Leave a message and our experts will get back to you as soon as possible.

Open Contact Formcamelot-theme

Camelot Trusted Computing Appliances

Securely processing private data with Blockchains

Our Trusted Computing Appliances, co-developed with DellEMC and Intel, bring more trust into Blockchain business scenarios by providing data protection for sensitive data.​

Arrange Callback

Just fill in our simple form and one of our experts will call you back.

​Confidential Computing: Data protection in decentralized business processes on blockchains

Many business use-cases require trusted processing of completely private and confidential data, known as confidential computing. Introducing a trustworthy process to data owned by a certain party is a paradigm shift in enterprise IT scenarios. Sensitive data no longer has to be provided to central platforms or 3rd parties. The data stays with the current owner while being used for cross-company processes such as supply-chain transparency. Camelot Trusted Computing Appliances, highly secured computing devices interconnected through a blockchain network by Camelot Hypertrust Platform, solve current challenges in IP protection and regulatory compliance in Pharma or Chemical industries.

Why Camelot Trusted Computing Appliances?

array(33) { [“id”]=> int(2502) [“title”]=> string(20) “2D-Icons-Teams-green” [“filename”]=> string(24) “2D-Icons-Teams-green.svg” [“url”]=> string(81) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Teams-green.svg” [“link”]=> string(51) “https://www.camelot-itlab.com/2d-icons-teams-green/” [“alt”]=> string(0) “” [“author”]=> string(1) “1” [“description”]=> string(0) “” [“caption”]=> string(0) “” [“name”]=> string(20) “2d-icons-teams-green” [“status”]=> string(7) “inherit” [“uploadedTo”]=> int(0) [“date”]=> string(24) “2020-03-31T13:03:53.000Z” [“modified”]=> string(24) “2020-03-31T13:03:53.000Z” [“menuOrder”]=> int(0) [“mime”]=> string(13) “image/svg+xml” [“type”]=> string(5) “image” [“subtype”]=> string(7) “svg+xml” [“icon”]=> string(66) “https://www.camelot-itlab.com/wp-includes/images/media/default.png” [“dateFormatted”]=> string(14) “March 31, 2020” [“nonces”]=> array(3) { [“update”]=> string(10) “1086780ab3” [“delete”]=> string(10) “cfb079dcc0” [“edit”]=> string(10) “db37174954” } [“editLink”]=> string(69) “https://www.camelot-itlab.com/wp-admin/post.php?post=2502&action=edit” [“meta”]=> bool(false) [“authorName”]=> string(5) “admin” [“filesizeInBytes”]=> int(7579) [“filesizeHumanReadable”]=> string(4) “7 KB” [“context”]=> string(0) “” [“height”]=> int(34) [“width”]=> int(35) [“orientation”]=> string(9) “landscape” [“sizes”]=> array(4) { [“thumbnail”]=> array(4) { [“height”]=> int(150) [“width”]=> int(150) [“url”]=> string(81) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Teams-green.svg” [“orientation”]=> string(9) “landscape” } [“medium”]=> array(4) { [“height”]=> int(300) [“width”]=> int(300) [“url”]=> string(81) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Teams-green.svg” [“orientation”]=> string(9) “landscape” } [“large”]=> array(4) { [“height”]=> int(1024) [“width”]=> int(1024) [“url”]=> string(81) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Teams-green.svg” [“orientation”]=> string(9) “landscape” } [“full”]=> array(4) { [“url”]=> string(81) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Teams-green.svg” [“height”]=> int(34) [“width”]=> int(35) [“orientation”]=> string(9) “landscape” } } [“compat”]=> array(2) { [“item”]=> string(0) “” [“meta”]=> string(0) “” } [“acf_errors”]=> bool(false) }

Process integrity for all parties​

By having consensus about the logic on private data, Trusted Computing Appliances and according governance bring more trust into regulatory or intellectual property involving scenarios.

