TrustGrid™

Digital Ecosystem
Building Trusted Digital Identity Networks

TrustGrid™ offers a confidential computing platform for identity-based transactions. The platform serves as a trusted identity layer that enables your organization to build a distributed identity network between your business partners, consumers, and other agencies.

TrustGrid™ provides a trusted network where identity transactions can be designed and executed with guaranteed levels of privacy and confidentiality.

COVID-19 Update - see how TrustGrid™ can protect your privacy during COVID-19 pandemic

Ready-to-go Solutions

TrustGrid™ provides a rich repository of out-of-the-box solutions that can be easily adapted to many business scenarios:
 

Confidential Consortium

Modern identity ecosystems requiring the involvement of multiple parties. Such ecosystems cannot exist on written contracts and policies, which are, by definition, very reactive by their very nature, and require technology-enforced rules defining the newly formed consortium.
 

A consortium-enabled network allows all involved parties to organize their business logic according to the roles and responsibilities of the participants, with the distributed ledger technology providing utility for distributed privacy-reserved transactions.

A consortium is invite-only, which means it is not for everyone to join, but only for a predetermined group of enterprises. It operates under the governance of the participants. It has a multi-party consensus, which means consortium members verify all operations.

Robust Digital Identity Solution

TrustGrid™ is a cloud-native digital identity and privacy platform which utilizes innovative cryptography and the trusted execution technology to build scalable identity management solutions. Automatically deployed on Azure confidential computing infrastructure, TrustGrid™ provides data privacy and security services across on-premises, hybrid, and public cloud environments from our orchestration service. Regardless of where the system is implemented, the cryptographic keys to the service execution are always owned by consortium members. At the same time, the ownership of the data resides with an end-user. Even if originally deployed to the cloud, you can always transition your instance to your private environment.
5D48A264-CD0F-4F53-BA20-E0D4D16A5741

Multiple Azure and AWS Regions

  • US East
  • US West
  • Europe West
  • Europe UK
  • South East Asia
  • United Arab Emirates
  • Australia
  • Singapore
  • India

1D9274B4-F229-4CB1-835D-00F9FFB1B17E

Integrate With Your Identity Systems

TrustGrid can be integrated with existing identity systems using integration connectors. The SQL connector allows user to query external database to fetch a single row using SQL statement. Similarly, the API connector can be used to get data from external API endpoint. The CSV connector can be used to add 1000s of identities into the workflow.

F054FE57-ACEC-4B77-ADC6-40B4865AC6B0

Library of Use Cases

TrustGrid contains a library of built-in use cases which can be customized and deployed within minutes. Digital License
Birth Certificate
Health Record
Vaccination
Training Certificate
Compliance Certificate
KYC

F06C066D-F500-44F2-B255-0EBBA6D62D39

Automated Consortium Creation and Management

TrustGrid Platform is a network of multiple clusters spread across multiple Azure and AWS regions. It allow users to provision their consortium in real-time, and services are published within minutes. User can see real-time status of their network elements like member nodes and service nodes.

Customizable Apps 

Software as a Service Delivery Model – Deploy Your Own Identity Network Now

TrustGrid™ supports multiple use cases (solutions) which can be implemented onto the same platform and managed by the same consortium of members.  The use cases are implemented as identity workflows and can re-use the existing identity data to create new verification and proofing scenarios. 

F135E239-C0BB-4552-9C44-5350F48E9F6B

User Management and Authentication

BB6B71B5-D93F-45B1-A013-2246C50AA2C0

Mobile App Templates

0F47900B-5A95-42CD-8A2F-17F7D4EEA97E

Library of Ready-to-go Use Cases

EBBF4FEF-CC9F-4DAD-A3C0-8301F7FAD2CC

Integration with External Systems

E01CF0AD-9AB0-4821-89E2-FFAC92B0461F

Consortium Policies

F4B84E02-C115-4D0B-9D83-238C2C68B19F

Confidentiality and Privacy Management

2E173F6A-9417-4A9E-878E-07F3793F0FA4

Integrated Data Encryption and Key Management

Contact us today for more details: