In the digital age, where data is the currency of innovation and growth, the need for a secure and trustworthy system of data sharing is paramount—particularly within expansive and interconnected industries such as the global supplier network. Within this context, the advent of decentralized identity (DID
) and self-sovereign identity (SSI
) principles marks a significant leap forward in enabling secure, private, and reliable interactions across the digital landscape.
Decentralized identity refers to a user-centric model where individuals or organizations have control over the creation, management, and usage of their digital identifiers without reliance on a centralized authority. This approach empowers users with the flexibility and independence to present their credentials across various platforms while maintaining security and privacy.
Self-sovereign identity takes the concept further, positing that individuals and entities should own and control their digital identities without the intervention of any intermediary. This philosophy supports the creation of a digital identity that is portable, persistent, and protected against unauthorized access and usage. In the sphere of data sharing among global suppliers, SSI provides the foundation for a trust framework where each participant has an unambiguous and verifiable digital identity.
By combining the principles of decentralized identity with the technological mechanisms of self-sovereign identity, organizations can ensure that their data sharing processes are both secure and efficient. Credentials established under this framework, therefore, play a vital role — they serve as attestations of identity, qualifications, or membership, which can be seamlessly shared and verified. Such credentials foster an environment where data sharing is based on mutual trust, consent, and adherence to agreed-upon standards, thereby streamlining cooperation within the global supplier network and catalyzing the harmonious exchange of valuable data.
SSI and DID are concepts that have been adapted not only for individuals but also for legal entities such as businesses, organizations, and institutions. When applied to legal entities, these concepts are instrumental in creating a secure and independent framework for digital interactions and transactions.
Self-Sovereign Identity (SSI) for Legal Entities
Self-Sovereign Identity allows legal entities to have full control over their identity without depending on a centralized registry or authority. In this model, a legal entity manages its own identity data, can present itself digitally in interactions with others, and can establish trust relationships while maintaining privacy and security.
The SSI model for legal entities typically involves:
Identity Creation: The legal entity generates its own identity, which includes various credentials that are relevant to its operations and interactions.
Data Control: The entity stores and controls its identity data, possibly using decentralized storage solutions to avoid single points of failure.
Identity Verification: Credentials can be verified using public-key cryptography, where entities can prove they hold the corresponding private keys without revealing sensitive information.
Selective Disclosure: Legal entities can disclose only the necessary information required for a specific transaction, protecting their privacy and sensitive corporate data.
Interoperability: The SSI framework allows for cross-industry and cross-border recognition and compatibility, which is crucial for legal entities operating on a global scale.
Decentralized Identifiers (DID) for Legal Entities
Decentralized Identifiers are a key part of the SSI framework. For legal entities, DIDs serve as the unique, persistent identifiers that are completely under the control of the entity itself. They are not issued by any central authority and are typically registered on a decentralized system.
The DID for a legal entity:
Unique Identifier: Acts as a unique reference point for all interactions and transactions the legal entity engages in.
Control and Autonomy: The entity has full control over its DID and can update, add, or revoke credentials associated with it.
Verifiable Credentials: Associated with the DID, these credentials can be instantly verified by any party in a transaction without the need for an intermediary.
Public Key Infrastructure: The DID document includes public keys and service endpoints that allow secure communication and verification of the legal entity.
Compliance and Trust: By using DIDs and verifiable credentials, legal entities can comply with regulatory requirements and build a foundation of trust with partners and customers.
SSI and DID for legal entities are transformative, enabling more agile, secure, and direct interactions and transactions in the digital realm. This enhanced control and flexibility are particularly valuable in the increasingly complex and interconnected global marketplace.
Trust Frameworks
In a decentralized identity system, the validity of a legal entity and its associated digital representation is established through a combination of cryptographic techniques and trust frameworks that involve multiple stakeholders. Entities that comply with these frameworks offer additional assurance that they are conducting identity verification practices adequately. To achieve this, Trust frameworks may leverage various mechanisms, including:
Digital identity verification processes that legal entities to provide digital proof of their identity and their legal status, such as through digital certificates or e-ID verification systems recognized by the European Union.
Trusted third-party verification services that specialize in verifying the identity and authenticity of legal entities, such as notaries, or accredited verification service providers.
Cross-border data sharing agreements are important for facilitating the international exchange of data while ensuring compliance with various national regulations like GDPR
, Standard Contractual Clauses (SCC
), UK-EU Trade and Cooperation Agreement (TCA
), APEC Cross-Border Privacy Rules (CBPR
) System, EU-JP cross-boarder data flow agreement
.
Gaia-X
as a European initiative aimed at creating a federated data infrastructure that promotes data sovereignty and interoperability across various services and providers. One of the key aspects of such an infrastructure is ensuring that participants, such as legal entities that provide or use services within the Gaia-X ecosystem, are valid and verified by a legal authority. The Gaia-X Digital Clearing Houses (GXDCH
) as crucial part of the GAIA-X trust framework architecture
and enables the issuing of Gaia-X Credentials.
It is important to note that the actual implementation details would depend on the policies and technical specifications of the Gaia-X framework and components. These mechanisms would likely evolve over time as the framework matures and as legal requirements and technological solutions develop.
Verifiable Presentations
Verifiable presentations are foundational to decentralized and secure digital interactions, forming a bridge between holders and verifiers that maintains trust, privacy, and user autonomy, which are all integral to the principles of SSI and DID. This system greatly reduces the risks associated with centralized identity repositories and paves the way for more dynamic and resilient digital economies and ecosystems.
Credential Issuance: A trusted issuer provides a verifiable credential to a holder after verifying their claims. This credential is linked to the holder's DID and signed by the issuer's private key.
Creating Presentations: When a holder wishes to engage in a transaction or prove a certain piece of information, they compile one or more of their verifiable credentials into a verifiable presentation. This is often digitally signed by the holder's private key associated with their DID to ensure authenticity.
Presenting to Verifiers: The holder provides the verifiable presentation to a verifier, who then checks the validity of the signatures and the integrity of the credentials within by using the corresponding public keys available on the public ledger or DID document.
Verification and Acceptance: Once the verifier confirms that the presentation is authentic and the information within is accurate, they proceed with the interaction, transaction, or service engagement.
Let's take an example scenario where an Original Equipment Manufacturer (OEM) car manufacturer needs to verify the authenticity and qualifications of a car dismantler before entering into a business relationship, such as agreeing to supply used car parts. In this context, a verifiable presentation enables the dismantler to prove its credentials to the car manufacturer in a secure and trustworthy manner.
Credential Issuance: The dismantler has previously received verifiable credentials from the Catena-X authority and certification body. For instance:A credential confirming they are licensed to operate as a vehicle dismantler. A credential evidencing compliance with environmental safety standards. A credential proving they have the necessary equipment and trained staff for dismantling.These credentials are linked to the dismantler's DID and are secured by cryptographic signatures from the credential issuers.
Creating the Presentation: The car manufacturer requests the dismantler to provide evidence of their qualifications. In response, the dismantler creates a verifiable presentation that includes the required credentials. This presentation is signed with the dismantler's private key to ensure authenticity.
Presenting to the Car Manufacturer: The dismantler sends the verifiable presentation to the OEM car manufacturer, who acts as the verifier in this process.
Verification by the Car Manufacturer: The car manufacturer, upon receipt of the verifiable presentation, uses the dismantler's public key (accessible through the dismantler's DID document on a public ledger) to verify the signatures on the presentation. The car manufacturer also verifies the integrity and authenticity of the individual credentials contained within the presentation.
Acceptance and Collaboration: Once satisfied that the verifiable presentation is valid and that the credentials meet their due diligence requirements, the car manufacturer can proceed to collaborate with the dismantler, such as sending them vehicles for parts recovery, secure in the knowledge that they are dealing with a qualified and compliant entity.
OpenID for Verifiable Presentations
OpenID for VP, as described by the specification
, is a protocol designed to allow holders to present Verifiable Presentations to a verifier in a secure and standardized manner. While it is generally associated with the authentication of individuals, the same protocol can be adapted for use by legal entities such as corporations, organizations, or even services and devices.
The key to this adaptability lies in the fact that legal entities can also possess digital identities that are represented by decentralized identifiers (DIDs) and can be issued Verifiable Credentials (VCs) by authorized issuers and can be applicable for legal entities.
Utilizing OpenID for Verifiable Presentations can thus offer legal entities a secure, private, and interoperable method for establishing their credentials in a variety of digital interactions and transactions. It can be particularly beneficial for legal entities navigating the complex web of regulations and partnerships in the global business environment, where establishing trust and authenticity is key.
OpenID for Verifiable Presentation is a protocol that can be used alongside DIDs for authentication purposes. While DID is a unique identifier associated with a DID document that contains cryptographic material, service endpoints, and other information that can be used to establish a digital identity, OpenID for Verifiable Presentation is a way to share that identity information securely with a verifier.
OpenID for Verifiable Presentation can be implemented using a specific DID method:
DID Creation: First, implement a specific DID method to create and manage the DIDs, which involves choosing a DID method that suits your requirements (e.g., did:web, did:core, did:ebsi) and using it to generate a unique DID and corresponding DID document.
DID Document Update: Ensure that the DID document includes authentication methods and service endpoints that support interaction with OpenID providers and verifiable credentials.
Issuer and Verifiable Credentials: Work with an issuer who uses the chosen DID method to issue verifiable credentials associated with the DIDs. The credentials must conform to the standards set out by the W3C for verifiable credentials.
OpenID Provider Configuration: Set up an OpenID provider that supports DID-based authentication. This OpenID provider should be able to interpret the DID and the associated verifiable credentials.
Authentication Flow: When a user needs to authenticate with a service that supports OpenID for Verifiable Presentation, they initiate an authentication request using their DID. The OpenID provider verifies the DID against the DID document, and if the service requests it, the user presents their verifiable credentials.
