Enterprise Europe Network

Trusted, system independent IoT data sharing solution

Country of origin:
Country: 
AUSTRIA
Opportunity:
External Id: 
TOAT20190529001
Published
29/05/2019
Last update
21/01/2020
Expiration date
31/05/2020

Keywords

Partner keyword: 
Data Processing / Data Interchange, Middleware
Data Protection, Storage, Cryptography, Security
Internet of Things
Supply chain
Information processing & Systems, Workflow
Communications processors/network management
Process control equipment and systems
Machine vision software and systems
Data processing, hosting and related activities
Renting and leasing of other machinery, equipment and tangible goods n.e.c.
Security systems service activities
EXPRESS YOUR INTEREST

Summary

Summary: 
An Austrian start-up developed a system-independent, peer-to-peer data sharing solution for IoT data with the capability of data verification across systems. The solution allows the receiving company to verify the data integrity even though confidential data of the dataset are not sent. By that a trusted cooperation between companies and the establishment of new business models is enabled. The company is looking for commercial, license, technical and research agreements.

Description

Description: 

The Austrian technology company provides software services for verifying sensor data collected by IoT systems and thus make them auditable.
The company developed a novel software solution for trusted exchange of IoT data between separate companies or different operating sites of one company.

State of the Art:
Companies are increasingly collecting data from their own (industrial) processes. These data can be shared with cooperating organisations (suppliers, customers, R%26D partners, open innovation, ...) to optimize interaction processes and to create new cooperation possibilities (e.g. maintenance per use). For this purpose, the data owner has to trust that no confidential data are exchanged and the data receiver has to trust the correctness of the data he gets. Currently data are encrypted and sent to the targeted company which decrypts the data. For verification of the received data the receiving company has to receive all data of a data set (e.g. every temperature measurement within the period of the dataset). This i) may lead to a high amount of data that have to be sent and ii) may lead to the problem that the data owner does not want to exchange every single data point of the dataset.

Invention:
The Austrian company developed a system-independent peer-to-peer data sharing solution with the capability of data verification across systems. The software is designed as an add-on to existing cloud and IoT solutions, the product is platform-independent and can be easily integrated and individualized in the company's own data administration platform. This can be done by the companies own IT administrator or alternatively by the Austrian company. In this software the data are merged and encrypted. The data of interest can be selected by the data owner or the receiving company via a simple dashboard without the need of any special IT skills. Subsequently the data owner has to approve the transmission of the selected / the requested data. The companies own user management solution can be integrated to define permissions for this purpose. The solution allows the receiver to verify the data integrity even though not all data of the dataset are sent. The data exchange is designed peer-to-peer - without central storage and routing - and thus offers the highest level of privacy and data control for all involved parties. For this transmission both parties have to install the developed system.

Use cases for our technology are for example:
• verification of the output and use of machines in pay-per-use models
• binding of product guarantees to the actual use
• mapping of verified process data for a Cross-Company Digital Twin
• enabling and securing the licensing of technology or know-how

Partner sought:
The company is looking for:
- End-users who want to integrate the solution in their company. In this case a commercial agreement with technical assistance is sought.
- Producers of industrial machines and chips to integrate the verification solution in its products. In this case a license agreement is sought. Alternatively, a research cooperation is sought in case that a close cooperation is necessary for integration of the solution (e.g. in chips).
- Operators of data monetization platforms. In this case a license agreement is sought.
- Consultants (consulting firms, cloud provider, telecom provider, ...) who plan new projects with and for companies. In this case a commercial agreement with technical assistance is sought.

Advantages & innovations

Cooperation plus value: 
The developed technology assures that data integrity and data security are not an issue when companies share (industrial) data with external companies and between different operating sites of one company. The relevant USPs of the developed technology are: - Data verification: The data owner can decide which data are transferred and the data receiver can verify the correctness of these data even though not all data of a dataset are sent by the data owner (e.g. not each temperature measurement in a measurement period is sent). - Privacy: System-independent peer to peer transmission of encrypted data without involvement of any third party - Simplicity: No need for IT skills to manage the exchange of data. The data of interest can be easily selected by the data owner or the receiving party via an intuitive dashboard. The data owner has to approve the transmission of the selected (data owner) or the requested (data receiver) data. The companies own user management solution can be integrated to define permissions for this purpose.

Stage of development

Cooperation stage dev stage: 
Already on the market

Partner sought

Cooperation area: 
The Austrian company is interested to cooperate with: 1. Companies that plan to develop new business models. This can be end-users that want to integrate the developed technology for this purpose or consulting companies who give advice to companies regarding the establishment of new business models (consulting firms, cloud provider, telecom provider, ...). In this case a commercial agreement with technical assistance is sought. 2. Producers of industrial machines that are willing to integrate the verification solution in its products. In this case a license agreement is sought. 3. Chip manufacturer active in the field of data security. In this case a research cooperation or a technical cooperation is sought for integration of the solution into its "trust execution environment". The company is open for white label solutions. 4. Operators of platforms that collect data from different sources and put these data at somebodies disposal for specific purposes ("data monetization platforms"). The developed technology could be used to share verified data between these platforms and data buying or data selling companies without involvement of a third party. In this case a license agreement is sought. The Austrian company thinks that the awareness for the importance of data verification is comparable high in the business areas healthcare, aerospace and energy utilities. So maybe companies active in these business fields may be especially interested. But the Austrian company is open cooperate with companies from any business area. The Austrian company offers to accompany cooperating companies depending on their specific needs: - Implementation of machine data generation and collection (OPC-UA, ...) - Implementation of the software solution as described in the profile - Consultancy about the usage possibilities (business models) of the developed solution - Implementation of innovative financing solution for pay-per-use models together with PricewaterhouseCoopers and several financial institutions. - Research cooperation for the integration of the verification solution in industrial machines. Bigger companies with an own IT department may not need any relevant advice by the Austrian company to implement the software in its exiting IT system.