SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Identity and access
management
Facts. Challenges. Solutions
Jan Keil
October 2017
Almost 20 years of experience in the IT industry.
Currently, Jan Keil is a Vice President of Marketing at Infopulse.
Previously, ran several companies as CEO and start-ups as Business
Angel.
Acted as interim manager for several international IT projects and
well-known companies.
Since 2015 is heavily involved in the Blockchain projects
development.
Jan Keil
2
'First they ignore you.
Then they laugh at you.
Then they attack you.
Then you win.'
– Mohandas Gandhi
4
Blockchain – the fifth disruptive computing
paradigm
1970s
Mainframe
1980s
PC
1990s
Internet
2000s
Social-Mobile
2010s
Blockchain
5
Getting closer to a definition
through hierarchies
• Bitcoin Blockchain
• Blockchain Technology
• Distributed Ledger Technology
• Distributed Databases
– Sebastian Meuiner
How does Blockchain work
A wants to send
value to B1
The transaction is
represented online as
a “Block”2 The block is broadcast to
every party in the network3
Those in the
network approve the
transaction is valid4
The block then can be added to the chain, which
provides an indelible and transparent record of
transactions5 The value moves
from A toB6
6
7
Blockchain as High Interest of Market
DIGITAL CONTENT
STORAGE/DELIVERY/SHARING
Storj.uo, Filecoin, MaidSafe, ArtPlus, Bysantyum, Blockparti, Enigma, datum
CONTENT MONETIZATION
Streamium, Stream, CIVIL, Synereo, STEEM
COMPUTATION
Golem, MYCELIA, UJO, RNDR, elastic, iexec
DEVELOPMENT TOOLS
EOS, Ethereum, NEO, RSK, TrueBit, RAIDEN, Oraclize, ZEPPELIN, Coala IP, Grello, Cosmos, Simple
Token, NuCypher, Rockchain, IOTA, Byteball
SUPPLY CHAIN/LOGISTICS
TMINING, Kouvola.innovation, sweetbridge, MONAX, orogontrail
ENTERTAINMENT
SOCIAL
Steemit, KIN, flixxo, props, Mastodon
GAMING/ESPORTS/GAMBLING
Flux, CIRST BLOOD, EnjinCoin, Bison, Dmarket, UNIKOIN, BitQuest, HERO, FunFair
VIDEO & VR
Livepeer, Decentraland
DIGITAL OPERATIONS & TRANSACTIONS
PEER-TO-PEER TRANSACTIONS
BTC Jam, Codius, BitBond, BitnPlay, DeBuNe
AUTHENTICITY
Data, FACTOM, TIERION
TICKETING
Guts, Aventus, Blocktix, TicketChain
DIGITAL IDENTITY
PROTECTS PRIVACY OF CONSUMERS
Sho Card, Uniquid, Onename, Trustatorm
AUTHENTICATION & AUTHERIZATION
REMME.io, The Real McCoy, Degree of Trust, Everpass, BlockVerify
INSURANCE
INSUREX, ai gang, chainThat, Etherisc
FINTECH
CURRENCIES
Coinbase, Bilion, Ripple, Stellar, Funds.org, MeXBT, CryptoSigma, Bitcoin, CoinJoin
DIAMONDS GOLD/SILVER
Everledger: DitShares, ReasAsset Co., DigitalTangible (Serica), Bit Reserve
TRADING/DEX/DIGITAl SECURITIES TRADING
Omise, raidEX, EverMarkets, EtherDelta, HitFin. DXMarkets, Kraken, BitShares
LENDING
Salt, Ripio, WeTrust, ETHLend
FUNDS/INVESTMENT MANAGEMENT
Iconomi, Numerai, Blockchain Capital
ENERGY
Singularity, PowerLedger, GRID
INTERNET OF THINGS
FOAM, IOTA, OAKEN, SIKORKA
BLOCKCHAIN
There is a difference
between identity and
access management
$6tn
/year
Will cost the
world crime
damages by 2021
>$150
mln
The average cost
of data breach in
2020
of all data
breaches were
enabled by weak
credentialing and
user
authentication
7/10
Cyber attacks
could be
prevented with
simple IT security
measures
>15
mln
consumers were
victims of
identity theft or
fraud in 2016
Cyber Security Facts
76%
9
Existing Problems
Centralized server
Weak protection
Human factor
Common Hack Attacks
• Phishing
• Brute Force
• Bucket Brigade
• Keylogging
• Server access hacking
• Password reuse attack
10
Identity as entity
confirmation
It is a set of attributes that identify a person as a real individual both in online and
offline world.
Offline
Personal data
(First name, Second name, birthdate)
Passport details
Social security number
Driver license
Online
E-mail address
Phone number
Digital signature
What is identity?
12
Exploring Digital Identity
13
Identity Management is responsible
for user’s identifying attributes