Verifiable Presentation: The credentials are presented as a verifiable presentation, which includes the proofs that the OpenID provider or the service can check to verify the user's identity.
By implementing OpenID with a specific DID method, you are combining the self-sovereign identity capability of DIDs with the widespread acceptance and security of the OpenID authentication framework. This allows for a user-centric identity model which enhances privacy and gives users control over their personal data when authenticating with various online services.
In the context of Self-Issued OpenID Provider draft specification
the DID is self-issued, meaning it is generated by the entity that will control it, rather than being issued by a third-party authority. The process typically involves creating a new public/private key pair and registering the DID on a decentralized network where the DID and associated DID Document (containing the public key and other metadata) can be stored.
Data Collaboration in Automotive Sector
The use of a verifiable presentation in this example showcases how such a mechanism can streamline the process of establishing trust between legal entities in different parts of the automotive value chain. It reduces the need for lengthy due diligence processes, enables real-time verification of claims, helps to maintain data privacy by sharing only what's necessary, and builds a foundation for secure and efficient business transactions and collaborations.
The trust established through verifiable presentations is fundamental for secure and sovereign data exchange between entities such as an OEM car manufacturer and a dismantler. This trust enables the assurance that both parties are who they claim to be, possess the credentials they present, and have the authority to engage in data exchanges. Here’s how this established trust can aid in secure and sovereign data exchange:
Authenticated Identities: Verifiable presentations provide a cryptographic proof of identity and qualifications. When an entity is able to demonstrate its identity reliably, it lays the groundwork for secure interactions.
Authority and Permission: Entities that have established trust can confidently engage in exchanges of data, knowing the other party is authorized to handle such data. For example, a dismantler may have access to sensitive information regarding the OEM's car parts or proprietary processes, which the OEM must ensure is handled responsibly.
Data Integrity: Trust established through verifiable credentials ensures that the data exchanged between parties remains intact and unaltered during transmission, as both parties can detect any tampering through cryptographic means.
Compliance: Trustworthy credentials and presentations can help organizations ensure compliance with industry regulations and standards. The OEM, for instance, needs to be assured that the dismantler conforms to environmental regulations to avoid any compliance risk like money laundry, terrorist finance, and sanction lists.
Access Control: With sovereign control over data, entities can use verifiable credentials to manage access permissions to sensitive information. An entity can demonstrate it has permission to access certain data based on its verifiable credentials without exposing other unrelated aspects of its identity or operation.
Data Minimization: By facilitating selective disclosure of information, a verifiable presentation allows entities to share only what is necessary, thus adhering to privacy principles and minimizing exposure to data breaches or misuse.
Auditability: The immutability and traceability of DID transactions provide a clear audit trail, enhancing accountability in data exchanges. A record of the verifiable presentations and their associated credentials can be recorded, allowing for traceability of the interactions and the data shared.
Enhanced Security: Traditional centralized identity systems create a single point of failure that can be a target for cyber-attacks. Decentralized identity models distribute risks and help maintain security even if parts of the system are compromised.
Interoperability: With standards-based frameworks for DIDs and verifiable credentials, there is a higher level of interoperability between different systems and organizations. This allows for a more comprehensive and inclusive approach to data exchange across borders and industries.
Data Spaces
A data space is a structured environment where data exchange occurs securely and efficiently among participating entities, such as businesses, organizations, or systems. A robust data space typically encompasses three foundational components: identity, metadata, and data connectors. Each of these components plays a critical role in managing and facilitating the flow of information within the data space.
Identity: Identity is at the core of any data space, ensuring that all participants can be authenticated and authorized securely. In a decentralized system, identity is often managed through Decentralized Identifiers (DIDs) and corresponding Verifiable Credentials (VCs). The secure management of identities is essential for building trust within the data space and ensuring that only legitimate and authorized entities can interact and exchange data.
Metadata: Metadata refers to data about data. It provides context and describes the characteristics, content, quality, condition, and other attributes of the data being shared within the data space. Metadata facilitate discovery by allowing entities to find and understand the data without accessing the actual data itself. Enable interoperability by providing standardized descriptions that allow different systems to understand and use the data. The W3C Data Catalog Vocabulary
(DCAT) is a standard designed to facilitate interoperability between web-based data catalogs. W3C DCAT is widely recognized as a key metadata catalog for data spaces where datasets are described and shared. Enhance security by detailing the access policies, data provenance, and lineage, thereby ensuring that data usage complies with governance policies and regulations. The W3C Open Digital Rights Language
(ODRL) represent statements about the usage of content and services. It's a flexible and interoperable framework that can be used to create machine-readable and enforceable rules governing the access and use of resources, which makes it particularly well-suited for defining access policies in data spaces.
Data Connectors: Data connectors are the technical components that enable the secure transmission of data between different parties within the data space. They serve as the infrastructure that links different data sources and destinations, allowing for the integration of diverse data sets and systems. They can support various communication protocols, data formats, and enable real-time (Push method) or batch data exchange (Pull method). They often include features for data transformation, validation, and encryption to facilitate seamless and secure data transfer. They play a crucial role in enforcing access controls, ensuring that data flows adhere to specified accesss and usage policies and only authorized participants can share and access data. Data connectors provide the functional capability to move and process data across the data space, ensuring that it remains usable and secure throughout its contractural lifecycle with state machines.
Together, these three components form the backbone of a data space, orchestrating the interactions and governance required for trusted data exchange in today's interconnected digital ecosystems.
In the context of automotive value chain network Catena-X
, the three sovereign components make up the essential building blocks of a secure and trusted data space. Here's how each component is being defined and used within Catena-X, considering the integration of technologies:
DID:web
: The identity component of Catena-X is built around decentralized identities, with DID:web being a particularly relevant method. Organizations within the Catena-X network can use their web domains to create and manage their DIDs, making it simpler and more intuitive to handle digital identities linked to already established domain names and services. This utilizes dominant web protocols while embracing the principles of decentralized identity. eIDAS 2.0
: With evolving regulations around electronic identification in Europe, Catena-X is poised to use updates in eIDAS 2.0 to ensure compliance and enhance trust. This may include support for legal recognition of decentralized identities within the European Digital Single Market. EBSI
: As a prospective future development, Catena-X might integrate EBSI as a trust anchor, leveraging its blockchain infrastructure for recording transactions and verifying the authenticity of digital identities in a tamper-proof way. This would add a layer of assurance for data spaces that extend across European borders. Catena-X is developing an open-source reference implementation of DID:web with the Managed Identity Wallet
and specify the identity and trust
within the Eclipse Tractus-X
project.
Eclipse Dataspace Connector: The EDC
is an open-source initiative used by Catena-X to serve as the data connector, managing the secure exchange of information across different participants' systems. It enables controlled data sharing, ensures data sovereignty by enforcing granular policies over data usage, and facilitates the connection between heterogeneous data sources and consumers within the network. Contracts and Policies: Through the use of connectors, Catena-X ensures that data exchanges are secure, comply with pre-agreed contracts and access and usage policies, and are conducted in a manner that respects each participant's data governance policies.
Metadata Catalogs:Catena-X define Semantic Aspect Meta Models
of Digital Twins, also known as the Asset Administration Shell (AAS), as its metadata catalog. This provides a standardized and semantic way to describe manufacturer equipment by the IDSA
with 80+ submodes. By representing physical entities with their corresponding digital twins, and defining the necessary metadata for each asset, the network ensures interoperability and a unified understanding of data semantics, paving the way for machine-readable and AI-driven use cases. Semantic Interoperability: The AAS not only provides structure to asset-related metadata but also promotes semantic interoperability, which is crucial for ensuring that different systems and stakeholders within Catena-X can meaningfully use the data via Eclipse Tractus-X KITs.
By integrating these three sovereign components, Catena-X is shaping an ecosystem where participants can securely share data with assured identity verification, unified semantic understanding, and robust data exchange mechanisms. This foundation supports the automotive industry's movement towards improved sustainability, efficiency, and innovation within the global value chain. Additionally, the outlook for integrating with future European frameworks like EBSI and eIDAS 2.0 positions Catena-X to be at the forefront of leveraging cutting-edge trust services and regulatory compliance standards.
The role of VC and VP for EDC
Verifiable Credentials and Verifiable Presentations are central to the governance of the Eclipse Dataspace Connector (EDC) as they directly impact usage and access policies within a data space. These elements work together to afford entities control over their data while enabling secure and trustworthy data exchange. Let's delve into their roles:
Verifiable Credentials in the context of the EDC are digital forms of identity and authorization tokens. They confirm the identity of a participant in the dataspace and the veracity of their qualifications, permissions, or other attributes. In practice, credentials could attest to a participant’s role, organizational membership, data sharing agreements, or compliance with regulatory requirements. Enforcement of Access Policies: Credentials facilitate the EDC's ability to enforce access policies effectively. When a participant requests data, the EDC can reference their credentials to determine if they have the appropriate permissions and agreement terms to access that data. Negotiation of Data Sharing Agreements: Credentials can also be used to automatically negotiate and enforce data sharing agreements between different parties, ensuring that data usage aligns with the prescribed terms.
Verifiable Presentations: Verifiable Presentations enable participants to demonstrate possession of one or more credentials without revealing all of their information unnecessarily. This aligns with the principle of data minimization, enhancing privacy and control over data disclosure. Selective Disclosure: Through Verifiable Presentations, participants can share just enough credentials to satisfy the EDC's policy requirements for a given transaction. This process retains the privacy of the data provider and the integrity of the data consumer, fostering trust in the ecosystem. The Selective Disclosure for JWTs draft specification
defines a mechanism for selective disclosure of individual elements of a JSON object used as the payload of a JSON Web Signature (JWS) structure.
