SlideShare a Scribd company logo
1 of 77
Download to read offline
Getting Started
with TRISA
— HARPER LEE / TO KILL A MOCKINGBIRD
“You never really understand
a person until you consider
things from his point of
view.”
TRISA is an open peer-to-peer
network that supports information
sharing between members
What is TRISA?
Getting Started with TRISA
Getting Certified
To join the network, register
with your legal, business, and
technical details
Member
Responsibilities
Members must store shared
details and operate an endpoint to
respond to incoming requests
About the Global
Directory Service (GDS)
The GDS grants certificates
and serves as a decentralized
store of member details
Working with
Secure Envelopes
6
Learn the fundamental data
structures that enable secure
information exchange
5
4
2
1
Member Benefits
3
Members can request details about
other members for Travel Rule
compliance
What is TRISA?
1
This is Alice
● Alice wants to send digital assets in
the form of cryptocurrency
● Alice lives in the US and she wants to send the
equivalent of $3,500 in cryptocurrency to her
friend Bob, who lives abroad.
● She uses a Virtual Assets Service Provider
(VASP) to do this.
● Under the Travel Rule, Alice’s VASP has a legal
responsibility to keep a record of all the parties
involved – not just data about Alice, but also
about Bob and his VASP.
This is Bob
● Bob lives in Singapore.
● Bob also uses a Virtual Assets Service Provider
(VASP) to manage cryptocurrency
transactions.
● Depending on his local government
regulations, Bob’s VASP may also have a legal
responsibility to keep records about Bob, Alice,
and Alice’s VASP.
That’s a lot of records!
The recently enacted Travel Rule is
changing how VASPs use customer data,
as well as how much non-customer data
they store.
The “travel rule” refers to guidance published by the
Financial Action Task Force (FATF), an independent
inter-governmental body that develops policies to combat
money laundering and the financing of terrorism.
What is the Travel Rule?
The guidance requires Virtual Assets Service Providers “to
obtain, hold, and transmit required originator and beneficiary
information in order to identify and report suspicious
transactions, monitor the availability of information, take
freezing actions, and prohibit transactions with designated
persons and entities.”
What is the Travel Rule?
This raises many questions…
How can VASPs make sense of each other’s
data? How can they keep customer details
secure? How can they trust other VASPs to
keep their customer data secure?
The Travel Rule Information Sharing Architecture (TRISA)
was initiated in July 2019 as a response to emerging
regulations from the FATF and FinCEN around data
transfer for cryptocurrency transactions between Virtual
Asset Service Providers (VASPs).
Introducing TRISA
The goal of TRISA is to enable compliance with the FATF
and FinCEN Travel Rules, as well as Travel Rules
implemented by equivalent authorities, without:
● modifying the core blockchain protocols.
● incurring increased transaction costs.
● modifying virtual currency peer-to-peer transaction
flows.
Introducing TRISA
TRISA aims to do this on a global level while:
● Protecting user privacy
● Ensuring fast and inexpensive transactions
● Remaining open source and decentralized
● Having an open governance body
● Maintaining interoperability with other approaches
It helps VASPs demonstrate the technical capability to comply with
the Travel Rule, which may help with licensing, depending on the
jurisdiction.
Introducing TRISA
Why you should start meeting Travel Rule requirements
today?
● Signal to regulators that your business is taking
regulations seriously. Ensure your business receives its
licenses on time without disrupting go-to-market
strategy.
● Signal to counterparties that your compliance program is
up to par. Give your customers and partners the
confidence to keep working with you, open up new
opportunities, and gain an advantage in the market.
Introducing TRISA
TRISA is designed with the six following guiding principles:
● Open Architecture
● Open Source
● Secure
● Private
● Decentralized
● Reliable
Introducing TRISA
Who can join TRISA?
● Virtual Asset Service Providers (VASPs)
● Crypto Asset Service Providers (CASPs)
● Money Service Businesses (MSBs)
● Traditional financial services institutions
● Regulatory bodies
Introducing TRISA
A Peer-to-Peer Network
At its heart, TRISA is a peer-to-peer
network.
It’s a decentralized and secure
messaging layer.
No single person, organization, or
government controls it.
A Peer-to-Peer Network
Alice’s VASP Bob’s VASP
The “peers” in the TRISA network are
VASPs who are following their legal
recordkeeping responsibilities by
exchanging customer, business, and
legal data once an applicable
transaction occurs.
A Peer-to-Peer Network
Alice’s VASP Bob’s VASP
TRISA is a special kind of peer-to-peer
network — a trusted network.
This means that the communications
between peers are protected, unlike
those on ordinary p2p networks.
A Peer-to-Peer Network
Alice’s VASP Bob’s VASP
The protection comes in the form of
mutual authentication (mTLS).
When Alice’s VASP registers for TRISA,
it receives Identity Certificates, which
serve as proof to Bob’s VASP that
Alice’s VASP is who they say they are,
and vice versa.
A Peer-to-Peer Network
Alice’s VASP Bob’s VASP
TRISA’s messaging framework is based
on proven security technologies:
● Certificate Authority (CA):
TRISA employs the CA model,
commonly used in e-commerce
and gov’t communications, to
issue Identity Certificates to
Members.
● Public Key Cryptography (PKC):
TRISA uses PKC to encrypt Travel
Rule data packets.
A Peer-to-Peer Network
The TRISA Network includes
VASPs from all over the
world, including Singapore,
Germany, Taiwan, the
Philippines, the Czech
Republic, and the United
States.
What TRISA Is and What It Is Not
TRISA is… TRISA is NOT …
A peer-to-peer network of vetted Members A centralized service
A secure messaging protocol A complete Travel Rule solution
An open source initiative A proprietary service
Interoperable with other solutions A closed framework
A messaging layer on top of blockchains A means for address confirmation
Getting
Certified
2
TRISA Certification Process
● TRISA acts as the root of trust. It is the Trusted VASP Certificate Authority
(TVCA) and issues Identity Certificates to Members.
● VASPs must complete a formal registration and due diligence process by
TRISA that includes physical and digital verification of the VASP.
● The verification process follows FATF’s Recommendations for VASP
licensing and registration.
● The process is designed to be thorough and rigorous, but not financially
burdensome for VASPs to complete on their own; it does not require a
third-party auditor or hefty fees.
● TRISA verifies all data submitted by VASPs and conducts sanctions checks.
Step 1: Get Certified
● The first step is to formally join the
TRISA network.
● To become a member, a VASP
must submit a registration.
● Once approved, the VASP will
receive digital certificates
(cryptographic key-pairs), which
can be used in secure TRISA
information exchanges with other
members.
What You’ll Need
● Your business details, e.g.
○ Your company name and website
○ What type of business/VASP you are
● Your legal details, e.g.
○ Legal name
○ Country and address
○ Government identification number
● Points of contact:
○ Technical and Legal/Compliance (required)
○ Administrative and/or Billing (optional)
● Endpoint details
● Jurisdiction details
Make sure you have
all your details ready
before you begin
registration!
Business Details
1. Company Name
2. Date of Incorporation/
Establishment
3. Company Website
4. Business Category
○ Private Organization
○ Business Entity
○ Government Entity
○ Non-Commercial Entity
5. VASP Category
○ Centralized Exchange
○ Decentralized Exchange
○ Person-to-Person Exchange
○ Kiosk/Crypto ATM Operator
○ Custody Provider
○ Over-The-Counter Trading Desk
○ Investment Fund
○ Token Project
○ Gambling or Gaming Site
○ Mining Pool
○ Mixing Service
○ Legal Person
○ Other
Legal Details
● The Legal Person is how TRISA defines your business entity.
● TRISA uses the IVMS 101 data standard to describe the business entity.
● IVMS 101 defines a Legal Person* as having:
1. One or more Name Identifiers (Legal Name, Short Name, Trading Name)
2. Zero or more Local and/or Phonetic Names (other spellings, translations, etc)
3. One or more physical geographical address
4. The country where your business is headquartered
5. National Identification (e.g. LEIX)
*Depending on your business details, other fields may be required.
Key Points-of-Contact
1. Technical Contact (Required)
Primary contact for handling technical queries about the operation and status of your
service participating in the TRISA network. Can be a group or admin email.
2. Legal/Compliance Contact (Required)
Compliance officer or legal contact for requests about the compliance requirements and
legal status of your organization.
3. Administrative Contact (Optional)
Administrative or executive contact for your organization to field high-level requests or
queries.
4. Billing Contact (Optional)
Billing contact for your organization to handle account and invoice requests or queries
relating to the operation of the TRISA network.
Endpoint Details
Each VASP is required to establish a TRISA endpoint for inter-VASP communication.
To join TRISA and be issued a certificate, you must specify two details of your endpoint in
your registration:
1. TRISA Endpoint
○ The address and port of the TRISA endpoint for partner VASPs to connect on via gRPC.
○ Example: trisa.myvasp.com:4321
2. Certificate Common Name
○ The common name for the mTLS certificate.
○ This should match the TRISA endpoint, without the port, in most cases.
○ Example: trisa.myvasp.com
Jurisdiction Details
● aka “The TRIXO Questionnaire”
○ Primary National Jurisdiction
○ Name of Primary Regulator
○ Applicable Regulations
○ Currency Threshold
○ etc.
● This will help your Members understand the regulatory regime of your
organization.
● The information you provide will help ensure that required compliance
information exchanges are conducted correctly and safely.
● Where required, a counter-party or any VASP involved in the transaction will
have access to this information.
Member
Benefits
3
Why VASPs Choose TRISA
Safeguards private
customer data
Counterparty lookups
and verification
Synchronous and
asynchronous transfer
Fully decentralized
data layer
Common technical
messaging framework
Standardized data
formats
VASP Decision Point: DIY vs COTS
Upon verification, VASPs must integrate with TRISA to begin exchanging
Travel Rule data with other verified TRISA members. Since TRISA is open
source and interoperable, VASPs have two options.
Option 1. Do it Yourself (DIY)
Set Up Your Own TRISA Node
VASPs can set up and maintain their own
TRISA server to exchange encrypted
Travel Rule compliance data. TRISA
maintains a GitHub repository with
detailed documentation, a reference
implementation, and “robot” VASPs for
testing purposes.
Option 2. Commercial Off the Shelf (COTS)
Use a 3rd-party Solution
There are several Travel Rule solutions
providers available on the market that are
