Skip to main content
Version: Work in Progress
Work in Progress
This is the latest Work in Progress for the United Nations Transparency Protocol. The content of this version is under active development and may change before release.
It's advised to use the latest maintained release from the list of maintained releases.

Different Digital Maturities

info

Please note that this content is under development and is not ready for implementation. This status message will be updated as content development progresses.

Overview

The world will not transition from paper to digital overnight. For years — possibly decades — supply chains will operate with a mix of PDF documents, paper certificates, and digitally verifiable credentials. Every UNTP implementer faces the same reality: some upstream suppliers are not yet issuing verifiable digital data, and some downstream customers are not yet equipped to consume it. This page describes the challenges of this transition period and the UNTP design patterns that address them.

Challenges

Upstream: Unstructured Input Data

Most supply chain actors will encounter upstream suppliers that have not yet implemented UNTP. Their product and facility data arrives as PDF documents, scanned certificates, spreadsheets, or even paper records. This creates several problems for an implementer trying to build a transparency graph:

  • No machine-readable structure — the data cannot be automatically loaded into a graph database or validated against business rules.
  • No cryptographic integrity — PDF documents and paper certificates are trivially easy to fake with modern AI tools. There is no digital signature to verify authenticity.
  • No consistent discovery — unlike UNTP credentials that are discoverable via identity resolvers, unstructured data arrives through ad-hoc channels (email, portals, physical mail) with no standardised way to check for updates.
  • No entity linking — a PDF certificate might refer to "Copper mining facility seven" while the graph knows the same facility as ID https://someregister/facilities/5558880000030. Without structured identifiers, linking data across credentials is manual and error-prone.

Downstream: Customers Not Ready for Digital

At the other end, an implementer that issues UNTP digital credentials may find that some customers cannot process them. A small retailer scanning a QR code on a product expects to see something human-readable — not a JSON-LD document. If digital credentials are only machine-readable, they create a barrier to adoption rather than removing one. The challenge is to issue credentials that serve both technically advanced verifiers running automated compliance checks and less technical actors who need a simple, readable document.

Solution

Ingesting Unstructured Data with AI

For upstream suppliers that have not yet implemented UNTP, the recommended approach is to use AI (Large Language Models) to transform unstructured data into graph-compatible linked data — but to flag that data as unverified.

unstructured data

The diagram shows a case where the mine-site and the refiner have not implemented UNTP and are producing PDF documentation. The smelter and fabricator use an LLM to transform the PDF data into UNTP-structured linked data before loading it into their transparency graph. This means the same algorithmic assessments and validation rules can run across the entire graph, but portions derived from unstructured sources will be marked as lower integrity — warranting sample-based human review or traditional auditing.

There are important considerations for this approach:

  • Entity matching — UNTP depends on globally unique identifiers to link data. A PDF document might refer to a facility by a different name than the graph uses. LLMs are well suited to matching similar entities, so implementers should follow GraphRAG best practices: first ask the LLM to extract and match entities against existing graph nodes, then transform the data using matched identifiers.
  • Discovery — The Identity Resolver need not be limited to discovering UNTP credentials. It can also make PDF product or facility data consistently discoverable. Even before implementing UNTP credentials, there is value in making existing data discoverable via an identity resolver — this standardises how downstream actors find and refresh your data.
  • Integrity — AI cannot generate valid cryptographic signatures. Unstructured data ingested via LLM should be treated as unverified and clearly flagged in the graph. Implementers should plan to transition suppliers from PDF documents to digitally signed credentials over time.

In the diagram above, the mine-site passes unstructured data to the smelter via an unmanaged channel, so the smelter must manually request updates and cannot be sure the data is genuine. However the refiner, although still exchanging unstructured data, publishes it through an identity resolver — so the fabricator can be confident it is genuine refiner data and can automate the discovery and update process.

