The Travel Rule Information Sharing Architecture (TRISA) is a global, open source, secure, and peer-to-peer protocol for Travel Rule compliance. TRISA helps Virtual Asset Service Providers (VASPs) comply with the Travel Rule for cross-border cryptocurrency transactions. TRISA is designed to be interoperable.
TRISA’s Global Directory Service (GDS) is a network of vetted VASPs that can securely exchange Travel Rule compliance data with each other. Learn how to become a TRISA-verified VASP, along with member benefits and responsibilities.
This deck is meant to help compliance officers and technical implementors at Virtual Asset Service Providers (VASPs) implement TRISA for travel rule compliance.
The goal of TRISA is to enable compliance with the FATF and FinCEN Travel Rules, as well as Travel Rules implemented by equivalent authorities, without: modifying the core blockchain protocols, incurring increased transaction costs, or modifying virtual currency peer-to-peer transaction flows.
Design and implementation of antenna control servo system for satellite grouIAEME Publication
This document summarizes the design and implementation of an antenna control servo system for a satellite ground station. It describes the modeling and analysis of the system both theoretically and experimentally. Key aspects include designing the drive control system for the antenna, integrating drive chains for elevation and azimuth axes, optimizing the system through mathematical modeling and simulation, and testing the operational system by tracking real satellite passes. Both simulation and experimental results showed the system providing stable and accurate antenna positioning to receive satellite data as required.
This deck is meant to help compliance officers and technical implementors at Virtual Asset Service Providers (VASPs) implement TRISA for travel rule compliance.
The goal of TRISA is to enable compliance with the FATF and FinCEN Travel Rules, as well as Travel Rules implemented by equivalent authorities, without: modifying the core blockchain protocols, incurring increased transaction costs, or modifying virtual currency peer-to-peer transaction flows.
Design and implementation of antenna control servo system for satellite grouIAEME Publication
This document summarizes the design and implementation of an antenna control servo system for a satellite ground station. It describes the modeling and analysis of the system both theoretically and experimentally. Key aspects include designing the drive control system for the antenna, integrating drive chains for elevation and azimuth axes, optimizing the system through mathematical modeling and simulation, and testing the operational system by tracking real satellite passes. Both simulation and experimental results showed the system providing stable and accurate antenna positioning to receive satellite data as required.
Η παρουσίαση αυτή δημιουργήθηκε από μαθητές του 21ου Γυμνασίου Πατρών στο πλαίσιο προγράμματος σχετικό με γέφυρες.
Κατά το σχ. έτος 2014-2015, η παρουσίαση αυτή μαζί και με άλλο υλικό σχετικό πάντα με τις γέφυρες παρουσιάζονται στο 5ο ψηφιακό φεστιβάλ σε ιστολόγιο που δημιουργήθηκε απο τους μαθητές. Στο ιστολόγιο υπάρχει επίσης σύνδεσμος προς μια διαδραστική αφίσα σχετικά με τις γέφυρες, την οποία δημιούργησαν οι μαθητές για τις ανάγκες του φεστιβάλ.
Δείτε το ιστολόγιο και τη διαδραστική αφίσα στη διεύθυνση http://blogs.sch.gr/petrogefyra/
محلول سازی جزء جدایی ناپذیر برای کاربران در آزمایشگاههای مختلف در مراکز مختلف صنعتی، آموزشی محسوب می شود. فقدان یک منبع پیشرفته باعث سردرگمی در فهم درست محاسبات لازم در قسمت آموزش تئوری این مجموعه پرکاربرد شده است و نقطه بحرانی قضیه در شروع کسب مهارت لازم برای آن خودنمایی می کند.
سرفصل هایی که در این آموزش به آن پرداخته شده است:
آشنایی با وسایل آزمایشگاهی و نحوه استفاده از آنها
آشنایی با ابزار و دستگاهها
مفاهیم پایه برای محلول سازی
مراحل اساسی محلول سازی
محلول سازی از ترکیبات جامد نمک های معدنی
...
برای توضیحات بیشتر و تهیه این آموزش لطفا به لینک زیر مراجعه بفرمائید:
http://faradars.org/courses/fvch9405
Μια παρουσίαση σχετικά με τα μέσα μαζικής μεταφοράς και ιδιαίτερα τα λεωφορεία, περιέχει σχεδιαγράμμα σχετικά με την χρήση τον ΜΜΜ και πληροφορίες για τα λεωφορεία του παρελθόντος αλλα και του μέλλοντος.
The document discusses the Travel Rule Information Sharing Alliance (TRISA), a nonprofit organization working to enable virtual asset service providers (VASPs) to cost-effectively comply with travel rule regulations. TRISA aims to deliver travel rule compliance infrastructure and software, enable interoperability between related projects and standards, and create a global coalition of over 200 leaders collaborating on an open and secure travel rule sharing solution. The document outlines TRISA's guiding principles of being open architecture, open source, secure, private, decentralized, and reliable. It also describes TRISA's proposed approach to certificate authority, mutual authentication between VASPs, and addressing various FATF concerns regarding travel rule implementation.
Data Structures for Data Privacy: Lessons Learned in ProductionRebecca Bilbro
In this talk we present a decentralized messaging protocol and storage system in use across North America, Europe, and South East Asia. Built at the behest of an international nonprofit working group, the protocol and system are designed to address a unique problem at the intersection of financial crime regulation, distributed ledger technology, and user privacy. In our talk we discuss the many lessons learned in the process of architecting, implementing, and fostering adoption of this system. We present the Secure Envelope, a data structure that employs a combination of methods (symmetric and asymmetric encryption, mTLS, protocol buffers, etc) to safeguard data privacy both at rest and in flight.