For car manufacturers, there are several certifications that are relevant for equipment, whether it's manufacturing machinery, tools, software, or safety gear. The certifications ensure that the equipment meets specific quality, safety, and industry standards. Some of these certifications and standards include:
ISO 9001: General quality management system standard that applies to the processes that create and control the products and services an organization supplies.
ISO/TS 16949: Specific to the automotive sector, this is a technical specification aimed at the development of a quality management system that provides for continual improvement, emphasizing defect prevention, and the reduction of variation and waste in the automotive industry supply chain.
ISO 14001: Environmental management systems standard that helps organizations improve their environmental performance through more efficient use of resources and reduction of waste.
ISO 26262: An international standard for functional safety of electrical and/or electronic systems in production automobiles defined by the International Electrotechnical Commission (IEC).
ISO 45001: An international standard for occupational health and safety management systems, it provides a framework to improve employee safety, reduce workplace risks, and create better, safer working conditions.
TISAX (Trusted Information Security Assessment Exchange): A standard for information security tailored to the automotive industry, based on the information security requirements of the German automotive industry, often enforced by major OEMs (Original Equipment Manufacturers).
IATF 16949: An Automotive Quality Management System Standard that provides guidance and tools for companies who want to ensure that their products consistently meet customer requirements and that quality and customer satisfaction are consistently improved.
VDA 6.x: A set of quality management standards developed by the German automotive industry, VDA 6.x includes different parts that apply to various players in the automotive supply chain, including equipment manufacturers.
EICHER or TüV Certifications: Certifications from independent bodies like EICHER or TüV, which certify the safety of equipment and systems, are also well-regarded in the automotive industry.
CE Marking: Indicates that equipment meets EU safety, health, and environmental protection requirements, which is crucial for equipment sold in the European market.
UL Certification: Provided by Underwriters Laboratories, this certification assures that equipment has been tested to determine that it is safe to use in the workplace.
FCC Compliance: For equipment that may interfere with radio frequency communication, the Federal Communications Commission (FCC) certification indicates that the electromagnetic interference from the equipment is within limits approved by the federal agency.
Operational Companies
Operational companies play a crucial role in building trust between automotive suppliers within the Catena-X network by acting as intermediaries that facilitate the establishment, operation, and joint use of end-to-end data chains along the entire automotive value chain. Catena-X describe a white paper
to outline how operational companies, characterized as Core Service Providers can foster this trust:
Standardizing Processes: Operational companies aid in defining and implementing common standards that ensure technology components, processes, and data exchanges are developed and operated uniformly. This standardization mitigates miscommunication and mismatched expectations, a frequent source of distrust in supply chain relationships.
Certification and Compliance: By acting as trusted authorities, operational companies can issue certifications or confirm compliance with industry standards and regulations (e.g., ISO standards, TISAX). Suppliers with verified certifications can use these credentials as evidence of their adherence to quality, security, and safety standards, reinforcing trust among OEMs and other suppliers.
Data Integration and Management: Implementing technologies like the Eclipse Dataspace Connector for secure data exchange and the Semantic Aspect Model for metadata cataloging, operational companies provide an infrastructure that ensures seamless data integration and management. Trust is built when suppliers know their data is accurately represented, managed, and protected.
Secure and Sovereign Data Exchange: Through the use of digital identities and verifiable credentials, operational companies facilitate sovereign data exchanges where suppliers maintain control over their data. The certainty that sensitive data is only shared with verified and authorized parties fosters trust in the network’s data-sharing mechanisms.
Transparency and Visibility: Providing dashboards and visualization tools, operational companies offer suppliers and OEMs the ability to track data and transactions. This transparency allows all parties to monitor compliance and performance, which can help build trust and identify areas for improvement more quickly.
Facilitating Collaboration: By offering platforms that encourage collaborative development and sharing of applications, operational companies help to establish a cooperative environment that is based on mutual benefit and shared goals. Trust is enhanced when partners work together to solve common industry challenges.
Risk Management: Monitoring tools that operational companies could offer, such as for sanction party watchlists, help suppliers and OEMs mitigate risks by identifying potential issues with business partners early. By proactively managing risk, entities in the Catena-X network can establish a reputation for reliability and responsibility.
Audit and Incident Reporting: Operational companies may provide mechanisms for reporting and auditing transactions within the network, which adds a layer of accountability. This can help reassure all parties that any disputes or issues will be handled with transparency and fairness.
Cost Reduction and Efficiency Improvement: With the Catena-X network aiming to reduce IT costs by avoiding cumbersome individual solutions and facilitating cross-company data collection, operational companies support cost-saving measures which, in return, can build financial trust among participants.
Operational companies facilitate a secure, standardized, and transparent environment within Catena-X that enhances collaboration and trust between automotive suppliers and OEMs. By demonstrating reliable performance, maintaining high compliance standards, and providing clear insights into supply chain data, operational companies can significantly contribute to a more trustworthy and efficient global automotive network.
Business Partner Number (BPN)
A globally unique Business Partner Number (BPN) in Catena-X ensures precise identification of each participant in the automotive supply chain, crucial for managing transactions, compliances, and relationships. The BPN's relation to digital credentials is fundamental; it allows businesses to securely associate their digital identities with verified company information, enhancing trust. By linking the BPN to digital credentials, entities can streamline operations and data exchange, leveraging this identifier as a trust anchor in digital interactions. These credentials can be used for automated validation, reducing errors and enhancing the efficiency of Catena-X's decentralized network. Consequently, a unique BPN tied to digital credentials establishes a reliable foundation for transparent and secure business processes across the Catena-X ecosystem. More information you find in the Catena-X Standard document for BPN v2
.
The standard defines multiple types of BPNs for these different roles, for instance:
BPNL (Legal): Identifies a legal entity, such as a company or organization that is a distinct legal entity under the law.
BPNS (Site): Identifies an individual site or physical location of an entity, which might be a factory, office, or other types of premise.
BPNA (Address): Designates a specific address, which might be used for different purposes such as delivery, invoicing, or legal registration.
By supporting the Legal Entity Identifier (LEI)
defined by gleif.org
as an unique identifier, Catena-X ensures a globally recognized and verifiable standard is used during onboarding
, enhancing trust and simplifying interactions across the global automotive supply chain.
GLEIF LEI and D-U-N-S? Number are widely recognized and established standards for identifying legal entities and businesses globally, they may not offer the same level of integration with digital twin technology, decentralized identity management, and data sovereignty that are provided by the enablement services of Catena-X. These components make Catena-X particularly suitable for the automotive industry and the specific use cases it seeks to address through its data space. Catena-X are working with both numbers and using them as trust factor.
The Catena-X data space is designed to support various identifiers as specified by the Gaia-X Trust Framework. By supporting the LEI Code, Catena-X enables companies that are already identified under this globally recognized standard to use their existing identifier for onboarding into the Catena-X data space. This help to streamline the onboarding process and build trust by utilizing an identifier that is already well established for legal entity identification. The use of existing identifiers can provide several advantages during the onboarding process:
Proof of Identity: Simplify the verification process within Catena-X, as the existence of these identifiers indicates that the company has gone through a rigorous verification process by the issuing authorities.
Established Trust: Since both GLEIF and Dun & Bradstreet are trusted entities in the global financial and business communities, their identifiers carry a certain level of built-in trust.
Reduced Duplication: Catena-X can prevent duplication of entity records within its ecosystem, ensuring each supplier has a unique and singular identity within the data space.
Accelerated Onboarding: With these identifiers, companies can often bypass or expedite certain parts of the onboarding process since part of their necessary information has been validated by another recognized entity.
Global Reach: Both GLEIF LEI and D-U-N-S Numbers have a global scope, which aligns well with the international and cross-border nature of Catena-X, facilitating the onboarding of international suppliers.
Regulations as Business Driver
Considering the evolving European regulatory landscape and the need to optimize costs and reduce risks in a global supply chain, operational companies within data spaces have the potential to offer a range of services geared towards compliance, efficiency, and risk management. Operational companies can adopt in light of new European regulations like the Supply Chain Due Diligence Directive
, Data Act
, Digital Market Act
and the Data Governance Act:
Compliance as a Service: The automotive industry participants need to navigate and comply with new regulations. This includes due diligence assessments, risk analysis, and implementation of compliant data management practices. Companies can charge for consultancy, subscription-based access to compliance management tools, or audit services.
Supply Chain Transparency Solutions: Businesses can offer platforms that provide real-time tracking of materials and parts across the supply chain, satisfying the requirements of the supply chain due diligence directive. By using distributed ledger technologies and integrating Digital Twins, these platforms can offer granular traceability and evidence of ethical and sustainable practices in a secure manner.
Data Sharing Intermediaries: Under the Data Governance Act, operational companies may act as neutral data intermediaries, facilitating the sharing of data between entities while ensuring compliance with data protection and privacy regulations. They could monetize this role by charging service fees or through premium memberships.
Data Sovereignty and Portability: To align with the Data Act's focus on data access and portability, businesses can provide tools and services that empower customers to easily move their data between different services and platforms, ensuring they retain control over their data at all times.
Data Marketplaces: Operational companies can create and manage data marketplaces that support the secure buying, selling, or sharing of data. These marketplaces would enforce compliance with European regulations through automated contractual agreements and credential-based access mechanisms.
Risk Management Services: These would analyze supply chain data for potential risks, like delays, shortages, or regulatory non-compliances, and offer predictive insights and mitigation strategies. Clients could be charged on a subscription or service basis.
Credential Verification: Businesses can offer services to validate the credentials of suppliers and other supply chain stakeholders, offering assurances that they meet European regulatory standards. This could involve a transaction-based pricing model or ongoing validation and monitoring services for a subscription fee.
Data Lifecycle Management: Operational companies can provide services to manage the full lifecycle of data, ensuring that end-to-end processes in the supply chain are compliant with regulations related to data creation, storage, processing, and deletion.
