SlideShare a Scribd company logo
1 of 15
Download to read offline
2
The International Data
Spaces Association
(IDSA) has defined a
data sharing scheme
including a reference
architecture and a set of
agreements to be used
for creating and
operating virtual data
spaces. The IDS
Scheme is based on
commonly accepted
data governance
models facilitating
secure exchange and
easy linkage of data
within business
ecosystems.
The IDS Scheme
ensures digital
sovereignty for data
owners making data
available for bteing
exchanged or shared. It
thereby constitutes the
basis for developing
and offering smart
services and for
establishing innovative
business processes.
The IDS initiative aims
at defining the technical
base and set of
agreements for secure
and trusted data
spaces, in which
companies of any size
and from any industry
can manage their data
assets in a sovereign
fashion. It addresses
companies and other
organizations from
across Europe and
beyond. IDSA already
counts over one-
hundred member
organizations from
twenty countries.
1.
IDS – the data sharing
solution
3
2.
Data sharing services -
making IDS happen –
an overview
SERVICE
PROVIDER
DATA
PROVI-
DER
DATA
USER
DATA
OWNER
IDENTITY
PROVIDER
DATA
CONSU-
MER
Transferdata
Recieve
data
Publish metadata
Authorize
U
se data
apps
Publish app
U
se data
app
Log transactionLog transaction
Search metadata
Use
metadata
Provide
vocabularies
BROKER
SERVICE
PROVIDER
CLEARING
HOUSE
APP STORE
PROVIDER
APP
PROVIDER
VOCABULARY
PROVIDER
CERTIFICATION
BODY
To enable companies to
participate in the IDS
data sharing solution, a
number of services are
required. Services
enabling companies to
sign up to the solution,
to define which data
they want to share (if
they act as data
provider) – and where
to find which data (if
they act as data
consumer), to clear the
contractual or legal
issues, such as usage
rights and price as well
as fulfilment of those
contracts including
payment and regulation
in case of dispute.
4
To secure an easy entry into the future of data
sharing, IDSA is setting up to entities providing
these required services:
IDS Support
Organization GmbH is
a non-profit company
of IDSA which
orchestrates the
essential services
securing trust to the
IDS solution. IDS SO
GmbH is a 100 %
subsidiary of IDSA.
Truzzt.org SE is a
European stock
company. Truzzt will
implement and operate
services required to
enable the physical data
sharing between
companies. Truzzt will
be founded by a
network of strategic
partners sharing the
interest of forming the
future of the IDS data
sharing solution.
Logistic
Maritim
Manufa-
cturing
Supply
Chain
F&B Agri-
cultural
Mobility Finance
Health-
care
Smart
Cities
Generic functionality
for data ecosystems
Industry groups
VERTICALS
MARKET
SPECIFIC
SOLUTIONS
BASE DATA
SOVEREIGNTY
SERVICES
ESSENTIAL DATA
SOVEREIGNTY
SERVICES
Evaluation Facilities
Identity Provider
essential functionality
for data ecosystems
CA
IDSA Support
Organization
GmbH
Certification
Body
DAPS ParIS DTM
IDSAStandards&specificationsofrdatasovereignty
definethetechnicalbasis/standardsfofrdataexchange
5
IDS SO is the entity securing trust to the IDS solutions. This entity is responsible
for the orchestration of the essential services which will be provided by several
companies providing their services according to the regulation defined in the IDS
Rule Book which also includes the code of conduct for the IDS data sharing
solution. The following services are contained:
2.1
IDS Support Organization GmbH:
(safeguarding the essential services)
Identity
management (CA):
To secure the flow of
data between entities,
the parties in the digital
ecosystem must be able
to digitally identify and
authenticate
themselves. As part of
the “essential services”
identity management
(ID verification and -
certification) will be
provided.
Certification (for
components and
organizations) and
SW testing:
Certification of
companies and
connectors will be
conducted by the
certification unit. This
unit will also provide
consultancy and pre-
defined test procedures
for SW prior to
certification.
Only certified units and
connectors can take
part in the IDS eco
system. The criteria are
defined in DIN SPEC
27070 and in the
criteria catalogue in the
IDS Rule Book .
DAPS (Dynamic
Attribute
Provisioning
System):
Efficient management
of certificates and
metadata, streamlining
the process and
reducing cost through
use of a dynamic
attribute provisioning
system.
6
IDS SO will organize these processes whereby it
ensures the provisioning and SLA of the essential
services provided by companies from the market:
Service Center
Certification Body
Evaluation Facility
Testing Facility
Certification Authority DAPS ParIS
Connector Provider
Implementation
Partner
Competence
Center
IDSA Hubs
Adoption Partner
(tbd)
• Manage Code of Conduct
• Perform RfQ
• Selection
• Assignment
• Onboarding, Offbobarding
• Billing
• First level support
Essential Service Provider
Management
2.2 Truzzt.org AG:
(Data sharing in operation)
2.2.1 Advantages:
Truzzt offers a fully
serviced solution,
making the access to
data sharing in the IDS
ecosystem easy:
Standardized,
configurable
connectors, brokerage-
and clearing services as
well as settlement and
billing of data
transactions. All
services are provided
and deployed using the
Truzzt service platform,
enabling full access to
the IDS data sharing
solution without having
to deploy designated
resources within the
company for this. In
addition, Truzzt offers
consulting services for
implementation and all
topics related to data
sharing and data
security, ensuring fast,
uncomplicated
onboarding of new
users.
7
Configurate
connector
Clearing
Service
Certify
Connector
Billing &
settlement
Broker
service
Company
providing
data
Company
consuming
data
Consulting services
Market Solutions
Certification Authority
Connectors: Truzzt offers
a set of pre-configured
connectors. These
connectors are provided and
configured on the Truzzt
service portal. Operation can
be done by the company
itself or be managed by
Truzzt - as a Service (TaaS).
Customers can also develop
and operate their own
connectors. All connectors
will have to be certified by
the IDS Support
Organization before going
into production, as defined
in the previous bullet points
(Certification @ IDS
Support Organization
GmbH).
Broker service: Where to
find which data? This will be
handled by the broker
service. This service
provides metadata from
data-publishing companies,
so that they can be searched
and found by data-searching
companies.
Clearing house: All data
transaction will be
registered, monitored and
logged by the clearing house
service: Clearing of
contractual or legal issues,
such as usage rights and
price up front as well as
fulfilment of the
transactions and post-
transaction dispute
management. Transaction
logging is done using the
latest DLT technology,
securing undisputable
transaction protocols.
Billing service: The billing
services are responsible for
calculation and settlement
of transaction fees and data
usage costs.
Blockchain services: In
cooperation with
Orbiterchain, Truzzt has
developed a fully-featured
consortium blockchain
solution. Blockchain nodes
will be provided as SW in a
container and installed by
experienced technicians
from Truzzt, sparing
participants any hassle. The
blockchain comes with IDS
connectors, enabling an easy
adaption to data sources
within the IDS data sharing
solution.
Consulting- and
marketing services: In
addition to the primary
functional services, Truzzt
provides consulting services
and training for its member
institutions on data security
– and on other subjects
related to data processing
related topics. Truzzt will
also account for sales and
marketing activities,
necessary for bringing the
IDS services to market.
2.2.2 Primary services
8
connectors for the IDS
participants. Support (first,
second and third level) will
be performed by the Truzzt
Service Centre.
Support for connectors
not provided by Truzzt
(1st - 3rd Level): in
addition to the connectors
acquired on the IDS Service
Platform, connectors not
provided by Truzzt can be
supported by the Truzzt
Service Centre. The only
requirement is that the
connector is registered on
the IDS Identity
Management Platform. For
support services for external
connectors an extra service
fee will be charged.
Hardware Connector on
IOT Edge Devices: Truzzt
provides high security
hardware chips containing
pre-configured IDS
connectors for IoT devices.
The chip comes in different
sizes and with different
specifications and can be
implemented in virtually
every IoT device. The chip
has got 255 private/public
key pairs using the latest
encryption methods to
ensure secure in- and out-
bound communication
between the device and the
IDS network.
Software Connectors on
open source base as off-
the-shelf products: A
number of pre-defined, IDS
certified open source
connectors are available on
the IDS Service Platform.
These connectors can easily
be configured to meet the
specific requirements of the
participants. Since the
connectors have already
been certified by the IDS
Support Organization, they
just have to be configured
and registered for the
participants to be able to
start sharing data within the
IDS ecosystem.
Configuration portal for
connectors: The
Configuration of the pre-
defined connectors to meet
the specific requirement of
the participants is done
directly on the IDS Service
Platform.
Connector as a Service:
In addition to providing pre-
defined connectors and the
corresponding configuration
services, Truzzt offers
serviced operation of the
2.3
Value proposition of Truzzt
and services in detail
2.3.1 Truzzt connector services:
2.2.3 Market solution services
In addition to primary services necessary for being able to use
the IDS solution that applies for all participants, Truzzt will
orchestrate the provision of specific solution for different
industry verticals like mobility, supply chain, smart city, health
care etc. These solutions will
be developed and operated
by IDSA member
organisations.
9
Identification -
Verification: Verified
identities provides trust in
the IDS data sharing
solution. All participants
and connectors participating
in the IDS ecosystem will
have to be registered on the
IDS Identity Management
Platform. In the registration
process the identity of the
participant and the
connector is verified.
Identity management:
The identity parameter,
including the identity
certificates, are stored in the
participants` personal data
wallet. The Identity
Management Platform
enables a consent-based
sharing of these identity
credentials (certificates)
with other parties when
performing a transaction in
order to prove the validity of
each user´s identity.
Connector ID data:
The connector identity data
includes the metadata for
the data content provided by
the connector.
ID Certification: When
two participants share data,
certificates confirming their
identity are exchanged,
guaranteeing the contractual
counterpart is indeed at the
other end.
Consent management
