The BEAP-MAR Project

Blue Bioeconomy in the Atlantic Area

New Products from Marine Organisms

Project Partners

What is the BEAP-MAR project?

BEAP-MAR will tackle key challenges of the Blue Bioeconomy sector in the Atlantic Area – the limited knowledge of marine organisms, namely those non-traditionally commercially exploited, e.g., new algal strains, marine fungi and sponges, valorising them to develop new, innovative bioactive compounds and products for various industries. 

The research on these untapped organisms will lead to new methodologies for their industrial implementation. This will be done through Product Tests, envisaged as in-company knowledge transfer processes to provide new cost-effective and sustainable products of high-added value from new compounds. 

The Blue Bioeconomy is still in its infancy, so exchanging knowledge and best practices at a transnational level is needed. BEAP-MAR will establish cooperation schemes among partners and Quadruple Helix actors to share the lessons learnt in the project, increase knowledge of new marine organisms and their potential and reinforce the AA competitiveness.

Unlocking the Potential of Marine Organisms

At BEAP-MAR, we are dedicated to researching and harnessing the power of unique marine organisms such as algae, marine fungi, and sponges. Our goal is to uncover their hidden potential and create innovative solutions for various industries.

Partners
0

From around Europe

Regions
0
Product Tests
0

Will be carried out during the project lifetime

How it works

BurstIQ will primarily be using the Certs API. Certs Web Dashboard will mainly be used to administer API usage such as creating new API keys to create Verifiable Credentials. LifeGraph assigns ownership to a piece of data so whatever company is using LifeGraph will know who the owner is. The platform allows for dynamic consent if, for example, a client decides to remove access to their health data.

The Verifiable Credential services provided by Credentifi will initially be deployed to verify and attest employee skills and learning accomplishments. This will build trusted engagements between employees and employers while enabling employers to optimize their workforce.

Want to get involved?

Secure, Transparent & User-Friendly Solutions

Third-party security audits

To ensure the highest level of security and quality, we do periodic third-party security audits on our code bases. This process guarantees our commitment to transparency and trust, reinforcing our dedication to providing secure, reliable, and robust software solutions.

No personal data on the blockchain and GDPR compliant

We prioritize privacy and security, which is why we don’t put personal data on the blockchain. Verifiable Credentials are securely stored in users' Identity Wallet apps. This method ensures that your users maintain complete control and ownership over their personal data, at all times.

No personal data on the blockchain and GDPR compliant

We prioritize privacy and security, which is why we don’t put personal data on the blockchain. Verifiable Credentials are securely stored in users' Identity Wallet apps. This method ensures that your users maintain complete control and ownership over their personal data, at all times.

Third-party security audits

To ensure the highest level of security and quality, we do periodic third-party security audits on our code bases. This process guarantees our commitment to transparency and trust, reinforcing our dedication to providing secure, reliable, and robust software solutions.

Privacy-Preserving Verification

Credential verifiers can check that specific credential attributes satisfy certain required conditions without learning the attributes themselves.

For example, users can prove that their yearly income is less than $x for qualifying for social welfare without revealing their actual income. Similarly, users could prove that their annual income is more than a certain amount to access a high-risk, high-reward investment fund.

When users present a Credential for verification, they can share one (or more) attributes within the Credential without presenting the entire Credential. For example, a student could share the name of his university from his Student Card without revealing his name or student number.

With Range Proofs, someone can verify if a user's attribute is within a specific range.

For example, verifying if the user's age is between 20 and 25 or that their annual income is between $50,000 and $60,000 without knowing their actual age or income.

Verifiable Encryption allows the holder to encrypt any attribute(s) of the credential specifically for authorities and regulators.

When accessing a service, the verifier can request that the holder encrypts a specific attribute (like an ID number) so that a regulator can access it if need be. The verifier will not be able to decrypt the attribute. Only the regulator will.

Credentials can be issued jointly by a group of issuers. Using Threshold Anonymous Credentials, a valid credential will only be issued when a threshold number of issuers agree.

Stay Updated with the BEAP-MAR Newsletter

Subscribe to our newsletter and receive an update every 6 months on how the project progresses, results, collaborations, events & more! 

Scroll to Top