Audit Trail and Reporting Services: With European regulations demanding a higher level of reporting and documentation, businesses can offer services that compile comprehensive audit trails and facilitate easy reporting for regulatory compliance purposes.
Calculation of the Product Carbon Footprint
The automotive industry is a customer-facing industry with high visibility at the cutting-edge of climate action and is a solution provider in the current climate crisis driving the transition towards low-emission mobility. Nevertheless, the global challenge to reduce GHG emissions also requires the automotive industry to measure its GHG emissions on the product level for the status-quo as well as any emissions reductions.
Measuring the product carbon footprint for vehicles is a challenge, due to the enormous complexity of the international automotive supply chain. A vast number of materials and parts are used for vehicles. Even identical materials and parts are usually produced by different companies in different locations to ensure supply chain resilience and risk management.
The Product Carbon Footprint (PCF) Rulebook
developed by Catena-X aims to standardize the calculation of PCFs across the automotive industry and its supply chains.
PCF Standardization
Scope of Emissions
Lifecycle Stages
Data Sources and Quality
Calculation Tools and Methodologies
Reporting and Communication
Credentials can support the PCF calculation by providing a structured and trustworthy mechanism for sharing and validating the required information throughout the automotive supply chain. Credentials could be beneficial in this context:
Verifiable Proof of Compliance: Credentials can serve as verifiable digital certificates for suppliers to prove they adhere to the PCF Rulebook’s guidelines. These credentials can be issued by authorized entities, indicating the organization’s competence in accurately calculating and reporting PCFs.
Automating Trust: With the Catena-X approach of using the Eclipse Dataspace Connector (EDC) for data sharing, credentials can be embedded in automated contract negotiations and data exchange protocols. This enables seamless validation that all involved parties follow the same PCF calculation standards.
Reducing Risk of Errors: Credentials can include cryptographic validation of the data, reducing the risks of errors or fraud in PCF reporting. This ensures that OEMs and other participants in Catena-X can rely on the integrity and accuracy of critical environmental information.
Streamlining Audits and Certifications: By sharing verifiable credentials related to PCF certifications and audit results, organizations can streamline the validation process. This simplifies compliance checks, which are especially important in a network aiming for a standardized calculation and reporting method as detailed in the PCF Rulebook.
By integrating such credentialing mechanisms within the data-sharing policies and guidelines of the Catena-X framework, all participants, including Core Service Providers (CSPs), Business Application Providers, Data Providers, and Consumers, can contribute to and benefit from an efficient, trust-based ecosystem that underscores reliable PCF calculations. This harmonization of processes is key to driving industry-wide transparency and sustainability efforts in line with the European Green Deal and other environmental objectives.
Business Models for Operational Companies
Considering the evolving European regulatory landscape and the need to optimize costs and reduce risks in a global supply chain, operational companies within data spaces have the potential to offer a range of services geared towards compliance, efficiency, and risk management. Operational companies can adopt in light of new European regulations like the Supply Chain Due Diligence Directive
, Data Act
, Digital Market Act
and the Data Governance Act.
It is worth noting that the relevance of each certification can vary based on the role the equipment plays in car manufacturing, the location of the manufacturing facilities, the markets where the cars will be sold, and specific OEM requirements. Regularly updating and maintaining these certifications is essential for equipment suppliers to remain competitive and compliant within the automotive industry.
VCs and VPs can significantly enhance trust, efficiency, and transparency within the global automotive supply chain, involving both suppliers and Original Equipment Manufacturers (OEMs). Here’s how these digital mechanisms can be advantageous:
Streamlined Supplier Onboarding:VCs can contain pre-verified information about a supplier's qualifications, certifications (like ISO 9001, ISO/TS 16949), and compliance status. When a supplier presents these credentials in a VP during the onboarding process with an OEM, it can accelerate the verification and due diligence process, reducing the time and resources spent on audits.
Enhanced Trust and Compliance:As compliance with various standards is critical in the automotive industry, suppliers can use VCs to provide tamper-proof evidence of their adherence to relevant regulations and standards, such as environmental compliance (ISO 14001), occupational health and safety (ISO 45001), or information security (TISAX, ISO 27001).OEMs can have greater confidence in the compliance of their supply chain, contributing to the brand's reputation for quality and reliability.
Flexibility in Data Disclosure:VPs allow suppliers to disclose only the necessary information for a specific transaction or engagement with OEMs. This selective disclosure respects privacy concerns and limits the unnecessary sharing of sensitive data.
Real-time Validation:OEMs can verify the authenticity of a supplier's VCs in real-time without contacting the issuing body directly. This instant verification is possible because VCs are cryptographically protected and can be checked against public directories or ledger systems.
Reducing Risk in the Supply Chain:With VCs confirming the supplier's qualifications and track record, OEMs can mitigate risks associated with supplier reliability and product quality. This risk reduction can lead to fewer recalls, reduced liability, and increased customer satisfaction.
Cost Savings:By reducing the administrative burden and the need for multiple, costly audits of suppliers, VCs and VPs can save resources for OEMs. For suppliers, maintaining digital credentials can be more cost-effective than traditional certification processes.
Global Interoperability:The standardized format of VCs and VPs allows for global interoperability across supply chains. This means suppliers can use the same set of credentials to work with OEMs in different regions without needing separate validations for each market.
Dynamic Supplier Relationships:As market demands shift, OEMs can quickly validate the credentials of potential new suppliers, enabling them to respond to changes in the supply chain dynamically.
Building a Resilient Supply Chain:In times of disruption, such as during a pandemic, VCs and VPs can facilitate the secure and speedy identification of alternative suppliers and confirm their capabilities through digital means, bolstering supply chain resilience.
Facilitating Secure Data Exchange:VCs and VPs can be part of secure data-sharing protocols within the supply chain, ensuring that only verified and authorized entities have access to sensitive information and intellectual property.
The adoption of VCs and VPs by automotive suppliers and OEMs can revolutionize the way trust is established and maintained in a global and increasingly digital supply chain. By leveraging these technologies, the automotive industry can ensure more secure, efficient, and reliable interactions between suppliers and manufacturers.
eIDAS 2.0 and EBSI in Europe
eIDAS 2.0 and the European Blockchain Services Infrastructure (EBSI) are initiatives by the European Union aimed at enhancing trust among legal entities, not just within Europe but also globally. These initiatives can help build trust in the supply chain by improving identity management, transaction verification, and data integrity. Here's how they can contribute:
eIDAS 2.0
establish a framework for secure electronic identification and trust services for electronic transactions that enhance the digital single market. The updated regulation is expected to directly address the recognition and interoperability of electronic identities (eIDs) and trust services such as electronic signatures, electronic seals, time stamps, and other proofing services across EU member states, making them more user-friendly and widely accepted. eIDAS 2.0 will likely include provisions for decentralized identity models, which could help in the creation of self-sovereign identities for legal entities. This would allow entities to control their own identity data, increasing privacy and trust. By providing a universal and legally-recognized identity standard, eIDAS 2.0 facilitates smoother, more trustworthy interactions in cross-border supply chain operations.
EU Digital Identity Wallet Consortium
- The EUDI project aims to drive digital transformation is by improving citizens’ access to a trusted and secure electronic identity that safeguards privacy and affords users control over their identity data will drive digital transformation is by supporting the digital transformation of the European industrial sector.For The European Union funded a reference implementation for mobile wallets for their citizens. You find it on Github
.
EBSI
aims to leverage blockchain technology to deliver cross-border public services in a trusted, secure, and efficient manner. As part of this, it focuses on creating a reliable and verifiable ledger of transactions and identities. The use of blockchain provides a tamper-proof, immutable record of transactions and agreements. This greatly enhances trust as legal entities in the supply chain can confidently rely on the accuracy and integrity of the recorded information. EBSI could provide a platform for issuing, storing, and managing digital product passports and verifiable credentials, which could prove vital for tracking and authenticating goods in the supply chain. Traceability and provenance of goods are improved with EBSI, as each step in the supply chain can be verified, and authenticity checks can be performed with ease and transparency, substantially reducing fraud and counterfeiting.
Both eIDAS 2.0 and EBSI can address some key trust issues typically present in international supply chains by creating a standardized, secure, and interoperable framework for identity management, transaction verification, and reliable information exchange. By adopting these frameworks, entities across the supply chain can ensure that their partners are verified legal entities and that their transactions are secure, thus fostering a trusted trading environment not just within Europe, but also in connections with worldwide partners.
Similar initiatives in other economic regions
There are initiatives similar to EBSI and eIDAS in other economic regions like Japan and the United States, aiming to enhance digital identity, trust services, and blockchain integration for improved transaction security and interoperability.
While many regions are still working on integrating these concepts into their legal and infrastructural frameworks, some initiatives are already beginning to support the principles of DID and SSI.
United States
Though not an official government initiative, numerous projects and companies in the U.S. are heavily involved in the development and promotion of DID and SSI concepts. These often work in a complementary way to the existing identity frameworks, potentially interfacing with governmental initiatives like NSTIC in the future.
National Strategy for Trusted Identities in Cyberspace (NSTIC):NSTIC was an initiative launched by the United States government to promote the creation of secure and interoperable online identities. The goal was to enable individuals and organizations to securely authenticate in cyberspace while maintaining privacy.
Trusted Framework Providers:In line with NSTIC, various third-party organizations operate as Trusted Framework Providers. They establish identity frameworks and provide certification programs for digital identity products and services.
Cybersecurity Framework by NIST:The National Institute of Standards and Technology (NIST) has developed the Cybersecurity Framework, which includes standards, guidelines, and practices to manage cybersecurity-related risks, and this framework is widely adopted by various sectors, including supply chains.
