Technology

Blockchain

We use blockchain to enable automation and efficiency while ensuring that your data is kept private between you and your counterparty.

Built as a democratic self-governed network between members across a decentralized set of ledgers independently owned by participants.

All data is owned and managed by you.

Peer-to-Peer Data Flow

Data and Documents are exchanged between Counterparties only. No other member, including Bunkerchain, have access to any data or documents if they are not part of the Trade.

Smart Contract Workflow Automation

Designed for the Bunkering Industry to automate workflow processes. Keep your current processes intact while streamlining workflow between your Trading Team and Operations.

Security and Encryption

End-to-end encryption of all user data generated by transactions.

Secure Digital Identities for Corporates and Vessels

Activate your Fleet and Clients’ Digital Identities and link them to the IMO Numbers.

Smart Contract Generated EBDN

Code generated eBDN after validation of MFM and geo-location data of supplying and receiving vessels.

BunkerConnect USB Drive: Critical Infrastructure Level Data Segregation

BunkerConnect USB Drive is designed with Critical Information Infrastructure designs in mind.

Separating your ship’s MFM Systems and source data from the internet shields it save from hacks, manipulation, and down time.

Regulatory Reporting Ready

Automate your regulatory reporting after every transaction using BunkerConnect Drive.

Select from Live Data or Post Transaction Data Export

Select between live data or instant post transaction data for your eBDN and Operations. Keep your clients updated instantly when a transaction ends.

Document Vault

Keep immutable records of of all your Transactions, Documents and Event Data Logs

ISO27001 Certified

Bunkerchain has achieved it ISO/IEC 27001:2013 certification in 2021. ISO/IEC 27001 is a security standard that outlines and provides the requirements for an information security management system (ISMS). It specifies a set of best practices and details a list of security controls concerning the management of information risks.