Individuals identification in the system (e.g.
government portal or enterprise network) is based on
the attributes related with a particular identity.
Identity management
• Slow paperwork and complicated digital processes
• Possible data manipulation
• No common informational environment
• Unreliable intermediaries
Identity management
challenges
15
Online passport allowing online and offline
identification
• Faster and cheaper identification
• Protection from external and internal security threats, such as
hacking and internal fraud
• Unified data storage
• No intermediaries - direct access to data
• Zero knowledge-proof
• User controls his identity information
Solution
Identity verificationSocial Media
Hotels &
Restaurants Extra personal
information:
• Address
• Height & Weight
• Bank information
• Hair & eye color etc.
Online & Virtual
Services
• Citizens should own their data and manage
their identities
• Contemporary forms of authentication and
identification are insecure and insufficient
• There is a need for a new form of digital
identification
The Blockchain allows to create a form of authentication that grants access to certain information and eliminates the need for each service provider to store credentials
for every client. The Blockchain offers this approach decentralizing the ownership of credentials and offering a universally available protocol for verifying one’s record in a
immutable chain of data.
Stores
Booking Services
Public Services
Government and
Digital Identification
17
Biometrics is an identity based on human
characteristics.
• Fingerprint
• Palm veins and palm print
• Face recognition
• DNA
• Hand geometry
• Face ID
• Iris recognition
• Retina
• Odour/scent
Biometrics as an identity
tool
Business identity
management
Know your customer
• Basic identity information collection and analysis
• Verifying identities via specialized lists
• Checking risks in terms of propensity to commit
money laundering, terrorist finance, or identity theft
• Analyzing and monitoring customer’s transactional
behavior
Know your customer
Know your customer (KYC) is the business process
based on identifying and verifying the identity of
clients.
20
Access Management
approves/denies access to services
basing on validation of these
attributes.
Access management regulates users’ access to
services considering their identities and authorization
results.
Access management
• Efficient management of access to vital
systems
• Orphan accounts
• Lack of monitoring
• Proper approve of identity’s access rights
• Complex deployment
Access management
challenges
22
• Automated processes
• Immutable event recording
• Cheaper and infallible access rights verification
• Easy and fast deployment
• Duplicate entries prevention
• Users manage access
Solution
A decentralized platform that recognizes users
identities and regulates their access permissions
accordingly relevant attributes
Identity and access
management
case studies
25
OAuth
OAuth
Open Authorization is an open standard that allows users to give
websites and applications access to their information on other
resources (e.g. Google, Facebook, Microsoft, Twitter) without
disclosing their password.
• Ownership consent and access delegation
• No passwords
• Usage of access tokens to access the resources
• Access is provided by the approval of the resource owner
Main features:
Remme.io
Ukrainian project REMME is a simple and easy to use platform
for digital identity and access management.
It is made to protect users’ personal data in web, mobile apps or
critical infrastructure applications.
Remme is a distributed 3-layer access management security
solution.
• No Passwords
• SSL (x.509 certificate) and Blokchcain technology
• Distributed – no single point of failure
• Easy integration
• Multiple accounts
• Two-factor authentication
• Biometrics authentication
Main features:
jan.keil@infopulse.com
Contact:

