2. Almost 20 years of experience in the IT industry.
Currently, Jan Keil is a Vice President of Marketing at Infopulse.
Previously, ran several companies as CEO and start-ups as Business
Angel.
Acted as interim manager for several international IT projects and
well-known companies.
Since 2015 is heavily involved in the Blockchain projects
development.
Jan Keil
2
3. 'First they ignore you.
Then they laugh at you.
Then they attack you.
Then you win.'
â Mohandas Gandhi
4. 4
Blockchain â the fifth disruptive computing
paradigm
1970s
Mainframe
1980s
PC
1990s
Internet
2000s
Social-Mobile
2010s
Blockchain
5. 5
Getting closer to a definition
through hierarchies
⢠Bitcoin Blockchain
⢠Blockchain Technology
⢠Distributed Ledger Technology
⢠Distributed Databases
â Sebastian Meuiner
6. How does Blockchain work
A wants to send
value to B1
The transaction is
represented online as
a âBlockâ2 The block is broadcast to
every party in the network3
Those in the
network approve the
transaction is valid4
The block then can be added to the chain, which
provides an indelible and transparent record of
transactions5 The value moves
from A toB6
6
7. 7
Blockchain as High Interest of Market
DIGITAL CONTENT
STORAGE/DELIVERY/SHARING
Storj.uo, Filecoin, MaidSafe, ArtPlus, Bysantyum, Blockparti, Enigma, datum
CONTENT MONETIZATION
Streamium, Stream, CIVIL, Synereo, STEEM
COMPUTATION
Golem, MYCELIA, UJO, RNDR, elastic, iexec
DEVELOPMENT TOOLS
EOS, Ethereum, NEO, RSK, TrueBit, RAIDEN, Oraclize, ZEPPELIN, Coala IP, Grello, Cosmos, Simple
Token, NuCypher, Rockchain, IOTA, Byteball
SUPPLY CHAIN/LOGISTICS
TMINING, Kouvola.innovation, sweetbridge, MONAX, orogontrail
ENTERTAINMENT
SOCIAL
Steemit, KIN, flixxo, props, Mastodon
GAMING/ESPORTS/GAMBLING
Flux, CIRST BLOOD, EnjinCoin, Bison, Dmarket, UNIKOIN, BitQuest, HERO, FunFair
VIDEO & VR
Livepeer, Decentraland
DIGITAL OPERATIONS & TRANSACTIONS
PEER-TO-PEER TRANSACTIONS
BTC Jam, Codius, BitBond, BitnPlay, DeBuNe
AUTHENTICITY
Data, FACTOM, TIERION
TICKETING
Guts, Aventus, Blocktix, TicketChain
DIGITAL IDENTITY
PROTECTS PRIVACY OF CONSUMERS
Sho Card, Uniquid, Onename, Trustatorm
AUTHENTICATION & AUTHERIZATION
REMME.io, The Real McCoy, Degree of Trust, Everpass, BlockVerify
INSURANCE
INSUREX, ai gang, chainThat, Etherisc
FINTECH
CURRENCIES
Coinbase, Bilion, Ripple, Stellar, Funds.org, MeXBT, CryptoSigma, Bitcoin, CoinJoin
DIAMONDS GOLD/SILVER
Everledger: DitShares, ReasAsset Co., DigitalTangible (Serica), Bit Reserve
TRADING/DEX/DIGITAl SECURITIES TRADING
Omise, raidEX, EverMarkets, EtherDelta, HitFin. DXMarkets, Kraken, BitShares
LENDING
Salt, Ripio, WeTrust, ETHLend
FUNDS/INVESTMENT MANAGEMENT
Iconomi, Numerai, Blockchain Capital
ENERGY
Singularity, PowerLedger, GRID
INTERNET OF THINGS
FOAM, IOTA, OAKEN, SIKORKA
BLOCKCHAIN
8. There is a difference
between identity and
access management
9. $6tn
/year
Will cost the
world crime
damages by 2021
>$150
mln
The average cost
of data breach in
2020
of all data
breaches were
enabled by weak
credentialing and
user
authentication
7/10
Cyber attacks
could be
prevented with
simple IT security
measures
>15
mln
consumers were
victims of
identity theft or
fraud in 2016
Cyber Security Facts
76%
9
10. Existing Problems
Centralized server
Weak protection
Human factor
Common Hack Attacks
⢠Phishing
⢠Brute Force
⢠Bucket Brigade
⢠Keylogging
⢠Server access hacking
⢠Password reuse attack
10
12. It is a set of attributes that identify a person as a real individual both in online and
offline world.
Offline
Personal data
(First name, Second name, birthdate)
Passport details
Social security number
Driver license
Online
E-mail address
Phone number
Digital signature
What is identity?
12
14. Identity Management is responsible
for userâs identifying attributes
Individuals identification in the system (e.g.
government portal or enterprise network) is based on
the attributes related with a particular identity.
Identity management
15. ⢠Slow paperwork and complicated digital processes
⢠Possible data manipulation
⢠No common informational environment
⢠Unreliable intermediaries
Identity management
challenges
15
16. Online passport allowing online and offline
identification
⢠Faster and cheaper identification
⢠Protection from external and internal security threats, such as
hacking and internal fraud
⢠Unified data storage
⢠No intermediaries - direct access to data
⢠Zero knowledge-proof
⢠User controls his identity information
Solution
17. Identity verificationSocial Media
Hotels &
Restaurants Extra personal
information:
⢠Address
⢠Height & Weight
⢠Bank information
⢠Hair & eye color etc.
Online & Virtual
Services
⢠Citizens should own their data and manage
their identities
⢠Contemporary forms of authentication and
identification are insecure and insufficient
⢠There is a need for a new form of digital
identification
The Blockchain allows to create a form of authentication that grants access to certain information and eliminates the need for each service provider to store credentials
for every client. The Blockchain offers this approach decentralizing the ownership of credentials and offering a universally available protocol for verifying oneâs record in a
immutable chain of data.
Stores
Booking Services
Public Services
Government and
Digital Identification
17
18. Biometrics is an identity based on human
characteristics.
⢠Fingerprint
⢠Palm veins and palm print
⢠Face recognition
⢠DNA
⢠Hand geometry
⢠Face ID
⢠Iris recognition
⢠Retina
⢠Odour/scent
Biometrics as an identity
tool
20. ⢠Basic identity information collection and analysis
⢠Verifying identities via specialized lists
⢠Checking risks in terms of propensity to commit
money laundering, terrorist finance, or identity theft
⢠Analyzing and monitoring customerâs transactional
behavior
Know your customer
Know your customer (KYC) is the business process
based on identifying and verifying the identity of
clients.
20
21. Access Management
approves/denies access to services
basing on validation of these
attributes.
Access management regulates usersâ access to
services considering their identities and authorization
results.
Access management
22. ⢠Efficient management of access to vital
systems
⢠Orphan accounts
⢠Lack of monitoring
⢠Proper approve of identityâs access rights
⢠Complex deployment
Access management
challenges
22
23. ⢠Automated processes
⢠Immutable event recording
⢠Cheaper and infallible access rights verification
⢠Easy and fast deployment
⢠Duplicate entries prevention
⢠Users manage access
Solution
A decentralized platform that recognizes users
identities and regulates their access permissions
accordingly relevant attributes
26. OAuth
Open Authorization is an open standard that allows users to give
websites and applications access to their information on other
resources (e.g. Google, Facebook, Microsoft, Twitter) without
disclosing their password.
⢠Ownership consent and access delegation
⢠No passwords
⢠Usage of access tokens to access the resources
⢠Access is provided by the approval of the resource owner
Main features:
27. Remme.io
Ukrainian project REMME is a simple and easy to use platform
for digital identity and access management.
It is made to protect usersâ personal data in web, mobile apps or
critical infrastructure applications.
Remme is a distributed 3-layer access management security
solution.
⢠No Passwords
⢠SSL (x.509 certificate) and Blokchcain technology
⢠Distributed â no single point of failure
⢠Easy integration
⢠Multiple accounts
⢠Two-factor authentication
⢠Biometrics authentication
Main features: