4F/ Moving Trusted Data across Untrusted Parties in Global Supply Chains

From IIW

Moving Trusted Data across Untrusted Parties in Global Supply Chains


Tuesday 4F

Convener: Margo Johnson (Transmute),Paul Dietrich (GS1 US)

Notes-taker(s): Guillaume Dardelet (Transmute)

Tags for the session - technology discussed/ideas considered:

Verifiable Credentials, Supply Chain


Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:


GS1 and Transmute are working together to combine GS1 standards with verifiable credentials for trusted product data and answer

How can GS1 help create trust that travels with the data?

How might Digital link, VC, DID standards be leveraged to created business value related to product claims


What is GS1:


110 member organizations

2 million companies in supply chain space

Governed by member companies

GS1’s goal is to develop the global language of business

Identity: GS1 standards for identification (GLN, GTIN, etc…)

Capture: GS1 standards for Barcodes & EPC/RFID

Share: GS1 standards for Data exchange (GDSN, EDI, EPCIS)


What is Transmute:


Involved in standards organizations (DIF, W3C)

Transmute secures critical trade data by digitizing key trade documents so that they are:

Traceable and verifiable

Instantaneous to access and share

Easily searchable and auditable

Impossible to forge

Product claims use case examples where VCs increase efficiency and reduce costs in supply chains


New product introduction:


Increasing pressure from online marketplace for retailers to bring new products faster, and in a more trusted way

Currently a costly process: building relationships, paperwork, ...


Product Traceability:


EPCIS events are emitted when a product moves along the supply chain

But parties in the chain don’t necessarily want to share the events with all parties involved

Leveraging VCs for anonymity

Many more, see slides

More details about the “New product introduction” use case

The process of getting quality products on the shelves for sale

Retailer needs to receive authoritative data about the product and business

Brand is often not trusted to provide data for its own goods

Today processes are duplicative, expensive, easy to forge


Planogram example:


Shelf space is a precious commodity

Product measurements coming from the manufacturer often cannot be trusted, and wrong measurements can be costly

Needing to hire an external third party to remeasure the products.


Product credentials work well together with brand credentials:


GTIN / GLN will be identifiers for products credentials

A brand can prove ownership of a GTIN / GLN with a brand credential (GS1 company prefix, GS1 GLN)

GS1 is the root of trust: issues brand credentials to company members

Trust flows from GS1, to Brands, to Retailers, to Customers that way


More details about the “Traceability” use case:

Pharma traceability:

Need to show unbroken chain of custody

How did this pharma product move ?

Each holder of the product can issue a credential stating that they had custody of the product at some point This credential can later be used as access to prove you are legitimate to see relevant EPCIS events


Verifiable Product Data considerations:


Shared vocabulary:


GS1 web vocabulary

Traceability Shared Vocabulary (Early Draft)


Identifiers for VCs:


Digilink URLs

DIDs: Decentralized Identifiers

Credentials as authorization capabilities:

Proving legitimacy to access data and system


Q&A -Technical discussion around VCs and identifiers.


GS1 has an existing standard: GS1 digital link that provides URLs to identify companies and products, down to the batch or lot number. These URLs can be leveraged as identifiers in VCs.

OBADA: https://www.obada.io/


Zoom Chat:


From Kaliya Identity Woman to Everyone: are you going to record the session if so claim the host

From Me to Everyone: think margo is planning to, providing no one objects

From Paul DIetrich to Everyone: Sounds great to me.

From Kaliya Identity Woman to Everyone: We have a note taker already - but if you want to join in you can :) ; Jonathan has his hand up

From drummondreed to Everyone: Drat. I only want to join silver bullet sessions ;-)

From Melanie Nuce to Everyone: +1 Drummond

From Tobias Looker to Everyone: Is the arrow the direction of the assertion? And does trust therefore flow in the other direction?

From Dave Crocker to Everyone: Chain of custody. No idea whether this relates adequately, but it might: The Authenticated Received Chain (ARC) Protocol https://tools.ietf.org/html/rfc8617

From Jim St.Clair to Everyone: We are building on use of VCs for authorization

From Tobias Looker to Everyone: This is awesome work! :)

From Orie Steele to Everyone: Thanks!

From Tyler @ Evernym to Everyone: Very focused application of VCs. I love it

From Bart Suichies to Everyone: where are the claims related to the products stored? And how are they linked to batch/unit?

From Dave_McKay to Everyone: https://medium.com/@rufftimo/verifiable-credentials-arent-credentials-they-re-containers-fab5b3ae5c0

From Jim St.Clair to Everyone: +1 Dave - semantic containers

From Orie Steele to Everyone: @Bart it depends, GS1 has a number of systems which can provide additional data, but obviously the claims can be embedded in the VC as well

From Tobias Looker to Everyone: The key with verifiable information is you don’t have to trust where you resolve it from

From Neil Thomson to Everyone: Is a Social Insurance Number a credential or an attribute?

From Bart Suichies to Everyone: @orie: if they're embedded, where do they go? do they travel with the batch? or are they stored elsewhere?

From Jim St.Clair to Everyone: @Neil, an attribute. It may be one of several items needed for the verification

From Bart Suichies to Everyone: ie - do products/batches have wallets? or is it more lookup systems?

From Neil Thomson to Everyone: @Jim - and possibly just an identifier (sub-class of attribute)

From Bart Suichies to Everyone: got it, thx paul

From Karen Hand to Everyone: Good use case - is there any thought on the access or use of the VC's for organizations or businesses working with manufacturers or processors to increase their market access?

From Tobias Looker to Everyone: Haha here we go this session is going to pivot into a DID WG meeting!

From drummondreed to Everyone: Well, it’s the perfect place to discuss ‘type’!

From Tobias Looker to Everyone: :)

From drummondreed to Everyone: “Hilarious” is not the word I’d use for it ;-)

From Bart Suichies to Everyone: products have privacy rights too you know ;)

From Orie Steele to Everyone: 37371372312 === person GDPR violation!

From drummondreed to Everyone: GTIN gets richer as a Digital Link gets richer as a verifiable credential

From Jim St.Clair to Everyone: Not much, but here you go https://www.obada.io/ A good example of conflict metals too

From Orie Steele to Everyone: Yes

From Paul DIetrich to Everyone: thanks. Who was speaking about PICO

From Jsearls to Everyone: Joyce Searls