Η παρουσίαση αυτή δημιουργήθηκε από μαθητές του 21ου Γυμνασίου Πατρών στο πλαίσιο προγράμματος σχετικό με γέφυρες.
Κατά το σχ. έτος 2014-2015, η παρουσίαση αυτή μαζί και με άλλο υλικό σχετικό πάντα με τις γέφυρες παρουσιάζονται στο 5ο ψηφιακό φεστιβάλ σε ιστολόγιο που δημιουργήθηκε απο τους μαθητές. Στο ιστολόγιο υπάρχει επίσης σύνδεσμος προς μια διαδραστική αφίσα σχετικά με τις γέφυρες, την οποία δημιούργησαν οι μαθητές για τις ανάγκες του φεστιβάλ.
Δείτε το ιστολόγιο και τη διαδραστική αφίσα στη διεύθυνση http://blogs.sch.gr/petrogefyra/
محلول سازی جزء جدایی ناپذیر برای کاربران در آزمایشگاههای مختلف در مراکز مختلف صنعتی، آموزشی محسوب می شود. فقدان یک منبع پیشرفته باعث سردرگمی در فهم درست محاسبات لازم در قسمت آموزش تئوری این مجموعه پرکاربرد شده است و نقطه بحرانی قضیه در شروع کسب مهارت لازم برای آن خودنمایی می کند.
سرفصل هایی که در این آموزش به آن پرداخته شده است:
آشنایی با وسایل آزمایشگاهی و نحوه استفاده از آنها
آشنایی با ابزار و دستگاهها
مفاهیم پایه برای محلول سازی
مراحل اساسی محلول سازی
محلول سازی از ترکیبات جامد نمک های معدنی
...
برای توضیحات بیشتر و تهیه این آموزش لطفا به لینک زیر مراجعه بفرمائید:
http://faradars.org/courses/fvch9405
Μια παρουσίαση σχετικά με τα μέσα μαζικής μεταφοράς και ιδιαίτερα τα λεωφορεία, περιέχει σχεδιαγράμμα σχετικά με την χρήση τον ΜΜΜ και πληροφορίες για τα λεωφορεία του παρελθόντος αλλα και του μέλλοντος.
The document discusses the Travel Rule Information Sharing Alliance (TRISA), a nonprofit organization working to enable virtual asset service providers (VASPs) to cost-effectively comply with travel rule regulations. TRISA aims to deliver travel rule compliance infrastructure and software, enable interoperability between related projects and standards, and create a global coalition of over 200 leaders collaborating on an open and secure travel rule sharing solution. The document outlines TRISA's guiding principles of being open architecture, open source, secure, private, decentralized, and reliable. It also describes TRISA's proposed approach to certificate authority, mutual authentication between VASPs, and addressing various FATF concerns regarding travel rule implementation.
Data Structures for Data Privacy: Lessons Learned in ProductionRebecca Bilbro
In this talk we present a decentralized messaging protocol and storage system in use across North America, Europe, and South East Asia. Built at the behest of an international nonprofit working group, the protocol and system are designed to address a unique problem at the intersection of financial crime regulation, distributed ledger technology, and user privacy. In our talk we discuss the many lessons learned in the process of architecting, implementing, and fostering adoption of this system. We present the Secure Envelope, a data structure that employs a combination of methods (symmetric and asymmetric encryption, mTLS, protocol buffers, etc) to safeguard data privacy both at rest and in flight.
Fintech summit 2016 thomson reuters tim baker_presentation finalGlen Frost
Thomson Reuters is a leading provider of intelligent information to businesses and professionals. It has over 2 million news stories, supports $250 billion in bond trading daily, and tracks over 2 million entities that could pose risks. Thomson Reuters is transforming to an open platform model, making its permanent identifier and graph database publicly available. This will allow easier integration of client data and lower costs through third party applications built on its open technologies and data. Thomson Reuters is also investing in new technologies like cognitive computing, blockchain, and machine learning to provide advanced analytics and insights from its vast stores of structured and unstructured data.
The Challenges of Third Party Credentials & Why a Trusted Identity Registry i...ForgeRock
Don Thibeau, Chairman & President of the Open Identity Exchange discusses the challenges of third party credentials in a Breakout Session at the 2014 IRM Summit in Phoenix, Arizona.
DLT registration process and documents list.pdfShree Tripada
Navigating the DLT registration process can be a complex and time-consuming task for businesses. Shree Tripada is here to help by providing free DLT support and the cheapest bulk SMS services. With our comprehensive understanding of the registration process and the required documents, we make it easy for businesses to stay compliant with regulatory requirements and enjoy the benefits of bulk SMS services. Our team is dedicated to helping you navigate the intricacies of DLT registration and ensuring that your SMS campaigns are compliant and effective. https://www.shreetripada.com/free_dlt_support.php
Presentation on 'Transforming services through identity & eligibility checking' by Ian Litton, Warwickshire County Council, at the Local Digital Futures - Working as One: Platforms & Sharing event held on 4 March 2016 in London.
Digital Retail Africa 2023 hosted by IT News Africa - Carrie Peter speaks on Balancing User Experience and Security Compliance at Scale at the Digital Retail Africa 2023 conference. #retailtech #ecommerce #customerexperience #onlineshopping #securitycompliance
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...FinTechLabs.io
RAiDiAM is a consulting firm focused on identity and regulatory challenges posed by open banking and PSD2. It provides business and technical consulting services using a modular and scalable identity architecture. RAiDiAM has experience delivering services to open banking organizations, financial institutions, and software vendors. The document discusses the changing landscape in financial services due to open banking and data privacy regulations in Europe and globally. It outlines the various actors in the ecosystem and proposes a trust framework using a hub-and-spoke topology to help establish identity and authorization between parties. The Open Banking Implementation Entity in the UK established a trust framework and directory based on this approach to facilitate standard interfaces and integration between authorized banks and third parties.