interoperable with TRISA. If you are a
customer, work with them to integrate
TRISA into your Travel Rule compliance
workflow.
Open Source Resources & Considerations
TRISA maintains open source
resources for building, testing, and
deploying a TRISA node.
● Github repository
○ Reference
implementation
○ “Robot” VASPs for test
transactions
● Documentation
● TRISA Slack
Open Source implementers must consider:
● Systems integration: How will your
TRISA node integrate with your
backend systems?
● Data storage: How will you store
encrypted secure envelopes?
● Key management: How will you
manage the keys for secure
envelopes?
3rd Party Travel Rule Solutions
VASPs may choose to work with a COTS Travel Rule solution. VASPs should
evaluate the solutions, select the one that best fits their needs, and work with
the provider to integrate with TRISA.
A non-exhaustive list of commercial solutions include:
● 21 Analytics
● CipherTrace Traveler
● CoinBase TRUST
● Sygna Bridge
● NotaBene
Member
Responsibilities
4
3 Responsibilities of Members
Communication
It is your responsibility
to communicate and
interact directly with
your peer VASPs.
Operations
It is your responsibility
to deploy and maintain
your TRISA endpoint to
keep it operational.
Security
It is your responsibility to
protect the security of the
network, including data,
passwords and certificates.
Communication
● Because TRISA is a decentralized network, there is no
central body designated to facilitate communications
between VASPs.
● TRISA exchanges go in two directions, and you must
be prepared to respond to other VASPs requests for
information as well as sending your own requests.
● It is your responsibility to coordinate directly with
your peer VASPs.
○ For secure information sharing, use the TRISA protocol.
○ For informal communications, use the TRISA Slack group.
Operations
● You must deploy a TRISA endpoint that enables you to
respond to requests from peer VASPs.
○ An endpoint is like a phone number or web address
where your peers can reach you.
○ It looks a bit like a URL, e.g. api.alice.vaspbot.net:443
● You must maintain your TRISA endpoint and ensure it
remains healthy and operational.
● If you do not have an engineering team capable of
deploying and maintaining your TRISA endpoint, there
are third party tools that offer support and hosting.
Security
● To connect to a peer’s TRISA endpoint, you must
authenticate with mTLS using the TRISA identity certificates
you were granted during registration.
● You are responsible for maintaining your own private keys
for your TRISA identity certificates.
● You are responsible for securely storing encrypted Travel
Rule data in compliance with local data retention regulations.
● If your TRISA certificates are compromised, you must revoke
them immediately so that new ones can be reissued.
About the Global
Directory
Service
5
The Global TRISA Directory Service (GDS) facilitates peer-to-peer exchanges
between TRISA members as follows:
● By issuing mTLS certificates to verify exchanges
● By providing discovery services for finding TRISA endpoints
● By providing VASP public certificate and KYCV (Know Your Counterparty
VASP) information for verification
Interactions with a Directory Service are specified by the TRISA protocol.
Currently, the TRISA organization hosts the GDS on behalf of the TRISA network.
The Global Directory Service (GDS)
The Global Directory Service (GDS)
The GDS serves as a
decentralized store of
member details.
It is replicated across
multiple continents.
The Global TRISA Directory Service issues
Identity Certificates for VASPs to verify
exchanges with peers.
Identity certificates:
- Are issued after extended validation
including business entity verification and a
phone interview.
- Prove that the VASP is a trusted member of
the TRISA network and are used to
establish mutually authenticated secure
communications between VASPs and the
Directory.
Issuing Identity Certificates
Discovery Services for Endpoints
The Global TRISA Directory Service
provides discovery services for finding
TRISA endpoints.
Only TRISA members have access to the
directory listing of other verified members
and can search and lookup counterparties
for information exchanges.
The Directory also manages the certificate
revocation list (CRL) to maintain the
network over time.
Certificate and KYC Information
The Global TRISA Directory Service
provides certificate and KYC information
for verification.
The Directory:
- Issues sealing keys and manages
revocation and reissuance of certificates.
- Provides public keys to facilitate sealing
key exchange and signature verification.
VASP LegalPerson records are available for
members to assist them in building
complete IVMS 101 records.
Working with
Secure Envelopes
6
Secure Envelope → Secure Envelope →
Encryption Key
HMAC Secret
Encryption Algorithm
HMAC Algorithm HMAC Signature
Payload
IVMS 101 Identities
Transaction Info
ID & Timestamp Sealing Key Info
Encryption Key
HMAC Secret
Encryption Algorithm
HMAC Algorithm HMAC Signature
Payload
IVMS 101 Identities
Transaction Info
ID & Timestamp Sealing Key Info
Originator VASP Beneficiary VASP
mTLS Encrypted
Channel
Originator VASP Beneficiary VASP
Step 1: The Originator VASP
finds the TRISA endpoint
address and public identity
key of the Beneficiary
VASP.
api.bob.vaspbot.net
Originator VASP Beneficiary VASP
Step 2: The Originator
VASP encrypts the sender’s
data and the transaction
details using an encryption
key.
What’s being encrypted?
IVMS 101 Identities
Transaction Details
What’s being encrypted?
IVMS 101 Identities
This data should be expressed using the interVASP
Messaging Standard (IVMS101), an internationally
recognized standard that helps with:
- language encodings
- numeric identification systems
- phonetic name pronunciations
- standardized country codes (ISO 3166)
The Originator VASP needs to encrypt and send two pieces
of data in IVMS101 format:
- Originator customer data
- Originator VASP data
{
“originator”: {
“originator_persons”: [{
“natural_person”: {
“name”: {
“name_identifiers": [{
"primary_identifier": "Verte”,
"secondary_identifier": "Sinead”,
"name_identifier_type": 1
}]
},
"geographic_addresses" : [{
"address_line": "456 Lime Blvd, Dublin",
"country": "IRL",
"address_type": 0
}],
“national_identification”: {
"national_identifier": "567567567",
"national_identifier_type": 1,
"country_of_issue": "IRL",
"registration_authority": "RA000234"
},
"customer_identification": "12345",
"date_and_place_of_birth": {
"date_of_birth" : "1984-08-01",
"place_of_birth" : "Dublin, Ireland"
},
"country_of_residence": "IRL"
}
}],
“account_numbers”: [
“2sdffsfd93kjhbkjhj55554ggtrt”
]
}
Natural Person
The first part of the Originator
details are the customer details.
TRISA defines the Originator as a
Natural Person using the
IVMS101 standard, shown in this
example.
{
“originating_vasp”: {
“originating_vasp”: {
“legal_person”: {
“name”: {
“name_identifiers": [{
"legal_person_name": "Kelly Green VASP, LLC",
"legal_person_name_identifier_type": 0
}, {
"legal_person_name": "Kelly Green",
"legal_person_name_identifier_type": 1
}]
},
"geographic_addresses" : [{
"address_line": "987 Chartreuse Lane, Dublin",
"country": "IRL",
"address_type": 0
}],
"customer_number": "12345",
“national_identification”: {
"national_identifier": "987987987",
"national_identifier_type": 8,
"country_of_issue": "IRL",
"registration_authority": "RA000999"
},
“country_of_registration”: “IRL”,
}
}
}
}
Legal Person
The second part of the Originator
details are the VASP details.
TRISA defines the Originator
VASP as a Legal Person using
the IVMS101 standard, shown in
this example.
What’s being encrypted?
Transaction Details
The transaction details specify:
- sender/originator
- intended recipient
- transaction amount
- other information used to identify the
transaction on the blockchain*
{
“amount” : 5,
"originator": "3XhHDu1Ngh7x9fcBs5KuThbSzw",
"beneficiary": "1ffXrcWge9Zi1ZngNia64u3Wd2v"
…
}
*see protocol buffer for details
Secure Envelope
Originator VASP Beneficiary VASP
Step 3: The Originator VASP creates a
Secure Envelope containing the
encrypted payload, the encryption key
and HMAC secret, and a timestamp,
sealing it with the Beneficiary’s public
identity key.
Originator VASP Beneficiary VASP
Step 4: The Originator VASP
opens an mTLS connection to
the Beneficiary VASP’s TRISA
endpoint and transmits the
Secure Envelope via a TRISA
Transfer message.
Originator VASP Beneficiary VASP
Step 5: The Beneficiary VASP
receives the Secure Envelope via
the mTLS connection and opens
it using their private identity
certificate.
Secure Envelope
Originator VASP Beneficiary VASP
Step 6: The Beneficiary VASP
validates the encryption key with
the HMAC secret.
✓
Originator VASP Beneficiary VASP
Step 7: The Beneficiary VASP
uses the key to decrypt the
identity payload
Originator VASP Beneficiary VASP
Step 8: The Beneficiary VASP
stores the Originator VASP and
sender details in a secure
location for Travel Rule
compliance.
Originator VASP Beneficiary VASP
Step 9: The Beneficiary VASP
encrypts the recipient’s data and
Beneficiary VASP data and creates
a secure envelope to send back to
the Originator VASP.
Originator VASP Beneficiary VASP
Step 10: The Beneficiary VASP
opens an mTLS connection to the
Originator VASP’s TRISA endpoint
and transmits the Secure
Envelope via a TRISA Transfer
message.
Secure Envelope
Originator VASP Beneficiary VASP
Step 11: The Originator VASP
opens the Secure Envelope,
decrypts the payload, and stores
the receiver and Beneficiary VASP
details securely for Travel Rule
compliance.
Benefits of Secure Envelopes
Non-
Repudiation
(Identity
Certificates)
Encryption in
Flight and at
Rest
Convenient for
Long-Term
Compliance
Storage
“Erasure” by
Deleting
Sealing
Certificates
Benefits of Secure Envelopes
1. Non-repudiation: Timestamps are digitally signed, meaning it is possible
to cryptographically prove that both parties have identical compliance
information exchanged at the time of the transaction.
2. Encryption In Flight and At Rest: Exchanges are encrypted both: (1) in
flight using mutually authenticated TLS (mTLS) version 1.3; and (2) at
rest through the use of multi-layer data cryptography.
3. Amenable to Long-term Storage: VASPs can retain encrypted
compliance data in accordance with jurisdictional data retention laws
(e.g. 5 or 7 years), though indexing and retrieval are more challenging.
4. Easy to Discard via "Erasure": Data can be erased when it no longer
needs to be maintained for compliance purposes simply by deleting the
private keys that decrypt the envelopes, making it impossible to open
the secure payload. This is called Erasure.
RESOURCES
Where to look for more information and assistance
trisa.io
General
information and
links
vaspdirectory.net
Submit your registration
to join the TRISA
Network
TRISA Slack
VASP A
VASP B
Connect with other
VASPs, regulators, and
engineers working on
Travel Rule compliance
trisa.dev
Documentation and
resources for developers
and technical teams
intervasp.org
Details about IVMS 101
and internationally
compatible data formats
Thanks!
Questions?
https://github.com/trisacrypto/trisa
trisa-workspace.slack.com
support@trisa.io
trisa.io

