Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Self-Sovereign Digital Identity
1. How can we fix the identity problem?
What is self-sovereign digital identity and what problems does it
solve?
David G.W. Birch
Digital ID Meetup (Sydney, February 2018)
www.dgwbirch.com
@dgwbirch
v2
Can Self-Sovereign Digital Identity Help?
2. David G.W. Birch
author, advisor and commentator
Global top 15 favourite sources of business
information (Wired Magazine);
London FinTech Top 10 most influential
commentators (City A.M.);
Top 20 Fintech Influencer (JAX London);
Top five Leader in IDentity (Rise);
Top 10 Twitter account followed by
innovators, alongside Bill Gates and Richard
Branson (PR Daily);
Top 10 most influential voices in banking
(Financial Brand);
Top 50 blockchain insider (Richtopia);
Europe’s most influential commentator on
emerging payments (Total Payments).
2
3. Time for some clear
thinking around digital
identity
Let’s create a model to helps us formulate a solution
3
4. The Three Domain Model
We’re all crazy for “digital identity” – but what is it?
4
12. Self-Sovereign Digital Identity
The user must be central to the administration of identity;
The identity must be transportable;
It must allow ordinary users to make claims
• From a “pull” to “push” model, with users selecting the virtual identity;
In creating the identity, “we must protect the individual”.
Christopher Allen (27th April 2016)
Ten Principles: Existence, Control, Access, Transparency,
Persistence, Portability, Interoperability, Consent,
Minimalisation, Protection
13. Transactions are between Virtual IDs
Transactions use the public key – do they care where the private key is?
14. Discovery: Is this where the Blockchain helps?
Transactions use the public key – do they care where the private key is?
15. Discussion
Is this the right model and framework for self-sovereign digital identity
(SSID) ? (Keyword: Credentials)
What real problems to we face that SSID can solve? (Keyword: Control)
If we do need SSID, how do we manage the problem of the private keys?
(Keyword: Recovery)
If we do want people to manage their own keys, how will we educate them?
(Keyword: Consent)
16. in the future, everyone will be famous for fifteen megabytes
engage dgwbirch limited
post 1 Armadale Road, Woking, Surrey GU21 3LB, UK
call +44 7850 863168
contact mail@dgwbirch.com
visit www.dgwbirch.com
follow @dgwbirch
comment blog.dgwbirch.com
connect https://www.linkedin.com/in/dgwbirch/
order amazon.co.uk “Before Babylon, Beyond Bitcoin”
Hinweis der Redaktion
All the things you are
The number of proposed biometric technologies increases daily. Starting with the well-established fingerprint systems to the more esoteric such as ear geometry (commonly left by listeners at crime scenes in Switzerland, apparently), gait (the way you walk) and body odour. How should you go about deciding the most appropriate technology for any given application?
Biometric technologies are useful means of identifying people against databases or verifying that they are who they say they are. A small number of technologies are good at the former function (e.g. iris and fingerprint) whereas many are capable of verification against a biometric template stored on a token such as a smart card or travel document.
There are many different applications for these two functions within UK government such as:
Verifying that a document holder is the legitimate document holder by matching them against a biometric held within the document.
Preventing duplicate applications for documents by searching against the database of currently issued documents.
Preventing people holding different identities on different systems (e.g. Driving License vs Passport) by sharing and cross-checking biometric data.
Ensuring that only legitimate members of staff have access to secure areas and systems.
The complexity of the individual requirements of each application coupled with the speed of advance of biometric technologies means that there is no single best biometric for all applications.