Weitere ähnliche Inhalte

Was ist angesagt?

Business of Decentralized Finance: Economics, Finance, and Business aspects o...
Business of Decentralized Finance: Economics, Finance, and Business aspects o...Business of Decentralized Finance: Economics, Finance, and Business aspects o...
Business of Decentralized Finance: Economics, Finance, and Business aspects o...
Sam Ghosh
 
FirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market MapFirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market Map
Richard Warren
 
Use Cases
Use CasesUse Cases
Use Cases
Don Klos
 
Cva asset tokenization_paper_v1.2_15122019 Tokenisasi aset Swiss
Cva asset tokenization_paper_v1.2_15122019 Tokenisasi aset SwissCva asset tokenization_paper_v1.2_15122019 Tokenisasi aset Swiss
Cva asset tokenization_paper_v1.2_15122019 Tokenisasi aset Swiss
Rein Mahatma
 
Digital currencies new technology new business model
Digital currencies new technology new business modelDigital currencies new technology new business model
Digital currencies new technology new business model
Shiva Bissessar
 

Was ist angesagt? (20)

Unlocking Blockchain’s Potential
Unlocking Blockchain’s PotentialUnlocking Blockchain’s Potential
Unlocking Blockchain’s Potential
 
Business of Decentralized Finance: Economics, Finance, and Business aspects o...
Business of Decentralized Finance: Economics, Finance, and Business aspects o...Business of Decentralized Finance: Economics, Finance, and Business aspects o...
Business of Decentralized Finance: Economics, Finance, and Business aspects o...
 
FirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market MapFirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market Map
 
Bitcoin blockchain: defeated challenges and foreseen the technical developmen...
Bitcoin blockchain: defeated challenges and foreseen the technical developmen...Bitcoin blockchain: defeated challenges and foreseen the technical developmen...
Bitcoin blockchain: defeated challenges and foreseen the technical developmen...
 
Disadvantages and Advantages of Blockchain
Disadvantages and Advantages of BlockchainDisadvantages and Advantages of Blockchain
Disadvantages and Advantages of Blockchain
 
The Evolution of E-Money
The Evolution of E-MoneyThe Evolution of E-Money
The Evolution of E-Money
 
Use Cases
Use CasesUse Cases
Use Cases
 
Cva asset tokenization_paper_v1.2_15122019 Tokenisasi aset Swiss
Cva asset tokenization_paper_v1.2_15122019 Tokenisasi aset SwissCva asset tokenization_paper_v1.2_15122019 Tokenisasi aset Swiss
Cva asset tokenization_paper_v1.2_15122019 Tokenisasi aset Swiss
 
Regulation & law in the Bitcoin era: analysis and perspectives | Stefano Capa...
Regulation & law in the Bitcoin era: analysis and perspectives | Stefano Capa...Regulation & law in the Bitcoin era: analysis and perspectives | Stefano Capa...
Regulation & law in the Bitcoin era: analysis and perspectives | Stefano Capa...
 
Hacking Finance: Crypto & Math based Currencies, Smart contracts and Blockch...
Hacking Finance: Crypto & Math based Currencies, Smart contracts  and Blockch...Hacking Finance: Crypto & Math based Currencies, Smart contracts  and Blockch...
Hacking Finance: Crypto & Math based Currencies, Smart contracts and Blockch...
 
Introduction to the Blockchain - August 28, 2018
Introduction to the Blockchain - August 28, 2018Introduction to the Blockchain - August 28, 2018
Introduction to the Blockchain - August 28, 2018
 
The journey of an innovative and disruptive technology in a big and organized...
The journey of an innovative and disruptive technology in a big and organized...The journey of an innovative and disruptive technology in a big and organized...
The journey of an innovative and disruptive technology in a big and organized...
 
