HOW IT WORKS

JLINC Your Data

Introduction

Facilitating Governance

Between Parties
On The Internet

Modern technologies have accelerated the use of data more than ever and institutions need a trusted mechanism to negotiate and integrate confidently

  • Ikonik Icon
    JLINC provides simple, verifiable, permission-based exchange.
  • Ikonik Icon
    It creates a new 'consent management layer' on the internet where human and machine-readable agreements set terms
  • Ikonik Icon
    JLINC offers an entirely novel way of creating networks with built in trust and provenance
  • Ikonik Icon
    For use-cases ranging from B2B contracts, to IoT, FinTech, supply chain, medical, news, content, and PII in commerce
  • Ikonik Icon
    All without the overhead of a blockchain
Workflow
Ikonik Icon
There’s more to Business Intelligence workflows than inputs and outputs

Business Intelligence (BI) auditing commonly lacks hooks for tracking issues, changes, and misuse, which is especially important for enterprise systems that handle sensitive data requiring compliance guardrails. JLINC traces what happens to your data at every step of any data supply chain.

Ikonik Icon
JLINC secures your systems inputs and outputs

As data flows between systems and users, JLINC adds a cryptographically signed proof of all inputs and outputs exchanged, creating a lightweight data governance layer to improve output quality.

Ikonik Icon
3rd-party Audit

Zero-knowledge records can be recalled by any party to compare to source data, validating that the exchange was handled as described by the vendor or user.

Ikonik Icon
Zero-knowledge 3rd-party proofs satisfy even the most extensive audits

Audit records allow businesses to look back on previous agreements and their associated transactions to both validate that data is being used appropriately, and that the chain of trust was not broken, supporting SOX, HIPPA, and other auditing methodologies. JLINC provides fully privatized hashes that can be stored with independent 3rd-party auditors.

Workflow
Ikonik Icon
There’s more to Business Intelligence workflows than inputs and outputs

Business Intelligence (BI) auditing commonly lacks hooks for tracking issues, changes, and misuse, which is especially important for enterprise systems that handle sensitive data requiring compliance guardrails. JLINC traces what happens to your data at every step of any data supply chain.

Ikonik Icon
Your Data uploaded by JLINC verified human or machine

As data flows between systems and users, JLINC adds a cryptographically signed proof of all inputs and outputs exchanged, creating a lightweight data governance layer to improve output quality.

Ikonik Icon
3rd-party Audit

Zero-knowledge records can be recalled by any party to compare to source data, validating that the exchange was handled as described by the vendor or user.

Ikonik Icon
Zero-knowledge 3rd-party proofs  satisfy even the most extensive audits

Audit records allow businesses to look back on previous agreements and their associated transactions to both validate that data is being used appropriately, and that the chain of trust was not broken, supporting SOX, HIPPA, and other auditing methodologies. JLINC provides fully privatized hashes that can be stored with independent 3rd-party auditors.

Protocol

The JLINC
open protocol

Ikonik Icon

JLINC is an open protocol for controlling data exchange across the internet.  

It combines several strands of technology to establish a fully decentralized solution for Internet Data Provenance – a signed, private chain-of-custody to control data, after it is shared or distributed.

Human and machine-readable Information Sharing Agreements (ISAs), written in JSON, are signed using industry standard public key cryptography.

A compact digital fingerprint of the signed agreement, or “hash,” is recorded to audit logs on any database, log, ledger or blockchain.

This provides a “digital return receipt” with an audit trail, which allows all parties to prove that the signed copy of the agreement they each hold covers their data, and that it was signed by the opposite party when it was recorded.

Automation

MORE ABOUT

JLINC

JLINC automates cryptographically signed ‘data exchange contracts’

JLINC stands for JSON-LD Link Contracts where JSON-LD provides a container for data permission and sharing. JLINC provides a robust, cryptographically signed chain of custody that reinforces the terms of 'data exchange contracts' between entities and/or individuals. This is done in a fully automatic, autonomous and transparent way by leveraging:

Ikonik Icon

Human and machine
readable  contracts

Legally admissible compliance

Accurately trace data moving across agentic systems, troubleshoot and improve output quality and training with enterprise grade audit to satisfy sensitive data compliance requirements.

Ikonik Icon

Signatures
and Audit Records

For every transaction

Contract signing using standard PKI cryptography to request data, to exchange data, and on audit records

Ikonik Icon

Distributed Identities
(DIDs)

Each party retains unique keys

Each party can control who and how documents are signed, including those which can be delegated to agent software for automatic signing on the entity or user’s behalf.

Traditional logs can be edited or lost. JLINC adds an immutable, cryptographically signed knowledge audit so every data hand‑off, from the human user, between agents, and to the final report, is provable.

Permission

DATA EXCHANGE

Permission Based Exchange

JLINC’s ‘data exchange contracts’ create a new 'consent management layer' on the internet where human and machine-readable Information Sharing Agreements (ISAs) set terms for data use after transfer that allow for simple, verifiable, permission-based sharing.

The core system consists of several API servers and their backend datastores, and an array of use case specific front-end applications, mainly java script SPAs and mobile and desktop apps.