Japan
My Number System
: While DIDs and SSIs are not yet integrated into the My Number system, the incorporation of individual ID numbers into digital transactions could provide a groundwork that future DID/SSI initiatives could leverage. The Japanese government implemented the My Number system, which provides a national identification number to citizens and residents for use across various government and private sector services. It is part of an effort to streamline digital transactions and improve secure data management.
Data-Ex
(Data Society Alliance) Infrastructure for Cross-Domain Data Exchange Based on Federated Architecture (Society 5.0 PDF
).
Japan Certification Authority (JPCA):The JPCA offers digital certificate services similar to trust services described in eIDAS for secure electronic transactions and authentications.
China
Electronic ID (eID) Initiatives: China has been developing digital ID systems, primarily through state-issued electronic IDs, which are linked to citizens’ national ID numbers and can be used for various online and offline services. While this centralized model currently differs from the decentralized DID concept, there is room for future integration as the technology and policy landscape evolves.
Blockchain Service Network (BSN): The BSN is an ambitious initiative by the Chinese government to build a global infrastructure that provides blockchain services. While its primary intent is not focused on DIDs and SSI, the infrastructure could potentially support these technologies because of its underlying blockchain capabilities.
Cybersecurity Law and Personal Information Protection Law (PIPL): Under the recent PIPL, China has increased the focus on data protection and securing personal information. While it does not explicitly address DID and SSI, any future move towards decentralized digital identity approaches will need to align with these regulations.
Brazil
In Brazil, the CNPJ
serves as the national registry of legal entities, which is a federal database managed by the Secretariat of the Federal Revenue of Brazil. It identifies Brazilian companies and other legal entities. As a leading provider of digital certificates, Certisign enables electronic signatures and secure online transactions, primarily through the use of traditional digital certificate technologies that comply with national regulations. ICP-Brazil
enables the issuance of digital certificates with Brazilian Public Key Infrastructure (ICP Brazil) and with validation by law.Integrating CNPJ and Certisign with SSI and DID would be a significant step towards providing electronic identities for legal entities.
B3
(Brazilian stock exchange) has undertaken several digital transformation initiatives under the banner of "B3 Digital." These initiatives often revolve around improving trading platforms, implementing advanced market analysis tools, and enhancing overall market infrastructure to better serve investors and companies. These initiatives may involve the use of blockchain, digital assets, and possibly exploring advanced technologies for identity verification and transaction security. While B3's digital initiatives are primarily focused on financial markets, there are ways in which such efforts could indirectly help establish trust for the automotive network.
Outlook of Data Spaces
Each business model invests in supporting clients to handle regulatory changes effectively, reducing the risk of non-compliance, and positioning themselves as indispensable partners in maintaining an efficient, compliant, and resilient global supply and value chain. As these regulations continue to evolve, operational companies will help their participants to stay ahead of the curve in offering innovative and compliant services. That's the main driver for open communities like Catena-X
or Manufacturing-X
.
The European Commission
is also actively working on a data strategy
to create an environment that fosters the development of common European data spaces in various sectors. As part of the European strategy for data and the Digital Single Market, the Commission has identified several key data spaces that are expected to start and evolve in the near future. These include:
Industrial (Manufacturing) Data Spaces: To support the optimization of manufacturing processes and the introduction of new business models in the industrial sector.
Green Deal Data Spaces: Aimed at contributing to the EU’s ambitious climate goals and supporting the transition to a green, sustainable economy.
Mobility Data Spaces: To improve traffic management, mobility services, and the development of connected and autonomous vehicles.
Health Data Spaces: Focused on improving healthcare delivery, personalized medicine, and the management of health data for research and policy-making.
Financial Data Spaces: To enhance the access to, and sharing of, financial information while ensuring the privacy and security of financial transactions.
Energy Data Spaces: Aimed at facilitating the transition to a more efficient and renewable energy system by improving grid management and fostering innovative energy services.
Agricultural Data Spaces: To support precision farming, sustainable agriculture practices, and efficient supply chain management.
Public Administration Data Spaces: To simplify and digitize cross-border interactions between European citizens and administrations, making public services more accessible.
Skills Data Spaces: To help develop the European labor market by improving the visibility of skills and facilitating job matching.
Cultural Heritage Data Spaces: To facilitate the preservation and dissemination of Europe's cultural heritage through digital technologies.
Each of these data spaces will be designed to promote secure data sharing and create value by connecting different stakeholders and facilitating access to large pools of valuable data. Additionally, implementations like the European Data Governance Act and the upcoming Data Act are expected to establish the legislative framework that governs these spaces, promoting trust and enabling the EU to take a leading role in the global data economy. Aiming at supporting the data spaces deployment, the Data Space Support Center
(DSSC) is creating numerous assets in cooperation with the network of stakeholders.
Very interesting article. In the age of data spaces, as also encouraged by the EU, we need to think of added value of sharing and combining data from several sources, in a safe and legally and ethically acceptable manner.
We see the numerous advantages that data sharing can bring. Data->information->knowledge-> wisdom is the holy grail we strive for to achieve a better (digital) society.
Wisdom is also taking lessons from thousands of years where humanity has proven that it needs strict and solid limits in using new insights.
It would be so easy to just connect every data source to each other, and find what you need. But the easy way is the dangerous way, so fortunately we have legal and ethical limitations.
It is our job as data scientists to be the guardian in safely evolving our digital society. In that way we not only innovate technology but also our ethical standards as humans.
Articles like this help in defining fundaments for digital safety.
Thanks for sharing. What an excellent read! What are your predictions for how DIDs will transform data exchanges in 2024?
As we step in to 2024, we are asking thought leaders in this space: what are your predictions for the key trends and most important advancements of 2024. Would you like to share your thoughts on this?
As a continuous learner on the topic, I would like to share some thoughts from the perspective of a new comer.
1.
Under the paragraph of "Decentralized Identifiers (DID) for Legal Entities", DIDs are not issued by any central authority and are typically registered on a decentralized system.
The relationship or mechanism between "not issued by central authority" and "registered on a decentralized system" might need more explanation, because the decentralized system works as a hub and somewhat functions like a "centralized hub" which every participant need to register and verify through "the hub" with a public key.
When we refer to the paragraph of "OpenID for Verifiable Presentations", in the item 1 DID Representation, you wrote: "A legal entity is assigned a DID, which serves as its globally unique identifier within the digital space." Now, a DID is "assigned". Comparing with the previous paragraph, where a DID is "not issued", it is really confusing.
Maybe it is better to create another diagram based on the "W3C Verifiable Credential data model v2.0?"?
2.
The relationship between "OpenID for verifiable presentation" and "DID" is not clear. WHO issues the "OpenID for VP"? or is "OpenID for VP" generated by the owner of DID?
Let's not forget vLEIs based on the established, globally scalable governance framework for organizational credentials created by Global Legal Entity Identifier Foundation (GLEIF).
This should definitely be conductive to the mission and vision of Catena-X
Jili 200 casino withdrawal
online slots games for real money
winhq.ph casino
Slots go casino Login
Philucky app download for android latest version
July 9 zodiac sign compatibility
Jili22 login download
Bonus 365 app download for android latest version
Jili lodi login
7 juli jarig
online casino games canada
91059 water tank
Golden empire jili online
peraplay.com login register
Jili 365 bet withdrawal fee
Franck Muller Crazy Hours replica
555 online casino
Ph646 ph login register
5 jili casino login register philippines app apk
Rehistro ng jili h1 download free
Okebet168 slot withdrawal
377 JILI casino Login registration
Anvil Fittings
Jili money coming cheat android
Phil lucky game apk
Jolibet php login password
Paano ka mananalo sa mga fruit slot download
slots 777 apk
Eternal Slots no deposit bonus free spins
Jiliasia online casino register
I met a pretty girl na taga is meaning
HB888 Casino Login
Global Games 2024 Taup艒
Casino Frenzy login register mobile
Matukio ya leo VIDEO Download
Jili8 login philippines withdrawal
Bonus Hunter casino
Super Sic Bo prediction software
Maraming tao sa panaginip
PH cash casino real money
casino online games real money
JILI slot jackpot app
Super Ace slot 777 login register
Sobrang alas libreng laro login
Elden ring more talisman slots reddit
Phdream 777 slot download
Old school casino slots online free
Free GSN games list
Wizard of Oz Slots Free Scratchers 2024
Jugar gratis Pharaoh's Fortune
Royale jili withdrawal
Toledo bend lake country cabins
Roulette simulator Unblocked
Infinity 88bet app
Super bingo jili demo apk
Super rich casino real money
Jelly cake design for Birthday
MERKUR Slots online UK
Slotxoz1688 register
35phfun
Betso login philippines
Slots Palace Casino promo code 2023
Libreng laro ng online slot machine real money
Extreme gaming 888 download
Jili official app ios apk download
Double Diamond Wheel of Fortune slots free
PHLBOSS online casino
Hot 646 slot real money
567 slots online
Yes jili com login registration online philippines
How old is Leon Kennedy in RE6
Demo jili free play demo no deposit
Ii89aa philippines
Maxjili com login philippines
Lodigame 1 login ios
Ubet63 jili slot online login app
Baccarat online casino
jili h1 register
Mega ace slot demo download
Ube halaya koi in english
Jili t7 register philippines online app
How to win at Cache Creek Casino
Slots how to win online
Go88 casino ios
Bulelani jili wikipedia harvard university
Funny casino Instagram captions
Best online slots philippines no deposit bonus
Fortune Gems 3 Jili
How to create transaction pin
Mwplay888 net login password reset
Slots ug real money
Jili q25 register download
Www 90 jili com login register philippines
Lucky Neko slot PNG
Royal casino game login register
Slot machine pictures cartoon
Jili free 100 new member apk
Alberta online casino no deposit bonus
Cc6 online casino login philippines
Gogo jili 777 login philippines sign up
winhq.com online casino
Fc178 download app apk
拢3 deposit bingo
Tongits online pc windows 10
casino plus customer service number 24/7
Galaxy88casino net login philippines
Fb777 win apk
JILI live casino login Philippines
Jiliplay login Register
Hot 646 ph login register download
Pin lucky game gcash download
Ph 646 casino login download
Free unlimited bingo card generator
Fc178aa review
CB1 and CB2 receptors
Jili club apk
Jiliko online casino pagtaya registration
When is pasig day 2021
Jili app casino download for android latest version
Gates of Olympus vs Gates of Olympus 1000
Biofloc fish farming book
Vegas7Games free credits
Jollibee Delivery Mix and Match
JB CASINO fb
X570 a pro m 2 slots manual
Golden joker jili withdrawal app
747 Live app download for android latest version
5 jili casino login philippines
July 8th 2024 weather
olympus tg-7 release date
FF16 Joshua companion
Ano ang kahulugan ng halimbawa
Lucky cola online casino games philippines
Online casino jili philippines real money
Bingo plus mines cheat android
Wilde Wealth Management
Jili 49 dot com login app
Julie's Bakeshop description
Is gambling illegal for minors
Slot Attendant salary in the philippines
Is jilivip legit philippines
Jili x superace88 login philippines
啶啶澿 啶曕啶?啶膏ぞ 啶班い啷嵿え 啶す啶ㄠえ啶?啶氞ぞ啶灌た啶?