Initial Thoughts on Regulation for Bitcoin and Virtual Currencies
Initial Thoughts on Regulation for Bitcoin and Virtual CurrenciesInitial Thoughts on Regulation for Bitcoin and Virtual Currencies
Initial Thoughts on Regulation for Bitcoin and Virtual Currencies
 
Blockchain technology and applications from a financial perspective
Blockchain technology and applications from a financial perspectiveBlockchain technology and applications from a financial perspective
Blockchain technology and applications from a financial perspective
 
The Blockchain Economy | William Mougayar | Blockchain Conf
The Blockchain Economy | William Mougayar | Blockchain ConfThe Blockchain Economy | William Mougayar | Blockchain Conf
The Blockchain Economy | William Mougayar | Blockchain Conf
 
Introduction to Blockchain and Cryptocurrencies
Introduction to Blockchain and CryptocurrenciesIntroduction to Blockchain and Cryptocurrencies
Introduction to Blockchain and Cryptocurrencies
 
Regulation in the Digital Era? Some thoughts on the Blockchain | Marta Ghigli...
Regulation in the Digital Era? Some thoughts on the Blockchain | Marta Ghigli...Regulation in the Digital Era? Some thoughts on the Blockchain | Marta Ghigli...
Regulation in the Digital Era? Some thoughts on the Blockchain | Marta Ghigli...
 
Cryptocurrencies: The Mechanics Economic and Finance
Cryptocurrencies: The Mechanics Economic and FinanceCryptocurrencies: The Mechanics Economic and Finance
Cryptocurrencies: The Mechanics Economic and Finance
 
Blockchain use cases
Blockchain use casesBlockchain use cases
Blockchain use cases
 
Digital currencies new technology new business model
Digital currencies new technology new business modelDigital currencies new technology new business model
Digital currencies new technology new business model
 

Ähnlich wie Jan Keil - Identity and access management Facts. Challenges. Solution

KYC using Blockchain
KYC using BlockchainKYC using Blockchain
KYC using Blockchain
ijtsrd
 

Ähnlich wie Jan Keil - Identity and access management Facts. Challenges. Solution (20)

Hiberus Experience - Fundamentos de Blockchain
Hiberus Experience - Fundamentos de BlockchainHiberus Experience - Fundamentos de Blockchain
Hiberus Experience - Fundamentos de Blockchain
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
Blockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable ThingsBlockchain Perspective - Internet of Memorable Things
Blockchain Perspective - Internet of Memorable Things
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Manie Eagar lecture at Rotman School of Management
Manie Eagar lecture at Rotman School of ManagementManie Eagar lecture at Rotman School of Management
Manie Eagar lecture at Rotman School of Management
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
Blockchain in HR
Blockchain in HRBlockchain in HR
Blockchain in HR
 
Shift Money 2019 - The future of DLT and its applications in the financial se...
Shift Money 2019 - The future of DLT and its applications in the financial se...Shift Money 2019 - The future of DLT and its applications in the financial se...
Shift Money 2019 - The future of DLT and its applications in the financial se...
 
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
 
Blockchain Trends & Business Cases
Blockchain Trends & Business CasesBlockchain Trends & Business Cases
Blockchain Trends & Business Cases
 
Banking on the Blockchain: Where we began, where we're Headed
Banking on the Blockchain: Where we began, where we're HeadedBanking on the Blockchain: Where we began, where we're Headed
Banking on the Blockchain: Where we began, where we're Headed
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
 
Blockchain@next18 event
Blockchain@next18 eventBlockchain@next18 event
Blockchain@next18 event
 
The coin tree summarized 10-15
The coin tree   summarized 10-15The coin tree   summarized 10-15
The coin tree summarized 10-15
 
