SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Own And ControlYour Identity: Identity
Management Using Blockchain
Mohan Venkataraman – CTO, Chainyard
Jake Gostylo – Director, Content Innovation, D&B | October 2019
2
Let’s look at the world today…
Own and Control Your Identity
The start to fighting all the business losses in fraud is
advances in identity and identity management
Fraud in the US is a $600B a year drain on business.
https://www.bizjournals.com/nashville/stories/2007/10/15/focus4.html
Globally, fake goods is a $500B a year problem.
https://www.oecd.org/newsroom/trade-in-fake-goods-is-now-33-of-world-trade-and-rising.htm
3
By way of introduction
Own and Control Your Identity
Jake Gostylo – Director of Data Innovation
Dun & Bradstreet: The global leader in commercial data offering
insights on over 330M entities globally through the Dun & Bradstreet
Data Cloud and solutions it powers.
MohanVenkataraman – CTO of Chainyard
In partnership with IBM and over 10 major brands we are launching
the TrustYour Supplier (TYS) network for supply chain onboarding.
AGENDA
• TheTYS Network
• Self-Sovereign Identities
• Decentralized ID
• Why Blockchain
• What is an attestation
• Why Dun & Bradstreet is interested in the business of
attestations
• How will business interactions improve
• What does this mean for IoT
• How does this scale for IoT applications
5Copyright © 2018 CHAINYARD™️
Create a
Trusted Source of Supplier
Information and Digital
Identity
O B J E C T I V E
Supplier Onboarding and Lifecycle Management
that simplifies and accelerates
Reduce
Cost
Mitigate
Risk
Shorten Cycle
Time
Create
TrustA Single SSI based Supplier Digital Passport
6
What is Identity?
–Identity is a set of characteristics that an entity (Person, Organization orThing)
identifies as belonging uniquely to them embodying both changeable and unchangeable
traits obtained naturally or provided by external bodies.
▪ Traditionally multiple identifiers issued by multiple bodies, centrally controlled, and can be
restricted or revoked by the identity issuer at will
–Self-sovereign identity, can be defined as a lifetime portable digital identity that does not
depend on any centralized authority.
▪ Its a new class of identifier that fulfills all four requirements: persistence, global resolvability,
cryptographic verifiability, and decentralization
Copyright ©
2018 CHAINYARD©
7
Why SSI?
–Enables a person, corporation or a thing to determine what constitutes their identity
–Securely share portions or in-full with one or more parties, claims made about their identity
in a verifiable manner
–Carry identity across geographic, business and economic boundaries
–Self manage claims and reputation by identity holder
–Enables issuers of verifiable claims to revoke or update the claims as information
surrounding them changes
Copyright ©
2018 CHAINYARD©
Leverages Decentralized PKI, Decentralized Identity and the Blockchain
8
TheTYS Decentralized Identifier (DID)
Copyright ©
2018 CHAINYARD©
DID with Base58 or Base64 Encoding
did:tys:<left 20 bytes(sha256_hash(did_public_key)
did:tys:2XhdfxCGMpz7MHEKBwbadCZd6aBd
Scheme
Namespace
Namespace Specific
Identifier
DID Document
Globally Unique Identifier that resolves to DID Document
9
Digital Identities in TYS
–DID : Digital Identity representing an Individual, Organization or Thing
–Pairwise DID : Digital Identity associated with a Relationship, and resolves to a private DDOC
document; (can be public) stored on sideDB or a private channel
Own and Control Your Identity
Supplier
(Holder)
Trust Anchor
(Verifier)
Supplier DID: did:tys:2XhdfxCGMpz7MHEKBwbadCZd6aBd
Insurer
(Issuer)
Relationship : did:tys:2CedfxABpz7MHEKBwbadFFd6aBc
Points to a private DID Documentissues
Insurance
Certificate
attests
Buyer
(Relying Party)
trusts
10
DIDs and Blockchain (TYS)
Own and Control Your Identity
Digital credential
Credential Provider
(Issuer)
Supplier
(Holder)
Issue
Receive Present
validate
Verify
(Verifier)
Buyer
(Relying Party)
DID API (create, update, revoke query) & Resolver API
Permissioned
Ledger Uploadpre
issuedcredential
http://www.tys.com/credentials/1490
11
Trust Your Supplier – Why Blockchain
Conventional Systems are open to error,fraud and inefficiency
• In conventional systems each participant has his own, separate database, or
ledger — increasing the possibility of human error or fraud
• Shared databases cannot prevent malicious activity. Hacked entities can corrupt
or destroy data in the shared database, making it invalid for everyone involved.