More Related Content

What's hot

2 TomcatによるWebアプリケーションサーバ構築 第2章 Tomcat概要(2)-セッション
2 TomcatによるWebアプリケーションサーバ構築 第2章 Tomcat概要(2)-セッション2 TomcatによるWebアプリケーションサーバ構築 第2章 Tomcat概要(2)-セッション
2 TomcatによるWebアプリケーションサーバ構築 第2章 Tomcat概要(2)-セッションEnpel
 
PHP-FPM の子プロセス制御方法と設定をおさらいしよう
PHP-FPM の子プロセス制御方法と設定をおさらいしようPHP-FPM の子プロセス制御方法と設定をおさらいしよう
PHP-FPM の子プロセス制御方法と設定をおさらいしようShohei Okada
 
NginxとLuaを用いた動的なリバースプロキシでデプロイを 100 倍速くした
NginxとLuaを用いた動的なリバースプロキシでデプロイを 100 倍速くしたNginxとLuaを用いた動的なリバースプロキシでデプロイを 100 倍速くした
NginxとLuaを用いた動的なリバースプロキシでデプロイを 100 倍速くしたtoshi_pp
 
目grep入門 +解説
目grep入門 +解説目grep入門 +解説
目grep入門 +解説murachue
 
日本OpenStackユーザ会 第37回勉強会
日本OpenStackユーザ会 第37回勉強会日本OpenStackユーザ会 第37回勉強会
日本OpenStackユーザ会 第37回勉強会Yushiro Furukawa
 
明日から使えるPostgre sql運用管理テクニック(監視編)
明日から使えるPostgre sql運用管理テクニック(監視編)明日から使えるPostgre sql運用管理テクニック(監視編)
明日から使えるPostgre sql運用管理テクニック(監視編)kasaharatt
 
Linux女子部 iptables復習編
Linux女子部 iptables復習編Linux女子部 iptables復習編
Linux女子部 iptables復習編Etsuji Nakai
 
Ansibleの最近の動向を追ってみた
Ansibleの最近の動向を追ってみたAnsibleの最近の動向を追ってみた
Ansibleの最近の動向を追ってみたKeijiUehata1
 
KeycloakでFAPIに対応した高セキュリティなAPIを公開する
KeycloakでFAPIに対応した高セキュリティなAPIを公開するKeycloakでFAPIに対応した高セキュリティなAPIを公開する
KeycloakでFAPIに対応した高セキュリティなAPIを公開するHitachi, Ltd. OSS Solution Center.
 
PowerApps に Power BI を埋め込んでみよう!
PowerApps に Power BI  を埋め込んでみよう!PowerApps に Power BI  を埋め込んでみよう!
PowerApps に Power BI を埋め込んでみよう!Teruchika Yamada
 
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向Hitachi, Ltd. OSS Solution Center.
 
