Accounting

Verification Technology - Hash Declaration
plus
Hashed Declarations
Hashed declarations are privacy-preserving declarations and equivalent to tagging schemes using unique identifiers; they enable an inspecting party to confirm upper limits on treaty-accountable items. More »
Verification Technology - Buddy Tag
plus
Buddy Tag
Buddy tags can be used for warhead accountancy with on-site inspections. More »

Confirmation

Verification Technology - Zero Knowledge
plus
Zero-knowledge
Launched in 2011 with seed-funding from Global Zero and The Simons Foundation, the Princeton team has been developing a warhead verification approach based on the cryptographic concept of zero-knowledge proofs. More »
Verification Technology - Information Barrier Experimental (IBX)
plus
Information Barrier Experimental (IBX)
Information barriers shield sensitive measurements, authenticating warheads by a pass/fail signal. More »

Continuity-of-Knowledge

Verification Technology - Electronic Seal
plus
Electronic Seal
Electronic seals are tamper-indicating devices using an electronic component. More »
Verification Technology - Magtag
plus
Magtag
MAGTAG blankets detect any changes in the magnetic field due to illicit movements. More »

Identification

Verification Technology - Eddy Current Methods
plus
Eddy Current Methods
Verification methods involving eddy currents have the potential to support the goal of achieving just enough information to uniquely identify items without providing unnecessary information. More »
Verification Technology - Modal Testing
plus
Modal Testing
Modal vibration signatures might be used to uniquely identify warheads and containers. More »

Remote and Perimeter Monitoring

Verification Technology - Portal Monitor (outside)
plus
Portal Monitor (outside)
Portal monitors for vehicles can monitor the transfer of items between facilities. More »
Verification Technology - Person Portal
plus
Portal Monitor (inside)
Portal monitors can be used to detect the movement of nuclear materials. More »