• Reliance on intermediaries for validation creates inefficiencies
• Often laden with manual processes, resulting in frequent delays and inefficiencies
Blockchain is designed for trust and secure trading
• Single, shared, tamper-evident ledger — once recorded, transactions cannot be altered
• Provides levels of error checking and transaction validity not obtainable in regular
shared databases.
• Data is guaranteed to be valid and reconciled against the data held by the others
participating on the Blockchain.
• Immutably records all details of a transaction end-to-end, reducing vulnerabilities.
Blockchain Provides a Trusted, Common, Single Version of the Truth
12
Historical Milestones for attestations
Own and Control Your Identity
1977 – The first algorithms published that provide provable
digital signature produced from a private key.
1988 – Commercially viable attestations of one cryptographic
artifact to another. Strict authority hierarchy.
1992 – Web of Trust introduced with PGP as a distributed way
to manage attestations. Graph techniques used to judge validity.
RSA
x.509
WoT
13
What is an attestation?
Own and Control Your Identity
{
@context: “https://schema.org
id: “did:tys:1234567890”,
name: “Gorman Manufacturing”,
sig: “8e1736ac625…”
}
Cryptographic Artifact Subject DID
Third Party DID
{
name:“Gorman Manufacturing”
}
Data
14
Where do attestations belong?
Own and Control Your Identity
Attestations should not be
pushed to a blockchain, not
even encrypted.
Blockchain
Hash(data + nonce)
Offchain Datastore
Encrypt(data)
15
Why does Dun & Bradstreet care about this?
Own and Control Your Identity
CHANGINGTHE PARADIGM
• Much more transparency in the process. No longer is the buyer is getting data
that the seller knows nothing about.
• Follows the strictest intent of General Data Protection Regulation (GDPR).
• Closer interaction with the entity we have data on will allow positive feedback
loop for increased data quality.
16
How will businesses benefit?
Own and Control Your Identity
RFP process can have the
vetting frontloaded. No
more going back to the
drawing board.
Suppliers have greater
transparency in how they
are presented.
The bottom line is that all parties get reliable data faster.
Suppliers don’t have to fill
out different questionnaires
for every engagement.
The number of necessary
touch points with third party
data decreases.
17
What does Identity look like in an IoT business context
IIC Presentation (Confidential)
Device
OwnerIdentity
Beneficial Owner
IoT Device
Reputation
Transaction on behalf of ownership
18
IoT, Identity and Blockchains
–IoTs play a critical role in enabling efficient, fraud and counterfeit proof, auditable supply chains
–Authenticating and authorization of IoT devices through digital identities is a critical aspect of
preventing intrusion and hacking of business processes
–IoT devices provide verifiable credentials and attest supply chain transactions
–IoT Devices can be applied for various purposes such as location capture, imaging, motion
detection, altitude, tilt, light exposure, route deviations, acceleration
–Smart Tags such as RFID, NFC Chips, Chemical and Optical Tags provide verifiable credentials
to products
–DIDs provide credentials to parties and/or assets in the supply chain such as product, suppliers,
transporters and logistics operators
–Combined with Digital Identities and Smart Tagging Technologies, IoT and Blockchain provide
higher levels of trust in ensuring supplier credibility and product authenticity
Own and Control Your Identity
19
IOT Landscape
Own and Control Your Identity
20
Supply Chain – From Seller to Buyer
Copyright ©
2018 CHAINYARD©
Logistics
This Photo(s) by Unknown Author is licensed
under CC BY
Company (Corp) Buyer (Corp.)
Buyer (Retail Store)FactorySupplier
Sales Order, Payment
ASN, Invoice
Fulfillment
Order
Supplier PO
Order
Delivery
Order
Transport
WH DC
Goods
Receipt
PoD 214
Consumer
Fraud can occur at any point within the Supply Chain
21
The Future ofVerifiable Credentials
IoT and Blockchain In Supply Chain
Own and Control Your Identity
Blockchain Assigns
DID
Manufacturer
Assigns Smart Tag
Maps to Product Code/Serial#
Retailer
Issues Proof of Cryptographically
Verifiable Proof-of-Purchase Cert.
Tokenization
Assigns Cryptographic ERC-20
Proof of Ownership Token
IoT Devices
Records Proof of Supply Chain
Process
F682BC0EF6CF00D777C2EA7AEFDD9B548A892
91728FD2C349D6A5E83BD77A85B
22
A Conceptual Architecture
Own and Control Your Identity
23
ThankYou

