Data Vaults

Data Vaults allow users to store data in a private, secure way that they truly own. We call data stored in a vault on the network Autonomous Data

True Data Ownership

Vaults are secured by cryptographic keys that are owned by the creator of the vault. All network interactions require these keys in order to verify data ownership.

End-to-end Encryption

Our protocol ensures that all interactions with vaults use encrypted data. Neither Bright nor any intermediate services on the network can understand this encrypted data.

Permissioned Data Access

Vault owners must allow access to third parties to view data in their vault. The data to be shared can be specified, and is only viewable by the approved counterparty. Privately sharing data with service providers powers the Bright Network data ecosystem.

Trusted data

All data is secured according to ubiquitous, trusted cryptographic methodologies

Signature Verification

All data is signed by its author, making its origins verifiable by any other user on the network. In this way, data is verifiably tamper-resistant.

Linked Data

Vault entries can be linked to each other to represent relationships between data and users. These relationships can be used in a wide-array of different scenarios, including the ability for one user to attest a claim made by another user.

Web of Trust

Linked attestations between user’s data and services creates a web of claims that can be analysed. Such a web of trust can be used build trust and reputation around users and services on the network. This is a powerful tool for analysing risk and fraud.

Questions?

Read our Technical Paper which explores how we use cryptography to store, verify and share private data