The Coin Tree media kit deck
The Coin Tree   media kit deckThe Coin Tree   media kit deck
The Coin Tree media kit deck
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
KYC using Blockchain
KYC using BlockchainKYC using Blockchain
KYC using Blockchain
 
How Does Blockchain Identity Management Revolutionise Financial Sectors.pdf
How Does Blockchain Identity Management Revolutionise Financial Sectors.pdfHow Does Blockchain Identity Management Revolutionise Financial Sectors.pdf
How Does Blockchain Identity Management Revolutionise Financial Sectors.pdf
 
ConfĂŠrence - Digital Identity and Blockchain - #ACSS2019
ConfĂŠrence - Digital Identity and Blockchain - #ACSS2019ConfĂŠrence - Digital Identity and Blockchain - #ACSS2019
ConfĂŠrence - Digital Identity and Blockchain - #ACSS2019
 

Mehr von Timetogrowup

IT Sales Kyiv - Дмитрий Моцьо
IT Sales Kyiv - Дмитрий МоцьоIT Sales Kyiv - Дмитрий Моцьо
IT Sales Kyiv - Дмитрий Моцьо
Timetogrowup
 
IT Sales Kyiv - Антон Федулов
IT Sales Kyiv - Антон ФедуловIT Sales Kyiv - Антон Федулов
IT Sales Kyiv - Антон Федулов
Timetogrowup
 

Mehr von Timetogrowup (20)

Розробка стратегії з нуля
Розробка стратегії з нуляРозробка стратегії з нуля
Розробка стратегії з нуля
 
Володимир Коваль
Володимир КовальВолодимир Коваль
Володимир Коваль
 
Олена Григорчук
Олена ГригорчукОлена Григорчук
Олена Григорчук
 
Уляна Країнська
Уляна КраїнськаУляна Країнська
Уляна Країнська
 
Роман Дерега
Роман ДерегаРоман Дерега
Роман Дерега
 
Андрій Чорний
Андрій ЧорнийАндрій Чорний
Андрій Чорний
 
Kind geek ultimate-sales-guide-2018
Kind geek ultimate-sales-guide-2018Kind geek ultimate-sales-guide-2018
Kind geek ultimate-sales-guide-2018
 
Oleksiy Davydenko
Oleksiy DavydenkoOleksiy Davydenko
Oleksiy Davydenko
 
Ваче Давтян - Убийцы продаж
Ваче Давтян - Убийцы продажВаче Давтян - Убийцы продаж
Ваче Давтян - Убийцы продаж
 
Андрей Чекмарёв - Сприяння та перешкоди у професії продажів
Андрей Чекмарёв - Сприяння та перешкоди у професії продажівАндрей Чекмарёв - Сприяння та перешкоди у професії продажів
Андрей Чекмарёв - Сприяння та перешкоди у професії продажів
 
Артем Биковець - Agile at scale: Сhallenges & Fails
Артем Биковець - Agile at scale: Сhallenges & FailsАртем Биковець - Agile at scale: Сhallenges & Fails
Артем Биковець - Agile at scale: Сhallenges & Fails
 
Константин Коптелов - Objective and Key Results Framework
Константин Коптелов - Objective and Key Results FrameworkКонстантин Коптелов - Objective and Key Results Framework
Константин Коптелов - Objective and Key Results Framework
 
Максим Вишневський - Team scale
Максим Вишневський - Team scaleМаксим Вишневський - Team scale
Максим Вишневський - Team scale
 
Максим Ткаченко - Ефективні техніки продажів
Максим Ткаченко - Ефективні техніки продажівМаксим Ткаченко - Ефективні техніки продажів
Максим Ткаченко - Ефективні техніки продажів
 
Uliana Krainska - Lead Generation Channels and Pre-Sales Activities in IT Co...
Uliana Krainska - Lead Generation Channels  and Pre-Sales Activities in IT Co...Uliana Krainska - Lead Generation Channels  and Pre-Sales Activities in IT Co...
Uliana Krainska - Lead Generation Channels and Pre-Sales Activities in IT Co...
 