Slot machine games online no download
Wowph casino login
What did the Council of Nicaea do
Olympic casino online games no deposit bonus
Dragon Cash slot app
啶掂啷嵿ぐ啶ぞ啶?啶曕ぞ 啶ぐ啷嵿く啶距く啶掂ぞ啶氞 啶多が啷嵿う
How many days until July 3
Www jilino1 club registration
Philwin download apk
Pagpapanatili ng jili download apk
Jili h1 register philippines app
Old IGT slot machines
Tadhana slots 777 apk download latest version
Ajili in swahili meaning
online slots that pay real money
Atwood Water Heater parts near me
6s app casino login
Up 777 casino login download
Restore slotomania download android
Casino slots online real money
royal 777.in login
Pros and cons of gambling
Tadhana jili slot real money login
Ezjili login register philippines
Fishing app earn money
How to withdraw money from OKBET
Zynga Game of Thrones Slots support
Betjili apps download apk
Yesjili com app ios
Philadelphia News today
Noir cowboy TDS
Gogojili redemption code 2024
Jililuck download ios
Jackpot meter jili download apk
Slot777 casino login no deposit bonus
Railway Sar Sangrah Khan Sir book pdf in Hindi
106 jili casino withdrawal
QQ international sign up with email
Fb777pro login registration
Best free slot play no deposit
jili real money
Treasures of egypt slots free games download no download
Evolution Gaming lawsuit
7 libreng online na slot machine legit
CG777 Casino login register
Https slotbet com home game login
Pinakamahusay na oras upang maglaro ng jili slot
49 jili queens withdrawal form
Https ii89phn com download
Betjili app download
Jili libreng 100 login register
Play casino games online for free without downloading
Super ace jackpot pattern
LiveBet prediction
Official Journal of the European Union PDF
Maritime Industry Authority function
Marvel bet app download for pc
Journal of jilin university multidisciplinary journal impact factor
49jili apps download free ios 2021
Mitran de boot mp3 song download mr jatt pagalworld
Best free slots treasures of egypt no download
Angelina Jolie children Vivienne
Jili voucher code free chips 2021
啶掂啷嵿ぐ啶ぞ啶?啶膏 啶啶距さ 啶曕 啶溹ぞ啶ㄠ啶距ぐ啷€
Kabibe Game code 2024 free
Feestdagen Belgi毛 2024
DIY feminine wash for odor
49 jili apps philippines login
Brick Alpha
Jilivip 02 apk
Jili 49 login
Award winning chili recipe Allrecipes
online casino games like luckyland slots
Arena plus apk
Super ace hack download apk
Where There's a Will FF16
Jili777 oi login
Phwin777aa login
Betvisa Philippines login
Jollibee menu c1
Jili amazing withdrawal
Phrich download
Fish Farming in Bihar in Hindi
Top 10 best online slots in the world
Jiliasia 49 login
Ano ang pagsasalin pdf
"casino" casinomeister complaint
Jollibee promo 75
Jili city 829 apk latest version
Golden empire casino login download
Online casino games free money no deposit
Bet999bet login download
1xBet casino bonus
Casino Plus promo code today Philippines
Cow 888 Casino login Philippines
Peso63 login philippines app
MNL777 download free APK
Fake gambling Plinko
63win Casino
Jili city download apk
777pnl casino link download
Ilunsad ang Kraken demo
Kerri Strug ankle injury
Video poker online free play no download
Slotomania update
Jili 200cc login password philippines
White Rabbit slot
Tracksino Crazy coinflip
Euro casino slots no deposit bonus
xxjili live
Slots 999 casino online
SM Sale schedule June 2024
Paano maglaro ng slot para kumita register
Thunderkick slot apk
Spina bifida ultrasound newborn
Jiliasia app Download for Android
Kit timefree ph login register
USA online casino no deposit bonus
Phlwin Mines Game
Pay777 log in
5-ingredient vegetarian chili
King game888 register
Demo jili try out free
Jilibay VIP login password
Pci slot vs pcie gaming
Mines game hack scanner ios
Best casino for free slots
Falconplay web download
Sigeplay online casino register download
Scatter philippines withdrawal
Ano ang super 6 sa baccarat strategy
Baccarat card game strategy pdf
Ox jili casino login Register
ez jili app download apk
Fachai88 login app
Mines signal App
188 jili com login philippines
Yeriko BORA Injili download
Wild chili Scoville
Super ace jili slot login
bonus free casino
Casino frenzy app download ios
J jill promo code july 2024
49 jili road register app
100 free spins no deposit codes
Jili event app apk
Pnxbet philippines registration
Barrel bonanza slot demo hack
Jili t7 login registration online
Libreng computer video poker free download
QQ jili casino login registration
How did this part of the epic poem Beowulf end
Orion stars slots apk
Free online games jili philippines
Phlove Casino Login Register
Casumo - Live Casino & Slots
Mini Phone Touch Screen
Jiliko747 slot game login app download apk
Online pokies Australia real money no deposit
Lodibet com login password
devil fire jili slot
Lucky 777 apk old version
How to play Lucky JILI Slot
774pub register online
Super ace slot free play download
Windows 10 download
gogo jili log in
Yes jili free 68 login philippines apk
Hugph1 login password
777 pub online casino games downloadable content apk
釣€釣夺灍釤娽灨釣庒灱 online
Sloto kahibangan casino login
Scatter game jili download
Lucky calico casino login philippines register
Tongits Go Mod APK Unlimited everything
Mines predictor online free
New free slot machines with free spins
Deli zone boulder menu
Slots zone apk
Libreng paglalaro ng video poker online withdrawal
777 jili casino login registration
APaldo slot Login
Pp77 bet download
baba wild slots casino - free coins
Game slot 777 online apk
Release the Kraken slot review
Bagong jili register app
New slot machines 2024
Julie's bakeshop wikipedia biography
Lodi VIP bet
Jeetbuzz 168
5jili online casino philippines
Yy777aa app download
Ano ang fruit party?
Lodigame app download latest version
Popular online Games in the philippines 2024
J jill petites online
Good luck wishes for match
Online casino game dealer philippines
Best online pokies Australia real money
online gambling for real cash
phil168web
Kk jili free 58 login app
Jollibee Burger Chicken
Masaya si jili real money philippines
Julie's bakeshop history pdf
Casino online free philippines
Winph111 login bonus
Free slots online free games no download for android
NN777 Slot login
GOGO Jili casino login registration Philippines
Jili opisyal na website register philippines
Temple slots com login
Philadelphia State
Apollo game download
Jili 999 casino login philippines
888php login app
88casino
Osm gcash login problem
Cazino Zeppelin Reloaded demo
Free online slot games win real money philippines
5jiliorg download
Jili games free no deposit bonus
Big bass splash sam rayburn 2023 results
slots you can win real money
Gg777 download
777 lucky jili slots casino download apk
Dinosaur tycoon jili download apk
Free slots 777 apk latest version
888php casino login philippines
Bingo jili slot download
Jili slot 777 login register online download
Www mwgames188 com login download apk
Aratbet online casino register
Slot games for real money philippines
Wild Wild Riches
VIP slot online
Walang 1 jili login password
啶ぞ啶ㄠじ啶苦 啶班啶?
