Our Product
TrustGrid™ orchestrates multiple state-of-the-art technologies into a single platform, combining innovative cryptography, data privacy, and confidential computing into a highly customizable identity platform.
What is TrustGrid?
TrustGrid™ brings together the power of confidential computing, distributed ledger technologies, and data privacy. The key components of TrustGrid™ are:
- Distributed Ledger Technology (blockchain) used to implement a consortium layer, providing distributed governance and oversight
- Confidential Execution Layer creates a trusted execution platform managed by the consortium and providing confidential execution of identity transaction even on untrusted platforms
- Privacy Contracts enable establishment and enforcement of data and identity policies, such as user consent or user data encryption.
TrustGrid Architecture
We have an intuitive TrustGrid™ portal interface that all users can easily use in order to subscribe, set up and manage their requirements for Confidential Compute in Microsoft Azure cloud.
Depending on the granular requirements of a consortium, you can choose to set up in either Microsoft Azure or AWS. Choosing Microsoft Azure also means you gain the added benefit of Intel SGX enclave, which provides even more protection from disclosure or modification. Our team would be delighted to assist you further in determining the optimal set up for yourself!
What is a consortium? A consortium provides cryptographically strong authentication and integrity verification of participating consortium nodes. This creates the framework for a pre-established consortium of members to effectively govern the policy of the consortium that has been created. As a result, consortium policy defines the configuration policy of the consortium and outlines the governance rules agreed to by all members.
Consortium services are created by members who unanimously agree on the workflow of the service offered. This is done in order to implement and enable specific use cases, for example citizen services, health records, digital supply chain. Consortiums can have multiple services and service nodes can run multiple services. Existing members can invite new members according to policy and configuration defined at the consortium level.
Privacy Preservation and Consent
TrustGrid™ gives data owners the comfort of security and privacy in terms of controlling and protecting their data.
Data owners can interact securely within the secure digital ecosystems enabled by the TrustGrid™ platform. In this diagram, data owners(e.g. citizens) can transact with the services created by the consortiums using the TrustGrid™ platform. Data owners only consent to provide the data needed for validation during the transaction, which is performed using encryption provided by our innovative cryptographic methods .
After that , the data is encrypted and stored on user’s devices (data owners). When other participants (e.g. business , government , other organisations or end users) request data, they require the data owner’s explicit consent. Only after consent has been given can data be shared. Notably, only participants in the transaction (i.e. data owner and verifier) can see the data.
Finally, the TrustGrid™ platform has been very carefully engineered to guarantee that TrustGrid™ has no access or visibility of your data. We have effectively blended several sophisticated technologies to ensure that you can share your data only with your explicit consent , hence ensuring your privacy.
The Power of Distributed Consortium
A Variety of Pre-Built Use Cases

Unique Identity Workflow Builder™

Multi-Tier Architecture for Ultimate Data Privacy and Security

- 1. Data Integrity And Confidentiality
- 2. Multiple personas and data ownership
- 3. Privacy and identity policies enforced by a customer-managed consortium
- 4. Consortium Management and Confidential Execution
- Data Integrity And Confidentiality
- Multiple personas and data ownership
- Privacy and identity policies enforced by a customer-managed consortium
- Consortium Management and Confidential Execution