O slideshow foi denunciado.
Seu SlideShare está sendo baixado. ×

Know ID Workshop, Part 2: Who Will Give Robots Passports?

Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Próximos SlideShares
Self-Sovereign Digital Identity
Self-Sovereign Digital Identity
Carregando em…3
×

Confira estes a seguir

1 de 10 Anúncio

Mais Conteúdo rRelacionado

Diapositivos para si (20)

Semelhante a Know ID Workshop, Part 2: Who Will Give Robots Passports? (20)

Anúncio

Mais de David Birch (15)

Mais recentes (20)

Anúncio

Know ID Workshop, Part 2: Who Will Give Robots Passports?

  1. 1. www.chyp.comPlease copy and distribute25/03/20191 If Robots Need Passports who will provide them? KnowID Las Vegas March 2019
  2. 2. www.chyp.comPlease copy and distribute Will Robots Have Passports? Yes. In fact they will have more than one, just like the rest of us… …finance passport, a games passport, a dating passport, an adult passport, a work passport But they won’t have the most important stamp of all… IS_A_PERSON 2
  3. 3. www.chyp.comPlease copy and distribute Defining Digital Identity We define three domains: • Real identity: the real, unique and identifiable person. • Digital identity: the means by which a real person can assert their identity digitally. A person can have one or more digital identities • Virtual identity: the virtual identities belonging to the real person, that can be combined in any number of ways allowing the real person to present many digital personas. 3 Digital identity sits in the middle and provides: • Control: by ensuring only the real person has access to their keys or other authentication tokens which enable their virtual identities to be used. • Binding: by allowing the person to associate virtual identities from multiple places with their digital identities.
  4. 4. www.chyp.comPlease copy and distribute Am I REAL? The Bank Knows! Forget about schemes for doing taxes or waiting for banks to come together! Pick a real problem and solve it! My suggestion: internet dating? 4
  5. 5. www.chyp.comPlease copy and distribute Continental Example: BBVA 5
  6. 6. www.chyp.comPlease copy and distribute Continental+ Example: ItsMe 6
  7. 7. www.chyp.comPlease copy and distribute Commonwealth Example: CBA 7
  8. 8. www.chyp.comPlease copy and distribute Worked Example: Romance Scams Mass market, rife with fraud, identity issues, ”real names” not a solution 8
  9. 9. www.chyp.comPlease copy and distribute Banks in the Loop 9 Go to dating site If you don’t have a “Dating Passport”, get bounced to it Select your bank and log in with 2FA Bank is given an MBUN, returns attributes, token The dating passport does not know who you are Now Dating Passport has the attributes and the token Using Dating Passport to log in at dating site
  10. 10. www.chyp.comPlease copy and distribute Visit our website: http://www.chyp.com Follow us on Twitter: @chyppings Email us: info@chyp.com Read: Tomorrow's Transactions Blog Listen: Consult Hyperion Podcasts Consult Hyperion UK Tweed House, 12 The Mount Guildford, Surrey GU24HN, UK. +44 1483 301793 Consult Hyperion USA 535 Madison Avenue, 19th Floor New York, NY 10022, USA. +1 888 835 6124 Contact 25/03/201910

Notas do Editor

  • All the things you are
    The number of proposed biometric technologies increases daily. Starting with the well-established fingerprint systems to the more esoteric such as ear geometry (commonly left by listeners at crime scenes in Switzerland, apparently), gait (the way you walk) and body odour. How should you go about deciding the most appropriate technology for any given application?
    Biometric technologies are useful means of identifying people against databases or verifying that they are who they say they are. A small number of technologies are good at the former function (e.g. iris and fingerprint) whereas many are capable of verification against a biometric template stored on a token such as a smart card or travel document.
    There are many different applications for these two functions within UK government such as:
    Verifying that a document holder is the legitimate document holder by matching them against a biometric held within the document.
    Preventing duplicate applications for documents by searching against the database of currently issued documents.
    Preventing people holding different identities on different systems (e.g. Driving License vs Passport) by sharing and cross-checking biometric data.
    Ensuring that only legitimate members of staff have access to secure areas and systems.
    The complexity of the individual requirements of each application coupled with the speed of advance of biometric technologies means that there is no single best biometric for all applications.
  • All the things you are
    The number of proposed biometric technologies increases daily. Starting with the well-established fingerprint systems to the more esoteric such as ear geometry (commonly left by listeners at crime scenes in Switzerland, apparently), gait (the way you walk) and body odour. How should you go about deciding the most appropriate technology for any given application?
    Biometric technologies are useful means of identifying people against databases or verifying that they are who they say they are. A small number of technologies are good at the former function (e.g. iris and fingerprint) whereas many are capable of verification against a biometric template stored on a token such as a smart card or travel document.
    There are many different applications for these two functions within UK government such as:
    Verifying that a document holder is the legitimate document holder by matching them against a biometric held within the document.
    Preventing duplicate applications for documents by searching against the database of currently issued documents.
    Preventing people holding different identities on different systems (e.g. Driving License vs Passport) by sharing and cross-checking biometric data.
    Ensuring that only legitimate members of staff have access to secure areas and systems.
    The complexity of the individual requirements of each application coupled with the speed of advance of biometric technologies means that there is no single best biometric for all applications.

×