Akka ActorとAMQPでLINEのメッセージングパイプラインをリプレースした話
Akka ActorとAMQPでLINEのメッセージングパイプラインをリプレースした話Akka ActorとAMQPでLINEのメッセージングパイプラインをリプレースした話
Akka ActorとAMQPでLINEのメッセージングパイプラインをリプレースした話LINE Corporation
 
Scapyで作る・解析するパケット
Scapyで作る・解析するパケットScapyで作る・解析するパケット
Scapyで作る・解析するパケットTakaaki Hoyo
 
Zabbix最新情報 ~Zabbix 6.0に向けて~ @OSC2021 Online/Fall
Zabbix最新情報 ~Zabbix 6.0に向けて~ @OSC2021 Online/FallZabbix最新情報 ~Zabbix 6.0に向けて~ @OSC2021 Online/Fall
Zabbix最新情報 ~Zabbix 6.0に向けて~ @OSC2021 Online/FallAtsushi Tanaka
 
Prometheus Operator 入門(Kubernetes Novice Tokyo #26 発表資料)
Prometheus Operator 入門(Kubernetes Novice Tokyo #26 発表資料)Prometheus Operator 入門(Kubernetes Novice Tokyo #26 発表資料)
Prometheus Operator 入門(Kubernetes Novice Tokyo #26 発表資料)NTT DATA Technology & Innovation
 
OpenStackをコマンドで攻める! 構築・運用とトラブル解決 - OpenStack最新情報セミナー 2014年6月
OpenStackをコマンドで攻める! 構築・運用とトラブル解決 - OpenStack最新情報セミナー 2014年6月OpenStackをコマンドで攻める! 構築・運用とトラブル解決 - OpenStack最新情報セミナー 2014年6月
OpenStackをコマンドで攻める! 構築・運用とトラブル解決 - OpenStack最新情報セミナー 2014年6月VirtualTech Japan Inc.
 
ジョブ管理でcronは限界があったので”Rundeck”を使ってハッピーになりました
ジョブ管理でcronは限界があったので”Rundeck”を使ってハッピーになりましたジョブ管理でcronは限界があったので”Rundeck”を使ってハッピーになりました
ジョブ管理でcronは限界があったので”Rundeck”を使ってハッピーになりましたYukiya Hayashi
 

What's hot (20)

2 TomcatによるWebアプリケーションサーバ構築 第2章 Tomcat概要(2)-セッション
2 TomcatによるWebアプリケーションサーバ構築 第2章 Tomcat概要(2)-セッション2 TomcatによるWebアプリケーションサーバ構築 第2章 Tomcat概要(2)-セッション
2 TomcatによるWebアプリケーションサーバ構築 第2章 Tomcat概要(2)-セッション
 
PHP-FPM の子プロセス制御方法と設定をおさらいしよう
PHP-FPM の子プロセス制御方法と設定をおさらいしようPHP-FPM の子プロセス制御方法と設定をおさらいしよう
PHP-FPM の子プロセス制御方法と設定をおさらいしよう
 
NginxとLuaを用いた動的なリバースプロキシでデプロイを 100 倍速くした
NginxとLuaを用いた動的なリバースプロキシでデプロイを 100 倍速くしたNginxとLuaを用いた動的なリバースプロキシでデプロイを 100 倍速くした
NginxとLuaを用いた動的なリバースプロキシでデプロイを 100 倍速くした
 
目grep入門 +解説
目grep入門 +解説目grep入門 +解説
目grep入門 +解説
 
WebSocket / WebRTCの技術紹介
WebSocket / WebRTCの技術紹介WebSocket / WebRTCの技術紹介
WebSocket / WebRTCの技術紹介
 
日本OpenStackユーザ会 第37回勉強会
日本OpenStackユーザ会 第37回勉強会日本OpenStackユーザ会 第37回勉強会
日本OpenStackユーザ会 第37回勉強会
 
明日から使えるPostgre sql運用管理テクニック(監視編)
明日から使えるPostgre sql運用管理テクニック(監視編)明日から使えるPostgre sql運用管理テクニック(監視編)
明日から使えるPostgre sql運用管理テクニック(監視編)
 
Linux女子部 iptables復習編
Linux女子部 iptables復習編Linux女子部 iptables復習編
Linux女子部 iptables復習編
 
HTTP/2 入門
HTTP/2 入門HTTP/2 入門
HTTP/2 入門
 
噛み砕いてKafka Streams #kafkajp
噛み砕いてKafka Streams #kafkajp噛み砕いてKafka Streams #kafkajp
噛み砕いてKafka Streams #kafkajp
 
Ansibleの最近の動向を追ってみた
Ansibleの最近の動向を追ってみたAnsibleの最近の動向を追ってみた
Ansibleの最近の動向を追ってみた
 
KeycloakでFAPIに対応した高セキュリティなAPIを公開する
KeycloakでFAPIに対応した高セキュリティなAPIを公開するKeycloakでFAPIに対応した高セキュリティなAPIを公開する
KeycloakでFAPIに対応した高セキュリティなAPIを公開する
 
PowerApps に Power BI を埋め込んでみよう!
PowerApps に Power BI  を埋め込んでみよう!PowerApps に Power BI  を埋め込んでみよう!
PowerApps に Power BI を埋め込んでみよう!
 
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向
 
Akka ActorとAMQPでLINEのメッセージングパイプラインをリプレースした話
Akka ActorとAMQPでLINEのメッセージングパイプラインをリプレースした話Akka ActorとAMQPでLINEのメッセージングパイプラインをリプレースした話
Akka ActorとAMQPでLINEのメッセージングパイプラインをリプレースした話
 
Scapyで作る・解析するパケット
Scapyで作る・解析するパケットScapyで作る・解析するパケット
Scapyで作る・解析するパケット
 
Zabbix最新情報 ~Zabbix 6.0に向けて~ @OSC2021 Online/Fall
Zabbix最新情報 ~Zabbix 6.0に向けて~ @OSC2021 Online/FallZabbix最新情報 ~Zabbix 6.0に向けて~ @OSC2021 Online/Fall
Zabbix最新情報 ~Zabbix 6.0に向けて~ @OSC2021 Online/Fall
 
Prometheus Operator 入門(Kubernetes Novice Tokyo #26 発表資料)
Prometheus Operator 入門(Kubernetes Novice Tokyo #26 発表資料)Prometheus Operator 入門(Kubernetes Novice Tokyo #26 発表資料)
Prometheus Operator 入門(Kubernetes Novice Tokyo #26 発表資料)
 
OpenStackをコマンドで攻める! 構築・運用とトラブル解決 - OpenStack最新情報セミナー 2014年6月
OpenStackをコマンドで攻める! 構築・運用とトラブル解決 - OpenStack最新情報セミナー 2014年6月OpenStackをコマンドで攻める! 構築・運用とトラブル解決 - OpenStack最新情報セミナー 2014年6月
OpenStackをコマンドで攻める! 構築・運用とトラブル解決 - OpenStack最新情報セミナー 2014年6月
 
ジョブ管理でcronは限界があったので”Rundeck”を使ってハッピーになりました
ジョブ管理でcronは限界があったので”Rundeck”を使ってハッピーになりましたジョブ管理でcronは限界があったので”Rundeck”を使ってハッピーになりました
ジョブ管理でcronは限界があったので”Rundeck”を使ってハッピーになりました
 

Similar to Getting Started with TRISA

Travel Rule Information Sharing Alliance
Travel Rule Information Sharing AllianceTravel Rule Information Sharing Alliance
Travel Rule Information Sharing AllianceJohn Jefferies
 
Data Structures for Data Privacy: Lessons Learned in Production
Data Structures for Data Privacy: Lessons Learned in ProductionData Structures for Data Privacy: Lessons Learned in Production
Data Structures for Data Privacy: Lessons Learned in ProductionRebecca Bilbro
 
Fintech summit 2016 thomson reuters tim baker_presentation final
Fintech summit 2016 thomson reuters tim baker_presentation finalFintech summit 2016 thomson reuters tim baker_presentation final
Fintech summit 2016 thomson reuters tim baker_presentation finalGlen Frost
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...FinTechLabs.io
 