Managing identity for the future how everybody can win - david alexander - ...Mydex CIC
The document discusses how the Mydex open platform enables all participants, including individuals, organizations, and application developers, to benefit from secure and consent-based sharing of personal data. The Mydex platform provides personal data stores for individuals, a secure API for data sharing, and identity and attribute services. For organizations, it reduces costs, improves compliance and data quality, and opens opportunities for new services. Application developers benefit from access to richer data sets and an open environment. The platform aims to empower individuals to more effectively manage their personal data and interactions with organizations.
The document discusses Bloomberg's Entity Exchange solution for accelerating the hedge fund onboarding process between sell-side firms and hedge fund clients. Entity Exchange allows sell-side firms to securely and efficiently request Know Your Customer (KYC) documents and other onboarding information from hedge funds through an online platform. It streamlines the exchange of sensitive data by automatically matching requests to documents hedge funds have already uploaded, ensuring firms receive accurate primary-source information more quickly without compromising client service or regulatory compliance. The solution aims to address challenges around the traditionally manual and time-consuming onboarding process.
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTForgeRock
This document discusses identity relationship management (IRM) and its applications in both enterprise and consumer contexts. IRM aims to strengthen authentication by leveraging relationships between authenticated entities like users, devices, locations, and organizations. Examples discussed include 3D Secure for online payments, UK's Assure identity program, and Belgium's government portal. The document argues that while consumer IRM may involve larger scales, security principles are the same as in enterprises, including use of standards, trusted identity providers, and privacy protections. Relationships can enhance security, enable new services, and strengthen customer ties.
Presentation about "Trust Your Supplier", a Chainyard solution to enable supplier qualification on a permissioned shared ledger. TYS is implemented on Hyperledger Fabric and works on a permissioned blockchain. It is one of largest consortium evolving in the supply chain space. If you need more info on TYS, SSI, BITA Party Object or just more info on Chainyard, email me at mohan@chainyard.com
This presentation by Isabelle Corbett, Senior Counsel & Director of Regulatory Affairs, R3, was made during the discussion “Blockchain and Competition” held at the 129th meeting of the OECD Competition Committee on 8 June 2018. More papers and presentations on the topic can be found out at oe.cd/2gx.
Blockchain explained FIATA Congress 20180910Arnaud Le Hors
Blockchain will fundamentally change business by enabling shared, replicated, and permissioned ledgers across business networks. This allows participants to streamline processes, reduce risks through transparency, and create new forms of value. IBM's blockchain strategy involves collaborating to build industry solutions on their blockchain platform and ecosystem. Their TradeLens solution digitizes the global supply chain by connecting participants on a blockchain network for real-time information sharing, collaboration, and innovation.
i4Trust's objective is to boost the development of innovative services around new data value chains in multiple sectors providing the right tools, training, mentoring, and initial funding for the creation of Data Spaces, enabling trustworthy and effective Data Sharing.
Info-Sessions is series of events introducing the initiative. In this first session, we focused on presenting the i4Trust initiative and the technology foundation. This also includes a brief overview of how to join the i4Trust Programme.
TFS is an identity theft and asset risk management service that provides technologies to the retail and commercial banking sector. It takes an iterative approach using a multi-layer security platform and Origin SMS Platform to build financial services solutions in a flexible way that mitigates risk. This allows clients to change quickly and securely while reducing costs and speeding up implementation.
12 02-14 information security managers - unannotatedwdsnead
The document discusses key legal and security considerations for cloud computing transactions. It addresses determining jurisdiction and choice of law, defining security responsibilities, handling data access and breaches, and disposing of data upon termination. Specifically, it emphasizes the need to understand data flows, split jurisdiction if possible, include enforceable security policies and breach notification requirements, limit third party access, and ensure deletion of data after termination.
Adani Group Requests For Additional Land For Its Dharavi Redevelopment Projec...Adani case
It will bring about growth and development not only in Maharashtra but also in our country as a whole, which will experience prosperity. The project will also give the Adani Group an opportunity to rise above the controversies that have been ongoing since the Adani CBI Investigation.
L'indice de performance des ports à conteneurs de l'année 2023SPATPortToamasina
Une évaluation comparable de la performance basée sur le temps d'escale des navires
L'objectif de l'ICPP est d'identifier les domaines d'amélioration qui peuvent en fin de compte bénéficier à toutes les parties concernées, des compagnies maritimes aux gouvernements nationaux en passant par les consommateurs. Il est conçu pour servir de point de référence aux principaux acteurs de l'économie mondiale, notamment les autorités et les opérateurs portuaires, les gouvernements nationaux, les organisations supranationales, les agences de développement, les divers intérêts maritimes et d'autres acteurs publics et privés du commerce, de la logistique et des services de la chaîne d'approvisionnement.
Le développement de l'ICPP repose sur le temps total passé par les porte-conteneurs dans les ports, de la manière expliquée dans les sections suivantes du rapport, et comme dans les itérations précédentes de l'ICPP. Cette quatrième itération utilise des données pour l'année civile complète 2023. Elle poursuit le changement introduit l'année dernière en n'incluant que les ports qui ont eu un minimum de 24 escales valides au cours de la période de 12 mois de l'étude. Le nombre de ports inclus dans l'ICPP 2023 est de 405.