Casino games slots free download
Jili club login download
Bwenas 999 Live Register
Winph222 login download
Maxjili casino
Poker machines online
Jili999 register app login
jili9889
Jil monthly theme
Ruby Slots free spins no deposit Plentiful Treasure
1 kilo ube halaya recipe
Best gambling slots
Tamabet app download
nice88 legit
matinding amazon big bass
Paano mag withdraw sa jili games
Jili50aa review
Macau casino minimum bet reddit
Bigballer club log in
July 3, 2024
Best smelling homemade laundry detergent
Jili 188 no deposit bonus
Lucky 777 login app philippines
Jiliko online live
291 bet casino withdrawal
Reusable ice cubes IKEA
Jelly App tik tok
Queen777 casino no deposit bonus
啶掂啷嵿ぐ啶ぞ啶?啶膏 啶啶距さ 啶曕 啶溹ぞ啶ㄠ啶距ぐ啷€
Royal888 deposit bonus codes
Jili free 100 register download philippines
Tapwin 2024 login
60 jili login philippines register
337 jili live casino
FF777 casino Login
Phil Online Service Center
PanaloKO referral code
111jili login
Best lenses for sports photography Nikon
Sm 777 casino login Philippines
Big bass Splash Guntersville 2024 Results
Mwgooddomain com login download
Online casino games usa real money
Gogo jili casino login download free
What is PCI in computer Architecture
Nn777 slot jili online real money download
Is July 2 a holiday in Pasig City
Geely gx3 pro engine review
Pagal Khana drama cast tina
Is Calico Spin affected by luck
Hot Vegas Slots Free coins
Majili clan names
lodi291 online casino games gameplay
Ff777 casino link app
Mga kahinaan ng mga pragmatic slot machine login
FB JILI Login
Fijne dag meaning
download jili
MPL PH
Jlbet 26 register
Jilibet Promo code Philippines no deposit bonus
Fg777 pro login philippines
Video poker games free download no download for android
Konnyaku jelly ingredients
Ph646bet app
Lucky Tiger 777
21.com casino no deposit bonus
Charge Buffalo free play
Super jili 777 casino Login
Royal 888 casino app
Jili slot 777 free 100
Jilibet promo code 2024 philippines
Jili live app download apk old version
online casino video slot games
Slingo originals free download
Slots the game download
118 jili casino login
Phjl55 philippines
646 jili
Ijility trabaho address new york
Rush Fever 7s Deluxe
Slot machine simulator online
Tetris free
Jili777 online casino login
Winjili ph login registration
Jili 53 casino login download
Y777 jili withdrawal limit
Ijility las vegas warehouse jobs salary
Flush Fever video poker online free
Libreng jili games login registration
ck jili casino
Pay 777 casino login register philippines
Ye7 login philippines
Casino Royale 88 login register
Please complete the required turnover for withdrawal tagalog meaning
Osm Jili Official Website
Hacker keyboard download
Ijility llc milton ga address
Jili999 register philippines download apk
List of Aristocrat slot machines
Transaction password example gcash
SUPERX Casino app
Jili ez apk mod
FBM bingo Pilipino online login
Mnl168 link login
Crown88 login
Sugal777 app apk
megapanalo
Jili update philippines today
Superaccess industrial login
Esball Online Casino com
July 9 bts song
Nexus gaming slot login download
Bingo jili ph download
Tg777aa philippines
Libreng paglalaro ng video poker online app
Lv bet app login
Jili slot machine real money legit
Jili rich download for pc
200 jili casino login register philippines
mayari ng jili
Lucky 777 Login app
Kumuha ng jili app ios apk
188 Jili Casino login Philippines
Hack mines game
Lodi 291 online casino register app
laro ng pera ng dragon
No cash in online casino
Best online casino slots kenya real money
ILI bibliography format
777 casino login register philippines download
Jiliplay 9 today
Jackpot meter jili download apk
Jili 777 lucky slot login register download
30 free slot games online slot machine no deposit philippines
Jiliko casino online games philippines
Bmw casino slot app
Osm jili gcash register online download
Yahoo daily horoscope Scorpio
BET999 Login Register
Dragon Link slots online free download
WINPH com casino
Free slots treasures of egypt no download
X570 AORUS ELITE WIFI price
Kk jili login registration app philippines
Online casino games to win real money philippines
Hot 646 ph online casino register
Mahal si jili casino login register
Lodi 291 online casino games free chips
Tongits offline mod apk
www.scatter slots.com
Casino game real money free play
3rd hand slots
Gamebato alternative
101 jili com login philippines
puwang ng dragon hatch
Pagal Khana Episode 28
Virtual browser online free download
Phlboss888 app for android
slots nigeria
JB Music moa
Crazy 777 jili login download
Yono Slots APK download latest version
Best free online slots fake money no deposit
1xBet online casino free download
Platincasino Deutschland
JILI 646 PH login
Jili 747 casino login register philippines
Zodiac Casino app
Gogo jili App download apk latest version
Play to win Casino registration online real money
Ace demo slot free download
Mahjong ways 2 tricks
Top 10 free online casino games philippines
Side quest ni jill
6bet com redeem code philippines
777 lucky slots casino login
how online casino games work
usajili yanga 2023/24
Okbet 168 login password
Jili 464 login register philippines
Casino frenzy app download for android
Jili games apk old version
Fire Joker free spins no deposit
Manila online casino
Jlbet33 login
60win asia
Free 100 casino 2024
X570 AORUS MASTER drivers
200 JILI cc
Book of ra free game apk
Good Luck Guys Netherlands
Kk jili login registration online 2021
Jilibay pro withdrawal
Baliw 777 jili login download
Chili pepper
Q25 jili login app
Slots of Vegas $300 no deposit bonus codes 2024
Tp777 download apk
Boxing king slot png free download
Coffee jelly ingredients and procedure
magicjili
Best online casino games philippines gcash
Philucky official casino
Jili cc login philippines
Jili lucky slots real money philippines
Jili super ace hack download apk
Jili777 free 100 no deposit bonus Philippines
Asia jili register mobile
Jili games gcash real money
Online casino no minimum deposit philippines gcash
LIMBO Mod APK
Jilibet download app for android latest version
Ano ang ibig sabihin ng time slot brainly
Play Dice and Roll free online kaz
777 casino real money login
Betpawa Games today Football match live
Kirin games online casino download
Www 90 jili com login register
Jili rich login philippines
Betjili bangladeshi saiet login
Dbx777 login philippines registration download
J Jill coupon codes $50 off
Helens 777 Casino login download apk
4 talisman slots elden ring bug
Jili online slots apk latest version
JILI official GCash
Jackpot Party apk
49jili casino official site philippines
Quick hits slots free download apk
Lol646one download
Kkjili com 777 login password
Wow88 malaysia login register
Golden Empire Gcash
Ano ang speed roulette online
Who invented mobile phone in which year
Jili code free 2021
Best slots free
49 jili queens register app
Jili turnover calculator philippines
Jili referencing indian law pdf
Slots 213 apk
Slot Super Ace Jili Games gameplay
Jili gcash register link
Golden empire free demo no deposit
Best slot machines to play at the casino for beginners
49jili vip login download
Electronic Bingo tablets
Jackpot meter slot philippines
Jili city 829 login password
JILI casino PH
Double Ball Roulette rules
49jili casino slots login download
Jili irich bingo app free download
49 jili today philippines login
49jili login to my account register philippines
Love Jili online casino
What day is july 2nd 2024 holiday
How to withdraw jili casino philippines
Helens gogo jili register app
Jili 365 casino login registration philippines
50jili fun withdrawal
Peso 888 register bonus
Espanyol to Tagalog words
Jili tryout free
Pagal Khana Episode 26
Ice wild slot real money
Double Rainbow game cgebet
Jili scatter download
Crazy Hour Watch price
Big bass splash strategy
Jili easy win download apk
Jilibet020 com login Register
FB777 PH login
Maritime Industry Authority function
60 jili login register mobile
Blackjack rules not 21
XXXtreme Lightning Roulette
Bloxflip Mines predictor discord
Sg777 bet login philippines app
99bet app login
Pb777 login register mobile
1xSlots no deposit bonus
Libreng slots treasures of egypt download
Mini777 download apk
Phjl casino app download
365 jili casino login philippines download
July 12 holiday Philippines proclamation
Jili8 COM log in
Super JILI asia
10 online casino games philippines
Okebet168 com login password
Jili7 jili slot register
Get jili app login philippines download
Nakakatawang palaro sa mga bata
vegas7games play online casino games https //m.vegas7games.com
BBM777 free 188
Infinity Games free 100 download
Casino Filipino Coin
El filibusterismo kabanata 30 buod
啶椸ぐ啷嵿ぎ 啶ぞ啶ㄠ 啶膏 啶溹げ啶ㄠ 啶ぐ 啶曕啶ぞ 啶侧啶距え啶?啶氞ぞ啶灌た啶?
Jili178 promotion philippines
Irich bingo slot login
Jili slot 777 real money
88jili login registration
188 jili casino login app download
Xtreme gaming casino login
Best online penny slots real money
Jili online casino apk mod
Euro slot packaging
FF16 Phoenix, Heal Thyself
Lucky Tiger Casino no deposit bonus
Royal777 slot apk
Betso88web login
Dermaplaning powder Spray
Apps na pwedeng kumita ng pera legit 2023
Singilin ang kalabaw jili withdrawal
best online casino games that pay real money
Win99 slots game real money
jili com
Jili online slot real money app
Jelly cubes food
Lodivip4 com login password
Solid bet777 com login philippines
Jigsaw Puzzles - Puzzle Games
Jili opisyal na website login philippines
8k8 online casino games downloadable content philippines
Aceph 99 review
Jili tv login
Pure swerte99 live login register
188 jili
How to get badlands cowboy skin
Demo jili try out apk mod
Jili official website login register
Jili Slot 777 login register online no deposit bonus
Jilibay pro withdrawal
Free 60 pesos online casino
Ano ang pinaka kumikitang diskarte sa baccarat?
Online casino games example for students
Heart of Vegas Slots casino
Cowboy Slots best slots
Ph sabong go perya login registration
S888 org live betting app
218aceph com login register
FC777 register
wow888 casino login
Www jilibet888 com login app
Swcup6 net live login Register
Jili 646 register philippines
Bet88 agent
1p slots Foxy games
Jili777 login register online philippines
Golden Temple JILI Slot
Journal of Tianjin University Science and Technology impact factor
Live casino slots online philippines
Pisobet88 philippines
Is casino legal in India on land
Casino Jackpot Slots early access APK
PG gaming slot login
Jili kilig casino login download
Phl vip slot download
Halimbawa ng online slot na pagsusugal app
online slot machines for fun
Max jili casino login
Zeus casino game free download
Good luck in Hindu
Jilino1aa philippines
GSN Casino free Tokens 2024
Jackpot Wins gift code list today
Phtaya download free
49jili casino games download ios
byu games casino 968 online casino
Lol646pro review
Wagi 777 download for android
yyy777web
49 jili quartz withdrawal
Please complete the required turnover for withdrawal phdream login
Voslot apk download for android
Paano maglaro ng slot88 withdrawal
Ano ang pinakamalakas na kamay sa blackjack cards
Jili jackpot 777 login app download
Jili yes casino login download
XBet app
Tmtplay pro apk
Jili live slot
Deepwoken wiki
Slot machine Plants vs Zombies
Phbwin com login password
Best online casino philippines gcash real money
online casino free games on slots
Jili link casino no deposit bonus
Pasig gems slot register
Baccarat table philippines
Jili 8888 real money login
Casino slot free no deposit
Slots Ninja match bonuses
Tadhana jili slot apk download old version
Turnover not met cannot withdraw amount meaning
How to deposit in philucky Online
How to cash out in JILIBET
Max jili App
joy slots
Taya365 bet
41 jili withdrawal
337 jili com login register mobile
Jili 8998 login register download
Winehq slot online login register
Alberta online casino games no deposit bonus
Jili999 withdrawal fee
Best free online pokie games with free spins
Rummy Culture
Saan maglaro ng baliw na coinflip?
