Scan member card to check out
- Return reminder after 3 days
- Next member sees: In use by John until Friday
Scenario 4: Medicine Cabinet Safety
Actor: Family with children Concern: Medicine security and expiration
Setup:
- Parents tag all medicines
- Set “restricted” flag on prescriptions
- Add expiration dates
Daily Use:
- Child scans: “Access restricted - get parent”
- Parent scans: Shows dosage, warnings
- Monthly: Alert for expiring medicines
- Emergency: Paramedics scan for allergies
Scenario 5: Retail Innovation
Store: Sporting goods chain Innovation: Try-before-buy program
Implementation:
- Customer selects ski equipment
- Scans items to “check out” for weekend
- Items linked to customer account
- Return Monday or auto-purchase
- All tracked via Plings paths
Benefits:
- Reduced theft (items traceable)
- Increased sales (try before buy)
- Customer data (usage patterns)
- Inventory optimization
Scenario 6: Beverage Manufacturing at Scale
Actor: Coca-Cola Company Challenge: Global supply chain tracking and anti-counterfeiting at massive scale Production Reality: 1.8-2.2 billion servings per day globally
Path Structure: 3.2.1.2.x.x
Path: 1.3.2.1.2.5847.1
HD Derivation: m/44'/501'/1/3/2/1/2/5847/1
Breakdown:
- 3: Coca-Cola (manufacturer ID)
- 2: Producer delegation (hardened)
- 1: Atlanta bottling plant
- 2: Classic Coca-Cola product class
- 5847: Production batch (15-minute production run)
- 1: Individual can #1
Production Scale Realities:
- 360,000 cans per hour per production line (100 cans per second)
- Multiple lines per plant: 10+ production lines at major facilities
- Continuous flow manufacturing: Materials continuously in motion
- Daily identifier needs: Millions of unique paths per large facility
- Global coordination: 10,000+ Coca-Cola drinks consumed per second worldwide
Batch Strategy for Scale:
Time-Based Batching (15-minute runs):
1.3.2.1.2.5847.1-90000 → 15-min batch (90,000 cans)
1.3.2.1.2.5848.1-90000 → Next 15-min batch
1.3.2.1.2.5849.1-90000 → Next 15-min batch
Daily Production Example:
Plant produces 3.6M cans/day = 40 batches of 90,000 cans
Requires path allocation: 1.3.2.1.2.5847 through 1.3.2.1.2.5886
Implementation at Scale:
- High-Speed Production: QR codes printed inline at 100 cans/second
- Batch Management: 15-minute production runs for quality control
- Automatic Path Allocation: System pre-allocates daily batch ranges
- Quality Gates: Automated scanning at packaging checkpoints
- Distribution Tracking: Pallet-level scanning for logistics
Supply Chain Benefits:
- Precision Recall: “All cans from 1.3.2.1.2.5847.* (15-min window)”
- Quality Control: Immediate batch isolation for any detected issues
- Anti-Counterfeiting: Cryptographically impossible to forge paths
- Production Analytics: Real-time efficiency tracking per line
- Regulatory Compliance: Complete audit trail for food safety
Path Registry Implications:
- Massive Path Allocation: Single plant needs 14,600+ batch paths per year
- Real-time Registration: Batch paths allocated minutes before production
- Global Coordination: Prevent path conflicts across 200+ countries
- Performance Requirements: Path validation must complete in milliseconds
Product Variations at Scale:
Atlanta Plant (simultaneous production):
1.3.2.1.1.5847.x → Diet Coke line (50,000 cans/batch)
1.3.2.1.2.5847.x → Classic Coke line (90,000 cans/batch)
1.3.2.1.3.5847.x → Sprite line (70,000 cans/batch)
1.3.2.1.4.5847.x → Fanta line (40,000 cans/batch)
Mexico City Plant (same timeframe):
1.3.2.2.2.5847.x → Classic Coke (different facility)
Consumer Experience:
- Scan can → “Atlanta plant, Line 2, 2:15 PM batch, Can #45,832”
- Promotional campaigns targeting specific production timeframes
- Recycling rewards with production facility routing
- Instant authenticity verification against counterfeit products
⚠️ CRITICAL: Private Key Operations and Trust
When Private Keys Are Needed
While basic identifier verification and scanning work without private keys, certain advanced operations require cryptographic signatures:
✅ Safe Private Key Operations
- Payment Recovery: When Program Derived Address (PDA) fails, recover stuck funds
- Warranty Claims: Manufacturer signs warranty validations during warranty period
- Supply Chain Verification: Manufacturing proof, quality control (pre-sale only)
❌ Dangerous Private Key Operations
- Object Retirement: Marking objects as “destroyed” after sale
- Ownership Transfer: Using private keys to “transfer” ownership
- Unlimited IoT Autonomy: Permanent manufacturer control over user devices
The Trust Challenge
The Problem: HD wallet architecture allows multiple parties to derive private keys:
- Plings (master key holder)
- Manufacturer (via delegation)
- Plant/Facility (via manufacturer delegation)
Trust Issue: Even after ownership transfer, supply chain participants retain technical ability to perform cryptographic operations on behalf of objects.
Critical Principle: Key Access ≠ Ownership Rights
Example Trust Violation:
1. Consumer buys smartwatch from Chinese factory
2. 3 years later in Sweden, factory uses private key to mark watch as "retired"
3. Consumer's valuable watch now appears worthless in apps
4. Consumer has no recourse
Implementation Guidelines
For Current Development:
- Implement only safe operations with temporal and scope validation
- DO NOT implement owner-equivalent operations without owner consent
- Respect trust boundaries between supply chain authority and ownership rights
Required Reading:
- HD Wallet Trust Boundaries - Implementation guidelines and security boundaries
- Private Key Use Cases Analysis - Detailed risk assessment
Implementation Strategy
Phase 1: Foundation (Current)
- ✅ Basic identifier generation
- ✅ Path registry system
- ✅ Manufacturer architecture
- 🔄 Core use case implementation
Phase 2: Scale (Next)
- Production manufacturer integration
- Retail pilot programs
- Consumer mobile apps
- Lost & found network
Phase 3: Ecosystem (Future)
- API marketplace
- Third-party integrations
- Industry standards adoption
- Global verification network
Key Takeaways
For Developers
- Paths enable offline verification and hierarchy
- Class Keys prove product authenticity
- URLs ensure universal accessibility
- Cryptography prevents counterfeiting
For Business
- Brand Protection through uncounterfeitable identifiers
- Supply Chain visibility and traceability
- Customer Trust via transparent authentication
- New Services like automated warranties
For Consumers
- Instant Shopping without checkout lines or cashiers
- Authenticity verification for purchases
- Organization tools for personal items
- Lost & Found recovery system
- Service Access (rent, repair, insure) directly from objects
- Transparency in product history and ownership
This document explains WHY the Plings identifier system is designed as it is. For technical implementation details, see plings_identifier.md. For what happens when identifiers are scanned, see scan-event-system.md. For specific use cases, see /docs/use-cases/.
Last Updated: Sun 27 Jul 2025 08:40:00 CEST - CRITICAL: Added private key operations trust model and security considerations. Added implementation guidelines for safe vs. dangerous private key operations.