The hotel supplier would be considered the trusted authority who generates the security certificates that its “trusted issuers” (OTAs) will sign their data with. This means we can always guarantee a request is coming from a given issuer because the data sent from them is signed with a unique certificate that only they have access to. Unless the certificate is shared or comprised, this data will remain unreadable by other participants. After the hotel supplier has generated its certificates and given them to the appropriate OTAs, the supplier will now need to generate assets. Logically, assets are the same as a “bitcoin” or unit of value within the blockchain. Once the assets are generated, the hotel supplier can then perform a series of transactions to distribute their hotel inventory to the other OTAs. At this point, we have a cryptographic trail that tracks where the given hotel inventory originated from and who is selling it. Get the full story at Koddi