Olena Grygorchuk - Refactor your understandings about Agile development
Olena Grygorchuk - Refactor your understandings about Agile developmentOlena Grygorchuk - Refactor your understandings about Agile development
Olena Grygorchuk - Refactor your understandings about Agile development
 
Andriy Mudryy - Agile it All!
Andriy Mudryy - Agile it All!Andriy Mudryy - Agile it All!
Andriy Mudryy - Agile it All!
 
IT Sales Kyiv - Дмитрий Моцьо
IT Sales Kyiv - Дмитрий МоцьоIT Sales Kyiv - Дмитрий Моцьо
IT Sales Kyiv - Дмитрий Моцьо
 
IT Sales Kyiv - Антон Федулов
IT Sales Kyiv - Антон ФедуловIT Sales Kyiv - Антон Федулов
IT Sales Kyiv - Антон Федулов
 
Orysya Sklyar - Calls
Orysya Sklyar - CallsOrysya Sklyar - Calls
Orysya Sklyar - Calls
 

KĂźrzlich hochgeladen

FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdfFOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
Cocity Enterprises
 
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadh
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadhabortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadh
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadh
samsungultra782445
 
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammamAbortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
samsungultra782445
 
Economics Presentation-2.pdf xxjshshsjsjsjwjw
Economics Presentation-2.pdf xxjshshsjsjsjwjwEconomics Presentation-2.pdf xxjshshsjsjsjwjw
Economics Presentation-2.pdf xxjshshsjsjsjwjw
mordockmatt25
 
In Sharjah ௾(+971)558539980 *_௾abortion pills now available.
In Sharjah ௾(+971)558539980 *_௾abortion pills now available.In Sharjah ௾(+971)558539980 *_௾abortion pills now available.
In Sharjah ௾(+971)558539980 *_௾abortion pills now available.
hyt3577
 
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
Health
 
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnLaw of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
TintoTom3
 
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdfMASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
Cocity Enterprises
 

KĂźrzlich hochgeladen (20)

Avoidable Errors in Payroll Compliance for Payroll Services Providers - Globu...
Avoidable Errors in Payroll Compliance for Payroll Services Providers - Globu...Avoidable Errors in Payroll Compliance for Payroll Services Providers - Globu...
Avoidable Errors in Payroll Compliance for Payroll Services Providers - Globu...
 
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdfFOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
 
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
 
Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...
 
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunities
 
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadh
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadhabortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadh
abortion pills in Jeddah Saudi Arabia (+919707899604)cytotec pills in Riyadh
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammamAbortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
 
Economics Presentation-2.pdf xxjshshsjsjsjwjw
Economics Presentation-2.pdf xxjshshsjsjsjwjwEconomics Presentation-2.pdf xxjshshsjsjsjwjw
Economics Presentation-2.pdf xxjshshsjsjsjwjw
 
In Sharjah ௾(+971)558539980 *_௾abortion pills now available.
In Sharjah ௾(+971)558539980 *_௾abortion pills now available.In Sharjah ௾(+971)558539980 *_௾abortion pills now available.
In Sharjah ௾(+971)558539980 *_௾abortion pills now available.
 
Responsible Finance Principles and Implication
Responsible Finance Principles and ImplicationResponsible Finance Principles and Implication
Responsible Finance Principles and Implication
 
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
+97470301568>>buy weed in qatar,buy thc oil in qatar doha>>buy cannabis oil i...
 
