Products
Introducing the TrustGrid™ decentralized ecosystem.
TrustGrid™ provides direct peer to peer transactions between service providers and end users. This ensures economic efficiency by removing the middle man and fee takers. It also ensures transactional efficiency by servicing the user directly rather than through an intermediate host.
5G minimizes the gap between the online and physical world. This opens a vast new market for edge services, delivered directly to people or devices in the physical world. The physical world is inherently decentralized and TrustGrid™ products, DeGrid and vrtYou offer a decentralized transactional infrastructure to facilitate these new classes of services.
What is DeGrid?
DeGrid is a decentralized ecosystem that facilitates secure and privacy preserving end to end transactions. DeGrid enables businesses to directly publish their services from the metro edge or the service edge (on premise).
DeGrid is decentralized – it doesn’t require centralized cloud for data processing and does not require a centralized directory for identity management.
- Decentralized policy orchestration is accomplished using smart contracts for policy distribution and policy enforcement (even on resource constrained devices).
- Immutable transactions are implemented through applying blockchain cryptography to protect the authenticity and integrity of transactions and transaction data.
- Decentralized identityis implemented using W3C decentralized identifiers (DIDs) and W3C verifiable credentials (VCs).


What is vrtYou?
vrtYou enables users to navigate the decentralized Web3 world with digital agency over identity, consent, communications and user data management.
vrtYou provides digital agency for users to represent their best interests in digital transactions without sacrificing their privacy or security.
Characteristics of vrtYou digital agency: Cryptographically verifiable user consent based on a non custodial key that has a strong identity bind with the user. The user consent cannot be spoofed or revoked.
- Zero-ID (™) Transaction - vrtYou is a Mobile node with Hardware Root of Trust and unique Biometric binding controlled by user on their device with our Edge AI technology to enable privacy preserved Zero- ID transactions.
- Hardware Root-of-Trust (HRoT) - vrtYou leverages the hardware root-of-trust on the host device to anchor user identity. Private keys are never exposed outside the secured hardware on the users device i.e (self custodial). Providing silicon isolation from OS level and network level attacks. Mitigating credential theft ie.spoofing, stealing, snooping, phishing or other impersonation attacks.
- Provable Consent - consent is a key attribute of human agency. Until now there has been no effective online mechanism for provable consent. vrtYou provides dynamic linking of transaction details, user identity and user signature.
- Vault & Wallet - vrtYou enables users to manage and store their identities (DIDs, VCs). Supporting counter signing and selected disclosure of verifiable credentials.
- Services - vrtYou is an onramp for users to launch and interact with services. This includes messaging services, public market places and service discovery.
What is TrustGrid?
TrustGrid™ makes it easy for businesses to host their services at the Edge and deliver their services directly to end users or devices.
DeGrid stack enables business owners and service providers to efficiently deploy decentralized services.
DeGrid appliance is a decentralized edge processing node, containing an integrated stack of services running a powerful heterogeneous processor. High-performance, high assurance, software-defined.
DeGrid enables businesses and service providers to integrate customers directly into service delivery, eliminating dependence on cloud vendors and CSPs, switch to high-performance decentralized service delivery.
- Integrated security services: security, privacy, identity management, access control and policy orchestration.
- Heterogeneous Processing: leveraging FPGA microservices for accelerated packet processing and line-speed security policy enforcement.
- Fully Decentralized and self-contained: no centralized cloud, no centralized directories, no single point of failure, no single point of attack.
- Peer-to-Peer: no centrally managed platform or centrally managed network brokering customer connectivity / customer relationship.
- Open architecture: built on open source using open standards.
- Be in control of your customer relationships.
- Be in control of your data.
- Be in control of your costs.
- Be in control of your transactional efficiency.
- Complete ownership of your technology roadmap and business roadmap.
DeGrid Architecture
There is an explosion of new service opportunities at the edge. 5G / 4G networking provides gigahertz bandwidth, single digit milliseconds of latency and connection density of 1 million connections per square kilometer. These 5G capabilities make it easy to integrate online intelligence and control directly into real-time applications running in the real-world at the cyber-physical edge.
Additionally there is an explosion of heterogeneous processors that bring new levels of accelerated performance, hardware security and compact form-factor convenience. Heterogeneous processors combine CPU, FPGA & GPU processors along with large DRM4 memory. Integrated software defined 5G radios are also available.
These processors bring high-performance compute to the edge. FGPAs are ideally suited for data intensive computing. FPGAs enable flow-through stream processing at line speed. This eliminates the need for large expensive packet buffering.
The DeGrid stack runs natively on the heterogeneous edge processors. DeGrid appliance makes it easy for service providers to host their application on the Edge close to the data sources / data consumers. The DeGrid appliance provides a robust self-contained execution node for edge services. This includes IIOT, AR/VR, volumetric video, payments messaging, logistics supply chain, etc.
The Power Of Distributed Consortium
The platform’s identity and privacy policies are managed by the distributed consortium – a group of nominated organizations providing oversight and management of identity and privacy policies.
A Variety Of Pre-Built Use Cases
TrustGrid™ supports multiple use cases (solutions) that can be implemented onto the same platform and managed by members of the same consortium. The use cases are implemented as identity workflows and can re-use the existing identity data to create new verification and proofing scenarios.
Unique Identity Workflow Builder™
TrustGrid™ provides touch-of-a-button functionality for the creation of customized identity workflows. Multiple identity operations, such as user consent verification, or identity attributes encryption, can be organized into simple and logical workflows which can be re-used to create multiple representations of customer identities.