Technical applications of unique ids

The key principle behind our affordably priced unique identifiers lies in the modern approach we take to representing identifiers using bits inside a computer.
This groundbreaking technology has many applications, to wit:
Real-life identification & quantification properties
When you know how to count to 15 in binary, you will be identifying the bits inside our identifiers without so much as a second glance.
This property of bits being identifiable is precisely what enables them to be used in areas where identifiers are commonly used. This is also strongly related to bits being usable for quantification. Examples include: database identifiers, counter values, monetary values, percentages, and even second order expressions like kilometers per hour. The imperial system of units is
not officially supported, notwithstanding some existing novelty implementations.
Robust verification properties
You can verify that these are bits quite easily by taking note of the distribution of values in the symbol alphabet, which is (0,1) inclusive.
This is a good starting point for building a security proof as we can be sure that
there is no such thing as two.
Robust integrity checking properties
Bits are not only robust for verification but also robust for integrity checking.
We can ensure the integrity of bits by using other bits which we concatenate with the original bits, thus solving the problem once and for all.
Uniqueness properties
Unlike snowflakes, bits are not individual and unique. We have swapped a few zeroes around in this part of the text to allow you to verify this for yourself.
However, when we give out
a lot of bits, there is a good chance that verifying their combined uniqueness will be infeasible through the sheer complexity of checking everybody's bits against yours.
This perspective lets us build on the comforting intuition that there is only one needle in every haystack.
Bit-based extensible authentication
Publicly verifiable methods of authenticating actors place the burden of proof on their users to actually do that verification.
Through market analysis we have discovered that the authentication services which enterprises are actually interested in using relegate this responsibility entirely to the provider of said services.
We will therefore make use of extensible authentication schemes that allow our clients to be secure in the knowledge that things are authentic, because ultimately we say they are.
Return to homepage