About us

In 1996, together with German and American partners such as Pro7 and computer pioneer Silicon Graphics International, we launched "Kolibri", the first German-language search engine, on the Internet. 

2000 haben wir das Patent für die Fingerprinting-Technologie, das Verfahren zum interaktiven Kommunizieren zwischen einem internetfähigen Browser und einem internetfähigen Webserver, angemeldet.  Auf diese Technologie basierend arbeitet wir an dem Recommandetaion Marketing der Deutschen Telekom.

In a joint venture with Bertelsmann from 2012 to 2016, a successful application for fraud prevention was realized. Earlier than others, we demonstrated the need for Self-Sovereign Identity (SSI) for data ecosystems with idento.one. 

Together with Infineon and the International Data Spaces Association (IDSA), the blockchain-based application OrbiterChain was presented at the Hannover Messe and in Barcelona. 

truzzt GmbH was founded in 2020. We realized that there was a great need for a solution that would facilitate the exchange of data between companies while minimizing the risks.

Together with our partners verifeye, Neuropil and GAIA-X founding partner IONOS, we are now creating a reliable infrastructure for interoperable data spaces based on European values: the truzzt box. 

truzzt GmbH is the infrastructure provider of the IDSA reference architecture. A security gateway for the exchange of data and services using IDSA Essential Services, an infrastructure that we have played a key role in developing. truzzt thus complies with the IDSA standard DIN SPEC 27070. We are the official operator of the Mobility Data Space (MDS), a certified data space for the mobility sector based on the standards of IDSA and Gaia-X. 

Our management consists of employees, some of whom have more than 30 years of experience in the Internet business. We have an experienced team of data scientists, software developers, lawyers and marketers with outstanding expertise, put together to make our vision a reality.

The Foundation of truzzt

The IDSA architecture model aims at a virtual integration of physically distributed data. Essentially, the data should be left where it is generated and managed. There is no provision for a common database schema, no attempt is made to achieve schematic integration.

The model also envisages a data integration concept in which the integration takes place at the semantic level. For this reason, it is important that there are vocabularies to ensure interoperability between the data from distributed databases. A very important feature is that they do not necessarily have a "single source of truth", not least because data spaces are very distributed architectures.

IDSA certified data spaces can be nested within themselves. One can imagine that nested spaces can be formed from data spaces that are overlapping in themselves. In summary, it can be said that the truzzt port covers all the requirements of the IDSA architectural model.

Our role in the ecosystem

What we offer

Trust Anchor

An anchor of trust is a type of technology or process used to build or reinforce trust between two or more parties. This anchor of trust creates a baseline that allows all parties involved to be aware of the identity of their counterparts at all times. Similar to how a person is recognized in a conversation about appearance, behavior or voice and thus their identity is confirmed, an anchor of trust allows the same form of confirmation on the Internet.

Data Traceability

Data traceability refers to the ability to track and prove the origin and use of data. The data provider wants to be able to ensure and determine who is allowed to do what with their data in a data space, under what conditions – and who exactly is not allowed to do so. They also want transparency about what actually happens to their data when it is shared – data traceability is essential.

Data Sovereignty

Data sovereignty is the ability of a person or company to have control over their own data and determine how it is used. This includes the ability to decide what data is collected, how it is stored, who has access to it, and how it is used. The concept of data sovereignty allows for completely self-determined control over the collection, storage, use and processing of one's own data.