Intelligent Identity Verification - Obtain authorisation, authentication & verification of each user all in one go as user-owned Personas®, conferred trust scoring, biometrics and 3rd-party verifiable claims confirms identity.
Sovereign Identity Ownership - Every user owns a feature-rich social privacy application for identity and data management, Persona® connections and instant communication within both private and public communities.
Secure Identity Compliance - Distributed graph technology, regulatory compliance and built-in DPO roles and rights for consent management revoking personally identifiable data and exercising one’s right to be forgotten
AI Workflow - Pro-active Intelligent Agents work on behalf of users discovering & connecting layers of Personas, apps, APIs & digital services - protecting against AI threats (e.g. bots) whilst automating workflow & lifestyle decisions across private & public connections.
Read more about advanced Personas® identities in our whitepaper here.
Vaults linked together form the VaultChain®. This technology ensures only data owners can add, change, archive, revoke or delete their data - unless access is granted to another Vault in the chain.
Our technology is built on the idea that a user should trust the person authoring the personal data - not just the data itself (nor any block that holds it).
Our Vaults are distributed for security & anonymity and then federated for access, to enable complete data ownership, ensuring no company, agency or analytics organisation can ever access private data without data owner permission.
Each Vault is completely anonymous, and has no detectable relationship to any other Vault in the network. Only the owner of a Vault knows its connections & relationships to other Vaults in the network.
A Vault can store any form of data, and the owner is free to publish cryptographically signed sets of data called Artefacts® from their Vault, either to the public at large or other specific Vaults. These shared relationships between Vaults form the VaultChain
Read more about the Octopus.sh platform in our white paper here.
Truly self-sovereign: VaultChain has no "governing council", "stewardship" or some kind of centralised authority. In the same way anyone can run their own email servers, anyone can host a VaultChain cluster and join the network. They chose how and when they connect with the wider VaultChain network and who can use it. End users can consume any part of the network they have access to, and VaultChain then presents that as a single private contiguous network space to each consumer.
Storage burden: As a distributed ledger (DLT) grows in size the cost of maintaining network synchronisation rises with it. In a VaultChain only those that want to hold or verify the data store the data. This places the storage burden of long term data onto those that need the data not onto the network as a whole avoiding a tragedy of the commons.
Trust relationships: Hubs partition the size of the VaultChain to relevant participants, allowing owners to trust groups of network participants rather than just chains of hashed blocks. Hubs allow allow certain partitions of the VaultChain to operate with higher levels of trust than others.
Reputation: Because VaultChains are multi-node directed graphs, decentralised trust is built on network reputation & distance rather than proof-of-work.
Anonymity: Data stored in a VaultChain is built from anonymised linked data sets, the data can be retrieved and aggregated from multiple Vaults into large queryable graphs without breaking network anonymity. Sub-graphs within the dataset can be validated by different network participants.
Zero-knowledge: A VaultChain uses zero-knowledge proofs to reference specific datasets so preserving anonymity, whilst ensuring the graph is still navigable.
Audit Trails: A VaultChain allows newer data to be stored, updated & referenced as part of a single piece of auditable data.
Compliant: Data can be permanently deleted from a VaultChain, but only when all members of a Hub holding that data agree to its deletion.
More and more people use atomic data management tools like messengers and encrypted storage to keep their data private. Meanwhile enterprises are spending billions creating secure encrypted systems for customer account self-management to meet compliance legislation and prevent breaches and hacks.
In the near future, Octopus Hubs will unify and redefine these detached, siloed systems as enterprise and customers build their own feature-rich hub to freely share digital Artefacts via the Personas they connect with. This will give both parties complete complaint control of their data at a field level, allowing customers to manage what and how much the enterprise can interact with them.
Enterprises can finally create a true one-to-one connection with customers - and people finally have a reason to make social relationships with all the companies and brands they value.
Read the Personas whitepaper here.
Learn about our unique platform features which are helping Enterprise reduce identity management costs and build trust with every single stakeholder.
Octopus.sh - Solution WhitePaperLearn how our VaultChain® distributed graph technology guarantees privacy, anonymity and security. Distributed "data islands" create a million vaults for a million customers – not one database holding a million customer records.
VaultChain® - A self-sovereign networkDiscover all the unique ways Personas can be leveraged to build trust - and why they're essential for true self sovereign identity.
Personas® - Managing Digital IdentitiesRead our new Self Sovereign Identity research that reveals compelling identity and data ownership trends as face two crises: Covid-19 and global unemployment
SSI - Data Owner Perspectives - July 2020Read our illustrated investment story highlighting how Octopus.sh will lead future self-sovereign identity growth.
Octopus.sh - The Identity CrisisSee how our unique technology can help Enterprise manage a medical chain of custody.
Prescriptions, Fraud & Patient Privacy
Octopus.sh is an innovative technology company offering market-leading self sovereign identity.
We're working with The University of Cambridge and East Anglia CyberLabs and are contributing members of
the Open Identity Exchange and Decentralized Identity Foundation
Contact us: info@octopus.sh
Open an Artefacts® Exchange Hub to store and protect all personally identifiable information
Build unique Personas®, identities that lets everyone be who they want to be
Connect a Persona with customers, friends and organisation in both private and public networks
Securely share verified identity, attestations and all other private information Artefacts®