array(33) { [“id”]=> int(2488) [“title”]=> string(29) “2D-Icons_Alles-im-Blick-green” [“filename”]=> string(33) “2D-Icons_Alles-im-Blick-green.svg” [“url”]=> string(90) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons_Alles-im-Blick-green.svg” [“link”]=> string(60) “https://www.camelot-itlab.com/2d-icons_alles-im-blick-green/” [“alt”]=> string(0) “” [“author”]=> string(1) “1” [“description”]=> string(0) “” [“caption”]=> string(0) “” [“name”]=> string(29) “2d-icons_alles-im-blick-green” [“status”]=> string(7) “inherit” [“uploadedTo”]=> int(0) [“date”]=> string(24) “2020-03-31T13:03:47.000Z” [“modified”]=> string(24) “2020-03-31T13:03:47.000Z” [“menuOrder”]=> int(0) [“mime”]=> string(13) “image/svg+xml” [“type”]=> string(5) “image” [“subtype”]=> string(7) “svg+xml” [“icon”]=> string(66) “https://www.camelot-itlab.com/wp-includes/images/media/default.png” [“dateFormatted”]=> string(14) “March 31, 2020” [“nonces”]=> array(3) { [“update”]=> string(10) “3aeb586edb” [“delete”]=> string(10) “605c0e2fb1” [“edit”]=> string(10) “1cef60d464” } [“editLink”]=> string(69) “https://www.camelot-itlab.com/wp-admin/post.php?post=2488&action=edit” [“meta”]=> bool(false) [“authorName”]=> string(5) “admin” [“filesizeInBytes”]=> int(2933) [“filesizeHumanReadable”]=> string(4) “3 KB” [“context”]=> string(0) “” [“height”]=> int(35) [“width”]=> int(35) [“orientation”]=> string(9) “landscape” [“sizes”]=> array(4) { [“thumbnail”]=> array(4) { [“height”]=> int(150) [“width”]=> int(150) [“url”]=> string(90) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons_Alles-im-Blick-green.svg” [“orientation”]=> string(9) “landscape” } [“medium”]=> array(4) { [“height”]=> int(300) [“width”]=> int(300) [“url”]=> string(90) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons_Alles-im-Blick-green.svg” [“orientation”]=> string(9) “landscape” } [“large”]=> array(4) { [“height”]=> int(1024) [“width”]=> int(1024) [“url”]=> string(90) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons_Alles-im-Blick-green.svg” [“orientation”]=> string(9) “landscape” } [“full”]=> array(4) { [“url”]=> string(90) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons_Alles-im-Blick-green.svg” [“height”]=> int(35) [“width”]=> int(35) [“orientation”]=> string(9) “landscape” } } [“compat”]=> array(2) { [“item”]=> string(0) “” [“meta”]=> string(0) “” } [“acf_errors”]=> bool(false) }

​Maximum hardware based data protection​

Offering Intel SGX based and highly secure computing units, interconnected through blockchain networks.​