Comme dans les éditions précédentes de l'ICPP, la production du classement fait appel à deux approches méthodologiques différentes : une approche administrative, ou technique, une méthodologie pragmatique reflétant les connaissances et le jugement des experts ; et une approche statistique, utilisant l'analyse factorielle (AF), ou plus précisément la factorisation matricielle. L'utilisation de ces deux approches vise à garantir que le classement des performances des ports à conteneurs reflète le plus fidèlement possible les performances réelles des ports, tout en étant statistiquement robuste.
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi_compressed.pdfKhaled Al Awadi
Greetings,
Hawk Energy is pleased to present you with the latest energy news
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi
Regards.
Founder & S.Editor - NewBase Energy
Khaled M Al Awadi, Energy Consultant
MS & BS Mechanical Engineering (HON), USAGreetings,
Hawk Energy is pleased to present you with the latest energy news
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi
Regards.
Founder & S.Editor - NewBase Energy
Khaled M Al Awadi, Energy Consultant
MS & BS Mechanical Engineering (HON), USAGreetings,
Hawk Energy is pleased to present you with the latest energy news
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi
Regards.
Founder & S.Editor - NewBase Energy
Khaled M Al Awadi, Energy Consultant
MS & BS Mechanical Engineering (HON), USAGreetings,
Hawk Energy is pleased to present you with the latest energy news
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi
Regards.
Founder & S.Editor - NewBase Energy
Khaled M Al Awadi, Energy Consultant
MS & BS Mechanical Engineering (HON), USAGreetings,
Hawk Energy is pleased to present you with the latest energy news
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi
Regards.
Founder & S.Editor - NewBase Energy
Khaled M Al Awadi, Energy Consultant
MS & BS Mechanical Engineering (HON), USAGreetings,
Hawk Energy is pleased to present you with the latest energy news
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi
Regards.
Founder & S.Editor - NewBase Energy
Khaled M Al Awadi, Energy Consultant
MS & BS Mechanical Engineering (HON), USA
Satta matka fixx jodi panna all market dpboss matka guessing fixx panna jodi kalyan and all market game liss cover now 420 matka office mumbai maharashtra india fixx jodi panna
Call me 9040963354
WhatsApp 9040963354
AI Transformation Playbook: Thinking AI-First for Your BusinessArijit Dutta
I dive into how businesses can stay competitive by integrating AI into their core processes. From identifying the right approach to building collaborative teams and recognizing common pitfalls, this guide has got you covered. AI transformation is a journey, and this playbook is here to help you navigate it successfully.
Enabling Digital Sustainability by Jutta EcksteinJutta Eckstein
This is a New Zealand wide meetup event with meetup groups from Auckland, Wellington and Christchurch attending and open to anyone with an interest in digital sustainability or agile. All welcome. Joke, this is how it started. Jutta is now also available in Germany, i.e. hosted by Berlin/Brandenburg
According to the World Economic Forum, digital technologies can help reduce global carbon emissions by up to 15%. However, digitalization also comes with some challenges. Thus, if we want to make a positive impact by increasing sustainability, we need to address challenges like the digital divide, energy consumption of IT, or the rise of electronic waste. In this talk, I want to explore how Agile can help to leverage Digital Sustainability.
Easy Earnings Through Refer and Earn Apps Without KYC.pptxFx Lotus
Learn how to make extra money with refer and earn apps that don’t require KYC. Find out the advantages, top apps, and strategies to boost your earnings quickly and easily.
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...Niswey
50 million companies worldwide leverage WhatsApp as a key marketing channel. You may have considered adding it to your marketing mix, or probably already driving impressive conversions with WhatsApp.
But wait. What happens when you fully integrate your WhatsApp campaigns with HubSpot?
That's exactly what we explored in this session.
We take a look at everything that you need to know in order to deploy effective WhatsApp marketing strategies, and integrate it with your buyer journey in HubSpot. From technical requirements to innovative campaign strategies, to advanced campaign reporting - we discuss all that and more, to leverage WhatsApp for maximum impact. Check out more details about the event here https://events.hubspot.com/events/details/hubspot-new-delhi-presents-unlocking-whatsapp-marketing-with-hubspot-integrating-messaging-into-your-marketing-strategy/
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART INDIA MATKA KALYAN SATTA MATKA 420 INDIAN MATKA SATTA KING MATKA FIX JODI FIX FIX FIX SATTA NAMBAR MATKA INDIA SATTA BATTA
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
Discover the Beauty and Functionality of The Expert Remodeling Serviceobriengroupinc04
Unlock your kitchen's true potential with expert remodeling services from O'Brien Group Inc. Transform your space into a functional, modern, and luxurious haven with their experienced professionals. From layout reconfiguration to high-end upgrades, they deliver stunning results tailored to your style and needs. Visit obriengroupinc.com to elevate your kitchen's beauty and functionality today.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART KALYAN CHART
High-Quality IPTV Monthly Subscription for $15advik4387
Experience high-quality entertainment with our IPTV monthly subscription for just $15. Access a vast array of live TV channels, movies, and on-demand shows with crystal-clear streaming. Our reliable service ensures smooth, uninterrupted viewing at an unbeatable price. Perfect for those seeking premium content without breaking the bank. Start streaming today!
https://rb.gy/f409dk
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
2. — HARPER LEE / TO KILL A MOCKINGBIRD
“You never really understand
a person until you consider
things from his point of
view.”
3. TRISA is an open peer-to-peer
network that supports information
sharing between members
What is TRISA?
Getting Started with TRISA
Getting Certified
To join the network, register
with your legal, business, and
technical details
Member
Responsibilities
Members must store shared
details and operate an endpoint to
respond to incoming requests
About the Global
Directory Service
(GDS)
The GDS grants certificates
and serves as a decentralized
store of member details
Working with
Secure Envelopes
6
Learn the fundamental data
structures that enable secure
information exchange
5
4
2
1
Member Benefits
3
Members can request details about
other members for Travel Rule
compliance
5. This is Alice
● Alice wants to send digital assets in
the form of cryptocurrency
● Alice lives in the US and she wants to send the
equivalent of $3,500 in cryptocurrency to her
friend Bob, who lives abroad.
● She uses a Virtual Assets Service Provider
(VASP) to do this.
● Under the Travel Rule, Alice’s VASP has a legal
responsibility to keep a record of all the parties
involved – not just data about Alice, but also
about Bob and his VASP.
6. This is Bob
● Bob lives in Singapore.
● Bob also uses a Virtual Assets Service Provider
(VASP) to manage cryptocurrency
transactions.
● Depending on his local government
regulations, Bob’s VASP may also have a legal
responsibility to keep records about Bob, Alice,
and Alice’s VASP.
7. That’s a lot of records!
The recently enacted Travel Rule is
changing how VASPs use customer data,
as well as how much non-customer data
they store.
8. The “travel rule” refers to guidance published by the
Financial Action Task Force (FATF), an independent inter-
governmental body that develops policies to combat
money laundering and the financing of terrorism.
What is the Travel Rule?
9. The guidance requires Virtual Assets Service Providers “to
obtain, hold, and transmit required originator and beneficiary
information in order to identify and report suspicious
transactions, monitor the availability of information, take
freezing actions, and prohibit transactions with designated
persons and entities.”
What is the Travel Rule?
10. This raises many questions…
How can VASPs make sense of each
other’s data? How can they keep customer
details secure? How can they trust other
VASPs to keep their customer data
secure?
11. The Travel Rule Information Sharing Architecture (TRISA)
was initiated in July 2019 as a response to emerging
regulations from the FATF and FinCEN around data
transfer for cryptocurrency transactions between Virtual
Asset Service Providers (VASPs).
Introducing TRISA
12. The goal of TRISA is to enable compliance with the FATF
and FinCEN Travel Rules, as well as Travel Rules
implemented by equivalent authorities, without:
● modifying the core blockchain protocols.
● incurring increased transaction costs.
● modifying virtual currency peer-to-peer transaction
flows.
Introducing TRISA
13. TRISA aims to do this on a global level while:
● Protecting user privacy
● Ensuring fast and inexpensive transactions
● Remaining open source and decentralized
● Having an open governance body
● Maintaining interoperability with other approaches
It helps VASPs demonstrate the technical capability to comply with
the Travel Rule, which may help with licensing, depending on the
jurisdiction.
Introducing TRISA
14. Why you should start meeting Travel Rule requirements
today?
● Signal to regulators that your business is taking
regulations seriously. Ensure your business receives its
licenses on time without disrupting go-to-market
strategy.
● Signal to counterparties that your compliance program is
up to par. Give your customers and partners the
confidence to keep working with you, open up new
opportunities, and gain an advantage in the market.
Introducing TRISA
15. TRISA is designed with the six following guiding principles:
● Open Architecture
● Open Source
● Secure
● Private
● Decentralized
● Reliable
Introducing TRISA
16. Who can join TRISA?
● Virtual Asset Service Providers (VASPs)
● Crypto Asset Service Providers (CASPs)
● Money Service Businesses (MSBs)
● Traditional financial services institutions
● Regulatory bodies
Introducing TRISA
17. A Peer-to-Peer Network
At its heart, TRISA is a peer-to-peer
network.
It’s a decentralized and secure
messaging layer.
No single person, organization, or
government controls it.
18. A Peer-to-Peer Network
Alice’s VASP Bob’s VASP
The “peers” in the TRISA network are
VASPs who are following their legal
recordkeeping responsibilities by
exchanging customer, business, and
legal data once an applicable
transaction occurs.
19. A Peer-to-Peer Network
Alice’s VASP Bob’s VASP
TRISA is a special kind of peer-to-peer
network — a trusted network.
This means that the communications
between peers are protected, unlike
those on ordinary p2p networks.
20. A Peer-to-Peer Network
Alice’s VASP Bob’s VASP
The protection comes in the form of
mutual authentication (mTLS).
When Alice’s VASP registers for TRISA,
it receives Identity Certificates, which
serve as proof to Bob’s VASP that
Alice’s VASP is who they say they are,
and vice versa.
21. A Peer-to-Peer Network
Alice’s VASP Bob’s VASP
TRISA’s messaging framework is based
on proven security technologies:
● Certificate Authority (CA):
TRISA employs the CA model,
commonly used in e-commerce
and gov’t communications, to
issue Identity Certificates to
Members.
● Public Key Cryptography
(PKC): TRISA uses PKC to
encrypt Travel Rule data packets.
22. A Peer-to-Peer Network
The TRISA Network
includes VASPs from all
over the world, including
Singapore, Germany,
Taiwan, the Philippines, the
Czech Republic, and the
United States.
