User roles

In this section we describe all user roles in the platform, shedding light on the specific permissions and capabilities that each potential user of the platform might have.

In order to define the user roles, we will shed light first on the target clients for AirTrace SaaS platform. Please, note that a target client is not the same as a user role in the platform, that justifies why we are giving an in-depth description now.

The target clients we will approach on our first commercial stage are:

  • IoT System Integrators:

IoT System Integrators are professional service companies that offer solutions for deploying and managing Internet of Things (IoT) solutions, both hardware and software. With AirTrace, System Integrators do not need to invest heavily in Blockchain projects to support this technology in their IoT devices. IoT devices might connect via MQTT protocol or using RestFUL API, AirTrace implementation makes it very agile and scalable to support Blockchain (immutability) in the IoT infrastructures they deploy to their end-clients. Adding ADOS allows to also include a Data Quality Factor (DQF) that is used to quantify the quality of the blockchainized data (reliability).

  • IoT SaaS platforms:

IoT SaaS platforms are willing to integrate Blockchain capabilities in their services without needing to invest heavy sums in Blockchain technologies. Thanks to AirTrace modularity, they can basically plug-and-play our services and provide their clients with Blockchain capabilities with all the satellite services that AirTrace provides. IoT SaaS platforms might not go as low-level as IoT System Integrators might do, probably using more high-level protocols like RestFUL API.

  • IoT end-clients:

End-clients refer to customers having IoT networks already installed and deployed in their operations. Even if normally IoT System Integrators are the ones that can operate on the devices to integrate AirTrace's functionality, some end-clients might want to support AirTrace service themselves, only if they have access to the internals of their IoT devices and have full control on the infrastructure.

Last updated