service: Using the Identity
Management Platform, the
participant can give consent
to share specific data fields
from selected connectors for
a chosen period of time with
a specified third party. The
consent for each of these
data transaction will be
logged in the blockchain.
Identity Management Platform: The IDS Identity
Management Platform is the identity register for all participants
in the IDS data sharing solution. Due to use of DLT
(blockchain) and latest cryptographic technologies including
private/public keys, only the identity owner will have access to
the stored data. The system
will define a unique IDS
identity for each participant
in the solution (company,
person, connector)
2.3.2 Operational services:
Identification - Verification Company
providing
data
Company
consuming
data
Identity Certification Authority
Identity Management
Identity Management
Consent Management
ID Certification
Data
10
Transaction logging
services (with DLT
(blockchain)):
All data transaction are
monitored and logged by the
clearing house service. The
transaction logging is done
using latest DLT technology
(distributed ledger
technology), securing
undisputable transaction
protocols. The protocol
service is provided by the
Truzzt Blockchain
Consortium securing
absolute neutrality and
fairness.
that a data consumer cannot
deny having received the
data, nor can the data
provider deny having sent
the data.
Settlement services: The
administrative handling of
the data transaction,
including logging, billing
and payment.
Clearing Billing Payment
Company
providing
data
Company
consuming
data
Transaction Record
Data
Certification Authority
Search
engine
Consent
Mgmt
Trusted Services for Digital Ecosystems
Broker services: Enables
companies providing data to
define the data they want to
share, including terms and
conditions for usage (to
protect their data). An
integrated search engine
reduces the effort for data
consumers to search and
find usable data.
Clearing services: (usage
control): Defines and
enforces usage policies
(usage contracts) prior to
the data being exchanged.
In addition, a data control
and release function is
provided to verify and
enforce that the legal and
financial conditions are met
before any data is
exchanged.
Non-repudiation
services: It is guaranteed
11
Automated
transaction
settlement services
(Paypal
functionality):
The use of DLT
(blockchain) in the
clearing process
enables an automated
settlement of data
transactions based on
smart contracts. The
smart contracts define
the transactional
conditions and are
executed automatically
by both parties upon
authorisation of a
transaction.
Insurance services
(for data
transactions):
The IDS Data
Marketplace with its
Clearing Services ibased
on clearly structured
usage contracts for data
transactions and a
tamper-proof recording
of the transacting
enables the provision of
insurance policies to
increase the reliability
level for the involved
transaction parties.
2.3.3 Value-added services:
Truzzt services will be provided to all companies
interested in sharing data (providers and users) in
the IDS ecosystem. As described above a
participation requires identification and certification
assuring secure, trusted communication. It does not
require an IDSA
membership to
participate in the IDS
data sharing solution.
3.
Who is entitled to use the
Truzzt services?
12
Services are
provisioned based on
usage. (Transactions)
Consulting services are
calculated based on
daily rates.
Verification- and
certification services are
provided to
standardized service-
rates.
The experienced IT consultants at Truzzt will
assist in deploying the services.
Configuration is made
easy using the Truzzt
service portal.
Truzzt wants to run a profitable business as a service provider for IDS.
Price calculations:
5.
Business model –
how to earn money with
Truzzt
4.
How to deploy Truzzt
services
13
Truzzt holds a central
role in the IDS
ecosystem, providing
the services necessary
for companies share
data within or between
different industrial
verticals. The strategic
membership group is
part of the supervisory
board, defining the
future direction of the
Truzzt operational
services. An initial
investment in Truzzt is
rewarded with shares
in the Truzzt SE &
KGaA and earnings
from the operational
profit.
6.
Why become a strategic
partner / investor of Truzzt?
Decision-making
power: The strategic
partners will define the
direction and the
development of
essential- and basic
services, enabling IDS
to grow a prosperous
data sharing ecosystem
based on European
values.
Central
development and
operation unit:
Companies considering
developing their own
connectors and services
can optimize their
allocation of
development resources
by joining Truzzt.
Profit: The
shareholders are
awarded earnings from
the operational profit.
Founding
Partners
Truzzt SE & Co. KGaA
Limited Liability Capital
of Truzzt, ‟Fund Capital”
Supervisory Board
delegates
Board Members
appoints
delegates
Board Members
controls
Executive Board
of Truzzt
Supervisory Board
Strategic Partners
(Shareholders)
14
Truzzt.org SE will be founded and presented to the
public at the Hannover Industrial Fair, July 13th –
17th 2020.
7.
Launch date
If you are interested in becoming a strategic partner
of Truzzt, please contact:
8.
How to become a strategic
partner / investor of Truzzt
Lars Nagel
CEO of IDSA
+49 173 2929 140
lars.nagel@internationaldataspaces.org
Hannes Bauer
CEO of Orbiter.de GmbH
+49 171 6844 690
hb@orbiter.de
TRUSTED SERVICES FOR DIGITAL ECOSYSTEMS