The Challenges of Third Party Credentials & Why a Trusted Identity Registry i...
The Challenges of Third Party Credentials & Why a Trusted Identity Registry i...The Challenges of Third Party Credentials & Why a Trusted Identity Registry i...
The Challenges of Third Party Credentials & Why a Trusted Identity Registry i...ForgeRock
 
Digital Asset Transfer Authority Comments to Conference of State Bank Supervi...
Digital Asset Transfer Authority Comments to Conference of State Bank Supervi...Digital Asset Transfer Authority Comments to Conference of State Bank Supervi...
Digital Asset Transfer Authority Comments to Conference of State Bank Supervi...DataSecretariat
 
Chainyard BITA TYS presentation v0.1.11042019
Chainyard BITA TYS  presentation v0.1.11042019Chainyard BITA TYS  presentation v0.1.11042019
Chainyard BITA TYS presentation v0.1.11042019Mohan Venkataraman
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTForgeRock
 
FATF FinTech & RegTech initiative: Gilbraltar Distributed Ledger Technology R...
FATF FinTech & RegTech initiative: Gilbraltar Distributed Ledger Technology R...FATF FinTech & RegTech initiative: Gilbraltar Distributed Ledger Technology R...
FATF FinTech & RegTech initiative: Gilbraltar Distributed Ledger Technology R...FATF - Financial Action Task Force
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?ITU
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…Rochester Security Summit
 
Managing identity for the future how everybody can win - david alexander - ...
Managing identity for the future   how everybody can win - david alexander - ...Managing identity for the future   how everybody can win - david alexander - ...
Managing identity for the future how everybody can win - david alexander - ...Mydex CIC
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityOliver Pfaff
 

Similar to Getting Started with TRISA (20)

Travel Rule Information Sharing Alliance
Travel Rule Information Sharing AllianceTravel Rule Information Sharing Alliance
Travel Rule Information Sharing Alliance
 
Data Structures for Data Privacy: Lessons Learned in Production
Data Structures for Data Privacy: Lessons Learned in ProductionData Structures for Data Privacy: Lessons Learned in Production
Data Structures for Data Privacy: Lessons Learned in Production
 
Fintech summit 2016 thomson reuters tim baker_presentation final
Fintech summit 2016 thomson reuters tim baker_presentation finalFintech summit 2016 thomson reuters tim baker_presentation final
Fintech summit 2016 thomson reuters tim baker_presentation final
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
 
The Challenges of Third Party Credentials & Why a Trusted Identity Registry i...
The Challenges of Third Party Credentials & Why a Trusted Identity Registry i...The Challenges of Third Party Credentials & Why a Trusted Identity Registry i...
The Challenges of Third Party Credentials & Why a Trusted Identity Registry i...
 
ENTITY EXCHANGE FOR SELL-SIDE FIRMS
ENTITY EXCHANGE FOR SELL-SIDE FIRMSENTITY EXCHANGE FOR SELL-SIDE FIRMS
ENTITY EXCHANGE FOR SELL-SIDE FIRMS
 
Transforming services through identity & eligibility checking | Ian Litton | ...
Transforming services through identity & eligibility checking | Ian Litton | ...Transforming services through identity & eligibility checking | Ian Litton | ...
Transforming services through identity & eligibility checking | Ian Litton | ...
 
Digital Asset Transfer Authority Comments to Conference of State Bank Supervi...
Digital Asset Transfer Authority Comments to Conference of State Bank Supervi...Digital Asset Transfer Authority Comments to Conference of State Bank Supervi...
Digital Asset Transfer Authority Comments to Conference of State Bank Supervi...
 
Blockchain and Competition – CORBETT – June 2018 OECD discussion
Blockchain and Competition – CORBETT – June 2018 OECD discussionBlockchain and Competition – CORBETT – June 2018 OECD discussion
Blockchain and Competition – CORBETT – June 2018 OECD discussion
 
Chainyard BITA TYS presentation v0.1.11042019
Chainyard BITA TYS  presentation v0.1.11042019Chainyard BITA TYS  presentation v0.1.11042019
Chainyard BITA TYS presentation v0.1.11042019
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
 
FATF FinTech & RegTech initiative: Gilbraltar Distributed Ledger Technology R...
FATF FinTech & RegTech initiative: Gilbraltar Distributed Ledger Technology R...FATF FinTech & RegTech initiative: Gilbraltar Distributed Ledger Technology R...
FATF FinTech & RegTech initiative: Gilbraltar Distributed Ledger Technology R...
 
Tfs
TfsTfs
Tfs
 
FirstNet ICAM
FirstNet ICAMFirstNet ICAM
FirstNet ICAM
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…
 
Managing identity for the future how everybody can win - david alexander - ...
Managing identity for the future   how everybody can win - david alexander - ...Managing identity for the future   how everybody can win - david alexander - ...
Managing identity for the future how everybody can win - david alexander - ...
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 

More from Benjamin Bengfort

Visual diagnostics for more effective machine learning
Visual diagnostics for more effective machine learningVisual diagnostics for more effective machine learning
Visual diagnostics for more effective machine learningBenjamin Bengfort
 
Visualizing Model Selection with Scikit-Yellowbrick: An Introduction to Devel...
Visualizing Model Selection with Scikit-Yellowbrick: An Introduction to Devel...Visualizing Model Selection with Scikit-Yellowbrick: An Introduction to Devel...
Visualizing Model Selection with Scikit-Yellowbrick: An Introduction to Devel...Benjamin Bengfort
 
Dynamics in graph analysis (PyData Carolinas 2016)
Dynamics in graph analysis (PyData Carolinas 2016)Dynamics in graph analysis (PyData Carolinas 2016)
Dynamics in graph analysis (PyData Carolinas 2016)Benjamin Bengfort
 
Visualizing the Model Selection Process
Visualizing the Model Selection ProcessVisualizing the Model Selection Process
Visualizing the Model Selection ProcessBenjamin Bengfort
 
A Primer on Entity Resolution
A Primer on Entity ResolutionA Primer on Entity Resolution
A Primer on Entity ResolutionBenjamin Bengfort
 
An Interactive Visual Analytics Dashboard for the Employment Situation Report
An Interactive Visual Analytics Dashboard for the Employment Situation ReportAn Interactive Visual Analytics Dashboard for the Employment Situation Report
An Interactive Visual Analytics Dashboard for the Employment Situation ReportBenjamin Bengfort
 
Graph Based Machine Learning on Relational Data
Graph Based Machine Learning on Relational DataGraph Based Machine Learning on Relational Data
Graph Based Machine Learning on Relational DataBenjamin Bengfort
 
Introduction to Machine Learning with SciKit-Learn
Introduction to Machine Learning with SciKit-LearnIntroduction to Machine Learning with SciKit-Learn
Introduction to Machine Learning with SciKit-LearnBenjamin Bengfort
 
Fast Data Analytics with Spark and Python
Fast Data Analytics with Spark and PythonFast Data Analytics with Spark and Python
Fast Data Analytics with Spark and PythonBenjamin Bengfort
 
Evolutionary Design of Swarms (SSCI 2014)
Evolutionary Design of Swarms (SSCI 2014)Evolutionary Design of Swarms (SSCI 2014)
Evolutionary Design of Swarms (SSCI 2014)Benjamin Bengfort
 
An Overview of Spanner: Google's Globally Distributed Database
An Overview of Spanner: Google's Globally Distributed DatabaseAn Overview of Spanner: Google's Globally Distributed Database
An Overview of Spanner: Google's Globally Distributed DatabaseBenjamin Bengfort
 
Graph Analyses with Python and NetworkX
Graph Analyses with Python and NetworkXGraph Analyses with Python and NetworkX
Graph Analyses with Python and NetworkXBenjamin Bengfort
 
Natural Language Processing with Python
Natural Language Processing with PythonNatural Language Processing with Python
Natural Language Processing with PythonBenjamin Bengfort
 
Beginners Guide to Non-Negative Matrix Factorization
Beginners Guide to Non-Negative Matrix FactorizationBeginners Guide to Non-Negative Matrix Factorization
Beginners Guide to Non-Negative Matrix FactorizationBenjamin Bengfort
 
Building Data Products with Python (Georgetown)
Building Data Products with Python (Georgetown)Building Data Products with Python (Georgetown)
Building Data Products with Python (Georgetown)Benjamin Bengfort
 
Building Data Apps with Python
Building Data Apps with PythonBuilding Data Apps with Python
Building Data Apps with PythonBenjamin Bengfort
 

More from Benjamin Bengfort (19)

Visual diagnostics for more effective machine learning
Visual diagnostics for more effective machine learningVisual diagnostics for more effective machine learning
Visual diagnostics for more effective machine learning
 
Visualizing Model Selection with Scikit-Yellowbrick: An Introduction to Devel...
Visualizing Model Selection with Scikit-Yellowbrick: An Introduction to Devel...Visualizing Model Selection with Scikit-Yellowbrick: An Introduction to Devel...
Visualizing Model Selection with Scikit-Yellowbrick: An Introduction to Devel...
 