23. What TRISA Is and What It Is Not
TRISA is… TRISA is NOT …
A peer-to-peer network of vetted Members A centralized service
A secure messaging protocol A complete Travel Rule solution
An open source initiative A proprietary service
Interoperable with other solutions A closed framework
A messaging layer on top of blockchains A means for address confirmation
25. TRISA Certification Process
● TRISA acts as the root of trust. It is the Trusted VASP Certificate Authority
(TVCA) and issues Identity Certificates to Members.
● VASPs must complete a formal registration and due diligence process by
TRISA that includes physical and digital verification of the VASP.
● The verification process follows FATF’s Recommendations for VASP
licensing and registration.
● The process is designed to be thorough and rigorous, but not financially
burdensome for VASPs to complete on their own; it does not require a
third-party auditor or hefty fees.
● TRISA verifies all data submitted by VASPs and conducts sanctions
checks.
26. Step 1: Get Certified
● The first step is to formally join the
TRISA network.
● To become a member, a VASP
must submit a registration.
● Once approved, the VASP will
receive digital certificates
(cryptographic key-pairs), which
can be used in secure TRISA
information exchanges with other
members.
27. What You’ll Need
● Your business details, e.g.
○ Your company name and website
○ What type of business/VASP you are
● Your legal details, e.g.
○ Legal name
○ Country and address
○ Government identification number
● Points of contact:
○ Technical and Legal/Compliance (required)
○ Administrative and/or Billing (optional)
● Endpoint details
● Jurisdiction details
28. Make sure you have
all your details ready
before you begin
registration!
29. Business Details
1. Company Name
2. Date of Incorporation/
Establishment
3. Company Website
4. Business Category
○ Private Organization
○ Business Entity
○ Government Entity
○ Non-Commercial Entity
5. VASP Category
○ Centralized Exchange
○ Decentralized Exchange
○ Person-to-Person Exchange
○ Kiosk/Crypto ATM Operator
○ Custody Provider
○ Over-The-Counter Trading Desk
○ Investment Fund
○ Token Project
○ Gambling or Gaming Site
○ Mining Pool
○ Mixing Service
○ Legal Person
○ Other
30. Legal Details
● The Legal Person is how TRISA defines your business entity.
● TRISA uses the IVMS 101 data standard to describe the business entity.
● IVMS 101 defines a Legal Person* as having:
1. One or more Name Identifiers (Legal Name, Short Name, Trading Name)
2. Zero or more Local and/or Phonetic Names (other spellings, translations, etc)
3. One or more physical geographical address
4. The country where your business is headquartered
5. National Identification (e.g. LEIX)
*Depending on your business details, other fields may be required.
31. Key Points-of-Contact
1. Technical Contact (Required)
Primary contact for handling technical queries about the operation and status of your
service participating in the TRISA network. Can be a group or admin email.
2. Legal/Compliance Contact (Required)
Compliance officer or legal contact for requests about the compliance requirements and
legal status of your organization.
3. Administrative Contact (Optional)
Administrative or executive contact for your organization to field high-level requests or
queries.
4. Billing Contact (Optional)
Billing contact for your organization to handle account and invoice requests or queries
relating to the operation of the TRISA network.
32. Endpoint Details
Each VASP is required to establish a TRISA endpoint for inter-VASP communication.
To join TRISA and be issued a certificate, you must specify two details of your endpoint in
your registration:
1. TRISA Endpoint
○ The address and port of the TRISA endpoint for partner VASPs to connect on via gRPC.
○ Example: trisa.myvasp.com:4321
2. Certificate Common Name
○ The common name for the mTLS certificate.
○ This should match the TRISA endpoint, without the port, in most cases.
○ Example: trisa.myvasp.com
33. Jurisdiction Details
● aka “The TRIXO Questionnaire”
○ Primary National Jurisdiction
○ Name of Primary Regulator
○ Applicable Regulations
○ Currency Threshold
○ etc.
● This will help your Members understand the regulatory regime of your
organization.
● The information you provide will help ensure that required compliance
information exchanges are conducted correctly and safely.
● Where required, a counter-party or any VASP involved in the transaction will
have access to this information.
35. Why VASPs Choose TRISA
Safeguards private
customer data
Counterparty lookups
and verification
Synchronous and
asynchronous transfer
Fully decentralized
data layer
Common technical
messaging framework
Standardized data
formats
36. VASP Decision Point: DIY vs COTS
Upon verification, VASPs must integrate with TRISA to begin exchanging
Travel Rule data with other verified TRISA members. Since TRISA is open
source and interoperable, VASPs have two options.
Option 1. Do it Yourself (DIY)
Set Up Your Own TRISA Node
VASPs can set up and maintain their
own TRISA server to exchange
encrypted Travel Rule compliance data.
TRISA maintains a GitHub repository
with detailed documentation, a
reference implementation, and “robot”
VASPs for testing purposes.
Option 2. Commercial Off the Shelf
(COTS)
Use a 3rd-party Solution
There are several Travel Rule solutions
providers available on the market that are
interoperable with TRISA. If you are a
customer, work with them to integrate
TRISA into your Travel Rule compliance
workflow.
37. Open Source Resources & Considerations
TRISA maintains open source
resources for building, testing, and
deploying a TRISA node.
● Github repository
○ Reference
implementation
○ “Robot” VASPs for test
transactions
● Documentation
● TRISA Slack
Open Source implementers must consider:
● Systems integration: How will your
TRISA node integrate with your
backend systems?
● Data storage: How will you store
encrypted secure envelopes?
● Key management: How will you
manage the keys for secure
envelopes?
38. 3rd Party Travel Rule Solutions
VASPs may choose to work with a COTS Travel Rule solution. VASPs should
evaluate the solutions, select the one that best fits their needs, and work with
the provider to integrate with TRISA.