array(33) { [“id”]=> int(2489) [“title”]=> string(24) “2D-Icons-Agilitaet-green” [“filename”]=> string(28) “2D-Icons-Agilitaet-green.svg” [“url”]=> string(85) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Agilitaet-green.svg” [“link”]=> string(55) “https://www.camelot-itlab.com/2d-icons-agilitaet-green/” [“alt”]=> string(0) “” [“author”]=> string(1) “1” [“description”]=> string(0) “” [“caption”]=> string(0) “” [“name”]=> string(24) “2d-icons-agilitaet-green” [“status”]=> string(7) “inherit” [“uploadedTo”]=> int(0) [“date”]=> string(24) “2020-03-31T13:03:48.000Z” [“modified”]=> string(24) “2020-03-31T13:03:48.000Z” [“menuOrder”]=> int(0) [“mime”]=> string(13) “image/svg+xml” [“type”]=> string(5) “image” [“subtype”]=> string(7) “svg+xml” [“icon”]=> string(66) “https://www.camelot-itlab.com/wp-includes/images/media/default.png” [“dateFormatted”]=> string(14) “March 31, 2020” [“nonces”]=> array(3) { [“update”]=> string(10) “e37b93fe23” [“delete”]=> string(10) “91a24af8e9” [“edit”]=> string(10) “6ef86b2045” } [“editLink”]=> string(69) “https://www.camelot-itlab.com/wp-admin/post.php?post=2489&action=edit” [“meta”]=> bool(false) [“authorName”]=> string(5) “admin” [“filesizeInBytes”]=> int(766) [“filesizeHumanReadable”]=> string(5) “766 B” [“context”]=> string(0) “” [“height”]=> int(36) [“width”]=> int(35) [“orientation”]=> string(8) “portrait” [“sizes”]=> array(4) { [“thumbnail”]=> array(4) { [“height”]=> int(150) [“width”]=> int(150) [“url”]=> string(85) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Agilitaet-green.svg” [“orientation”]=> string(9) “landscape” } [“medium”]=> array(4) { [“height”]=> int(300) [“width”]=> int(300) [“url”]=> string(85) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Agilitaet-green.svg” [“orientation”]=> string(9) “landscape” } [“large”]=> array(4) { [“height”]=> int(1024) [“width”]=> int(1024) [“url”]=> string(85) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Agilitaet-green.svg” [“orientation”]=> string(9) “landscape” } [“full”]=> array(4) { [“url”]=> string(85) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Agilitaet-green.svg” [“height”]=> int(36) [“width”]=> int(35) [“orientation”]=> string(8) “portrait” } } [“compat”]=> array(2) { [“item”]=> string(0) “” [“meta”]=> string(0) “” } [“acf_errors”]=> bool(false) }

Off-Chain smart contracts​

Programs running in a Trusted Computing Appliance (so called „Trustlets“) can be seen as „off-chain smart contracts“ as they can be trusted just like a smart contract, without the need to distribute protected data in a blockchain network​.

array(33) { [“id”]=> int(2501) [“title”]=> string(23) “2D-Icons-Prozesse-green” [“filename”]=> string(27) “2D-Icons-Prozesse-green.svg” [“url”]=> string(84) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Prozesse-green.svg” [“link”]=> string(54) “https://www.camelot-itlab.com/2d-icons-prozesse-green/” [“alt”]=> string(0) “” [“author”]=> string(1) “1” [“description”]=> string(0) “” [“caption”]=> string(0) “” [“name”]=> string(23) “2d-icons-prozesse-green” [“status”]=> string(7) “inherit” [“uploadedTo”]=> int(0) [“date”]=> string(24) “2020-03-31T13:03:53.000Z” [“modified”]=> string(24) “2020-03-31T13:03:53.000Z” [“menuOrder”]=> int(0) [“mime”]=> string(13) “image/svg+xml” [“type”]=> string(5) “image” [“subtype”]=> string(7) “svg+xml” [“icon”]=> string(66) “https://www.camelot-itlab.com/wp-includes/images/media/default.png” [“dateFormatted”]=> string(14) “March 31, 2020” [“nonces”]=> array(3) { [“update”]=> string(10) “b8a6eed7e4” [“delete”]=> string(10) “29db935863” [“edit”]=> string(10) “f09341c00b” } [“editLink”]=> string(69) “https://www.camelot-itlab.com/wp-admin/post.php?post=2501&action=edit” [“meta”]=> bool(false) [“authorName”]=> string(5) “admin” [“filesizeInBytes”]=> int(13645) [“filesizeHumanReadable”]=> string(5) “13 KB” [“context”]=> string(0) “” [“height”]=> int(35) [“width”]=> int(34) [“orientation”]=> string(8) “portrait” [“sizes”]=> array(4) { [“thumbnail”]=> array(4) { [“height”]=> int(150) [“width”]=> int(150) [“url”]=> string(84) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Prozesse-green.svg” [“orientation”]=> string(9) “landscape” } [“medium”]=> array(4) { [“height”]=> int(300) [“width”]=> int(300) [“url”]=> string(84) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Prozesse-green.svg” [“orientation”]=> string(9) “landscape” } [“large”]=> array(4) { [“height”]=> int(1024) [“width”]=> int(1024) [“url”]=> string(84) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Prozesse-green.svg” [“orientation”]=> string(9) “landscape” } [“full”]=> array(4) { [“url”]=> string(84) “https://www.camelot-itlab.com/wp-content/uploads/2020/03/2D-Icons-Prozesse-green.svg” [“height”]=> int(35) [“width”]=> int(34) [“orientation”]=> string(8) “portrait” } } [“compat”]=> array(2) { [“item”]=> string(0) “” [“meta”]=> string(0) “” } [“acf_errors”]=> bool(false) }

Enterprise-ready integration​

Camelot Trusted Computing Appliances are based on Camelot Hypertrust Platform and therefore leverage the same enterprise-ready integration mechanisms.

Why Camelot

Camelot ITLab is leading provider of Enterprise Blockchain Solutions, offering strategy consulting and implementation services. Trusted Computing Appliances as part of the Camelot solution portfolio implement a fully decentralized architecture: independently working computing units, based on Intel SGX high security concepts, linking together to a network of mutually trusting satellites. Additional components realize an end-to-end chain of trust that can be leveraged in enterprise business scenarios, whenever private or sensitive data must be processed by other parties.​

array(33) { [“id”]=> int(2855) [“title”]=> string(18) “people-ITLab-weiss” [“filename”]=> string(22) “people-ITLab-weiss.png” [“url”]=> string(79) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/people-ITLab-weiss.png” [“link”]=> string(49) “https://www.camelot-itlab.com/people-itlab-weiss/” [“alt”]=> string(0) “” [“author”]=> string(1) “1” [“description”]=> string(0) “” [“caption”]=> string(0) “” [“name”]=> string(18) “people-itlab-weiss” [“status”]=> string(7) “inherit” [“uploadedTo”]=> int(0) [“date”]=> string(24) “2020-07-21T08:50:15.000Z” [“modified”]=> string(24) “2020-07-21T08:50:15.000Z” [“menuOrder”]=> int(0) [“mime”]=> string(9) “image/png” [“type”]=> string(5) “image” [“subtype”]=> string(3) “png” [“icon”]=> string(66) “https://www.camelot-itlab.com/wp-includes/images/media/default.png” [“dateFormatted”]=> string(13) “July 21, 2020” [“nonces”]=> array(3) { [“update”]=> string(10) “eaaea04d64” [“delete”]=> string(10) “522bb7c579” [“edit”]=> string(10) “cb30bc56cd” } [“editLink”]=> string(69) “https://www.camelot-itlab.com/wp-admin/post.php?post=2855&action=edit” [“meta”]=> bool(false) [“authorName”]=> string(5) “admin” [“filesizeInBytes”]=> int(413021) [“filesizeHumanReadable”]=> string(6) “403 KB” [“context”]=> string(0) “” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” [“sizes”]=> array(4) { [“thumbnail”]=> array(4) { [“height”]=> int(150) [“width”]=> int(150) [“url”]=> string(87) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/people-ITLab-weiss-150×150.png” [“orientation”]=> string(9) “landscape” } [“medium”]=> array(4) { [“height”]=> int(300) [“width”]=> int(9) [“url”]=> string(85) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/people-ITLab-weiss-9×300.png” [“orientation”]=> string(8) “portrait” } [“large”]=> array(4) { [“height”]=> int(1024) [“width”]=> int(32) [“url”]=> string(87) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/people-ITLab-weiss-32×1024.png” [“orientation”]=> string(8) “portrait” } [“full”]=> array(4) { [“url”]=> string(79) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/people-ITLab-weiss.png” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” } } [“compat”]=> array(2) { [“item”]=> string(0) “” [“meta”]=> string(0) “” } [“acf_errors”]=> bool(false) }