More Related Content

What's hot

An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsHelpSystems
 
PCI-DSS COMPLIANCE ON THE CLOUD
PCI-DSS COMPLIANCE ON THE CLOUDPCI-DSS COMPLIANCE ON THE CLOUD
PCI-DSS COMPLIANCE ON THE CLOUDHassan EL ALLOUSSI
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetSafeNet
 
PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...John Baines
 
Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudHassan EL ALLOUSSI
 
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...IJERA Editor
 
Alcumus ISOQAR PCIDSS Compliance Presentation
Alcumus  ISOQAR PCIDSS Compliance PresentationAlcumus  ISOQAR PCIDSS Compliance Presentation
Alcumus ISOQAR PCIDSS Compliance PresentationBhargav Upadhyay
 
PCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder dataPCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder dataInMobi Technology
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overviewokrantz
 
Best Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & KyteBest Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & KyteTokenEx
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)TokenEx
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline ComplianceTokenEx
 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certificationhodonoghue
 
P0 Pcidss Overview
P0 Pcidss OverviewP0 Pcidss Overview
P0 Pcidss Overviewb28stu
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 

What's hot (20)

Pcidss qr gv3_1
Pcidss qr gv3_1Pcidss qr gv3_1
Pcidss qr gv3_1
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power Systems
 
PCI-DSS COMPLIANCE ON THE CLOUD
PCI-DSS COMPLIANCE ON THE CLOUDPCI-DSS COMPLIANCE ON THE CLOUD
PCI-DSS COMPLIANCE ON THE CLOUD
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...
 
Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloud
 
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
 
Alcumus ISOQAR PCIDSS Compliance Presentation
Alcumus  ISOQAR PCIDSS Compliance PresentationAlcumus  ISOQAR PCIDSS Compliance Presentation
Alcumus ISOQAR PCIDSS Compliance Presentation
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
180926 ihan webinar 2
180926 ihan webinar 2180926 ihan webinar 2
180926 ihan webinar 2
 
PCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder dataPCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder data
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
Best Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & KyteBest Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & Kyte
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline Compliance
 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certification
 
P0 Pcidss Overview
P0 Pcidss OverviewP0 Pcidss Overview
P0 Pcidss Overview
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 

Similar to Truzzt whitepaper a4_einzel_20200311

What Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfWhat Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfNukala Gopala Krishna Murthy
 
Idsa, smau, milano, 2019 10-24
Idsa, smau, milano, 2019 10-24Idsa, smau, milano, 2019 10-24
Idsa, smau, milano, 2019 10-24Nadia Fabrizio
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueVijayananda Mohire
 
5 Key Requirements for PCI DSS Compliance.pdf
5 Key Requirements for PCI DSS Compliance.pdf5 Key Requirements for PCI DSS Compliance.pdf
5 Key Requirements for PCI DSS Compliance.pdf3Columns
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationRapidValue
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET Journal
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overviewtibbr
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
Truzzt pitchdeck white
Truzzt pitchdeck whiteTruzzt pitchdeck white
Truzzt pitchdeck whiteh-bauer2014
 
Bhadale group of companies AI services catalogue
Bhadale group of companies AI services catalogueBhadale group of companies AI services catalogue
Bhadale group of companies AI services catalogueVijayananda Mohire
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxjeffsrosalyn
 
Communications Inustry : innovation solutions for Service Providers
Communications Inustry : innovation solutions for Service ProvidersCommunications Inustry : innovation solutions for Service Providers
Communications Inustry : innovation solutions for Service ProvidersRiccardo Romani
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance ReportHolly Vega
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingSaraPia5
 
Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEsecuritysytem
 

Similar to Truzzt whitepaper a4_einzel_20200311 (20)

What Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfWhat Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdf
 
Idsa, smau, milano, 2019 10-24
Idsa, smau, milano, 2019 10-24Idsa, smau, milano, 2019 10-24
Idsa, smau, milano, 2019 10-24
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
 
GDPR
GDPRGDPR
GDPR
 
5 Key Requirements for PCI DSS Compliance.pdf
5 Key Requirements for PCI DSS Compliance.pdf5 Key Requirements for PCI DSS Compliance.pdf
5 Key Requirements for PCI DSS Compliance.pdf
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overview
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Truzzt pitchdeck white
Truzzt pitchdeck whiteTruzzt pitchdeck white
Truzzt pitchdeck white
 
Bhadale group of companies AI services catalogue
Bhadale group of companies AI services catalogueBhadale group of companies AI services catalogue
Bhadale group of companies AI services catalogue
 
AL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_web
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Communications Inustry : innovation solutions for Service Providers
Communications Inustry : innovation solutions for Service ProvidersCommunications Inustry : innovation solutions for Service Providers
Communications Inustry : innovation solutions for Service Providers
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 
Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAE
 

More from h-bauer2014

Press Release (1).pdf
Press Release (1).pdfPress Release (1).pdf
Press Release (1).pdfh-bauer2014
 
pressrelease dublin.pdf
pressrelease dublin.pdfpressrelease dublin.pdf
pressrelease dublin.pdfh-bauer2014
 
truzzt / Idento.one TakeOut Pflichtenheft Uni Leonie.pdf
truzzt / Idento.one TakeOut Pflichtenheft Uni Leonie.pdftruzzt / Idento.one TakeOut Pflichtenheft Uni Leonie.pdf
truzzt / Idento.one TakeOut Pflichtenheft Uni Leonie.pdfh-bauer2014
 
Truzzt box 3.2-en
Truzzt box 3.2-enTruzzt box 3.2-en
Truzzt box 3.2-enh-bauer2014
 
Truzztbox datenraummobilitaet angebot
Truzztbox datenraummobilitaet angebotTruzztbox datenraummobilitaet angebot
Truzztbox datenraummobilitaet angeboth-bauer2014
 
Truzzt portblocks v0.9
Truzzt portblocks v0.9Truzzt portblocks v0.9
Truzzt portblocks v0.9h-bauer2014
 
orbiter Idento.one Personal Data Banking
orbiter Idento.one Personal Data Bankingorbiter Idento.one Personal Data Banking
orbiter Idento.one Personal Data Bankingh-bauer2014
 
20180827 vortrag ihk
20180827 vortrag ihk20180827 vortrag ihk
20180827 vortrag ihkh-bauer2014
 
201804 idento.one v3
201804 idento.one v3201804 idento.one v3
201804 idento.one v3h-bauer2014
 
201802 idento.one 1_v1.1
201802 idento.one 1_v1.1201802 idento.one 1_v1.1
201802 idento.one 1_v1.1h-bauer2014
 
idento.one Personal Data Banking bc
idento.one Personal Data Banking bcidento.one Personal Data Banking bc
idento.one Personal Data Banking bch-bauer2014
 
idento.one Personal Data Banking
idento.one Personal Data Bankingidento.one Personal Data Banking
idento.one Personal Data Bankingh-bauer2014
 

More from h-bauer2014 (13)

Press Release (1).pdf
Press Release (1).pdfPress Release (1).pdf
Press Release (1).pdf
 
pressrelease dublin.pdf
pressrelease dublin.pdfpressrelease dublin.pdf
pressrelease dublin.pdf
 
truzzt / Idento.one TakeOut Pflichtenheft Uni Leonie.pdf
truzzt / Idento.one TakeOut Pflichtenheft Uni Leonie.pdftruzzt / Idento.one TakeOut Pflichtenheft Uni Leonie.pdf
truzzt / Idento.one TakeOut Pflichtenheft Uni Leonie.pdf
 
Truzzt box 3.2-en
Truzzt box 3.2-enTruzzt box 3.2-en
Truzzt box 3.2-en
 
Truzztbox datenraummobilitaet angebot
Truzztbox datenraummobilitaet angebotTruzztbox datenraummobilitaet angebot
Truzztbox datenraummobilitaet angebot
 
Truzzt portblocks v0.9
Truzzt portblocks v0.9Truzzt portblocks v0.9
Truzzt portblocks v0.9
 
Truzztcar mvp
Truzztcar mvpTruzztcar mvp
Truzztcar mvp
 
orbiter Idento.one Personal Data Banking
orbiter Idento.one Personal Data Bankingorbiter Idento.one Personal Data Banking
orbiter Idento.one Personal Data Banking
 
