O slideshow foi denunciado.
Seu SlideShare está sendo baixado. ×

Self-Sovereign Digital Identity

Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Carregando em…3
×

Confira estes a seguir

1 de 16 Anúncio

Mais Conteúdo rRelacionado

Diapositivos para si (20)

Semelhante a Self-Sovereign Digital Identity (20)

Anúncio

Mais de David Birch (20)

Mais recentes (20)

Anúncio

Self-Sovereign Digital Identity

  1. 1. How can we fix the identity problem? What is self-sovereign digital identity and what problems does it solve? David G.W. Birch Digital ID Meetup (Sydney, February 2018) www.dgwbirch.com @dgwbirch v2 Can Self-Sovereign Digital Identity Help?
  2. 2. David G.W. Birch author, advisor and commentator Global top 15 favourite sources of business information (Wired Magazine); London FinTech Top 10 most influential commentators (City A.M.); Top 20 Fintech Influencer (JAX London); Top five Leader in IDentity (Rise); Top 10 Twitter account followed by innovators, alongside Bill Gates and Richard Branson (PR Daily); Top 10 most influential voices in banking (Financial Brand); Top 50 blockchain insider (Richtopia); Europe’s most influential commentator on emerging payments (Total Payments). 2
  3. 3. Time for some clear thinking around digital identity Let’s create a model to helps us formulate a solution 3
  4. 4. The Three Domain Model We’re all crazy for “digital identity” – but what is it? 4
  5. 5. Identification Domain Binding a digital identity to a mundane identity is expensive 5
  6. 6. Authentication Domain For the foreseeable future, mobile the mass market 6
  7. 7. Authorisation Domain Allow me to… do stuff 7
  8. 8. Case Study: BBVA Banks use this framework 8
  9. 9. The NIST Standard Governments use this framework 9
  10. 10. Who will create the infrastructure? Banks, internet giants, governments, NGOs… or us? 10
  11. 11. Who Creates Digital ID? Who holds the private key, basically
  12. 12. Self-Sovereign Digital Identity The user must be central to the administration of identity; The identity must be transportable; It must allow ordinary users to make claims • From a “pull” to “push” model, with users selecting the virtual identity; In creating the identity, “we must protect the individual”. Christopher Allen (27th April 2016) Ten Principles: Existence, Control, Access, Transparency, Persistence, Portability, Interoperability, Consent, Minimalisation, Protection
  13. 13. Transactions are between Virtual IDs Transactions use the public key – do they care where the private key is?
  14. 14. Discovery: Is this where the Blockchain helps? Transactions use the public key – do they care where the private key is?
  15. 15. Discussion Is this the right model and framework for self-sovereign digital identity (SSID) ? (Keyword: Credentials) What real problems to we face that SSID can solve? (Keyword: Control) If we do need SSID, how do we manage the problem of the private keys? (Keyword: Recovery) If we do want people to manage their own keys, how will we educate them? (Keyword: Consent)
  16. 16. in the future, everyone will be famous for fifteen megabytes engage dgwbirch limited post 1 Armadale Road, Woking, Surrey GU21 3LB, UK call +44 7850 863168 contact mail@dgwbirch.com visit www.dgwbirch.com follow @dgwbirch comment blog.dgwbirch.com connect https://www.linkedin.com/in/dgwbirch/ order amazon.co.uk “Before Babylon, Beyond Bitcoin”

Notas do Editor

  • All the things you are
    The number of proposed biometric technologies increases daily. Starting with the well-established fingerprint systems to the more esoteric such as ear geometry (commonly left by listeners at crime scenes in Switzerland, apparently), gait (the way you walk) and body odour. How should you go about deciding the most appropriate technology for any given application?
    Biometric technologies are useful means of identifying people against databases or verifying that they are who they say they are. A small number of technologies are good at the former function (e.g. iris and fingerprint) whereas many are capable of verification against a biometric template stored on a token such as a smart card or travel document.
    There are many different applications for these two functions within UK government such as:
    Verifying that a document holder is the legitimate document holder by matching them against a biometric held within the document.
    Preventing duplicate applications for documents by searching against the database of currently issued documents.
    Preventing people holding different identities on different systems (e.g. Driving License vs Passport) by sharing and cross-checking biometric data.
    Ensuring that only legitimate members of staff have access to secure areas and systems.
    The complexity of the individual requirements of each application coupled with the speed of advance of biometric technologies means that there is no single best biometric for all applications.

×