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & RequirementsExplore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
 
Group 8 - Goldman Sachs & 1MDB Case Studies
Group 8 - Goldman Sachs & 1MDB Case StudiesGroup 8 - Goldman Sachs & 1MDB Case Studies
Group 8 - Goldman Sachs & 1MDB Case Studies
 
FE Credit and SMBC Acquisition Case Studies
FE Credit and SMBC Acquisition Case StudiesFE Credit and SMBC Acquisition Case Studies
FE Credit and SMBC Acquisition Case Studies
 
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnLaw of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
 
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdfMASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 

Jan Keil - Identity and access management Facts. Challenges. Solution

  • 1. Identity and access management Facts. Challenges. Solutions Jan Keil October 2017
  • 2. Almost 20 years of experience in the IT industry. Currently, Jan Keil is a Vice President of Marketing at Infopulse. Previously, ran several companies as CEO and start-ups as Business Angel. Acted as interim manager for several international IT projects and well-known companies. Since 2015 is heavily involved in the Blockchain projects development. Jan Keil 2
  • 3. 'First they ignore you. Then they laugh at you. Then they attack you. Then you win.' – Mohandas Gandhi
  • 4. 4 Blockchain – the fifth disruptive computing paradigm 1970s Mainframe 1980s PC 1990s Internet 2000s Social-Mobile 2010s Blockchain
  • 5. 5 Getting closer to a definition through hierarchies • Bitcoin Blockchain • Blockchain Technology • Distributed Ledger Technology • Distributed Databases – Sebastian Meuiner
  • 6. How does Blockchain work A wants to send value to B1 The transaction is represented online as a “Block”2 The block is broadcast to every party in the network3 Those in the network approve the transaction is valid4 The block then can be added to the chain, which provides an indelible and transparent record of transactions5 The value moves from A toB6 6
  • 7. 7 Blockchain as High Interest of Market DIGITAL CONTENT STORAGE/DELIVERY/SHARING Storj.uo, Filecoin, MaidSafe, ArtPlus, Bysantyum, Blockparti, Enigma, datum CONTENT MONETIZATION Streamium, Stream, CIVIL, Synereo, STEEM COMPUTATION Golem, MYCELIA, UJO, RNDR, elastic, iexec DEVELOPMENT TOOLS EOS, Ethereum, NEO, RSK, TrueBit, RAIDEN, Oraclize, ZEPPELIN, Coala IP, Grello, Cosmos, Simple Token, NuCypher, Rockchain, IOTA, Byteball SUPPLY CHAIN/LOGISTICS TMINING, Kouvola.innovation, sweetbridge, MONAX, orogontrail ENTERTAINMENT SOCIAL Steemit, KIN, flixxo, props, Mastodon GAMING/ESPORTS/GAMBLING Flux, CIRST BLOOD, EnjinCoin, Bison, Dmarket, UNIKOIN, BitQuest, HERO, FunFair VIDEO & VR Livepeer, Decentraland DIGITAL OPERATIONS & TRANSACTIONS PEER-TO-PEER TRANSACTIONS BTC Jam, Codius, BitBond, BitnPlay, DeBuNe AUTHENTICITY Data, FACTOM, TIERION TICKETING Guts, Aventus, Blocktix, TicketChain DIGITAL IDENTITY PROTECTS PRIVACY OF CONSUMERS Sho Card, Uniquid, Onename, Trustatorm AUTHENTICATION & AUTHERIZATION REMME.io, The Real McCoy, Degree of Trust, Everpass, BlockVerify INSURANCE INSUREX, ai gang, chainThat, Etherisc FINTECH CURRENCIES Coinbase, Bilion, Ripple, Stellar, Funds.org, MeXBT, CryptoSigma, Bitcoin, CoinJoin DIAMONDS GOLD/SILVER Everledger: DitShares, ReasAsset Co., DigitalTangible (Serica), Bit Reserve TRADING/DEX/DIGITAl SECURITIES TRADING Omise, raidEX, EverMarkets, EtherDelta, HitFin. DXMarkets, Kraken, BitShares LENDING Salt, Ripio, WeTrust, ETHLend FUNDS/INVESTMENT MANAGEMENT Iconomi, Numerai, Blockchain Capital ENERGY Singularity, PowerLedger, GRID INTERNET OF THINGS FOAM, IOTA, OAKEN, SIKORKA BLOCKCHAIN
  • 8. There is a difference between identity and access management
  • 9. $6tn /year Will cost the world crime damages by 2021 >$150 mln The average cost of data breach in 2020 of all data breaches were enabled by weak credentialing and user authentication 7/10 Cyber attacks could be prevented with simple IT security measures >15 mln consumers were victims of identity theft or fraud in 2016 Cyber Security Facts 76% 9
  • 10. Existing Problems Centralized server Weak protection Human factor Common Hack Attacks • Phishing • Brute Force • Bucket Brigade • Keylogging • Server access hacking • Password reuse attack 10