20180827 vortrag ihk
20180827 vortrag ihk20180827 vortrag ihk
20180827 vortrag ihk
 
201804 idento.one v3
201804 idento.one v3201804 idento.one v3
201804 idento.one v3
 
201802 idento.one 1_v1.1
201802 idento.one 1_v1.1201802 idento.one 1_v1.1
201802 idento.one 1_v1.1
 
idento.one Personal Data Banking bc
idento.one Personal Data Banking bcidento.one Personal Data Banking bc
idento.one Personal Data Banking bc
 
idento.one Personal Data Banking
idento.one Personal Data Bankingidento.one Personal Data Banking
idento.one Personal Data Banking
 

Recently uploaded

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 

Recently uploaded (20)

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 

Truzzt whitepaper a4_einzel_20200311

  • 1.
  • 2. 2 The International Data Spaces Association (IDSA) has defined a data sharing scheme including a reference architecture and a set of agreements to be used for creating and operating virtual data spaces. The IDS Scheme is based on commonly accepted data governance models facilitating secure exchange and easy linkage of data within business ecosystems. The IDS Scheme ensures digital sovereignty for data owners making data available for bteing exchanged or shared. It thereby constitutes the basis for developing and offering smart services and for establishing innovative business processes. The IDS initiative aims at defining the technical base and set of agreements for secure and trusted data spaces, in which companies of any size and from any industry can manage their data assets in a sovereign fashion. It addresses companies and other organizations from across Europe and beyond. IDSA already counts over one- hundred member organizations from twenty countries. 1. IDS – the data sharing solution
  • 3. 3 2. Data sharing services - making IDS happen – an overview SERVICE PROVIDER DATA PROVI- DER DATA USER DATA OWNER IDENTITY PROVIDER DATA CONSU- MER Transferdata Recieve data Publish metadata Authorize U se data apps Publish app U se data app Log transactionLog transaction Search metadata Use metadata Provide vocabularies BROKER SERVICE PROVIDER CLEARING HOUSE APP STORE PROVIDER APP PROVIDER VOCABULARY PROVIDER CERTIFICATION BODY To enable companies to participate in the IDS data sharing solution, a number of services are required. Services enabling companies to sign up to the solution, to define which data they want to share (if they act as data provider) – and where to find which data (if they act as data consumer), to clear the contractual or legal issues, such as usage rights and price as well as fulfilment of those contracts including payment and regulation in case of dispute.
  • 4. 4 To secure an easy entry into the future of data sharing, IDSA is setting up to entities providing these required services: IDS Support Organization GmbH is a non-profit company of IDSA which orchestrates the essential services securing trust to the IDS solution. IDS SO GmbH is a 100 % subsidiary of IDSA. Truzzt.org SE is a European stock company. Truzzt will implement and operate services required to enable the physical data sharing between companies. Truzzt will be founded by a network of strategic partners sharing the interest of forming the future of the IDS data sharing solution. Logistic Maritim Manufa- cturing Supply Chain F&B Agri- cultural Mobility Finance Health- care Smart Cities Generic functionality for data ecosystems Industry groups VERTICALS MARKET SPECIFIC SOLUTIONS BASE DATA SOVEREIGNTY SERVICES ESSENTIAL DATA SOVEREIGNTY SERVICES Evaluation Facilities Identity Provider essential functionality for data ecosystems CA IDSA Support Organization GmbH Certification Body DAPS ParIS DTM IDSAStandards&specificationsofrdatasovereignty definethetechnicalbasis/standardsfofrdataexchange
  • 5. 5 IDS SO is the entity securing trust to the IDS solutions. This entity is responsible for the orchestration of the essential services which will be provided by several companies providing their services according to the regulation defined in the IDS Rule Book which also includes the code of conduct for the IDS data sharing solution. The following services are contained: 2.1 IDS Support Organization GmbH: (safeguarding the essential services) Identity management (CA): To secure the flow of data between entities, the parties in the digital ecosystem must be able to digitally identify and authenticate themselves. As part of the “essential services” identity management (ID verification and - certification) will be provided. Certification (for components and organizations) and SW testing: Certification of companies and connectors will be conducted by the certification unit. This unit will also provide consultancy and pre- defined test procedures for SW prior to certification. Only certified units and connectors can take part in the IDS eco system. The criteria are defined in DIN SPEC 27070 and in the criteria catalogue in the IDS Rule Book . DAPS (Dynamic Attribute Provisioning System): Efficient management of certificates and metadata, streamlining the process and reducing cost through use of a dynamic attribute provisioning system.
  • 6. 6 IDS SO will organize these processes whereby it ensures the provisioning and SLA of the essential services provided by companies from the market: Service Center Certification Body Evaluation Facility Testing Facility Certification Authority DAPS ParIS Connector Provider Implementation Partner Competence Center IDSA Hubs Adoption Partner (tbd) • Manage Code of Conduct • Perform RfQ • Selection • Assignment • Onboarding, Offbobarding • Billing • First level support Essential Service Provider Management 2.2 Truzzt.org AG: (Data sharing in operation) 2.2.1 Advantages: Truzzt offers a fully serviced solution, making the access to data sharing in the IDS ecosystem easy: Standardized, configurable connectors, brokerage- and clearing services as well as settlement and billing of data transactions. All services are provided and deployed using the Truzzt service platform, enabling full access to the IDS data sharing solution without having to deploy designated resources within the company for this. In addition, Truzzt offers consulting services for implementation and all topics related to data sharing and data security, ensuring fast, uncomplicated onboarding of new users.