Jilibet download for android
How to make a gel ice pack without rubbing alcohol
177bet cc register
gille helmet full face price
Jili 178 ph register app
Teen Patti Gold old version
Play Dragon Mighty Cash free
s888aa
Ggbet net registration
啶掂啶ぞ啶ぞ啶?啶啶?啶膏か啶侧い啶?啶曕 啶侧た啶?啶曕啶?啶膏ぞ 啶班い啷嵿え 啶оぞ啶班ぃ 啶曕ぐ啷囙
772 pub withdrawal
88JL Login
Qq jili ph register online casino
Jiliasia withdrawal app
Legit online casino games philippines real money
Take Action pill
Slot online game free play no deposit
Yugioh forbidden Memories Ultimate Dragon Ritual
Lucky 778 casino no deposit bonus
Mr Fortune casino login
Gogojili old version
Jili deposit 50 philippines legit
Empire slot machine free chips
9y game city casino real money
Z790 ram slots specs
JILIHOT register download
49 jili tv shows 2021 philippines
Hb888 casino login
royal ace casino "hidden" coupons
Most expensive helmet in the philippines
Dragon Link slot machine app
337 jili live
Zeus casino game free download
PHMACAO apk free download
Mnlwin game login philippines
Poki unblocked github io
J jill promo code free shipping no minimum
Example of TV show in the Philippines
Super PH casino online real money
King game Casino free 100 no deposit bonus
Pragmatikong dula pdf
Dahilan at epekto ng suliranin sa pangingisda
Jili 999 casino login registration download ios
Dream 111 login forgot password
Zili app video download apk latest version
All games free download
Real money online casino Ohio no deposit
Jackpot World free coins code
Kkjili casino login register
Tesla Roadster
Agilaplay login philippines
Egypt slots no deposit bonus codes
Scatter free play
Best slot sites for real money philippines
Yes jili com login registration form download
Boeing aircraft price
God of Wealth slot game
Tesla inventory
Helens 777 Casino login download ios free
Quick hit slots app cheats android
Taya777 bet app
SLOTVIP Download app
Jili reward login app download
Casino score Crazy Time
Jili joy casino login philippines download
777d online casino register
Mga larong wild classic slots sa casino download
Mi777 login password free
Jili188 tw no deposit bonus
Yaman777 download
啶ぞ啶椸啶?啶氞ぎ啶曕ぞ啶ㄠ 啶曕 啶熰啶熰啷?
Online betting casino real money
Vipph casino login
Bet199 APP
DALI 777 Casino legit
S888 org live betting login registration
Tesco Hampers sale
What National Day is July 10
Sizzling sevens slot machine price
Phwin666
Anong uri ng laro ang Dragon Tiger?
Igt slots download
GTA Online slot machine trick
PHLOVE Casino link app
QQ Jili Casino login
E isang verdad traduction english pdf
FF777 Casino Login Register Philippines download
Pinakamahusay na mga site ng slot register
Phbwin com login register mobile
66pgslot
Abc Jili download free
Big win 777 PAGCOR Casino login registration Philippines
Is jp7 still made reddit
Recall balance meaning
Cheat Engine slot
Superball Keno online
Legacy of Dead free spins no deposit
Jili jackpot register mobile
Lodi888 login philippines
Golden empire free demo no deposit
Jollibee philippines menu price
Stake Crash strategy
free buffalo slots
Fortune gems real money philippines
Swerte Win
Jiliko register philippines login download
July 20, 2024 Mike Tyson
Gsn laro sa casino real money
Girl andrew lyrics
Ezjili code free ios
Ano ang diskarte sa power blackjack online
Pb777 login register mobile number
Ace casino real money
Jili isa login registration
Hqwin slot app
568 Slots yono apk download
Lumulutang na dragon megaways demo apk
Lion Slots Free Spins
Jili999 online casino login app philippines legit
100 free spin and win real money
How many days till July 8th
Ano ang pagsusugal
Jili app casino download for android ios
Jiliph club withdrawal
Quick hit slots unlimited coins hack
8m8 casino login register
Starmania slot real money
Yes zili app download apk old version
best online casino games in kenya
Online casino games not real money reddit
Royal fishing demo hack
Gambling online, free
Galaxy casino login philippines
Jili 11 casino login
Pb777 login app download for android
Betso888aa register login
online slot machines nz
Galaxy Casino Frenzy
Panalo99 ph register
milton 888 casino login
RTP Gorilla Kingdom
Videoslots freeroll no deposit bonus
Jilipark login register philippines download
63win withdrawal app
335 jili casino login register
Best alkansya for paper bills
Unli scatter super ace hack download
Jili mine casino login app
Best slot machines to play online
啶班ぞ啶多た 啶班い啷嵿え 啶曕 啶ㄠぞ啶?
free 100 sign up bonus no deposit
55 JILI casino Login
Play Alberta Free Spins
J jill facebook shoes
Fruit Party slot
Khan Sir Railway Book pdf
Which RAM slots to use for 2 sticks
Jlph3333
Pop Slots free chips 4m+ today
Live RTP slot
Jili slot free try out no deposit
Jili 369 login download apk
Halimbawa ng pagganyak sa filipino
Listahan ng laro ng skillz apk download
Super Ace game download
Jili999 login Register philippines download
crown89ph.com net
Slots 555 no deposit bonus
Portuguese to english dictionary
Pragmaticplay com legit
Win99 casino no deposit bonus
Bonus 365 login register mobile
Deli zone menu boulder pdf
Online casino games for real cash philippines
Lvbet com register
Bingo Plus download
Fufafa technology ltd co register
Yes zili app download old version apk
Jili no 1 com withdrawal app
Jili tv casino
Himala director
Tongits online casino
Wild West Gold download
Mnlwin free 100 login
BetOnline Reddit
Nn777 login philippines download
Bmy88 login password
Jili city login password
335 jili casino Login
888 casino - withdrawal problems
5e sorcerer spell slots reddit
Big Bass Splash registration
Jili super ace free play app
Slot synonym and antonym
Jili fun888 login app
Is casino jackpot slots legit for real money
Games for girls 2
Bmy888web app
Jili 365 casino login register download free
C9TAYA Facebook
Lucky wheel spin and win
Get jili app login registration philippines
Royal 888 ph login register download apk
Malaking bass bonus
PG gaming casino login
Lucky jili casino login download no deposit bonus
Innovation manager Smart Data and AI @Capgemini
9 个月Very interesting article. In the age of data spaces, as also encouraged by the EU, we need to think of added value of sharing and combining data from several sources, in a safe and legally and ethically acceptable manner. We see the numerous advantages that data sharing can bring. Data->information->knowledge-> wisdom is the holy grail we strive for to achieve a better (digital) society. Wisdom is also taking lessons from thousands of years where humanity has proven that it needs strict and solid limits in using new insights. It would be so easy to just connect every data source to each other, and find what you need. But the easy way is the dangerous way, so fortunately we have legal and ethical limitations. It is our job as data scientists to be the guardian in safely evolving our digital society. In that way we not only innovate technology but also our ethical standards as humans. Articles like this help in defining fundaments for digital safety.
Thanks for sharing. What an excellent read! What are your predictions for how DIDs will transform data exchanges in 2024? As we step in to 2024, we are asking thought leaders in this space: what are your predictions for the key trends and most important advancements of 2024. Would you like to share your thoughts on this?
Standards & Technology Diplomat at Microsoft Privacy and Regulatory Affairs / Corporate Standards Group
10 个月Thanks for sharing this Matthias Buchhorn-Roth, very useful for many people across several industries.
research and design for AI and Sustainability
11 个月As a continuous learner on the topic, I would like to share some thoughts from the perspective of a new comer. 1. Under the paragraph of "Decentralized Identifiers (DID) for Legal Entities", DIDs are not issued by any central authority and are typically registered on a decentralized system. The relationship or mechanism between "not issued by central authority" and "registered on a decentralized system" might need more explanation, because the decentralized system works as a hub and somewhat functions like a "centralized hub" which every participant need to register and verify through "the hub" with a public key. When we refer to the paragraph of "OpenID for Verifiable Presentations", in the item 1 DID Representation, you wrote: "A legal entity is assigned a DID, which serves as its globally unique identifier within the digital space." Now, a DID is "assigned". Comparing with the previous paragraph, where a DID is "not issued", it is really confusing. Maybe it is better to create another diagram based on the "W3C Verifiable Credential data model v2.0?"? 2. The relationship between "OpenID for verifiable presentation" and "DID" is not clear. WHO issues the "OpenID for VP"? or is "OpenID for VP" generated by the owner of DID?
CTO, Board Member, Technology Strategy Adviser
11 个月Let's not forget vLEIs based on the established, globally scalable governance framework for organizational credentials created by Global Legal Entity Identifier Foundation (GLEIF). This should definitely be conductive to the mission and vision of Catena-X