  • 12. It is a set of attributes that identify a person as a real individual both in online and offline world. Offline Personal data (First name, Second name, birthdate) Passport details Social security number Driver license Online E-mail address Phone number Digital signature What is identity? 12
  • 14. Identity Management is responsible for user’s identifying attributes Individuals identification in the system (e.g. government portal or enterprise network) is based on the attributes related with a particular identity. Identity management
  • 15. • Slow paperwork and complicated digital processes • Possible data manipulation • No common informational environment • Unreliable intermediaries Identity management challenges 15
  • 16. Online passport allowing online and offline identification • Faster and cheaper identification • Protection from external and internal security threats, such as hacking and internal fraud • Unified data storage • No intermediaries - direct access to data • Zero knowledge-proof • User controls his identity information Solution
  • 17. Identity verificationSocial Media Hotels & Restaurants Extra personal information: • Address • Height & Weight • Bank information • Hair & eye color etc. Online & Virtual Services • Citizens should own their data and manage their identities • Contemporary forms of authentication and identification are insecure and insufficient • There is a need for a new form of digital identification The Blockchain allows to create a form of authentication that grants access to certain information and eliminates the need for each service provider to store credentials for every client. The Blockchain offers this approach decentralizing the ownership of credentials and offering a universally available protocol for verifying one’s record in a immutable chain of data. Stores Booking Services Public Services Government and Digital Identification 17
  • 18. Biometrics is an identity based on human characteristics. • Fingerprint • Palm veins and palm print • Face recognition • DNA • Hand geometry • Face ID • Iris recognition • Retina • Odour/scent Biometrics as an identity tool
  • 20. • Basic identity information collection and analysis • Verifying identities via specialized lists • Checking risks in terms of propensity to commit money laundering, terrorist finance, or identity theft • Analyzing and monitoring customer’s transactional behavior Know your customer Know your customer (KYC) is the business process based on identifying and verifying the identity of clients. 20
  • 21. Access Management approves/denies access to services basing on validation of these attributes. Access management regulates users’ access to services considering their identities and authorization results. Access management
  • 22. • Efficient management of access to vital systems • Orphan accounts • Lack of monitoring • Proper approve of identity’s access rights • Complex deployment Access management challenges 22
  • 23. • Automated processes • Immutable event recording • Cheaper and infallible access rights verification • Easy and fast deployment • Duplicate entries prevention • Users manage access Solution A decentralized platform that recognizes users identities and regulates their access permissions accordingly relevant attributes
  • 26. OAuth Open Authorization is an open standard that allows users to give websites and applications access to their information on other resources (e.g. Google, Facebook, Microsoft, Twitter) without disclosing their password. • Ownership consent and access delegation • No passwords • Usage of access tokens to access the resources • Access is provided by the approval of the resource owner Main features:
  • 27. Remme.io Ukrainian project REMME is a simple and easy to use platform for digital identity and access management. It is made to protect users’ personal data in web, mobile apps or critical infrastructure applications. Remme is a distributed 3-layer access management security solution. • No Passwords • SSL (x.509 certificate) and Blokchcain technology • Distributed – no single point of failure • Easy integration • Multiple accounts • Two-factor authentication • Biometrics authentication Main features: