Call for more info  Tel (719) 210-5318

 

WHAT IS D-DDN?

  1. Company Technology and Purpose

Dataparency®, LLC has created a dramatic new solution for the problems associated with the securing and managing of information on highly distributed networks — all while it is being created, used, and shared, and available to and from all network nodes.

  • Access to the data need not be secured by its place of storage but rather to the confines of the relationships of the entities that are using, sharing, or creating the data itself.
  • Hackers not being a party to such relationships cannot see the data.
  • Access is restricted to such relationships regardless of network node on a widely distributed network, regardless of the type of operations including those involving its use or creation in generative artificial intelligence and other large language models.
  • As access to the data is bound to the approved relationships of entities, security is automatic. The traditional separation between DevOps and SecOps need not be observed and is, likely, rendered obsolete.
  • And this highly refined restricted access is offered while still offering extraordinary management features and characteristics outlined in more detail below.

The Company has two patents issued, another pending, and several others in process.

 

  1. Company Technology, Products, and Product Features: D-ISP™ and D-DDN™

 

  • D-ISP™ is an access-controlled, secure, immutable, entity-centric, domain-partitionable, custodian-controlled database and resource-oriented information-sharing It provides novel power and characteristics to deal with the security challenges and operational opportunities in the new highly distributed environments.
  • D-DDN™ is a series of D-ISPs with added NATS messaging to serve its features to distributed networks, private 5G networks, and more. D-DDN uses proprietary Secure Channels enabled by D-ISP to secure the use of NATS message services for this purpose.
  • Unique Data Management and Security Features. The posting, query, and retrieval of data are bound to unique, unidirectional (one-way) “Relationship Distributed IDentifiers” called RDIDs that identify the relationship access privileges, on D-DDN, between an entity requesting access to data of a targeted entity.

 

For example, suppose entity1 is a doctor and entity2 is a patient. In that case, the platform assigns a unique Relationship Distributed Identifier (RDID) the doctor would use when he posts a document about entity2’s lab test result.

Each component of information from every document ingested into the platform retains the RDID and entity information provided at the time the information was ingested.  Therefore, the database presents as entity-centric, i.e., structured around entities and their relationships.

 

WHAT D-DDN DOES AND “THEY” CANNOT

 

  1. Secure Operational Data

We secure any type of data, whether it regards security profiles, policies, access lists, device access profiles, access protocols in general, or just plain operational data.

 

They can’t. They don’t. They only offer one way.

 

We secure operational data at the point of creation. Fully access-controlled by relationship-bound data models. Virtually un-hackable encryption keyed to each entity. Quantum-resistant encryption is coming.

 

They can’t. They have no methods for doing such.

 

  1. Data Accessibility

We provide Resource-Oriented Data Access through a Path (URL) built from components that make up the ‘context’ of the data. This resource Path can contain components of any length, any type, and contains the RDID (Relationship Distributed IDentifier) which binds the data to the subject Entity.

 

Even the big guys can’t provide that. And it’s patented

technology so they can’t even if they wanted to.

 

  1. Distributed Data Network

We provide a totally Distributed Data Network (DDN) with automatic backup, geolocation, horizontally scalable, and encrypted data movement, from start to finish. Scale services to your needs without buying additional software. And the security is present at each node of the network…in EVERY operation…automatically without additional programming.

 

No one can offer the flexibility, scale of services,

security, and ROI that we can.

 

  1. Zero Trust Network

Secure your network assets, K8s pods, applications, and any other resource with Zero Trust capabilities. Others say they do but fail to provide security to the lowest levels of the enterprise. We allow you to choose the level you wish, from the lowest operational resources to user logins, applications, and more.

 

Others only work within the framework they supply.

We allow you to construct the Zero Trust framework to your needs.

 

  1. Automatic Provisioning & Encryption

By allowing automatic provisioning of controlled entities, we reduce the effort to build security into everything you do. By providing a secure, immutable, and encrypted data store, your security is based upon data-driven highly un-hackable data resources that manage all aspects of your business’s security. By using us to supply data to your operations and applications, you gain a SecOps/DevOps development pipeline that can’t be side-stepped. Security is baked in from the start.

 

Others cannot offer the same flexibility. They are fixed to a single OS, single framework, and/or single set of unchangeable methods. Being configured by data instead of software, we can meet your needs now and in the future.

 

  1. Customer/Employee Experience

Provide customers with the best experience by allowing a single sign-on to access all parts of your offerings, securely, and controllably. Provide your employees with the easiest access to the applications they use, whether local or remote.

 

Others cannot bring the central, yet distributed and duplicated, control

of resources. No central point of failure. Keep operating as long as one server is running.

 

  1. Data Privacy & Compliance

With strictly controlled identity and geolocation of data, you can provide the highest levels of privacy and compliance to customers. Comply with jurisdictions, anywhere in the network, and still view data from a network-wide view. Every data change operation can be observed to provide real-time visibility into operations.

 

Others, not having data-driven flexibility, cannot offer such services. They are hard-wired, with fixed formats, and therefore difficult to manage, configure, and adapt to the new realities. They do not have a distributed basis from which to manage the distributed nature of cloud and Internet applications. This makes them useless in the Digital Transformation every enterprise must follow in today’s environment.

 

  1. Bring Legacy Application Forward into Security

Use our data-controlling abilities to wrap legacy applications in a new layer of security. Provide a single interface to identify and securely control the running of legacy apps. Our API-less access control gives the utmost flexibility and future-proofs your application possibilities. An additional feature using our CloakFS product is the ability to manage and secure file data using D-DDN without the possibility of disclosing it to hackers and outsiders. This provides legacy applications that have a file system interface to use hidden (cloaked) files from a secure file store.

 

Others, bound to antiquated technology, cannot adapt.

 

  1. Flexible Networking

The flexible networking provided by the in-built NATS network (a CNCF[1]  technology) adapts to whatever network topology you’re confronted with or desire. Dataparency DDN, in combination with NATS, gives you the most flexible Distributed Data Network available. Put data where it is most easily accessed and with the least latency. NATS has been proven in countless installations to provide the best in networking technologies.

 

Other solutions do not provide the flexibility to adapt to your current needs, much less your future requirements to stay competitive. With fixed, hard-to-change technologies, they become more and more useless, requiring more and more workarounds.

 

  1. Data Sharing and Marketplaces

Dataparency DDN provides the ability to share data between trading partners in a secure and access-controlled way. Manage how and what data your suppliers and partners can access providing the most efficient operations possible. Supply chain operations become efficient and controllable in a way not possible before. Put your data ‘in the network’ where others can access it in a controlled way. Purchase quotes can live in the network to be ‘seen’ and responded to by suppliers. Build marketplaces controlled by a consortium of trading partners.

 

Others have no way to provide this controlled data sharing. If they do it is a very complex and unmanageable process. Dataparency DDN brings a common way to expose data to others in a controlled manner.

 

  1. AI and Data Control

With the current push towards generative AI (ChatGPT, GPT-4, Open-Source models, etc.) there needs to be a way to provide corporate data to the AI without exposing it to the larger model on the web. This is where DDN can provide the shared data to the AI without allowing it to be exposed. Properly constructed ‘prompts’ are how AI is queried for answers. Through a ‘templating’ technology of DDN, controlled data can be inserted into prompt templates in a way that doesn’t expose it to the AI model’s training, tuning, and optimizing procedures.

 

Others, since they do not control data directly and have restricted adaptation capabilities, cannot do this. Hence, they cannot provide this ability.

 

  1. Manufacturing 4.0 and IoT

Manufacturing 4.0 and the IoT devices upon which it is based present a problem to enterprises. These devices are generally poorly access-controlled by their manufacturers and require additional protections to provide security. This is where DDN’s RDID-controlled access can provide the required security. It can also provide control over the device’s output data. Hacked output or access can put a company at risk by changing data values or outright misdirection of device data. DDN’s ability to provide observation of data changes secures the movement of data from the devices to the Edge or the Data Center in the cloud.

 

Again, since other solutions do not control data directly, they cannot provide the added data security and risk reduction. And cannot provide the data to others securely.

 

  1. AI-Assisted Domain-Driven-Design (DDD) Development

With its flexible ‘context’ for applying data model inference, we are looking to build a fine-tuned AI model that assists in developing the data models that drive the enterprise. It will even be able to build code frameworks following DDD best practices by learning from your corporate data held in D-DDN. It may also be possible to derive the models from other current data retrieval technologies, e.g., Snowflake.

With the flexibility and composability of the data ‘path’ in D-DDN, an AI can compose a retrieval strategy for the data it’s using and apply procedures for creating and managing that data in the context of a DDD model. With all the changing contexts required by DDD elements. And it will make use of all the privacy and security features of the underlying D-DDN.

 

Again, since other solutions do not control data directly, they cannot provide the added data security and risk reduction. And cannot provide the data to AI models securely.

 

We are just getting started. The flexibility that we provide in our entity-centric approach will enable building and securing distributed networks that will be without equal.

 

 

Contact:

Timothy Dix, CEO

Dataparency LLC

Suite 401, 2864 South Circle Drive

Colorado Springs, CO 80906

timothy.dix@datparency.com

719-210-5318

 

 

 

 

 

[1] Cloud Native Computing Foundation.

 

Categories: Uncategorized