Partnership with DellEMC and Intel​

Long-standing partnerships with DellEMC and Intel – learn more in our joint whitepaper and case study

array(33) { [“id”]=> int(2847) [“title”]=> string(18) “erfolg-ITLab-weiss” [“filename”]=> string(22) “erfolg-ITLab-weiss.png” [“url”]=> string(79) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/erfolg-ITLab-weiss.png” [“link”]=> string(49) “https://www.camelot-itlab.com/erfolg-itlab-weiss/” [“alt”]=> string(0) “” [“author”]=> string(1) “1” [“description”]=> string(0) “” [“caption”]=> string(0) “” [“name”]=> string(18) “erfolg-itlab-weiss” [“status”]=> string(7) “inherit” [“uploadedTo”]=> int(0) [“date”]=> string(24) “2020-07-21T08:49:55.000Z” [“modified”]=> string(24) “2020-07-21T08:49:55.000Z” [“menuOrder”]=> int(0) [“mime”]=> string(9) “image/png” [“type”]=> string(5) “image” [“subtype”]=> string(3) “png” [“icon”]=> string(66) “https://www.camelot-itlab.com/wp-includes/images/media/default.png” [“dateFormatted”]=> string(13) “July 21, 2020” [“nonces”]=> array(3) { [“update”]=> string(10) “0512d6e8ba” [“delete”]=> string(10) “9cf12026fc” [“edit”]=> string(10) “c75d158bd8” } [“editLink”]=> string(69) “https://www.camelot-itlab.com/wp-admin/post.php?post=2847&action=edit” [“meta”]=> bool(false) [“authorName”]=> string(5) “admin” [“filesizeInBytes”]=> int(457582) [“filesizeHumanReadable”]=> string(6) “447 KB” [“context”]=> string(0) “” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” [“sizes”]=> array(4) { [“thumbnail”]=> array(4) { [“height”]=> int(150) [“width”]=> int(150) [“url”]=> string(87) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/erfolg-ITLab-weiss-150×150.png” [“orientation”]=> string(9) “landscape” } [“medium”]=> array(4) { [“height”]=> int(300) [“width”]=> int(9) [“url”]=> string(85) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/erfolg-ITLab-weiss-9×300.png” [“orientation”]=> string(8) “portrait” } [“large”]=> array(4) { [“height”]=> int(1024) [“width”]=> int(32) [“url”]=> string(87) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/erfolg-ITLab-weiss-32×1024.png” [“orientation”]=> string(8) “portrait” } [“full”]=> array(4) { [“url”]=> string(79) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/erfolg-ITLab-weiss.png” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” } } [“compat”]=> array(2) { [“item”]=> string(0) “” [“meta”]=> string(0) “” } [“acf_errors”]=> bool(false) }

Enterprise ready

Technology, uniquely developed for dedicated business needs of enterprises​

array(33) { [“id”]=> int(2853) [“title”]=> string(20) “netzwerk-ITLab-weiss” [“filename”]=> string(24) “netzwerk-ITLab-weiss.png” [“url”]=> string(81) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/netzwerk-ITLab-weiss.png” [“link”]=> string(51) “https://www.camelot-itlab.com/netzwerk-itlab-weiss/” [“alt”]=> string(0) “” [“author”]=> string(1) “1” [“description”]=> string(0) “” [“caption”]=> string(0) “” [“name”]=> string(20) “netzwerk-itlab-weiss” [“status”]=> string(7) “inherit” [“uploadedTo”]=> int(0) [“date”]=> string(24) “2020-07-21T08:50:11.000Z” [“modified”]=> string(24) “2020-07-21T08:50:11.000Z” [“menuOrder”]=> int(0) [“mime”]=> string(9) “image/png” [“type”]=> string(5) “image” [“subtype”]=> string(3) “png” [“icon”]=> string(66) “https://www.camelot-itlab.com/wp-includes/images/media/default.png” [“dateFormatted”]=> string(13) “July 21, 2020” [“nonces”]=> array(3) { [“update”]=> string(10) “42f0809b8b” [“delete”]=> string(10) “3359e37d3d” [“edit”]=> string(10) “ca9a78498a” } [“editLink”]=> string(69) “https://www.camelot-itlab.com/wp-admin/post.php?post=2853&action=edit” [“meta”]=> bool(false) [“authorName”]=> string(5) “admin” [“filesizeInBytes”]=> int(451002) [“filesizeHumanReadable”]=> string(6) “440 KB” [“context”]=> string(0) “” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” [“sizes”]=> array(4) { [“thumbnail”]=> array(4) { [“height”]=> int(150) [“width”]=> int(150) [“url”]=> string(89) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/netzwerk-ITLab-weiss-150×150.png” [“orientation”]=> string(9) “landscape” } [“medium”]=> array(4) { [“height”]=> int(300) [“width”]=> int(9) [“url”]=> string(87) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/netzwerk-ITLab-weiss-9×300.png” [“orientation”]=> string(8) “portrait” } [“large”]=> array(4) { [“height”]=> int(1024) [“width”]=> int(32) [“url”]=> string(89) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/netzwerk-ITLab-weiss-32×1024.png” [“orientation”]=> string(8) “portrait” } [“full”]=> array(4) { [“url”]=> string(81) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/netzwerk-ITLab-weiss.png” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” } } [“compat”]=> array(2) { [“item”]=> string(0) “” [“meta”]=> string(0) “” } [“acf_errors”]=> bool(false) }

SAP co-innovation partnership​

Successfully realized blockchain use case implementations together with our co-innovation partner SAP – also presented on SAPPHIRE stages​

Proven Results

array(33) { [“id”]=> int(2845) [“title”]=> string(21) “digTransf-ITLab-weiss” [“filename”]=> string(25) “digTransf-ITLab-weiss.png” [“url”]=> string(82) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/digTransf-ITLab-weiss.png” [“link”]=> string(52) “https://www.camelot-itlab.com/digtransf-itlab-weiss/” [“alt”]=> string(0) “” [“author”]=> string(1) “1” [“description”]=> string(0) “” [“caption”]=> string(0) “” [“name”]=> string(21) “digtransf-itlab-weiss” [“status”]=> string(7) “inherit” [“uploadedTo”]=> int(0) [“date”]=> string(24) “2020-07-21T08:49:49.000Z” [“modified”]=> string(24) “2020-07-21T08:49:49.000Z” [“menuOrder”]=> int(0) [“mime”]=> string(9) “image/png” [“type”]=> string(5) “image” [“subtype”]=> string(3) “png” [“icon”]=> string(66) “https://www.camelot-itlab.com/wp-includes/images/media/default.png” [“dateFormatted”]=> string(13) “July 21, 2020” [“nonces”]=> array(3) { [“update”]=> string(10) “b3077d3c09” [“delete”]=> string(10) “35d723a9b4” [“edit”]=> string(10) “82210f43ff” } [“editLink”]=> string(69) “https://www.camelot-itlab.com/wp-admin/post.php?post=2845&action=edit” [“meta”]=> bool(false) [“authorName”]=> string(5) “admin” [“filesizeInBytes”]=> int(590610) [“filesizeHumanReadable”]=> string(6) “577 KB” [“context”]=> string(0) “” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” [“sizes”]=> array(4) { [“thumbnail”]=> array(4) { [“height”]=> int(150) [“width”]=> int(150) [“url”]=> string(90) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/digTransf-ITLab-weiss-150×150.png” [“orientation”]=> string(9) “landscape” } [“medium”]=> array(4) { [“height”]=> int(300) [“width”]=> int(9) [“url”]=> string(88) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/digTransf-ITLab-weiss-9×300.png” [“orientation”]=> string(8) “portrait” } [“large”]=> array(4) { [“height”]=> int(1024) [“width”]=> int(32) [“url”]=> string(90) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/digTransf-ITLab-weiss-32×1024.png” [“orientation”]=> string(8) “portrait” } [“full”]=> array(4) { [“url”]=> string(82) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/digTransf-ITLab-weiss.png” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” } } [“compat”]=> array(2) { [“item”]=> string(0) “” [“meta”]=> string(0) “” } [“acf_errors”]=> bool(false) }