  • 7. 7 Configurate connector Clearing Service Certify Connector Billing & settlement Broker service Company providing data Company consuming data Consulting services Market Solutions Certification Authority Connectors: Truzzt offers a set of pre-configured connectors. These connectors are provided and configured on the Truzzt service portal. Operation can be done by the company itself or be managed by Truzzt - as a Service (TaaS). Customers can also develop and operate their own connectors. All connectors will have to be certified by the IDS Support Organization before going into production, as defined in the previous bullet points (Certification @ IDS Support Organization GmbH). Broker service: Where to find which data? This will be handled by the broker service. This service provides metadata from data-publishing companies, so that they can be searched and found by data-searching companies. Clearing house: All data transaction will be registered, monitored and logged by the clearing house service: Clearing of contractual or legal issues, such as usage rights and price up front as well as fulfilment of the transactions and post- transaction dispute management. Transaction logging is done using the latest DLT technology, securing undisputable transaction protocols. Billing service: The billing services are responsible for calculation and settlement of transaction fees and data usage costs. Blockchain services: In cooperation with Orbiterchain, Truzzt has developed a fully-featured consortium blockchain solution. Blockchain nodes will be provided as SW in a container and installed by experienced technicians from Truzzt, sparing participants any hassle. The blockchain comes with IDS connectors, enabling an easy adaption to data sources within the IDS data sharing solution. Consulting- and marketing services: In addition to the primary functional services, Truzzt provides consulting services and training for its member institutions on data security – and on other subjects related to data processing related topics. Truzzt will also account for sales and marketing activities, necessary for bringing the IDS services to market. 2.2.2 Primary services
  • 8. 8 connectors for the IDS participants. Support (first, second and third level) will be performed by the Truzzt Service Centre. Support for connectors not provided by Truzzt (1st - 3rd Level): in addition to the connectors acquired on the IDS Service Platform, connectors not provided by Truzzt can be supported by the Truzzt Service Centre. The only requirement is that the connector is registered on the IDS Identity Management Platform. For support services for external connectors an extra service fee will be charged. Hardware Connector on IOT Edge Devices: Truzzt provides high security hardware chips containing pre-configured IDS connectors for IoT devices. The chip comes in different sizes and with different specifications and can be implemented in virtually every IoT device. The chip has got 255 private/public key pairs using the latest encryption methods to ensure secure in- and out- bound communication between the device and the IDS network. Software Connectors on open source base as off- the-shelf products: A number of pre-defined, IDS certified open source connectors are available on the IDS Service Platform. These connectors can easily be configured to meet the specific requirements of the participants. Since the connectors have already been certified by the IDS Support Organization, they just have to be configured and registered for the participants to be able to start sharing data within the IDS ecosystem. Configuration portal for connectors: The Configuration of the pre- defined connectors to meet the specific requirement of the participants is done directly on the IDS Service Platform. Connector as a Service: In addition to providing pre- defined connectors and the corresponding configuration services, Truzzt offers serviced operation of the 2.3 Value proposition of Truzzt and services in detail 2.3.1 Truzzt connector services: 2.2.3 Market solution services In addition to primary services necessary for being able to use the IDS solution that applies for all participants, Truzzt will orchestrate the provision of specific solution for different industry verticals like mobility, supply chain, smart city, health care etc. These solutions will be developed and operated by IDSA member organisations.
  • 9. 9 Identification - Verification: Verified identities provides trust in the IDS data sharing solution. All participants and connectors participating in the IDS ecosystem will have to be registered on the IDS Identity Management Platform. In the registration process the identity of the participant and the connector is verified. Identity management: The identity parameter, including the identity certificates, are stored in the participants` personal data wallet. The Identity Management Platform enables a consent-based sharing of these identity credentials (certificates) with other parties when performing a transaction in order to prove the validity of each user´s identity. Connector ID data: The connector identity data includes the metadata for the data content provided by the connector. ID Certification: When two participants share data, certificates confirming their identity are exchanged, guaranteeing the contractual counterpart is indeed at the other end. Consent management service: Using the Identity Management Platform, the participant can give consent to share specific data fields from selected connectors for a chosen period of time with a specified third party. The consent for each of these data transaction will be logged in the blockchain. Identity Management Platform: The IDS Identity Management Platform is the identity register for all participants in the IDS data sharing solution. Due to use of DLT (blockchain) and latest cryptographic technologies including private/public keys, only the identity owner will have access to the stored data. The system will define a unique IDS identity for each participant in the solution (company, person, connector) 2.3.2 Operational services: Identification - Verification Company providing data Company consuming data Identity Certification Authority Identity Management Identity Management Consent Management ID Certification Data
  • 10. 10 Transaction logging services (with DLT (blockchain)): All data transaction are monitored and logged by the clearing house service. The transaction logging is done using latest DLT technology (distributed ledger technology), securing undisputable transaction protocols. The protocol service is provided by the Truzzt Blockchain Consortium securing absolute neutrality and fairness. that a data consumer cannot deny having received the data, nor can the data provider deny having sent the data. Settlement services: The administrative handling of the data transaction, including logging, billing and payment. Clearing Billing Payment Company providing data Company consuming data Transaction Record Data Certification Authority Search engine Consent Mgmt Trusted Services for Digital Ecosystems Broker services: Enables companies providing data to define the data they want to share, including terms and conditions for usage (to protect their data). An integrated search engine reduces the effort for data consumers to search and find usable data. Clearing services: (usage control): Defines and enforces usage policies (usage contracts) prior to the data being exchanged. In addition, a data control and release function is provided to verify and enforce that the legal and financial conditions are met before any data is exchanged. Non-repudiation services: It is guaranteed
  • 11. 11 Automated transaction settlement services (Paypal functionality): The use of DLT (blockchain) in the clearing process enables an automated settlement of data transactions based on smart contracts. The smart contracts define the transactional conditions and are executed automatically by both parties upon authorisation of a transaction. Insurance services (for data transactions): The IDS Data Marketplace with its Clearing Services ibased on clearly structured usage contracts for data transactions and a tamper-proof recording of the transacting enables the provision of insurance policies to increase the reliability level for the involved transaction parties. 2.3.3 Value-added services: Truzzt services will be provided to all companies interested in sharing data (providers and users) in the IDS ecosystem. As described above a participation requires identification and certification assuring secure, trusted communication. It does not require an IDSA membership to participate in the IDS data sharing solution. 3. Who is entitled to use the Truzzt services?
  • 12. 12 Services are provisioned based on usage. (Transactions) Consulting services are calculated based on daily rates. Verification- and certification services are provided to standardized service- rates. The experienced IT consultants at Truzzt will assist in deploying the services. Configuration is made easy using the Truzzt service portal. Truzzt wants to run a profitable business as a service provider for IDS. Price calculations: 5. Business model – how to earn money with Truzzt 4. How to deploy Truzzt services
  • 13. 13 Truzzt holds a central role in the IDS ecosystem, providing the services necessary for companies share data within or between different industrial verticals. The strategic membership group is part of the supervisory board, defining the future direction of the Truzzt operational services. An initial investment in Truzzt is rewarded with shares in the Truzzt SE & KGaA and earnings from the operational profit. 6. Why become a strategic partner / investor of Truzzt? Decision-making power: The strategic partners will define the direction and the development of essential- and basic services, enabling IDS to grow a prosperous data sharing ecosystem based on European values. Central development and operation unit: Companies considering developing their own connectors and services can optimize their allocation of development resources by joining Truzzt. Profit: The shareholders are awarded earnings from the operational profit. Founding Partners Truzzt SE & Co. KGaA Limited Liability Capital of Truzzt, ‟Fund Capital” Supervisory Board delegates Board Members appoints delegates Board Members controls Executive Board of Truzzt Supervisory Board Strategic Partners (Shareholders)
  • 14. 14 Truzzt.org SE will be founded and presented to the public at the Hannover Industrial Fair, July 13th – 17th 2020. 7. Launch date If you are interested in becoming a strategic partner of Truzzt, please contact: 8. How to become a strategic partner / investor of Truzzt Lars Nagel CEO of IDSA +49 173 2929 140 lars.nagel@internationaldataspaces.org Hannes Bauer CEO of Orbiter.de GmbH +49 171 6844 690 hb@orbiter.de
  • 15. TRUSTED SERVICES FOR DIGITAL ECOSYSTEMS