Dynamics in graph analysis (PyData Carolinas 2016)
Dynamics in graph analysis (PyData Carolinas 2016)Dynamics in graph analysis (PyData Carolinas 2016)
Dynamics in graph analysis (PyData Carolinas 2016)
 
Visualizing the Model Selection Process
Visualizing the Model Selection ProcessVisualizing the Model Selection Process
Visualizing the Model Selection Process
 
Data Product Architectures
Data Product ArchitecturesData Product Architectures
Data Product Architectures
 
A Primer on Entity Resolution
A Primer on Entity ResolutionA Primer on Entity Resolution
A Primer on Entity Resolution
 
An Interactive Visual Analytics Dashboard for the Employment Situation Report
An Interactive Visual Analytics Dashboard for the Employment Situation ReportAn Interactive Visual Analytics Dashboard for the Employment Situation Report
An Interactive Visual Analytics Dashboard for the Employment Situation Report
 
Graph Based Machine Learning on Relational Data
Graph Based Machine Learning on Relational DataGraph Based Machine Learning on Relational Data
Graph Based Machine Learning on Relational Data
 
Introduction to Machine Learning with SciKit-Learn
Introduction to Machine Learning with SciKit-LearnIntroduction to Machine Learning with SciKit-Learn
Introduction to Machine Learning with SciKit-Learn
 
Fast Data Analytics with Spark and Python
Fast Data Analytics with Spark and PythonFast Data Analytics with Spark and Python
Fast Data Analytics with Spark and Python
 
Evolutionary Design of Swarms (SSCI 2014)
Evolutionary Design of Swarms (SSCI 2014)Evolutionary Design of Swarms (SSCI 2014)
Evolutionary Design of Swarms (SSCI 2014)
 
An Overview of Spanner: Google's Globally Distributed Database
An Overview of Spanner: Google's Globally Distributed DatabaseAn Overview of Spanner: Google's Globally Distributed Database
An Overview of Spanner: Google's Globally Distributed Database
 
Graph Analyses with Python and NetworkX
Graph Analyses with Python and NetworkXGraph Analyses with Python and NetworkX
Graph Analyses with Python and NetworkX
 
Natural Language Processing with Python
Natural Language Processing with PythonNatural Language Processing with Python
Natural Language Processing with Python
 
Beginners Guide to Non-Negative Matrix Factorization
Beginners Guide to Non-Negative Matrix FactorizationBeginners Guide to Non-Negative Matrix Factorization
Beginners Guide to Non-Negative Matrix Factorization
 
Building Data Products with Python (Georgetown)
Building Data Products with Python (Georgetown)Building Data Products with Python (Georgetown)
Building Data Products with Python (Georgetown)
 
Annotation with Redfox
Annotation with RedfoxAnnotation with Redfox
Annotation with Redfox
 
Rasta processing of speech
Rasta processing of speechRasta processing of speech
Rasta processing of speech
 
Building Data Apps with Python
Building Data Apps with PythonBuilding Data Apps with Python
Building Data Apps with Python
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Getting Started with TRISA

  • 2. — HARPER LEE / TO KILL A MOCKINGBIRD “You never really understand a person until you consider things from his point of view.”
  • 3. TRISA is an open peer-to-peer network that supports information sharing between members What is TRISA? Getting Started with TRISA Getting Certified To join the network, register with your legal, business, and technical details Member Responsibilities Members must store shared details and operate an endpoint to respond to incoming requests About the Global Directory Service (GDS) The GDS grants certificates and serves as a decentralized store of member details Working with Secure Envelopes 6 Learn the fundamental data structures that enable secure information exchange 5 4 2 1 Member Benefits 3 Members can request details about other members for Travel Rule compliance
  • 5. This is Alice ● Alice wants to send digital assets in the form of cryptocurrency ● Alice lives in the US and she wants to send the equivalent of $3,500 in cryptocurrency to her friend Bob, who lives abroad. ● She uses a Virtual Assets Service Provider (VASP) to do this. ● Under the Travel Rule, Alice’s VASP has a legal responsibility to keep a record of all the parties involved – not just data about Alice, but also about Bob and his VASP.
  • 6. This is Bob ● Bob lives in Singapore. ● Bob also uses a Virtual Assets Service Provider (VASP) to manage cryptocurrency transactions. ● Depending on his local government regulations, Bob’s VASP may also have a legal responsibility to keep records about Bob, Alice, and Alice’s VASP.
  • 7. That’s a lot of records! The recently enacted Travel Rule is changing how VASPs use customer data, as well as how much non-customer data they store.
  • 8. The “travel rule” refers to guidance published by the Financial Action Task Force (FATF), an independent inter-governmental body that develops policies to combat money laundering and the financing of terrorism. What is the Travel Rule?
  • 9. The guidance requires Virtual Assets Service Providers “to obtain, hold, and transmit required originator and beneficiary information in order to identify and report suspicious transactions, monitor the availability of information, take freezing actions, and prohibit transactions with designated persons and entities.” What is the Travel Rule?
  • 10. This raises many questions… How can VASPs make sense of each other’s data? How can they keep customer details secure? How can they trust other VASPs to keep their customer data secure?
  • 11. The Travel Rule Information Sharing Architecture (TRISA) was initiated in July 2019 as a response to emerging regulations from the FATF and FinCEN around data transfer for cryptocurrency transactions between Virtual Asset Service Providers (VASPs). Introducing TRISA
  • 12. The goal of TRISA is to enable compliance with the FATF and FinCEN Travel Rules, as well as Travel Rules implemented by equivalent authorities, without: ● modifying the core blockchain protocols. ● incurring increased transaction costs. ● modifying virtual currency peer-to-peer transaction flows. Introducing TRISA
  • 13. TRISA aims to do this on a global level while: ● Protecting user privacy ● Ensuring fast and inexpensive transactions ● Remaining open source and decentralized ● Having an open governance body ● Maintaining interoperability with other approaches It helps VASPs demonstrate the technical capability to comply with the Travel Rule, which may help with licensing, depending on the jurisdiction. Introducing TRISA
  • 14. Why you should start meeting Travel Rule requirements today? ● Signal to regulators that your business is taking regulations seriously. Ensure your business receives its licenses on time without disrupting go-to-market strategy. ● Signal to counterparties that your compliance program is up to par. Give your customers and partners the confidence to keep working with you, open up new opportunities, and gain an advantage in the market. Introducing TRISA
  • 15. TRISA is designed with the six following guiding principles: ● Open Architecture ● Open Source ● Secure ● Private ● Decentralized ● Reliable Introducing TRISA
  • 16. Who can join TRISA? ● Virtual Asset Service Providers (VASPs) ● Crypto Asset Service Providers (CASPs) ● Money Service Businesses (MSBs) ● Traditional financial services institutions ● Regulatory bodies Introducing TRISA
  • 17. A Peer-to-Peer Network At its heart, TRISA is a peer-to-peer network. It’s a decentralized and secure messaging layer. No single person, organization, or government controls it.
  • 18. A Peer-to-Peer Network Alice’s VASP Bob’s VASP The “peers” in the TRISA network are VASPs who are following their legal recordkeeping responsibilities by exchanging customer, business, and legal data once an applicable transaction occurs.
  • 19. A Peer-to-Peer Network Alice’s VASP Bob’s VASP TRISA is a special kind of peer-to-peer network — a trusted network. This means that the communications between peers are protected, unlike those on ordinary p2p networks.
  • 20. A Peer-to-Peer Network Alice’s VASP Bob’s VASP The protection comes in the form of mutual authentication (mTLS). When Alice’s VASP registers for TRISA, it receives Identity Certificates, which serve as proof to Bob’s VASP that Alice’s VASP is who they say they are, and vice versa.
  • 21. A Peer-to-Peer Network Alice’s VASP Bob’s VASP TRISA’s messaging framework is based on proven security technologies: ● Certificate Authority (CA): TRISA employs the CA model, commonly used in e-commerce and gov’t communications, to issue Identity Certificates to Members. ● Public Key Cryptography (PKC): TRISA uses PKC to encrypt Travel Rule data packets.
  • 22. A Peer-to-Peer Network The TRISA Network includes VASPs from all over the world, including Singapore, Germany, Taiwan, the Philippines, the Czech Republic, and the United States.
  • 23. What TRISA Is and What It Is Not TRISA is… TRISA is NOT … A peer-to-peer network of vetted Members A centralized service A secure messaging protocol A complete Travel Rule solution An open source initiative A proprietary service Interoperable with other solutions A closed framework A messaging layer on top of blockchains A means for address confirmation
  • 25. TRISA Certification Process ● TRISA acts as the root of trust. It is the Trusted VASP Certificate Authority (TVCA) and issues Identity Certificates to Members. ● VASPs must complete a formal registration and due diligence process by TRISA that includes physical and digital verification of the VASP. ● The verification process follows FATF’s Recommendations for VASP licensing and registration. ● The process is designed to be thorough and rigorous, but not financially burdensome for VASPs to complete on their own; it does not require a third-party auditor or hefty fees. ● TRISA verifies all data submitted by VASPs and conducts sanctions checks.
  • 26. Step 1: Get Certified ● The first step is to formally join the TRISA network. ● To become a member, a VASP must submit a registration. ● Once approved, the VASP will receive digital certificates (cryptographic key-pairs), which can be used in secure TRISA information exchanges with other members.
  • 27. What You’ll Need ● Your business details, e.g. ○ Your company name and website ○ What type of business/VASP you are ● Your legal details, e.g. ○ Legal name ○ Country and address ○ Government identification number ● Points of contact: ○ Technical and Legal/Compliance (required) ○ Administrative and/or Billing (optional) ● Endpoint details ● Jurisdiction details
  • 28. Make sure you have all your details ready before you begin registration!
  • 29. Business Details 1. Company Name 2. Date of Incorporation/ Establishment 3. Company Website 4. Business Category ○ Private Organization ○ Business Entity ○ Government Entity ○ Non-Commercial Entity 5. VASP Category ○ Centralized Exchange ○ Decentralized Exchange ○ Person-to-Person Exchange ○ Kiosk/Crypto ATM Operator ○ Custody Provider ○ Over-The-Counter Trading Desk ○ Investment Fund ○ Token Project ○ Gambling or Gaming Site ○ Mining Pool ○ Mixing Service ○ Legal Person ○ Other
  • 30. Legal Details ● The Legal Person is how TRISA defines your business entity. ● TRISA uses the IVMS 101 data standard to describe the business entity. ● IVMS 101 defines a Legal Person* as having: 1. One or more Name Identifiers (Legal Name, Short Name, Trading Name) 2. Zero or more Local and/or Phonetic Names (other spellings, translations, etc) 3. One or more physical geographical address 4. The country where your business is headquartered 5. National Identification (e.g. LEIX) *Depending on your business details, other fields may be required.
  • 31. Key Points-of-Contact 1. Technical Contact (Required) Primary contact for handling technical queries about the operation and status of your service participating in the TRISA network. Can be a group or admin email. 2. Legal/Compliance Contact (Required) Compliance officer or legal contact for requests about the compliance requirements and legal status of your organization. 3. Administrative Contact (Optional) Administrative or executive contact for your organization to field high-level requests or queries. 4. Billing Contact (Optional) Billing contact for your organization to handle account and invoice requests or queries relating to the operation of the TRISA network.
  • 32. Endpoint Details Each VASP is required to establish a TRISA endpoint for inter-VASP communication. To join TRISA and be issued a certificate, you must specify two details of your endpoint in your registration: 1. TRISA Endpoint ○ The address and port of the TRISA endpoint for partner VASPs to connect on via gRPC. ○ Example: trisa.myvasp.com:4321 2. Certificate Common Name ○ The common name for the mTLS certificate. ○ This should match the TRISA endpoint, without the port, in most cases. ○ Example: trisa.myvasp.com
  • 33. Jurisdiction Details ● aka “The TRIXO Questionnaire” ○ Primary National Jurisdiction ○ Name of Primary Regulator ○ Applicable Regulations ○ Currency Threshold ○ etc. ● This will help your Members understand the regulatory regime of your organization. ● The information you provide will help ensure that required compliance information exchanges are conducted correctly and safely. ● Where required, a counter-party or any VASP involved in the transaction will have access to this information.
  • 35. Why VASPs Choose TRISA Safeguards private customer data Counterparty lookups and verification Synchronous and asynchronous transfer Fully decentralized data layer Common technical messaging framework Standardized data formats
  • 36. VASP Decision Point: DIY vs COTS Upon verification, VASPs must integrate with TRISA to begin exchanging Travel Rule data with other verified TRISA members. Since TRISA is open source and interoperable, VASPs have two options. Option 1. Do it Yourself (DIY) Set Up Your Own TRISA Node VASPs can set up and maintain their own TRISA server to exchange encrypted Travel Rule compliance data. TRISA maintains a GitHub repository with detailed documentation, a reference implementation, and “robot” VASPs for testing purposes. Option 2. Commercial Off the Shelf (COTS) Use a 3rd-party Solution There are several Travel Rule solutions providers available on the market that are interoperable with TRISA. If you are a customer, work with them to integrate TRISA into your Travel Rule compliance workflow.
