A platform for enabling IoT ­solutions

October 2018 Editor's Choice, Integrated Solutions, Infrastructure

Digital Twin is a South African company that has developed a hardware, software and communication platform to enable companies to harness the Internet of Things (IoT) for their own applications.

The company was conceived by Richard Creighton, a 25-year veteran of the industrial control and automation industry, after he recognised the potential of IoT. “Fundamentally my background revolves around automation, control, sensing, and getting data into systems and processes that actually end up bringing value and ROI to customers. So when I saw the trend towards using IoT concepts to provide nothing more than convenience or trivial functionality, I thought there was an opportunity that was being missed,” he says.

This led him to partner with two like-minded individuals, Anton Torlutter and Ivan Potter, to create Digital Twin in 2018. The trio then set about building IoT/IIoT (Industrial IoT) platform based on an indirect model to market. “This means we will never effectively do an installation at a customer site, unless a partner needs our help,” Creighton expands. “Our involvement is in the build-out and development of a platform. We recognised that we will never be everything to everyone, so we position ourselves as an enabler for the experts in their particular vertical markets (be it oil and gas, mining, retail, pharmaceuticals, and so on) to offer advanced solutions to their own clientele to help their return on sales from a client engagement perspective.”

Clients can adopt one of four tiers that make up the Digital Twin platform. Tier 1 comprises only the company’s IoT-enabled hardware (locally designed and manufactured in Ruimsig, Johannesburg), leaving it up to the integrator to build their own software, dashboards and data lake on top of it. Tier 2 adds access to Digital Twin’s data lake solution – this removes the significant effort that would be required for clients to establish the ability to connect to the hardware and start collecting info.

Tier 3 further includes a console for configuring and managing IoT gateways in the field and their associated inputs and outputs, in addition to trending, reporting, alerts, location services and data export. Finally, Tier 4 adds value-in-use development, customised visualisation and linkage to ERP, CRM and other systems, and advanced data wrangling and machine learning.

Security-specific application

In the security sector specifically, the platform provides the ability to embed technology such as biometric fingerprint recognition, and integrate tokens for access control. The company is also prototyping hardware that integrates an OEM version of a well-known biometric reader, which will allow for remote access applications via a cost-effective connection. It even intends to apply its technology for initiating payments and to become oracle inputs into blockchain solutions.

(“A blockchain oracle is a third-party information source that has the sole function of supplying data to blockchains which allow for the creation of smart contracts” – https://www.mycryptopedia.com/blockchain-oracles-explained/. Another explanation can be found at https://blog.apla.io/what-is-a-blockchain-oracle-2ccca433c026.)

Importantly, for applications such as an access control point in a remote location, the Digital Twin solution mitigates the need to have some sort of GSM commander, Wi-Fi infrastructure, or operating in disconnected mode. Instead, the data connection is powered by the Thingstream, a global connectivity platform that employs USSD (unstructured supplementary service data) and the MQTT (message queuing telemetry transport) protocol.

In order to guarantee data security, the hardware is never connected to a TCP/IP network. For starters, it has a physical air gap, and when it does establish a USSD connection via MQTT it transmits the data as an encrypted packet that gets shared via the SDK (software development kit) into the gateway. That encryption is maintained right the way through to the database, at which point it is decrypted as per the client’s credentials to view the data. What’s more, Digital Twin’s data lake is built on AWS (Amazon Web Services) and applies all the rigorous AWS security protocols for accessing that data.

“Thingstream is our brokerage of choice for that level of communication,” explains Creighton. “Because USSD is supported by all GSM towers, our hardware can effectively be placed almost anywhere in the world, powered up and we’re good to go – across any service provider and without any roaming charges or contract required. This is very powerful from a security perspective for things like managing access control points, or picking up remote signalling such as alarm conditions.”

Cost-effective and redeployable

To give an idea of the price point for adopting the Digital Twin platform, its first hardware unit – called Pigeon – retails between R1500 and R1750, depending on the configuration, and access to data is nearly unlimited. At the minimum, 30-minute updates are provided, but that can be brought down to one minute, with a variation in cost from R45 to R80 per month. The hardware is being added to the global Thingstream catalogue to maximise its market opportunities, and three or four derivatives have been designed for various levels of functionality, depending on the application.

The hardware is redeployable, so for example, it can be used to manage a turnstile at a construction site, then moved to another site as needed. “In fact we’re working with a company called IS Engineering that’s putting these units into its barriers and turnstiles as a value-adding feature. This gives their clients a basic access management system at a very low cost.

“Secondly, for their own benefit, it gives them insight into how many times a particular boom or turnstile has been engaged and whether it’s been subjected to severe temperatures. This helps them to manage the mechanical components and SLA on those units to ensure their network of providers get to their customers before a unit fails – on a predictive basis. Therefore, they get not just visibility into where all their barriers are for their own benefit and asset management purposes, but also their condition,” Creighton says.

For more information, contact Digital Twin, [email protected], www.digitaltwin.digital



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...