Weitere ähnliche Inhalte

Was ist angesagt?

DCG Bitcoin and Blockchain Tech Summit - Opening Remarks
DCG Bitcoin and Blockchain Tech Summit - Opening RemarksDCG Bitcoin and Blockchain Tech Summit - Opening Remarks
DCG Bitcoin and Blockchain Tech Summit - Opening RemarksDigital Currency Group
 
8 Decimal Capital Enterprise Solution Overview
8 Decimal Capital Enterprise Solution Overview8 Decimal Capital Enterprise Solution Overview
8 Decimal Capital Enterprise Solution OverviewRemi Gai
 
DeFi Beyond the Hype
DeFi Beyond the HypeDeFi Beyond the Hype
DeFi Beyond the HypeHarsha MV
 
Blockchain FinTech App | Land Registry
Blockchain FinTech App | Land RegistryBlockchain FinTech App | Land Registry
Blockchain FinTech App | Land RegistryBahaa Farouk
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemDr. Amarjeet Singh
 
Week 5 - Blockchain Economics: Strategic Value in Private Blockchain
Week 5 - Blockchain Economics: Strategic Value in Private Blockchain  Week 5 - Blockchain Economics: Strategic Value in Private Blockchain
Week 5 - Blockchain Economics: Strategic Value in Private Blockchain Roger Royse
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?Colleen Beck-Domanico
 
Cryptocurrency products from hashCash
Cryptocurrency products from hashCashCryptocurrency products from hashCash
Cryptocurrency products from hashCashHashCash Consultants
 
Blockchain FinTech PoC
Blockchain FinTech PoCBlockchain FinTech PoC
Blockchain FinTech PoCSanjeev Raman
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityKaryl Fowler
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsSanjeev Verma, PhD
 
How BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing IndustryHow BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing IndustryPromptCloud
 
Aurigraph Distributed Ledger Technology
Aurigraph Distributed Ledger TechnologyAurigraph Distributed Ledger Technology
Aurigraph Distributed Ledger TechnologySubbu Jois
 
Blockchain: the trust fabric for next generation digital identity management
Blockchain: the trust fabric for next generation  digital identity managementBlockchain: the trust fabric for next generation  digital identity management
Blockchain: the trust fabric for next generation digital identity managementEY
 
ISTA 2017 - Blockchain, beyond Bitcoin
ISTA 2017 - Blockchain, beyond BitcoinISTA 2017 - Blockchain, beyond Bitcoin
ISTA 2017 - Blockchain, beyond BitcoinVladimir Savchenko
 
Blockchain and Applications in Islamic Finance
Blockchain and Applications in Islamic FinanceBlockchain and Applications in Islamic Finance
Blockchain and Applications in Islamic FinanceRizal Mohd Nor
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsDr. Nikolaus Lipusch
 
How blockchain is changing finance
How blockchain is changing financeHow blockchain is changing finance
How blockchain is changing financeEY
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
 

Was ist angesagt? (20)

DCG Bitcoin and Blockchain Tech Summit - Opening Remarks
DCG Bitcoin and Blockchain Tech Summit - Opening RemarksDCG Bitcoin and Blockchain Tech Summit - Opening Remarks
DCG Bitcoin and Blockchain Tech Summit - Opening Remarks
 
8 Decimal Capital Enterprise Solution Overview
8 Decimal Capital Enterprise Solution Overview8 Decimal Capital Enterprise Solution Overview
8 Decimal Capital Enterprise Solution Overview
 
DeFi Beyond the Hype
DeFi Beyond the HypeDeFi Beyond the Hype
DeFi Beyond the Hype
 
Blockchain FinTech App | Land Registry
Blockchain FinTech App | Land RegistryBlockchain FinTech App | Land Registry
Blockchain FinTech App | Land Registry
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
 
Week 5 - Blockchain Economics: Strategic Value in Private Blockchain
Week 5 - Blockchain Economics: Strategic Value in Private Blockchain  Week 5 - Blockchain Economics: Strategic Value in Private Blockchain
Week 5 - Blockchain Economics: Strategic Value in Private Blockchain
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?
 
Cryptocurrency products from hashCash
Cryptocurrency products from hashCashCryptocurrency products from hashCash
Cryptocurrency products from hashCash
 
Blockchain FinTech PoC
Blockchain FinTech PoCBlockchain FinTech PoC
Blockchain FinTech PoC
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and Applications
 
How BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing IndustryHow BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing Industry
 
Aurigraph Distributed Ledger Technology
Aurigraph Distributed Ledger TechnologyAurigraph Distributed Ledger Technology
Aurigraph Distributed Ledger Technology
 
Blockchain: the trust fabric for next generation digital identity management
Blockchain: the trust fabric for next generation  digital identity managementBlockchain: the trust fabric for next generation  digital identity management
Blockchain: the trust fabric for next generation digital identity management
 
ISTA 2017 - Blockchain, beyond Bitcoin
ISTA 2017 - Blockchain, beyond BitcoinISTA 2017 - Blockchain, beyond Bitcoin
ISTA 2017 - Blockchain, beyond Bitcoin
 
Blockchain and Applications in Islamic Finance
Blockchain and Applications in Islamic FinanceBlockchain and Applications in Islamic Finance
Blockchain and Applications in Islamic Finance
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain Ecosystems
 
How blockchain is changing finance
How blockchain is changing financeHow blockchain is changing finance
How blockchain is changing finance
 
Blockchain & microsoft
Blockchain & microsoftBlockchain & microsoft
Blockchain & microsoft
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 

Ähnlich wie Barcelona presentationv6

Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Digipolis Antwerpen
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...NICSA
 
Making Blockchain Real for Business
Making Blockchain Real for BusinessMaking Blockchain Real for Business
Making Blockchain Real for BusinessBente Larsen
 
Jan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionJan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionTimetogrowup
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
Blockchain conference cwin18 mexico
Blockchain conference cwin18 mexicoBlockchain conference cwin18 mexico
Blockchain conference cwin18 mexicoCapgemini
 
The Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperThe Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperBen Rothke
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lrFuture Agenda
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationFIDO Alliance
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?ITU
 
Introduction to Blockchain-as-a-Service (BaaS)
Introduction to Blockchain-as-a-Service (BaaS)Introduction to Blockchain-as-a-Service (BaaS)
Introduction to Blockchain-as-a-Service (BaaS)Cygnet Infotech
 
5 ways blockchain improves business flexibility
5 ways blockchain improves business flexibility 5 ways blockchain improves business flexibility
5 ways blockchain improves business flexibility Cygnet Infotech
 
Blockchain for-enterprise
Blockchain for-enterpriseBlockchain for-enterprise
Blockchain for-enterpriseCapgemini
 
Cisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainCisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainMatteo Masi
 

Ähnlich wie Barcelona presentationv6 (20)

Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
NICSA Webinar | Reimaging the Future of the Fund Industry Through Emerging Te...
 
Making Blockchain Real for Business
Making Blockchain Real for BusinessMaking Blockchain Real for Business
Making Blockchain Real for Business
 
Hyperledger - MMA Impact Forum Brasil 2019
Hyperledger - MMA Impact Forum Brasil 2019Hyperledger - MMA Impact Forum Brasil 2019
Hyperledger - MMA Impact Forum Brasil 2019
 
Jan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionJan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. Solution
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Blockchain conference cwin18 mexico
Blockchain conference cwin18 mexicoBlockchain conference cwin18 mexico
Blockchain conference cwin18 mexico
 
The Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperThe Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White Paper
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?
 
Introduction to Blockchain-as-a-Service (BaaS)
Introduction to Blockchain-as-a-Service (BaaS)Introduction to Blockchain-as-a-Service (BaaS)
Introduction to Blockchain-as-a-Service (BaaS)
 
The coin tree summarized 10-15
The coin tree   summarized 10-15The coin tree   summarized 10-15
The coin tree summarized 10-15
 
5 ways blockchain improves business flexibility
5 ways blockchain improves business flexibility 5 ways blockchain improves business flexibility
5 ways blockchain improves business flexibility
 
Blockchain for-enterprise
Blockchain for-enterpriseBlockchain for-enterprise
Blockchain for-enterprise
 
Cisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainCisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & Blockchain
 
Velix.ID
Velix.ID Velix.ID
Velix.ID
 

Kürzlich hochgeladen

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Kürzlich hochgeladen (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Barcelona presentationv6

  • 1. Own And ControlYour Identity: Identity Management Using Blockchain Mohan Venkataraman – CTO, Chainyard Jake Gostylo – Director, Content Innovation, D&B | October 2019
  • 2. 2 Let’s look at the world today… Own and Control Your Identity The start to fighting all the business losses in fraud is advances in identity and identity management Fraud in the US is a $600B a year drain on business. https://www.bizjournals.com/nashville/stories/2007/10/15/focus4.html Globally, fake goods is a $500B a year problem. https://www.oecd.org/newsroom/trade-in-fake-goods-is-now-33-of-world-trade-and-rising.htm
  • 3. 3 By way of introduction Own and Control Your Identity Jake Gostylo – Director of Data Innovation Dun & Bradstreet: The global leader in commercial data offering insights on over 330M entities globally through the Dun & Bradstreet Data Cloud and solutions it powers. MohanVenkataraman – CTO of Chainyard In partnership with IBM and over 10 major brands we are launching the TrustYour Supplier (TYS) network for supply chain onboarding.
  • 4. AGENDA • TheTYS Network • Self-Sovereign Identities • Decentralized ID • Why Blockchain • What is an attestation • Why Dun & Bradstreet is interested in the business of attestations • How will business interactions improve • What does this mean for IoT • How does this scale for IoT applications
  • 5. 5Copyright © 2018 CHAINYARD™️ Create a Trusted Source of Supplier Information and Digital Identity O B J E C T I V E Supplier Onboarding and Lifecycle Management that simplifies and accelerates Reduce Cost Mitigate Risk Shorten Cycle Time Create TrustA Single SSI based Supplier Digital Passport
  • 6. 6 What is Identity? –Identity is a set of characteristics that an entity (Person, Organization orThing) identifies as belonging uniquely to them embodying both changeable and unchangeable traits obtained naturally or provided by external bodies. ▪ Traditionally multiple identifiers issued by multiple bodies, centrally controlled, and can be restricted or revoked by the identity issuer at will –Self-sovereign identity, can be defined as a lifetime portable digital identity that does not depend on any centralized authority. ▪ Its a new class of identifier that fulfills all four requirements: persistence, global resolvability, cryptographic verifiability, and decentralization Copyright © 2018 CHAINYARD©
  • 7. 7 Why SSI? –Enables a person, corporation or a thing to determine what constitutes their identity –Securely share portions or in-full with one or more parties, claims made about their identity in a verifiable manner –Carry identity across geographic, business and economic boundaries –Self manage claims and reputation by identity holder –Enables issuers of verifiable claims to revoke or update the claims as information surrounding them changes Copyright © 2018 CHAINYARD© Leverages Decentralized PKI, Decentralized Identity and the Blockchain
  • 8. 8 TheTYS Decentralized Identifier (DID) Copyright © 2018 CHAINYARD© DID with Base58 or Base64 Encoding did:tys:<left 20 bytes(sha256_hash(did_public_key) did:tys:2XhdfxCGMpz7MHEKBwbadCZd6aBd Scheme Namespace Namespace Specific Identifier DID Document Globally Unique Identifier that resolves to DID Document
  • 9. 9 Digital Identities in TYS –DID : Digital Identity representing an Individual, Organization or Thing –Pairwise DID : Digital Identity associated with a Relationship, and resolves to a private DDOC document; (can be public) stored on sideDB or a private channel Own and Control Your Identity Supplier (Holder) Trust Anchor (Verifier) Supplier DID: did:tys:2XhdfxCGMpz7MHEKBwbadCZd6aBd Insurer (Issuer) Relationship : did:tys:2CedfxABpz7MHEKBwbadFFd6aBc Points to a private DID Documentissues Insurance Certificate attests Buyer (Relying Party) trusts
  • 10. 10 DIDs and Blockchain (TYS) Own and Control Your Identity Digital credential Credential Provider (Issuer) Supplier (Holder) Issue Receive Present validate Verify (Verifier) Buyer (Relying Party) DID API (create, update, revoke query) & Resolver API Permissioned Ledger Uploadpre issuedcredential http://www.tys.com/credentials/1490
  • 11. 11 Trust Your Supplier – Why Blockchain Conventional Systems are open to error,fraud and inefficiency • In conventional systems each participant has his own, separate database, or ledger — increasing the possibility of human error or fraud • Shared databases cannot prevent malicious activity. Hacked entities can corrupt or destroy data in the shared database, making it invalid for everyone involved. • Reliance on intermediaries for validation creates inefficiencies • Often laden with manual processes, resulting in frequent delays and inefficiencies Blockchain is designed for trust and secure trading • Single, shared, tamper-evident ledger — once recorded, transactions cannot be altered • Provides levels of error checking and transaction validity not obtainable in regular shared databases. • Data is guaranteed to be valid and reconciled against the data held by the others participating on the Blockchain. • Immutably records all details of a transaction end-to-end, reducing vulnerabilities. Blockchain Provides a Trusted, Common, Single Version of the Truth
  • 12. 12 Historical Milestones for attestations Own and Control Your Identity 1977 – The first algorithms published that provide provable digital signature produced from a private key. 1988 – Commercially viable attestations of one cryptographic artifact to another. Strict authority hierarchy. 1992 – Web of Trust introduced with PGP as a distributed way to manage attestations. Graph techniques used to judge validity. RSA x.509 WoT
  • 13. 13 What is an attestation? Own and Control Your Identity { @context: “https://schema.org id: “did:tys:1234567890”, name: “Gorman Manufacturing”, sig: “8e1736ac625…” } Cryptographic Artifact Subject DID Third Party DID { name:“Gorman Manufacturing” } Data
  • 14. 14 Where do attestations belong? Own and Control Your Identity Attestations should not be pushed to a blockchain, not even encrypted. Blockchain Hash(data + nonce) Offchain Datastore Encrypt(data)
  • 15. 15 Why does Dun & Bradstreet care about this? Own and Control Your Identity CHANGINGTHE PARADIGM • Much more transparency in the process. No longer is the buyer is getting data that the seller knows nothing about. • Follows the strictest intent of General Data Protection Regulation (GDPR). • Closer interaction with the entity we have data on will allow positive feedback loop for increased data quality.
  • 16. 16 How will businesses benefit? Own and Control Your Identity RFP process can have the vetting frontloaded. No more going back to the drawing board. Suppliers have greater transparency in how they are presented. The bottom line is that all parties get reliable data faster. Suppliers don’t have to fill out different questionnaires for every engagement. The number of necessary touch points with third party data decreases.
  • 17. 17 What does Identity look like in an IoT business context IIC Presentation (Confidential) Device OwnerIdentity Beneficial Owner IoT Device Reputation Transaction on behalf of ownership
  • 18. 18 IoT, Identity and Blockchains –IoTs play a critical role in enabling efficient, fraud and counterfeit proof, auditable supply chains –Authenticating and authorization of IoT devices through digital identities is a critical aspect of preventing intrusion and hacking of business processes –IoT devices provide verifiable credentials and attest supply chain transactions –IoT Devices can be applied for various purposes such as location capture, imaging, motion detection, altitude, tilt, light exposure, route deviations, acceleration –Smart Tags such as RFID, NFC Chips, Chemical and Optical Tags provide verifiable credentials to products –DIDs provide credentials to parties and/or assets in the supply chain such as product, suppliers, transporters and logistics operators –Combined with Digital Identities and Smart Tagging Technologies, IoT and Blockchain provide higher levels of trust in ensuring supplier credibility and product authenticity Own and Control Your Identity
  • 19. 19 IOT Landscape Own and Control Your Identity
  • 20. 20 Supply Chain – From Seller to Buyer Copyright © 2018 CHAINYARD© Logistics This Photo(s) by Unknown Author is licensed under CC BY Company (Corp) Buyer (Corp.) Buyer (Retail Store)FactorySupplier Sales Order, Payment ASN, Invoice Fulfillment Order Supplier PO Order Delivery Order Transport WH DC Goods Receipt PoD 214 Consumer Fraud can occur at any point within the Supply Chain
  • 21. 21 The Future ofVerifiable Credentials IoT and Blockchain In Supply Chain Own and Control Your Identity Blockchain Assigns DID Manufacturer Assigns Smart Tag Maps to Product Code/Serial# Retailer Issues Proof of Cryptographically Verifiable Proof-of-Purchase Cert. Tokenization Assigns Cryptographic ERC-20 Proof of Ownership Token IoT Devices Records Proof of Supply Chain Process F682BC0EF6CF00D777C2EA7AEFDD9B548A892 91728FD2C349D6A5E83BD77A85B
  • 22. 22 A Conceptual Architecture Own and Control Your Identity