SYSTEM

The Technology

Clayster’s technology comes in the shape of a highly intelligent entitlement management platform, enabling fine-grained access control for real-time data.

You may think of it as an advanced switchboard operator for Next Generation Internet, directing digital traffic and making sure everything runs safely and smoothly.

With the ability to monitor and coordinate massive amounts of connected resources, Any digital entity producing real-time data, i.e. a connected device, asset or "thing". Clayster's sofisticated technology helps keep track not only of who may communicate with whom, but also of specific policys regarding what data to share once a relation has been established.

Let's say your insurance company wants access to a connected alarm system device installed in your home, in order to adjust your insurance according to actual usage. Each time someone (or something) requests access to your digital resource, Clayster keeps track of:

  1. Who the rightful owner of the data is.
  2. Who may access the data, what data they may access, how it may be used, and for how long.
  3. The current value of the requested data, i.e. the actual cost of the transaction.

Then it’s quite simply a question of yes or no. If your insurance company agrees upon the criteria you – as the rightful owner – have set, you shake hands and go ahead with the transaction.

If you’ve chosen to delegate the ownership of some particular data to another trusted party (your landlord, for instance), Clayster lets her take care of the handshaking in your place.

Of course, this entire procedure all takes place within a few microseconds, and most decisions are taken care of by pre-configured smartbots Machine learning algorithms that can translate behavior into actionable intelligence. . No need to wake you or your device up over and over again.

SCALABLE SECURITY

When billions of “things" are connected, the quantitative strains on the network will be massive. Clayster's technology allow large amounts of digital entities to interact safely in real-time.

Soon, pretty much everything and everyone will have their very own digital twin. People, cars, cash, an apple, the fridge, your neighbor, your shoes. They will all have a digital replica, constantly interacting with other digital entities – leading to extremely high volumes of real-time data.

For a seamless flow between the physical and digital world, secure interactions are necessary. All data that passes through Clayster has been signed and controlled by the rightful owner, and is transported in isolated environments. Any personal information is always hosted in secure, external PKI-systems A public key infrastructure supports the distribution and identification of public encryption keys. .

INTEGRITY BY DESIGN

Trust is blueprinted into our technology at the core. Every connected device retains full rights to determine when, how and with whom it communicates.

Clayster's technology is essentially human-centric. We believe that all important decisions concerning the access of data, should ultimately be made by the rightful owner of the digital asset in question. Every transaction that takes place within our ecosystem has been signed and controlled by the rightful owner, not by a third-party policy delegated owner, as is often the case today.

Clayster aims to protect the space between private and public, turning it into a space of integrity, empowerment and control. In order to fully optimize the value of data, it must at all times be handled responsibly, distributed properly and protected aggressively.

INTEROPERABILITY

Clayster’s lightweight, cross-platform technology has been developed in close relation to the most important standard bodies and is fully compliant with a wide range of protocols.

All current and future decisions regarding Clayster's technology are supported in existing and emerging standard. Some closely adhered to standards are IETF, W3C, XMPP Foundation, ISO, IEC, IEEE, SIS, IPSO, OCF. We are also on the Swedish committee for ISO/IEC JCT1/WG10 to design a reference architecture for the Internet of Things (IoT).

CONTRACTS & SMART RIGHTS

The Clayster platform gives you full control over your digital assets. Just like in the physical world, you should be able to sell or share your resources with those that you trust.

Additionally, you might also want to rent them out, assign or delegate them. For this to happen we need appropriate and valid contracts. Clayster’s job is to handle and keep record of these contracts, and make sure that all parties respect the specific terms of the transaction.

There are basically three types of contracts that Clayster will handle:

1. Proxy contracts
Regulates who’s in control of the data.

2. IPR contracts (Intellectual Property Rights)
Regulates intellectual property rights and what others are allowed to do with the data.

3. Transfer contracts
Regulates the value of the data, i.e. the actual cost of the transaction.

These contracts must be signed and approved by all involved parties before a transaction goes through. An important prerequisite is that each party must be able to prove their identity (i.e. be a legal person or entity).

Clayster automates most parts of this process through something called smart rights. Smart rights can be described as a cluster of intelligent, pre-configured algorithms that will orchestrate all transactions according to a set of rules and preferences that you have provided.

A story about the value of experience and Next Generation Internet as a catalyst for radically new business models.