Smart API blockchain
Service for the notarisation of digital assets in Blockchain, for the certification of processes and documents to guarantee transparency and traceability.
It provides an interface with permission-less Blockchain, guaranteeing immutability, authenticity and integrity of any digital asset. The service integrates with existing systems and applications and GDPR compliant.
Features
- Data validation in blockchain
- Data verification in blockchain
- Data invalidation in blockchain
- Event log
Benefits
- Access Blockchain without entrusting information to third parties
- GDPR compliant
- Facilitate connecting to most popular public blockchains
- Integrates with processes and systems easily.
Pricing
£1.00 a transaction
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
1 3 3 1 6 9 2 3 7 2 1 5 5 8 7
Contact
OWN YOUR BUSINESS LTD
Ekaterina Murzakova
Telephone: +447758665024
Email: murzakova@ownyourbusiness.tech
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- BIM
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Planned SW upgrade (mainly quartly)
- System requirements
- Browsers: Chrome v 5.4+, Edge 38+, Firefox 64+
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- First Support Response Time: 120 minutes maximum
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Request: acknowledge 24h, reply 5 days
Incident: acknowledge 2h, fix 1 day - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Sending request via email, after receipt any additional information necessary to activate the service will be requested
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
The customer is able to extract and store the notarization receipts of his interest on his systems, using the REST APIs made available by the service and accessible through the same invocation credentials of the notarization functions.
The receipt extraction functions will remain accessible for a further 30 calendar days after the actual deactivation of the service. - End-of-contract process
- The service can be cancelled via email 30 days prior renewal.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
Users can setup the service by using REST API type and allow the operations necessary to validate and invalidate documents
Changes can be requested via support - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- The software is deployed on Public cloud infrastructures and can easily scale.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Customer-specific application metrics (number of transactions, sla stats)
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
-
At rest data is stored in encrypted Storage buckets (AES-256 encryption algorithm).
Data retention policies are implemented and objects that can be deleted according to the policies get removed.
Application Servers and Databases Backup data is encrypted as well - Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- The customer is able to extract and store the notarization receipts of his interest on his systems, using the REST APIs made available by the service and accessible through the same invocation credentials of the notarization functions. The receipt extraction functions will remain accessible for a further 30 calendar days after the actual deactivation of the service.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Json
- Data import formats
- Other
- Other data import formats
- Json
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
SLA:
- Request: acknowledge 24h, reply 5 days
- Incident: acknowledge 2h, fix 1 day
Guarantee: 99% availability - Approach to resilience
- It’s available on request
- Outage reporting
-
- an API
- email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
-
Access restrictions to management resources is performed via:
* Identity and Access Management policies on secured cloud
* Public key authentication
* Network Security Groups and IP based filtering
* DMZ VM secure access/Bastion host jumphost - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Establish objectives.
Identify all relevant security regulations—corporate, industry, and government.
Customize the information security policy.
Align the policy with the needs of the organization.
Inventory all systems, processes, and data.
Identify risks.
Assess security related to systems, data, and workflows.
Document procedures thoroughly and clearly.
Review procedures carefully to ensure they are accurate and complete.
Train everyone who has access to the organization's data or systems on the rules that are outlined in the information security policy.
Review and update the policy regularly.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
OYB Cloud is AWS. Application components are all tracked via AWS Config.
All changes are tracked via software delivery toolchain and are assessed.
Production changes are rolled out at a predetermined time window to ensure people are available in case of issues. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We are subscribed to security mailing list for the technologies used in our software.
Patches of critical CVSS vulnerabilities are implemented within 3 days of availability.
Within the DevOps teams, security champions have been identified. They work together for a swift issue resolution. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Our monitoring tools are configured to scan for potential compromises.
The IT team routinely scan application logs to be "security proactive" and reduce the risk of compromise.
Our on call team gets notified via e-mail and messages in case logs are shown compromise pattern. - Incident management type
- Supplier-defined controls
- Incident management approach
-
The IT team relies on up-to-date documentation for incident management.
Users are able to report incident via e-mail.
The e-mail will generate a ticket that OYB support receives.
Incident reports/Post mortem can be provided on a case-by-case basis, in case of disaster or SLA breach.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
We integrate with one of the most Eco-friendly blockchain.
Polygon's validators consume approximately 0.00079TWh of electricity per year with an approximate continuous draw of 0.00009GW, orders of magnitude below the energy consumption of the main PoW blockchain networks.
Pricing
- Price
- £1.00 a transaction
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Data validation
Data check
Data invalidation - Link to free trial
- https://apiproxy.ownyourbusiness.tech/accounts/login/