Privacy, Security & Trust

A protected blended life

A protected blended life

Privacy, Security & Trust action line is about putting into practice innovative privacy-preserving and secure information technologies to protect sensitive data and the privacy of individuals in the Information Age.

EIT Digital is addressing this area in the full Innovation & Entrepreneurship and Entrepreneurial Education framework, through innovation projects- activities, Master and Summer Schools and through Business Development Accelerator and Business Community.

This action line is transversal to other action lines of EIT Digital.

Read more about Privacy, Security & Trust.

Business Community

Privacy, Security & Trust Business Community is a unique European marketplace connecting innovation buyers (and investors) with selected EIT Digital start-ups and market-ready innovations for deal and match making. The PST Business Community also enables market-pull of innovations and facilitates fund raising for the EIT Digital start-ups.

Download brochure (2015) and watch video about the PST Business Community.

Innovation Activities 2016

The innovation activities 2016 are focused on three priority areas of the PST action line: 1) secure and privacy-aware e-authentication and digital identity management with two activities; 2) protection of data privacy in online and mobile applications, services, and communications with four activities; 3) Mobile-Cyber-Security, addressing malicious software in mobile and on-line applications with two activities.

Engineering Privacy and Security in Crowdsourcing Environments along all Components

We introduce privacy and confidentiality aware crowd- and expert services for crowdsourcing of confidential enterprise data.

Many SMEs and large industries have difficulties to fully benefit from digital crowdsourcing. Main barriers: lack of trust in crowdsourcing caused by lack of privacy, security and confidentiality aware services. We provide crowd-service capable of both maximize semantic unrecognizability of clients’ content data, as well as highest security in data protection. We open up new cost- and time savings as well as efficiency levels.

Eventually, our solution allows companies to give out their data to our crowdsourcing services, as we take care of executing pseudonymization of critical data on clients‘ premises. Original data never leaves clients‘ sites. Clients retain full control over degree of obfuscation. Inside our crowdsourcing backend, we commence advanced privacy and security processing, cut and slice information before dispatching to ensure semantic unrecognizability and rule-based workers access restrictions. Our dedicated services at Starbytes (Italian crowdsourcing service) and Crowdee (German Start-Up) are happy to set your company up to fully benefit from digital crowdsourcing workforces.

Activity partners:


Reply -

TU Berlin -

EIT Digital locations: 

Berlin, Milan, Budapest


Tim Polzehl, TU Berlin

Homomorphic Cryptocomputing @ Works

Homomorphic Cryptocomputing @ Works (HC@WORKS) demonstrate the practicality of computing directly over encrypted data by means of homomorphic encryption, in the intendedly diverse industrial fields of e-health, cybersecurity and forensics.

Homomorphic Encryption (HE) is a new kind of disruptive cryptographic techniques which on top of allowing the scrambling of data in order to protect their confidentiality also provides the necessary mathematical building blocks for the execution of general algorithms directly on encrypted data. As such, HE is a unique ground breaking software-only technology allowing to enforce the confidentiality of data when they are manipulated by untrusted servers without decryption and without disclosing any secret to those servers.

The HC@WORKS project demonstrates the feasibility of embedding HE-based privacy-preserving processing techniques in real-world applications from the fields of e-Health (confidential-by-design cloud-based patient monitoring), social intelligence (privacy-preserving open and closed source data analytics) and cybersecurity (network monitoring probes for intrusion detection based on hidden criteria).

The project aims at achieving the delivery of these disruptive new kind of cryptographic techniques, along with supporting software tools and platforms, to the market in the 2016-17 timeframe. 

Activity partners:

Atos -



Engineering -


Thales - 

EIT Digital locations:

Madrid, Paris, Trento


Renaud Sirdey, Commissariat à l'Energie Atomique (CEA)

FIDES - Federated IDEntity Management System - Phase II

Finalization and deployment of an EU-wide platform for federated identity management, which may constitute a unified tool to access the EU Digital Single Market. 

Building on results achieved in FIDES first phase (2015), FIDES platform will be fine-tuned and deployed at large scale in three EU countries (Italy, Netherlands and Spain), with the ultimate goal to become a EU-wide platform for federated identity management.

FIDES platform addresses the need to foster the take-up of digital services, in line with the EU strategy for the Digital Single Market. To this aim, FIDES provides citizens, identity providers and service providers a unique framework for federated cross-border identity management, capable of preserving users security and privacy.

The solution will enable citizens to use a single sign-on to access to a multitude of digital services, managed by services providers of all EU countries in a secure way. Access will be available on mobile devices as well. 
FIDES will be brought to the market after 2016.


Atos - 

Fondazione Bruno Kessler - 

Poste Italiane - 

Reply -


EIT Digital locations:

Italy, Spain, The Netherlands


Rocco Mammoliti, Poste Italiane

Personal Information Management Ecosystem (PIME)

Privacy of health data

Today, it is extremely difficult to safeguard the privacy of health data in all circumstances. At the same time, the value hidden in health data for treatment, monitoring and advanced diagnosis is considerable and is worthwhile to explore. PIME combines a fully privacy respecting approach towards health data of patients with enabling capturing the health value of these data for patients, specialists, practitioners, care givers, and health centres. It does so by offering an end to end secure and privacy respecting health ecosystem to patients and a broad range of care givers. This ecosystem enforces ethical data handling by all parties. The ecosystem consists of a platform of advanced and secure data processing, a personal data store that enables fine grained control by patients and options for privacy preserving data analytics, a privacy dashboard that shows which data are kept and used and an app to support patients. 