Human and Machine Readable Credentials

The solution to the downstream challenge is straightforward: every UNTP credential is designed to be both human-readable and machine-readable. This is achieved through two mechanisms built into the Verifiable Credentials Profile:

  • Render templates — Every UNTP credential SHOULD include a renderMethod property that defines an HTML template for human-readable rendering. When a person scans a QR code on a product, the credential can be displayed as a nicely formatted document — complete with logos, claims, and assessment results — without any specialised software.
  • Hosted verifier links — Credentials can include a link to a hosted verification service. A low-maturity actor simply clicks the link and sees a verified, human-readable document in their browser. A high-maturity actor processes the raw credential data programmatically.

A good analogy is the modern passport. It is a paper document with a photo page that humans inspect — but it also contains an embedded chip that smart gates read automatically. Both the border officer and the automated gate use the same passport; they just consume it differently. UNTP credentials follow exactly the same pattern — a consumer with a phone sees a rendered, human-readable product passport, while a compliance system ingests the structured JSON-LD data and loads it into a transparency graph for automated verification. There is no need for separate "paper" and "digital" versions. A single credential serves all maturity levels.

Related design patterns cover other aspects of data sharing that are not specific to the paper-to-digital transition: Variant-Based Disclosure addresses how to serve different data to different consumer roles (regulators, buyers, public), and Mass Balance covers upstream confidentiality and audited transparency for supply chain traceability.

Transition Maturity Levels

The table below illustrates how a single product (a battery) might be represented at different stages of the paper-to-digital transition.

Maturity LevelUpstream DataDownstream OutputGraph Quality
Level 1 — Paper onlyPDF certificates from mine and refiner, received by emailPaper certificate shipped with goodsNo graph — manual review only
Level 2 — Discoverable but unstructuredPDFs published behind identity resolversPDF discoverable via QR code on productPartial graph — AI-ingested, flagged as unverified
Level 3 — Mixed credentialsUNTP credentials from refiner, PDFs from mineUNTP credential with render templateMostly verified graph — unverified portions flagged
Level 4 — Fully digitalUNTP credentials from all upstream suppliersUNTP credential consumed by automated systemsFully verified transparency graph

Most implementers will operate at Level 2 or 3 for an extended period. The key insight is that every level is useful — even AI-ingested unstructured data in a graph provides more actionable compliance intelligence than unconnected PDF files in email inboxes.

Examples

Human and Machine Readable Credential

The sample below is a UNTP Digital Product Passport issued as a verifiable credential. The URL (or QR scan) resolves to a hosted verifier that displays a human-readable version. Raw JSON data can be viewed via the JSON tab and the full credential can be downloaded via the download button.

URLQRDescription
Sample Digital Battery PassportBattery Passport ExampleA sample digital battery passport as a JWT-signed Verifiable Credential. Scanning the QR code or clicking the link opens the same credential in a hosted verifier — a human sees a rendered passport, while a machine can consume the raw JSON-LD data.

AI-Assisted Mapping of Unstructured Data

Given a well-documented UNTP vocabulary, credential schema, conformity topic taxonomy, and identifier scheme register, it is feasible to produce fully compliant UNTP data from unstructured sources and add it to a transparency graph. There are a number of commercial products that specialise in this kind of structured data extraction, but anyone can test the feasibility for themselves. Simply find a publicly available independent audit report (to map to a UNTP conformity credential) or a product brochure with an environmental product declaration (to map to a UNTP product passport), and use a prompt similar to the following in your preferred AI assistant:

"Using the attached audit report, create a UNTP Digital Conformity Credential JSON instance that complies with the guidance and JSON schema at https://untp.unece.org/docs/specification/ConformityCredential and the conformity topic taxonomy at https://untp.unece.org/docs/specification/CoreTaxonomies. Map any identifiers found in the document to well-structured globally unique identifiers using the identifier scheme guidance at https://untp.unece.org/docs/implementations/Registers"

The results are typically surprisingly good — demonstrating that the barrier to transforming existing unstructured supply chain data into graph-compatible UNTP credentials is lower than most implementers expect. The identifier mapping step is particularly important because it ensures that entities extracted from unstructured sources can be linked to existing nodes in the transparency graph rather than creating disconnected duplicates.