Reduction of information flow times in regulated scenarios from several months to just a few hours

array(33) { [“id”]=> int(2857) [“title”]=> string(21) “strategie-ITLab-weiss” [“filename”]=> string(25) “strategie-ITLab-weiss.png” [“url”]=> string(82) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/strategie-ITLab-weiss.png” [“link”]=> string(52) “https://www.camelot-itlab.com/strategie-itlab-weiss/” [“alt”]=> string(0) “” [“author”]=> string(1) “1” [“description”]=> string(0) “” [“caption”]=> string(0) “” [“name”]=> string(21) “strategie-itlab-weiss” [“status”]=> string(7) “inherit” [“uploadedTo”]=> int(0) [“date”]=> string(24) “2020-07-21T08:50:22.000Z” [“modified”]=> string(24) “2020-07-21T08:50:22.000Z” [“menuOrder”]=> int(0) [“mime”]=> string(9) “image/png” [“type”]=> string(5) “image” [“subtype”]=> string(3) “png” [“icon”]=> string(66) “https://www.camelot-itlab.com/wp-includes/images/media/default.png” [“dateFormatted”]=> string(13) “July 21, 2020” [“nonces”]=> array(3) { [“update”]=> string(10) “881ca928cd” [“delete”]=> string(10) “38d32a062d” [“edit”]=> string(10) “e9a90a6298” } [“editLink”]=> string(69) “https://www.camelot-itlab.com/wp-admin/post.php?post=2857&action=edit” [“meta”]=> bool(false) [“authorName”]=> string(5) “admin” [“filesizeInBytes”]=> int(532863) [“filesizeHumanReadable”]=> string(6) “520 KB” [“context”]=> string(0) “” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” [“sizes”]=> array(4) { [“thumbnail”]=> array(4) { [“height”]=> int(150) [“width”]=> int(150) [“url”]=> string(90) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/strategie-ITLab-weiss-150×150.png” [“orientation”]=> string(9) “landscape” } [“medium”]=> array(4) { [“height”]=> int(300) [“width”]=> int(9) [“url”]=> string(88) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/strategie-ITLab-weiss-9×300.png” [“orientation”]=> string(8) “portrait” } [“large”]=> array(4) { [“height”]=> int(1024) [“width”]=> int(32) [“url”]=> string(90) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/strategie-ITLab-weiss-32×1024.png” [“orientation”]=> string(8) “portrait” } [“full”]=> array(4) { [“url”]=> string(82) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/strategie-ITLab-weiss.png” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” } } [“compat”]=> array(2) { [“item”]=> string(0) “” [“meta”]=> string(0) “” } [“acf_errors”]=> bool(false) }

Separating logic from central instances and moving it closer to the data to be processed