Personal Information Management Ecosystem (PIME) offers:

  • An end to end secure and privacy respecting health data ecosystem
  • Keeping control at the patient’s side.
  • Enhancement of Patients empowerment
  • Enabling privacy respecting data processing and data analytics.
  • Supportive app and privacy dashboard.
  • Integrating health data collection of various sources in a privacy respecting manner.

Activity partners:

Atos -

Innovalor -

TNO - 

Synergetics -

EIT Digital locations:

Eindhoven, Madrid


Sharon Prins, TNO 


A top-grade, HW-secured smartphone platform supporting biometric authentication and certified security. The phone implements the Bring Your Own Device paradigm and can run existing mobile applications available of the market stores. 

The project delivers a high secure smartphone targeted mainly for the public safety market and top management. Up to date, the market does not offer a solution that combine high security and usability. Our top-grade, HW-secured smartphone platform features trusted boot, secure storage, tamper resistant measures and innovative biometric authentication methods based on the behaviour of the user and its interactions with the handset. Biometrics templates as well as other sensitive information need to be protected while stored on the phone, This will be guaranteed by secure storage on chip designed and produced by STM. The secure handset will be produced and commercialized by Bittium. On this respect, a detailed business plan and a comprehensive marketing and commercial strategy will be produced.

Activity partners:

Bittium -

STMicroelectronics -

University of Trento -

EIT Digital locations:

Helsinki, Trento


Bruno Crispo, University of Trento

Smart School from Pillars to Practical Experience

We provide services for advanced school lifestyle via mobile devices, based on mobile digital identity, wearables and advanced connectivity, targeting secure payments, personal data management and accesses. 

The Digital School is an important element for renewal, innovation, growth of Education and society evolution. New generation of students, relatives, teachers are facing new habits: connectivity always on, school as social place where time is spent also for aggregation and leisure, in addition to its fundamental education role. 

To enable an easy to use smart school scenario, still trusted and secured, the following key pillars are exploited:
 - Digital identity: the mobile phone is always in the hands of the user, and can be a strategic element for managing user identity. Moreover, solutions using wearable/personal objects can be complementary means to manage identity.
 - Mobile payments: users need to pay in digital way moving from cash to mobile where credit cards as well as new approaches based on virtual coins and coupons might simplify the experience. 

Smart combination of technologies is exploited to provide innovative services/apps at school (like canteen, food&beverages, printing, couponing, connectivity and ticketing for e.g. personal training courses, etc) nearly ready for market exploitation. 

Activity partners:

Deutsche Telekom -

Ericsson -

STMicroelectronics -

Telecom Italia -

EIT Digital locations:

Berlin, Trento


Pierangelo Garino, Telecom Italia

Smart Mobile APP Permission Management (SMAPPER)

A novel technology to let users understand and control what apps do on their mobile devices.

It is not easy for users to understand and control how apps access sensitive data on a mobile device. The aim of this activity is to develop a technology that allows users to better understand what apps do, and selectively grant them permissions. Our solution will be able to automatically suggest which permissions should be revoked to keep the mobile device, and the sensitive information stored on it, safe. The key value of this activity is to offer a user-friendly Android app that lets users easily control what other installed apps can do. This app will leverage on a backend service to automatically identify anomalous permissions, and to perform sophisticated analyses to spot information leaks and other suspicious activities in an app. This activity will produce a solution that is by far more user-friendly and more complete that current solutions on the market.

Activity partners:

F-Secure -

IMDEA Software Institute -

Saarland University -

Telecom Italia -

EIT Digital locations:

Helsinki, Madrid


Alessandra Gorla, IMDEA Software Institute 

Vulnerability Analysis and Management for Open-Source Software (VAMOSS)

We provide vulnerability assessment and risk analysis for applications that embed open-source-software.

Open source libraries are used in a vast majority of commercial and non-commercial software. During last years, serious security vulnerabilities were discovered in widely-used open-source software (e.g: in 2014 the vulnerability known as Heartbleed compromised the security of 500 millions of websites). Due to the pervasive nature of ICT, these vulnerabilities in OSS libraries may have a huge impact on critical services and on the everyday life of citizens. 

VAMOSS (Vulnerability Analysis and Management for Open-Source Software) project will develop a tool-set that will enable to effectively and efficiently analyse the risk coming from vulnerabilities in OSS libraries, determining if the vulnerable code is actually reachable. The project will develop two pilots and will create a new consulting service that will be launched to the market within the end of 2016.

Activity partners:

Fraunhofer SIT -

Poste Italiane -


Software Improvement Group -

University of Trento -

EIT Digital Locations:

Germany, Italy, The Netherlands


Andrea Volponi, Poste Italiane

Looking for the activities in 2014? Click here for more information.

Looking for the activities in 2015? Click here for more information.


The EIT Digital Challenge is the network's contest to reach out, identify and support the best digital start-ups in Europe, that are focused on fast growth of their business in the EU and worldwide. The contest focuses on eight strategic areas of EIT Digital, including Cyber Security and Privacy. In 2015 in the category Cyber Security and Privacy the start-up DigiFlak from Estonia won Gold for their “Flak Secuters”, followed by Mynigma from Germany and Coblue from the Netherlands.. Click here to learn about other finalists.

In the media & presentations


Privacy, Security & Trust Business Community
EIT Digital Idea Challenge 'Cyber Security & Privacy" final 2015
Security & Privacy in Digital Life 2015
Interview with Jovan Golic, Action Line Leader for Privacy, Security & Trust


Jovan Golic 
Action Line Leader

© 2010-2018 EIT Digital IVZW. All rights reserved. Legal notice