India's largest platform and marketplace for GCC & AI leaders and professionals

Sign in

India's largest platform and marketplace for GCC & AI leaders and professionals

3AI Digital Library

Property Registration in Karnataka to use Blockchain Technology

3AI January 6, 2021

Property registration in Karnataka is all set to become more secure and hassle-free, with the state government developing a system based on blockchain technology for online property documentation.

The new system, developed in collaboration with IIT-Kanpur, promises an immutable electronic storage of property data through blockchain. In other words, data once stored cannot be changed, eliminating risks of impersonation and unauthorised tweaking of records.
According to Additional Chief Secretary (e-governance) Rajeev Chawla, the new system was approved by the revenue department and would be ready for a pilot in four months. “Unless authorised, no official will be able to tamper with the data,” he said.
Each property holder will be given a property card akin to an ATM card, which can be accessed through a PIN.

The property transaction details can be accessed only with the authentication of the user’s digital key or PIN number.
“The content in the blockchain will be locked through this card. The card acts like a locker. Unless the card-based consent is provided, nobody will be able to modify the data,” an expert associated with the project further explained.

From a user’s point of view, this system protects property data besides removing the hassle of storing hard copies of documents. A user will be able to swipe the card at citizen service centres such as Bangalore One and download or print the same.

The new system is expected to strengthen the revenue department’s existing Kaveri portal.

“The identification of a property database in a sub registrar’s office will become easy. Right now, Kaveri depends on human discretion for verification of identity and ownership. A sub-registrar’s office will authenticate all this. The new technology will reduce human discretion as the cards will prove your identity and authentication,” the expert added.

It may be recalled that last year, data pertaining to about 300 properties in the Kaveri portal was allegedly compromised. An internal audit report of the Department of Stamps and Registration suspected that officials with technical expertise had misused the portal.

 

Picture from freepik.com

    3AI Trending Articles

  • P&L Forecasting Enabled by Analytics

    Author: Rajagopal Rangarajan, Senior Manager – Analytics, AB InBev Accurate P&L forecasts help companies build a good financial plan for the year. It enables the financial planning team in allocating resources more meaningfully across the company. For large and highly leveraged companies like AB-InBev with annual Revenues more than $50 Bn and with a debt […]

  • The Best Practices for IoT Analytics

    In most ways, Internet of Things analytics is like any other analytics. However, the need to distribute some IoT analytics to edge sites, and to use some technologies not commonly employed elsewhere, requires business intelligence and analytics leaders to adopt new best practices and software. There are certain prominent challenges that Analytics Vendors are facing […]

  • View: The way countries handle Foreign Policy will change due to Digital Transformation

    The way countries handle foreign policy will change irreversibly in the future due to digital transformation. . There is hardly any aspect of life that hasn’t been affected by the Covid-19 pandemic. New technologies, inventions and well-organised tools are being developed every day. Digital transformation has occurred all around us. It impacted every business, reducing […]

  • Using AI to Outwit Malicious AI

    Robust Intelligence is among a crop of companies that offer to protect clients from efforts at deception. IN SEPTEMBER 2019, the National Institute of Standards and Technology issued its first-ever warning for an attack on a commercial artificial intelligence algorithm. Security researchers had devised a way to attack a Proofpoint product that uses machine learning to identify spam emails. The system produced email headers […]