  • 37. Open Source Resources & Considerations TRISA maintains open source resources for building, testing, and deploying a TRISA node. ● Github repository ○ Reference implementation ○ “Robot” VASPs for test transactions ● Documentation ● TRISA Slack Open Source implementers must consider: ● Systems integration: How will your TRISA node integrate with your backend systems? ● Data storage: How will you store encrypted secure envelopes? ● Key management: How will you manage the keys for secure envelopes?
  • 38. 3rd Party Travel Rule Solutions VASPs may choose to work with a COTS Travel Rule solution. VASPs should evaluate the solutions, select the one that best fits their needs, and work with the provider to integrate with TRISA. A non-exhaustive list of commercial solutions include: ● 21 Analytics ● CipherTrace Traveler ● CoinBase TRUST ● Sygna Bridge ● NotaBene
  • 39.
  • 41. 3 Responsibilities of Members Communication It is your responsibility to communicate and interact directly with your peer VASPs. Operations It is your responsibility to deploy and maintain your TRISA endpoint to keep it operational. Security It is your responsibility to protect the security of the network, including data, passwords and certificates.
  • 42. Communication ● Because TRISA is a decentralized network, there is no central body designated to facilitate communications between VASPs. ● TRISA exchanges go in two directions, and you must be prepared to respond to other VASPs requests for information as well as sending your own requests. ● It is your responsibility to coordinate directly with your peer VASPs. ○ For secure information sharing, use the TRISA protocol. ○ For informal communications, use the TRISA Slack group.
  • 43. Operations ● You must deploy a TRISA endpoint that enables you to respond to requests from peer VASPs. ○ An endpoint is like a phone number or web address where your peers can reach you. ○ It looks a bit like a URL, e.g. api.alice.vaspbot.net:443 ● You must maintain your TRISA endpoint and ensure it remains healthy and operational. ● If you do not have an engineering team capable of deploying and maintaining your TRISA endpoint, there are third party tools that offer support and hosting.
  • 44. Security ● To connect to a peer’s TRISA endpoint, you must authenticate with mTLS using the TRISA identity certificates you were granted during registration. ● You are responsible for maintaining your own private keys for your TRISA identity certificates. ● You are responsible for securely storing encrypted Travel Rule data in compliance with local data retention regulations. ● If your TRISA certificates are compromised, you must revoke them immediately so that new ones can be reissued.
  • 46. The Global TRISA Directory Service (GDS) facilitates peer-to-peer exchanges between TRISA members as follows: ● By issuing mTLS certificates to verify exchanges ● By providing discovery services for finding TRISA endpoints ● By providing VASP public certificate and KYCV (Know Your Counterparty VASP) information for verification Interactions with a Directory Service are specified by the TRISA protocol. Currently, the TRISA organization hosts the GDS on behalf of the TRISA network. The Global Directory Service (GDS)
  • 47. The Global Directory Service (GDS) The GDS serves as a decentralized store of member details. It is replicated across multiple continents.
  • 48. The Global TRISA Directory Service issues Identity Certificates for VASPs to verify exchanges with peers. Identity certificates: - Are issued after extended validation including business entity verification and a phone interview. - Prove that the VASP is a trusted member of the TRISA network and are used to establish mutually authenticated secure communications between VASPs and the Directory. Issuing Identity Certificates
  • 49. Discovery Services for Endpoints The Global TRISA Directory Service provides discovery services for finding TRISA endpoints. Only TRISA members have access to the directory listing of other verified members and can search and lookup counterparties for information exchanges. The Directory also manages the certificate revocation list (CRL) to maintain the network over time.
  • 50. Certificate and KYC Information The Global TRISA Directory Service provides certificate and KYC information for verification. The Directory: - Issues sealing keys and manages revocation and reissuance of certificates. - Provides public keys to facilitate sealing key exchange and signature verification. VASP LegalPerson records are available for members to assist them in building complete IVMS 101 records.
  • 52. Secure Envelope → Secure Envelope → Encryption Key HMAC Secret Encryption Algorithm HMAC Algorithm HMAC Signature Payload IVMS 101 Identities Transaction Info ID & Timestamp Sealing Key Info Encryption Key HMAC Secret Encryption Algorithm HMAC Algorithm HMAC Signature Payload IVMS 101 Identities Transaction Info ID & Timestamp Sealing Key Info Originator VASP Beneficiary VASP mTLS Encrypted Channel
  • 53. Originator VASP Beneficiary VASP Step 1: The Originator VASP finds the TRISA endpoint address and public identity key of the Beneficiary VASP. api.bob.vaspbot.net
  • 54. Originator VASP Beneficiary VASP Step 2: The Originator VASP encrypts the sender’s data and the transaction details using an encryption key.
  • 55. What’s being encrypted? IVMS 101 Identities Transaction Details
  • 56. What’s being encrypted? IVMS 101 Identities This data should be expressed using the interVASP Messaging Standard (IVMS101), an internationally recognized standard that helps with: - language encodings - numeric identification systems - phonetic name pronunciations - standardized country codes (ISO 3166) The Originator VASP needs to encrypt and send two pieces of data in IVMS101 format: - Originator customer data - Originator VASP data
  • 57. { “originator”: { “originator_persons”: [{ “natural_person”: { “name”: { “name_identifiers": [{ "primary_identifier": "Verte”, "secondary_identifier": "Sinead”, "name_identifier_type": 1 }] }, "geographic_addresses" : [{ "address_line": "456 Lime Blvd, Dublin", "country": "IRL", "address_type": 0 }], “national_identification”: { "national_identifier": "567567567", "national_identifier_type": 1, "country_of_issue": "IRL", "registration_authority": "RA000234" }, "customer_identification": "12345", "date_and_place_of_birth": { "date_of_birth" : "1984-08-01", "place_of_birth" : "Dublin, Ireland" }, "country_of_residence": "IRL" } }], “account_numbers”: [ “2sdffsfd93kjhbkjhj55554ggtrt” ] } Natural Person The first part of the Originator details are the customer details. TRISA defines the Originator as a Natural Person using the IVMS101 standard, shown in this example.
  • 58. { “originating_vasp”: { “originating_vasp”: { “legal_person”: { “name”: { “name_identifiers": [{ "legal_person_name": "Kelly Green VASP, LLC", "legal_person_name_identifier_type": 0 }, { "legal_person_name": "Kelly Green", "legal_person_name_identifier_type": 1 }] }, "geographic_addresses" : [{ "address_line": "987 Chartreuse Lane, Dublin", "country": "IRL", "address_type": 0 }], "customer_number": "12345", “national_identification”: { "national_identifier": "987987987", "national_identifier_type": 8, "country_of_issue": "IRL", "registration_authority": "RA000999" }, “country_of_registration”: “IRL”, } } } } Legal Person The second part of the Originator details are the VASP details. TRISA defines the Originator VASP as a Legal Person using the IVMS101 standard, shown in this example.
  • 59. What’s being encrypted? Transaction Details The transaction details specify: - sender/originator - intended recipient - transaction amount - other information used to identify the transaction on the blockchain* { “amount” : 5, "originator": "3XhHDu1Ngh7x9fcBs5KuThbSzw", "beneficiary": "1ffXrcWge9Zi1ZngNia64u3Wd2v" … } *see protocol buffer for details
  • 60. Secure Envelope Originator VASP Beneficiary VASP Step 3: The Originator VASP creates a Secure Envelope containing the encrypted payload, the encryption key and HMAC secret, and a timestamp, sealing it with the Beneficiary’s public identity key.
  • 61. Originator VASP Beneficiary VASP Step 4: The Originator VASP opens an mTLS connection to the Beneficiary VASP’s TRISA endpoint and transmits the Secure Envelope via a TRISA Transfer message.
  • 62. Originator VASP Beneficiary VASP Step 5: The Beneficiary VASP receives the Secure Envelope via the mTLS connection and opens it using their private identity certificate. Secure Envelope
  • 63. Originator VASP Beneficiary VASP Step 6: The Beneficiary VASP validates the encryption key with the HMAC secret. ✓
  • 64. Originator VASP Beneficiary VASP Step 7: The Beneficiary VASP uses the key to decrypt the identity payload
  • 65. Originator VASP Beneficiary VASP Step 8: The Beneficiary VASP stores the Originator VASP and sender details in a secure location for Travel Rule compliance.
  • 66. Originator VASP Beneficiary VASP Step 9: The Beneficiary VASP encrypts the recipient’s data and Beneficiary VASP data and creates a secure envelope to send back to the Originator VASP.
  • 67. Originator VASP Beneficiary VASP Step 10: The Beneficiary VASP opens an mTLS connection to the Originator VASP’s TRISA endpoint and transmits the Secure Envelope via a TRISA Transfer message. Secure Envelope
  • 68. Originator VASP Beneficiary VASP Step 11: The Originator VASP opens the Secure Envelope, decrypts the payload, and stores the receiver and Beneficiary VASP details securely for Travel Rule compliance.
  • 69. Benefits of Secure Envelopes Non- Repudiation (Identity Certificates) Encryption in Flight and at Rest Convenient for Long-Term Compliance Storage “Erasure” by Deleting Sealing Certificates
  • 70. Benefits of Secure Envelopes 1. Non-repudiation: Timestamps are digitally signed, meaning it is possible to cryptographically prove that both parties have identical compliance information exchanged at the time of the transaction. 2. Encryption In Flight and At Rest: Exchanges are encrypted both: (1) in flight using mutually authenticated TLS (mTLS) version 1.3; and (2) at rest through the use of multi-layer data cryptography. 3. Amenable to Long-term Storage: VASPs can retain encrypted compliance data in accordance with jurisdictional data retention laws (e.g. 5 or 7 years), though indexing and retrieval are more challenging. 4. Easy to Discard via "Erasure": Data can be erased when it no longer needs to be maintained for compliance purposes simply by deleting the private keys that decrypt the envelopes, making it impossible to open the secure payload. This is called Erasure.
  • 71. RESOURCES Where to look for more information and assistance
  • 74. TRISA Slack VASP A VASP B Connect with other VASPs, regulators, and engineers working on Travel Rule compliance
  • 75. trisa.dev Documentation and resources for developers and technical teams
  • 76. intervasp.org Details about IVMS 101 and internationally compatible data formats