Demo 100% browser: all calculations happen in your browser. No file, text or data is transmitted or saved. This simulation faithfully reproduces the behaviour of the real system.
From the DAPI certificate to publication in the EVIDE public registry. Click on each phase to learn more.
Try the simulation
Choose the evidence type, upload a file or enter text, and see the system in action. All in your browser.
1
Identity
2
Evidence
3
Intake
4
FEDIS
5
Quote
6
Issuance
7
Registry
Verified DAPI identity
In the real system, you log in with your 10-digit DAPI code. Your identity is verified by Informatica in Azienda before you receive the certificate.
In the real system this number is unique and certified.
Why is identity needed? The evidentiary value depends on the verified identity of the declarant. Without a certain identity, the hash is anonymous and difficult to defend in legal proceedings.
Evidence type
The system supports 4 types. Each uses a hashing method appropriate to the format.
The file stays in your browser - it is not uploaded.
Evidentiary intake generated
The system has calculated the digital fingerprint of your evidence. The evidentiary value exists from this moment.
EVIDENCE TYPE
SHA-256 HASH (RFC 3161 ready)
UTC TIMESTAMP
HASH TYPE / SCOPE
Already probative: even without requesting FEDIS, this record has evidentiary value. The hash proves that the content existed in this exact form at this timestamp.
FEDIS certification request
The client can request FEDIS at any time, even months after intake, provided they keep the original file.
No active FEDIS request - the intake is still registered and valid.
FEDIS adds:
Professional validation by the certifier
Documented chain of custody
Officially assigned CWC code
Publication in the EVIDE public registry
Quote received
The certifier has assessed the request and sent a quote with operational notes.
Quote sent by the certifier - awaiting your confirmation.
50,00 EUR
Note: includes full forensic verification and FEDIS deposit
FEDIS issued
The certifier has issued the FEDIS. You receive the CWC code by email. Uploaded files are deleted from the server.
FEDIS certification issued successfully.
CWC CODE
Always keep: the CWC code and the original file. The file has been removed from the server after issuance.
Published in the EVIDE public registry
The certification is now publicly visible. Anyone can independently verify the integrity of the evidence.
Published in the EVIDE public registry.
CWC Code
Status
CERTIFICATA
Hash SHA-256
Intake timestamp
Published on
Independent verification:
Compare the result with the hash registered above.