...
Use case | Description |
---|---|
PROSPEH, poslovne storitve in digitalne rešitve, d.o.o. | OriginTrail is an ecosystem building a Verifiable Internet for AI, providing an inclusive framework that tackles the world's challenges in the AI era, such as hallucinations, bias, and model collapse, by ensuring the provenance and verifiability of data used by AI systems. Having been put to use for a spectrum of solutions, including deployments by Fortune 500 companies, it tackles misinformation by enabling discoverability, verifiability and ownership of Knowledge Assets with its Decentralized Knowledge Graph (DKG). The OriginTrail DKG is an open, permissionless decentralized network of knowledge graph nodes integrated with multiple blockchains, such as Ethereum, Polygon, Gnosis Chain, and Polkadot. It is a core component of the verifiable internet infrastructure enabling AI solutions to leverage its discoverability, verifiability, and ownership capability. Its core resources are Knowledge Assets, organized in DKG Paranets together with knowledge services. Using the Decentralized Retrieval-Augmented Generation (dRAG) framework, OriginTrail enhances AI models with verified information from decentralized sources, ensuring accurate and reliable AI-generated content. dRAG advances the RAG model by organizing external sources in a Decentralized Knowledge Graph while introducing incentives to grow a global, crowdsourced network of knowledge made available for AI models to use. OriginTrail is used by global leaders like the British Standards Institution, Swiss Federal Railways, Supplier Compliance Audit Network (SCAN), representing over 40% of US imports and several consortia funded by the European Union among others. Advised by Turing award winner Dr. Bob Metcalfe, renowned for his law of network effects, the Trace Labs team (OriginTrail core developers) plays a crucial role in promoting a more inclusive, transparent, and decentralized AI. |
Infineon Technologies AG | Infineon proposes a solution to the blockchain's 'oracle problem' in providing trustworthy data feeds from IoT edge devices, such as sensor nodes. Problem background
High level approach
Result Ultimately, relying parties can verify that edge device identities are authentic and that data has not been manipulated during either edge processing or transmission. In addition, relying parties may examine smart-contract based audit policies and source code deployed to edge devices. In result, applications based on new standards such as the digital twin (ISO) and the asset administration shell (IEC), as well as new EU regulations like eIDAS-2 and the digital product passport (ESPR), may consume a data feed that can be verified for its trustworthiness. |
NYALA Digital Asset AG | NYALA Digital Asset AG operates a Digital Asset Platform, which serves as an infrastructure layer for the issuance, registration, and custody of tokenized securities. With our regulated subsidiary, a crypto-securities registrar, we have repeatedly issued tokenized financial instruments over the past 18 months and have realized the first tokenized As one driver to solve the funding gap in the EU, with a focus on SME financing and renewables projects, we are now shaping our digital asset ecosystems into one holistic Our vision for the secondary market is to integrate the entire securities value chain within a single unit and to facilitate seamless trading and settlement processes. For this we partner with an existing MTF to conduct trading off-chain and serve as the settlement infrastructure on-chain. To enable DVP and automated dividend payments, we are |
Circularise B.V. | With the increasing regulations (e.g. ecodesign directive, Digital Product Passports (DPP), Corporate Sustainability Due Diligence) the need for data sharing is evident. However, companies are hesitant to share data, given the threat of its sensitive data being exposed. Circularise appears as a solution to the traceability challenge faced by value chains from multiple industries. Our platform harnesses groundbreaking and patented encryption technology to secure data across the supply chain in a way that's safeguarded against even the most advanced cyber threats. Circularise provides a tool to securely share sensitive information among value chains. Suppliers can create DPPs, and share key data with their customers, without endangering their Intellectual Property and competitive advantage. For example, do you share the full information or only whether it surpasses a certain threshold? Do you share the same data with your customer as with your auditor? These are challenges Circularise’s software solves through its Smart Questioning technology, based on blockchain and zero-knowledge proofs. If an Original Equipment Manufacturer (OEM) seeks to comply with a regulation, they will need data. For example, they need to ensure that there is no Bromide on their products. Using the Circularise system, an OEM can trigger a data request deep into the different tiers of its supply chain. The system connects data that exists decentrally across different supply chain steps and makes it available to the Brand owner. The patented technology ensures that the exact data input will not be visible to all other actors, but rather an answer to the question of whether the component contains or not bromide, or even if the percentage is lower/greater than or in between some values, enabling the OEM to check its compliance with regulations. Moreover, if the OEM needs information on a new chemical, they can send a data request through the Circularise’s system along the value chain, to know if they meet the requirements. The information could be about sourcing, chemical composition, technical properties, environmental assessments, and others, that support compliance or even specific OEM supplier requirements. Additionally, the data shared within the Circularise is reliable through its verifiable DPPs. These provide a publicly verifiable trail ensuring consistency, authenticity and integrity for claims about subjects, identified by their relation to a reference subject while ensuring privacy beyond the veracity of the claims. Notably, it achieves this without depending on a single central authority or auditors for trust in the consistency of narratives, balance checks, evident changes, etc. All this is possible while maintaining the confidentiality of the sensitive information.
|
IOTA Stiftung | About IOTA Since 2015, the IOTA project has developed open-source software, focusing on next-generation decentralized technology that promotes transparent, secure, and ethical practices in the digital space. Key Entities driving the project
IOTA Token
IOTA Product Suite
|