array(33) { [“id”]=> int(2841) [“title”]=> string(25) “blockbuilding-ITLab-weiss” [“filename”]=> string(29) “blockbuilding-ITLab-weiss.png” [“url”]=> string(86) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/blockbuilding-ITLab-weiss.png” [“link”]=> string(56) “https://www.camelot-itlab.com/blockbuilding-itlab-weiss/” [“alt”]=> string(0) “” [“author”]=> string(1) “1” [“description”]=> string(0) “” [“caption”]=> string(0) “” [“name”]=> string(25) “blockbuilding-itlab-weiss” [“status”]=> string(7) “inherit” [“uploadedTo”]=> int(0) [“date”]=> string(24) “2020-07-21T08:49:39.000Z” [“modified”]=> string(24) “2020-07-21T08:49:39.000Z” [“menuOrder”]=> int(0) [“mime”]=> string(9) “image/png” [“type”]=> string(5) “image” [“subtype”]=> string(3) “png” [“icon”]=> string(66) “https://www.camelot-itlab.com/wp-includes/images/media/default.png” [“dateFormatted”]=> string(13) “July 21, 2020” [“nonces”]=> array(3) { [“update”]=> string(10) “73dde6ce57” [“delete”]=> string(10) “9c9c059b57” [“edit”]=> string(10) “c832c850dc” } [“editLink”]=> string(69) “https://www.camelot-itlab.com/wp-admin/post.php?post=2841&action=edit” [“meta”]=> bool(false) [“authorName”]=> string(5) “admin” [“filesizeInBytes”]=> int(357408) [“filesizeHumanReadable”]=> string(6) “349 KB” [“context”]=> string(0) “” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” [“sizes”]=> array(4) { [“thumbnail”]=> array(4) { [“height”]=> int(150) [“width”]=> int(150) [“url”]=> string(94) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/blockbuilding-ITLab-weiss-150×150.png” [“orientation”]=> string(9) “landscape” } [“medium”]=> array(4) { [“height”]=> int(300) [“width”]=> int(9) [“url”]=> string(92) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/blockbuilding-ITLab-weiss-9×300.png” [“orientation”]=> string(8) “portrait” } [“large”]=> array(4) { [“height”]=> int(1024) [“width”]=> int(32) [“url”]=> string(94) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/blockbuilding-ITLab-weiss-32×1024.png” [“orientation”]=> string(8) “portrait” } [“full”]=> array(4) { [“url”]=> string(86) “https://www.camelot-itlab.com/wp-content/uploads/2020/07/blockbuilding-ITLab-weiss.png” [“height”]=> int(5760) [“width”]=> int(180) [“orientation”]=> string(8) “portrait” } } [“compat”]=> array(2) { [“item”]=> string(0) “” [“meta”]=> string(0) “” } [“acf_errors”]=> bool(false) }

Combining Trusted Computing Environments (TEEs) with blockchain networks: a logical evolution in distributed systems

FAQ

Why Confidential Computing?

Many known use cases for blockchains have contrary requirements: protecting private data on the one hand, but trustworthily processing it on the other hand. Putting private data on a blockchain network to process it with smart contracts is in many cases not an option, due to the level of sensitivty of the data. Camelot Trusted Computing Appliances solve this problem.​

What are use cases for Camelot Trusted Computing Appliances?

There are several use cases: regulatory scenarios, every use case touching private or sensitive data or any sort of intellectual property, GDPR compliance requirements in conjunction with blockchain networks.​

Who needs to run a Camelot Trusted Computing Appliance in an enterprise scenario?

Only those parties that own private data, but want to give a trustworthy answer to a question from other parties about the data, need to operate a Trusted Computing Appliance.

What are the benefits of Camelot Trusted Computing Appliances?

More efficiency and low TCOs: The reduced control effort, the lower number of switches and the resolution of data redundancies increase the efficiency of the processes in the blockchain network and reduce the total cost of ownership.​

More transparency and traceability: The distributed and public nature of the blockchain provides more transparency and a secure origin of the information distributed over the network.​

Better collaboration and leaner processes: The blockchain makes communication between the various participants in the business network safer, better and simpler. This reduces data redundancies, optimizes the flow of information, minimizes the number of intermediaries in the network and, last but not least, streamlines processes.

Is it possible to use Camelot Trusted Computing Appliances without blockchains?

Integration into an existing central data network is also possible using a public key infrastructure and secure data channels.​

Featured Insights

Render Post Preview here

Get all Insights

Further Services and Solutions

Solution

Camelot Hypertrust Platform

Camelot Hypertrust Platform: Managing interoperability, performance, security and scalability of your international, multi-company supply chain.

Innovation

Blockchain

Blockchain has moved on from the hype of Bitcoin and displays its potential in value chains where data security and authenticity are particularly important.

App

Blockchain Logistics Solutions

Closer cooperation and greater shared data enable higher efficiency at lower costs, but also require trust. By increasing security and transparency, Blockchain supports in building that trust.

Contact

Andreas Göbel​

Head of Center of Digital Innovation Blockchain​

Andreas is a driving force behind the decentralization of processes and organizations. He combines many years of experience as an SAP solution architect with his vision of shaping the future of supply chain management – with the help of digital solutions.

Stay in touch with us

Our experts who can best support you will reach out shortly to the phone number you have provided.

Request a Demo

Our experts will contact you soon to arrange a call or meeting.