Every card has a fingerprint.

Now it hasdigital-card-twin

Ownership Records to Match

The first fingerprinting protocol that transforms paper’s molecular structure into inviolable proof of ownership anchored publicly.

Scroll

The problems we solve

Trust in the trading card market breaks at the same points repeatedly. We make those vulnerabilities visible, verifiable, and impossible to exploit.

Counterfeits hide behind slabs

A slab and label can be imitated — but the physical card inside has a fingerprint unique to that one card. Counterfeits have no match.

Card fingerprint + ownership record = instant authenticity check.

Ownership is unclear at sale time

Buyers have no way to verify who actually controls a card during a transaction. Sellers could be lying. Middlemen could be skimming.

One public record shows exactly who owns the card at every moment.

Stolen cards keep reselling

A reported stolen card can still circulate across fragmented channels. Markets have no shared warning system. Thieves profit.

Stolen cards show a public alert. Transfers are blocked. Resale incentive disappears.

Get started in 30 seconds

New to digital ownership certificates? Use these guided entries to verify a card, open your digital vault, or manage grading operations.

Verify a certificate

Enter a cert number to confirm authenticity and ownership from a single public page.

Start verification

Open my collection space

Access your digital cards, generate proof links, and report a stolen card in one place.

Open collection

Grading company tools

Submit certificates, track mint jobs, and check status from the operator console.

Open partner portal

STEP 01

GRADATION

Collector Sends Card

A collector ships their card to an authorized grading company for evaluation and certification.

STEP 02

GRADATION

Grading & Authentication

Experts validate authenticity, assess condition, and assign the official grade on the slab.

STEP 02+

PARTNER

Grading partners

Grading companies integrate with our platform to issue ownership records alongside physical slabs.

Join the partner program

STEP 03

DCT

Fingerprint Scan

Our system captures the card's physical fingerprint — the unique texture and print pattern of that specific card.

STEP 04

DCT

Ownership Record Built

Card data, condition notes, fingerprint details, and grade are combined into a secure, tamper-proof record.

STEP 05

DCT

Record Signed & Issued

The ownership record is cryptographically signed and published so it cannot be forged or secretly changed.

STEP 06

GRADATION

Card Returned to Collector

The slabbed card goes back to the collector. The ownership record is now live and publicly verifiable.

STEP 07

DCT

Anyone Can Verify

Buyers, sellers, and marketplaces instantly verify grade, current owner, theft status, and authenticity — no gating, completely transparent.

Seller to buyer, end-to-end.

Designed for external marketplaces (Vinted, eBay): payment happens on marketplace rails while title transfer is secured in DCT.

01

List

Seller posts the card with DCT proof and marketplace link. Adding the link is a publicly recorded action — the URL is stored in contract state, publicly visible.

Seller listing with DCT certificate

02

Lock

Seller locks the title for the buyer.

Seller transfer initialization

03

Ship

Card ships while the title stays reserved.

Buyer receives reserved title notification

04

Inspect

Buyer checks the card and confirms receipt.

Buyer visual inspection with master scan

05

Transfer

Ownership moves atomically to the buyer on-chain. The transfer is recorded and auditable, completely transparent.

Atomic ownership transfer completed

How stolen reporting works.

Owners can report a stolen card from the digital vault. This action is permanently recorded publicly — visible to anyone, forever.

01

Owner reports from the digital vault

One click from the digital vault marks the digital-card-twin as stolen. This transaction is anchored on-chain immediately: it is public, permanent, and cannot be silently reversed.

Owner collection card with reported stolen state

02

Public search shows warning

Anyone searching the certificate page instantly sees the reported stolen badge. The status is read publicly — no intermediary can suppress it.

Public certificate page showing reported stolen badge

Feature Deep-Scan

Beyond plastic: molecular DNA.

A certificate number can be copied. The molecular structure of matter cannot.

AI Fingerprinting

01/04

AI fingerprinting

Our technology does not read a label. It analyzes the card's physical biometrics.

  • Print rosettes: each press pass creates a one-of-one ink-point constellation.
  • Fibrous structure: cellulose arrangement at micron scale acts like a natural fingerprint.
  • Ink micro-relief: shape and density variations in ink-dot patterns verified by the engine.

Result: a 256-bit Integrity Hash is generated and anchored publicly. If the card is removed or substituted, DNA no longer matches and the Twin becomes invalid.

Comparison Evidence

FINGERPRINT_MATCHING
Standard slab scan

Slabs are vulnerable.

Microscopic x200 scan of fibers and rosettes

the card has a unique fingerprint.

API Trust Response

{
  "status": "Verified",
  "digital_card_twin_id": "BT-7729-X",
  "dna_match_confidence": "99.98%",
  "blockchain_anchor": "blockchain-mainnet",
  "integrity_check": "PASS",
  "anti_theft_status": "Secure"
}

Kill-Switch

02/04

Kill-Switch Protocol: make stolen cards unsellable.

A stolen card has no value when it can no longer be authenticated.

  • Instant reporting from your digital vault: the STOLEN transaction is anchored on-chain in seconds and propagated in real time to partner explorers and marketplaces.
  • Ownership title freeze: the ownership transfer is locked by the system — no intermediary can override it.
  • Public auditability: the stolen status and all subsequent actions remain permanently visible and auditable.

Irreversible sentence: a graded card without a clean digital-card-twin can lose up to 90% of market value.

Comparison Evidence

PROTOCOL_LOCK
Application proof surface

Kill-Switch Protocol

STATUS: STOLEN / BLACKLISTED. The protocol removes the thief's economic incentive.

Certified Ownership

03/04

Marketplace + Atomic Title Settlement

The marketplace handles payment and shipping. DCT secures ownership transfer with transaction lock, buyer-confirmed release, and dispute-aware safeguards.

  • Buyer forgets to confirm: time-lock auto-transfer after 10 days if no dispute is opened.
  • Seller unresponsive: buyer can submit delivery proof + received-card photo; transfer can be force-completed after 48h review.
  • Buyer reports mismatch: transfer is frozen in dispute escrow until evidence resolution.

Result: ownership either settles atomically or remains safely escrowed while dispute evidence is processed.

Comparison Evidence

ATOMIC_TRANSFER
Application proof surface

Safety Nets for Edge Cases

Time-lock fallback, evidence-based arbitration, and dispute freeze protect both seller and buyer without breaking chain-of-title integrity.

Trust DCT not Humans

04/04

Trust, but Verify. Instantly.

Generate a dynamic QR from your vault. When scanned, the protocol performs a real-time handshake with blockchain to confirm the seller controls the digital title.

Comparison Evidence

REAL-TIME_VERIFICATION
Application proof surface

Instant Public Verification

The check surface validates ownership live and returns a tamper-proof trust signal in seconds.

FAQ for first-time users

Short answers for collectors new to digital ownership certificates.

Do I need to understand blockchain to use this app?

No. You can search a certificate number and read a simple authenticity and ownership result without creating any account.

What is the collection space?

It is your personal area to manage your digital-card-twin certificates, generate proof links, and report stolen cards.

How do I verify a card before buying?

Use the verification form with the certification number. You get card details, owner signal, and anti-theft status on one page.

Why is blockchain used here?

It creates an immutable record that no one can secretly change. Everyone sees the same ownership history.

Product Roadmap

From protocol to industry standard.

Our path to eliminating fraud in the TCG grading market.

CompleteNow

Protocol core is live in the codebase

  • ERC-721 registry, oracle adapter, and grading company registry
  • Public certificate, share, and check flows in the demo app
  • Vault flow with ownership views and stolen reporting
  • Integration and infrastructure docs already in the repo
Thinking PeriodPilot

Partner thinking period and open co-design

  • Dedicated sessions for partners to answer, think, and brainstorm with us
  • Roadmap priorities refined with partner feedback and edge cases
  • Shared problem framing before production commitments
  • Decisions logged with clear follow-up actions and owners
In ProgressBuild

Partner operations are being hardened

  • Lab partner console with gated access and submission flow
  • Webhooks, batch-submit, and job tracking endpoints
  • Transparent user actions in Vault: report stolen, set marketplace link, initialize lock, confirm receipt, and open dispute
  • All these user actions are blockchain-recorded, publicly auditable, and run through the secure gasless flow in the demo
  • PAF-assisted submit and verify flows wired in the demo
  • Operational rollout still depends on environment and partner setup
UpcomingNext

Integration breadth and production hardening

  • Multi-grader operational wiring for partner onboarding at scale
  • Broader SDK, indexer, and partner integration surface
  • Hardening of operator tooling and deployment paths
  • Cleaner source-of-truth alignment between product docs and UI
PlannedLater

Lifecycle and protocol expansion

  • Support for grade.updated and grade.voided lifecycle actions
  • Complete KMS transaction-signing path in the oracle
  • Governance, cross-chain, and larger ecosystem rollout
  • No volume or partnership milestone should move here without proof
Business Contact

Contact the team

Questions about integrations, certificate issuance, or commercial deployment? Reach out directly.

Grading companiesMarketplacesStrategic partners

We reply to grading companies, partners, and collectors evaluating the protocol for production use.

Emailengineering@digital-card-twin.com

Typical topics

API and issuance integration
Pilot launch planning
Operational and compliance questions
Write to us