Proxy Voting Solution

Companies require shareholder involvement at a number of times, for example, for board elections, bylaw amendments, business mergers, investment strategy changes, etc. These decisions are usually taken in meetings where the proposals are presented to shareholders. Not all shareholders can attend meetings in person, so they assign that responsibility to a proxy — a person or entity whose function it is to cast the vote on their behalf as they intended.

However, the proxy voting process involves many intermediaries, and it is hard for all parties to trace, vote, reconcile, and communicate with all those involved in the process. This impairs transparency, makes it hard to verify data, and makes it difficult to trace data flow end-to-end.

The goal of our Daml-based solution for proxy voting is to provide a traceable, secure, and immutable digital copy of the voting views expressed by the shareholders and to guarantee that the voters can exercise their rights safely and transparently. Furthermore, if regulators need access to voter information, our solution can also meet such requirements.

Zero Knowledge Proof Authentication

NuID integrates Daml to provide a decentralized authentication solution that eliminates the need for enterprises to store, manage, and protect passwords and other user authentication data. Enterprises that implement NuID’s Daml-based solution eliminate the risk of a credential breach altogether: with nothing to store, there’s nothing to steal! The NuID platform combines Daml with advances in zero knowledge cryptography. The solution runs on a distributed ledger to enable end-users (customers or employees) to prove that they know their authentication secrets without having to reveal them or send them across a network. This creates a “trustless” system, where end-users own their own authentication data and no longer have to trust services to protect it. The solution comes in the form of a lightweight REST API that functions as a thin layer within a larger enterprise Identity and Access Management (IAM) stack. NuID’s unified protocol for strong authentication is factor-agnostic: it supports passwords, tokens, and biometrics – enabling businesses to reduce security risks and streamline the user experience.

Supply Chain Contracts and Transactions

This supply-chain application solves a key pain point for a manufacturer and its clients by providing demand-supply matching that allows the supply chain to respond to fluctuating demand levels. The solution allows a CPG firm to place an order with a factory (their own or a third party’s) based on current inventory and forecasted demand. The factory then notifies the firm when production is complete and when it ships the inventory through third-party distributors to the designated set of locations or warehouses. The CPG firm and its third-party distributors can each track delivery information, and if required, renegotiate and update the delivery information in real-time to match changing demand at retailers or other locations. This solution can be tailored for multiple industry sectors.

Supply Chain

The Supply Chain application demonstrates a generic example between a Buyer, Seller, Supplier, two Warehouses, and two independent Transport Companies. Buyer requests a trade quote from Seller for the price and delivery date for a quantity of goods. Seller notifies Supplier, and Supplier starts the quote collection process by selecting Warehouses to fulfill the product order request. The application shows the benefits of an automated algorithm optimized for best price to calculate and finalize delivery. The algorithm computes quantities to be delivered from the Warehouses and calculates the amount of goods Transport Company needs to deliver from the Warehouses. Seller can review the quote details (quantity of goods, place of shipment, transport company, price) and can add margin to the price before sending it to Buyer. Transport companies pick up product from Warehouses. When a successful delivery is acknowledged by Buyer, an automated payment obligation is created between Buyer and Seller for the amount of goods delivered. If goods are arriving separately, then partial delivery and partial payment occurs.

Structured Trade Finance

The Structured Trade Finance application demonstrates a simplified example of creating a chain of participants between a Manufacturer and its Tier-1, Tier-2, and Tier-3 subcontractors. An External Auditor participant is created so Participants can request external certification for the supply chain (e.g. sustainability reporting, etc.). Subcontractors can request trade finance from a Bank with increased transparency because they can demonstrate their chain of partners and orders.

Structured Rate Security

Optimis’ structured rate security is a tokenized debt instrument having a weighted-average coupon comprised of fixed and floating interest rates. The tokenized security is modeled with the option to adjust the weighted exposures between these interest rates through maturity. With this structure, an issuer is able to lock-in interest rate exposure at issuance, with the option to adjust interest rate exposure throughout the life of the security. This approach to structured rate securities issuance enables innovation in debt securities issuance and mitigation of risk exposure.


Stampchain allows users to verify the existence, integrity, and ownership of any document in a standardized manner, providing irrefutable and inexpensive proof. The objective is to give institutions the ability to verify the legitimacy of documents through the use of a GDPR-compliant DLT platform. Because each document is verified using a cryptographic hash, blockchain technology can be used to prove a document’s originality and validity. The StampChain Daml platform, deployed within existing legal frameworks and built over sophisticated consensus algorithms, prevents registered information from being manipulated and certifies that official documents are tamper-evident and immutable. Moreover, the decentralized nature of the platform and the advanced cryptographic techniques used make the solution highly secure

Real Time Analytics and Integration of Blockchain Data

Daml applications now can leverage real time analytics and business intelligence. With more business processes moving to the blockchain, one of the most obvious and common adoption hurdles is the required use of aggregated data for analytics and business intelligence. Creating offline data-silos by duplicating the ledger data would go against the principal of golden source data that Daml driven applications enable. Enriching the data with other sources in such a scenario is also problematic without sacrificing the integrity of the blockchain data. Moreover, enterprises need fast, in-the-moment analytics if we are to make decisions on the emerging digitally connected marketplace. This high speed analytic requirement also applies for detecting fraudulent transactions – all without sacrificing customer experience. This reference application illustrates how high performance analytics and business intelligence capability can be provided to Daml driven applications. It keeps the data in-sync with the changes happening on the blockchain in real time, so that the need for replication and reconciliation is eliminated.

OpenWork board

OpenWork board is a Daml powered Kanban board. Building on top of a smart contract core, it is a full featured productivity tool with some powerful sharing and access control features.

Multi-party Loyalty Program

This solution shows how loyalty programs can be taken to the next level by making points issuance, exchange and redemption seamless and enable transactions to happen in near real time. Improvements to loyalty point systems via distributed ledgers can be used to improve operational efficiencies, balance sheet concerns and customer experience.