A non-exhaustive list of commercial solutions include:
● 21 Analytics
● CipherTrace Traveler
● CoinBase TRUST
● Sygna Bridge
● NotaBene
40. 3 Responsibilities of Members
Communication
It is your responsibility
to communicate and
interact directly with
your peer VASPs.
Operations
It is your responsibility
to deploy and maintain
your TRISA endpoint to
keep it operational.
Security
It is your responsibility to
protect the security of the
network, including data,
passwords and certificates.
41. Communication
● Because TRISA is a decentralized network, there is no
central body designated to facilitate communications
between VASPs.
● TRISA exchanges go in two directions, and you must
be prepared to respond to other VASPs requests for
information as well as sending your own requests.
● It is your responsibility to coordinate directly with
your peer VASPs.
○ For secure information sharing, use the TRISA protocol.
○ For informal communications, use the TRISA Slack
group.
42. Operations
● You must deploy a TRISA endpoint that enables you
to respond to requests from peer VASPs.
○ An endpoint is like a phone number or web address
where your peers can reach you.
○ It looks a bit like a URL, e.g. api.alice.vaspbot.net:443
● You must maintain your TRISA endpoint and ensure it
remains healthy and operational.
● If you do not have an engineering team capable of
deploying and maintaining your TRISA endpoint, there
are third party tools that offer support and hosting.
43. Security
● To connect to a peer’s TRISA endpoint, you must
authenticate with mTLS using the TRISA identity
certificates you were granted during registration.
● You are responsible for maintaining your own private keys
for your TRISA identity certificates.
● You are responsible for securely storing encrypted Travel
Rule data in compliance with local data retention
regulations.
● If your TRISA certificates are compromised, you must revoke
them immediately so that new ones can be reissued.
45. The Global TRISA Directory Service (GDS) facilitates peer-to-peer exchanges
between TRISA members as follows:
● By issuing mTLS certificates to verify exchanges
● By providing discovery services for finding TRISA endpoints
● By providing VASP public certificate and KYCV (Know Your Counterparty
VASP) information for verification
Interactions with a Directory Service are specified by the TRISA protocol.
Currently, the TRISA organization hosts the GDS on behalf of the TRISA network.
The Global Directory Service (GDS)
46. The Global Directory Service (GDS)
The GDS serves as a
decentralized store of
member details.
It is replicated across
multiple continents.
47. The Global TRISA Directory Service issues
Identity Certificates for VASPs to verify
exchanges with peers.
Identity certificates:
- Are issued after extended validation
including business entity verification and a
phone interview.
- Prove that the VASP is a trusted member
of the TRISA network and are used to
establish mutually authenticated secure
communications between VASPs and the
Directory.
Issuing Identity Certificates
48. Discovery Services for Endpoints
The Global TRISA Directory Service
provides discovery services for finding
TRISA endpoints.
Only TRISA members have access to the
directory listing of other verified members
and can search and lookup counterparties
for information exchanges.
The Directory also manages the certificate
revocation list (CRL) to maintain the
network over time.
49. Certificate and KYC Information
The Global TRISA Directory Service
provides certificate and KYC information
for verification.
The Directory:
- Issues sealing keys and manages
revocation and reissuance of certificates.
- Provides public keys to facilitate sealing
key exchange and signature verification.
VASP LegalPerson records are available
for members to assist them in building
complete IVMS 101 records.
51. Secure Envelope → Secure Envelope →
Encryption Key
HMAC Secret
Encryption Algorithm
HMAC Algorithm HMAC Signature
Payload
IVMS 101 Identities
Transaction Info
ID & Timestamp Sealing Key Info
Encryption Key
HMAC Secret
Encryption Algorithm
HMAC Algorithm HMAC Signature
Payload
IVMS 101 Identities
Transaction Info
ID & Timestamp Sealing Key Info
Originator VASP Beneficiary VASP
mTLS Encrypted
Channel
52. Originator VASP Beneficiary VASP
Step 1: The Originator VASP
finds the TRISA endpoint
address and public identity
key of the Beneficiary
VASP.
api.bob.vaspbot.net
53. Originator VASP Beneficiary VASP
Step 2: The Originator
VASP encrypts the sender’s
data and the transaction
details using an encryption
key.
55. What’s being encrypted?
IVMS 101 Identities
This data should be expressed using the interVASP
Messaging Standard (IVMS101), an internationally
recognized standard that helps with:
- language encodings
- numeric identification systems
- phonetic name pronunciations
- standardized country codes (ISO 3166)
The Originator VASP needs to encrypt and send two pieces
of data in IVMS101 format:
- Originator customer data
- Originator VASP data
56. {
“originator”: {
“originator_persons”: [{
“natural_person”: {
“name”: {
“name_identifiers": [{
"primary_identifier": "Verte”,
"secondary_identifier": "Sinead”,
"name_identifier_type": 1
}]
},
"geographic_addresses" : [{
"address_line": "456 Lime Blvd, Dublin",
"country": "IRL",
"address_type": 0
}],
“national_identification”: {
"national_identifier": "567567567",
"national_identifier_type": 1,
"country_of_issue": "IRL",
"registration_authority": "RA000234"
},
"customer_identification": "12345",
"date_and_place_of_birth": {
"date_of_birth" : "1984-08-01",
"place_of_birth" : "Dublin, Ireland"
},
"country_of_residence": "IRL"
}
}],
“account_numbers”: [
“2sdffsfd93kjhbkjhj55554ggtrt”
]
}
Natural Person
The first part of the Originator
details are the customer details.
TRISA defines the Originator as a
Natural Person using the
IVMS101 standard, shown in this
example.
57. {
“originating_vasp”: {
“originating_vasp”: {
“legal_person”: {
“name”: {
“name_identifiers": [{
"legal_person_name": "Kelly Green VASP, LLC",
"legal_person_name_identifier_type": 0
}, {
"legal_person_name": "Kelly Green",
"legal_person_name_identifier_type": 1
}]
},
"geographic_addresses" : [{
"address_line": "987 Chartreuse Lane, Dublin",
"country": "IRL",
"address_type": 0
}],
"customer_number": "12345",
“national_identification”: {
"national_identifier": "987987987",
"national_identifier_type": 8,
"country_of_issue": "IRL",
"registration_authority": "RA000999"
},
“country_of_registration”: “IRL”,
}
}
}
}
Legal Person
The second part of the Originator
details are the VASP details.
TRISA defines the Originator
VASP as a Legal Person using
the IVMS101 standard, shown in
this example.
58. What’s being encrypted?
Transaction Details
The transaction details specify:
- sender/originator
- intended recipient
- transaction amount
- other information used to identify the
transaction on the blockchain*
{
“amount” : 5,
"originator": "3XhHDu1Ngh7x9fcBs5KuThbSzw",
"beneficiary": "1ffXrcWge9Zi1ZngNia64u3Wd2v"
…
}
*see protocol buffer for details
59. Secure Envelope
Originator VASP Beneficiary VASP
Step 3: The Originator VASP creates a
Secure Envelope containing the
encrypted payload, the encryption key
and HMAC secret, and a timestamp,
sealing it with the Beneficiary’s public
identity key.
60. Originator VASP Beneficiary VASP
Step 4: The Originator VASP
opens an mTLS connection to
the Beneficiary VASP’s TRISA
endpoint and transmits the
Secure Envelope via a TRISA
Transfer message.
61. Originator VASP Beneficiary VASP
Step 5: The Beneficiary VASP
receives the Secure Envelope via
the mTLS connection and opens
it using their private identity
certificate.
Secure Envelope
62. Originator VASP Beneficiary VASP
Step 6: The Beneficiary VASP
validates the encryption key
with the HMAC secret.
✓
64. Originator VASP Beneficiary VASP
Step 8: The Beneficiary VASP
stores the Originator VASP and
sender details in a secure
location for Travel Rule
compliance.
65. Originator VASP Beneficiary VASP
Step 9: The Beneficiary VASP
encrypts the recipient’s data and
Beneficiary VASP data and
creates a secure envelope to send
back to the Originator VASP.
66. Originator VASP Beneficiary VASP
Step 10: The Beneficiary VASP
opens an mTLS connection to the
Originator VASP’s TRISA endpoint
and transmits the Secure
Envelope via a TRISA Transfer
message.
Secure Envelope
67. Originator VASP Beneficiary VASP
Step 11: The Originator VASP
opens the Secure Envelope,
decrypts the payload, and stores
the receiver and Beneficiary VASP
details securely for Travel Rule
compliance.
68. Benefits of Secure Envelopes
Non-
Repudiation
(Identity
Certificates)
Encryption in
Flight and at
Rest
Convenient for
Long-Term
Compliance
Storage
“Erasure” by
Deleting
Sealing
Certificates
69. Benefits of Secure Envelopes
1. Non-repudiation: Timestamps are digitally signed, meaning it is
possible to cryptographically prove that both parties have identical
compliance information exchanged at the time of the transaction.
2. Encryption In Flight and At Rest: Exchanges are encrypted both: (1) in
flight using mutually authenticated TLS (mTLS) version 1.3; and (2) at
rest through the use of multi-layer data cryptography.
3. Amenable to Long-term Storage: VASPs can retain encrypted
compliance data in accordance with jurisdictional data retention laws
(e.g. 5 or 7 years), though indexing and retrieval are more challenging.
4. Easy to Discard via "Erasure": Data can be erased when it no longer
needs to be maintained for compliance purposes simply by deleting the
private keys that decrypt the envelopes, making it impossible to open
the secure payload. This is called Erasure.
Open Architecture: TRISA is committed to interoperability with open security standards and different messaging protocols.
Open Source: TRISA goes beyond being open and is open source. VASPs large and small have access to TRISA’s source code on Github. VASPs can inspect, download, modify, and implement TRISA at no cost.
Secure: TRISA applies the proven Certificate Authority (CA) model, commonly used in ecommerce transactions and government communications.
Private: TRISA employs Public Key Cryptography (PKC) to ensure personally identifiable information (PII) remains private and is encrypted in flight and at rest.
Decentralized: TRISA’s peer-to-peer network adheres to the ethos and benefits of blockchain technologies, eliminating single points of failure and ensuring a resilient and secure network.
Reliable: TRISA requires mutual authentication, meaning counterparties have to prove their identity before exchanging information.
TODO:
- should the beneficiary send back its KYC data? e.g. is it actually an exchange?
- why should the beneficiary return a secure message (non-repudiation with signed receipt timestamps)
- what about async vs sync messaging?
1. Non-repudiation
2. Encryption in flight and at rest
3. Long-term storage
because they're encrypted at rest and because they can be "erased" by deleting sealing certificates, secure envelopes are ideal for long term storage (e.g. saving to disk or into a database) They are secure and there is no worry about replication for durability (all copies are erased by deleting sealing certs, all copies are encrypted). This is a counterpoint to unpacking and parsing the information and storing that separately. The only issue is indexing and retrieval.
4. "erasure" by deleting sealing certificates.