Skip to main content

Decentralised Access Control

info

Please note that this content is under development and is not ready for implementation. This status message will be updated as content development progresses.

Overview

There is a balance between the demands of transparency (more supply chain visibility means it's harder to hide greenwshing) and confidentiality (share too much data and you risk expososing commercial secrets). A key UNTP principle is that every supply chain actor should be able to choose their own balance between transparency and confidentiality. To achieve this, UNTP defines six data confidentiality patterns with different degrees of data protection so that they can be appropriately combined to meet the confidentiality goals of each party. This includes the ability to selectively redact data from credentials received from upstream suppliers before passing them on to downstream buyers - without affecting the cryptographic integrity of the data.

Discoverable Public Data

Public Data with GUID key

Encrypted Data with Shared Key

Encrypted Data with Requestable Key

Selective Redaction

Private Data

Usage Patterns