Data Vaults allow users to store data in a private, secure way that they truly own. We call data stored in a vault on the network Autonomous Data
Vaults are secured by cryptographic keys that are owned by the creator of the vault. All network interactions require these keys in order to verify data ownership.
Our protocol ensures that all interactions with vaults use encrypted data. Neither Bright nor any intermediate services on the network can understand this encrypted data.
Vault owners must allow access to third parties to view data in their vault. The data to be shared can be specified, and is only viewable by the approved counterparty. Privately sharing data with service providers powers the Bright Network data ecosystem.
All data is secured according to ubiquitous, trusted cryptographic methodologies
All data is signed by its author, making its origins verifiable by any other user on the network. In this way, data is verifiably tamper-resistant.
Vault entries can be linked to each other to represent relationships between data and users. These relationships can be used in a wide-array of different scenarios, including the ability for one user to attest a claim made by another user.
Linked attestations between user’s data and services creates a web of claims that can be analysed. Such a web of trust can be used build trust and reputation around users and services on the network. This is a powerful tool for analysing risk and fraud.
Read our Technical Paper which explores how we use cryptography to store, verify and share private data