Abstract: A method for injecting data into a secure distributed computing system includes obtaining characteristics of an object via a secure operable connection from a smart silo. The method further includes verifying an identity of the smart silo based on credentials included in a message from the smart silo received via the secure operable connection. The methods further includes making a determination that the characteristics match a trigger condition of a smart contract. The method further includes executing the smart contract in response to the determination.
Abstract: A method for injecting data into a secure distributed computing system includes obtaining characteristics of an object via a secure operable connection from a smart silo. The method further includes verifying an identity of the smart silo based on credentials included in a message from the smart silo received via the secure operable connection. The method further includes making a determination that the characteristics match a trigger condition of a smart contract. The method further includes executing the smart contract in response to the determination.