1. www.chyp.comPlease Copy and Distribute1
The Blockchain and Identity
The 3D-ID model and why we might want
to store CRUD on the shared ledger
Dutch Blockchain Congress
Amsterdam
June 2016
2. www.chyp.comPlease Copy and Distribute
David G.W. Birch
Director of Innovation at Consult Hyperion,
Visiting Professor, University of Surrey Business School
An internationally-recognised thought leader in
digital identity and digital money;
Named one of the global top 15 favourite sources of
business information (Wired magazine);
In the London FinTech top 10 most influential
commentators (City A.M.);
One of the top ten Twitter accounts followed by
innovators, along with Bill Gates and Richard
Branson (PR Daily);
One of the top ten most influential voices in banking
(Financial Brand);
Named one of the “Fintech Titans” (NextBank);
Ranked Europe’s most influential commentator on
emerging payments (Total Payments magazine).
2
3. www.chyp.comPlease Copy and Distribute
Structure
3
A simple “three domain” model to help us think about
digital identity and its relationship to shared ledgers.
An explanation (!) of why a shared ledger for identity
transactions might be innovative.
A discussion of practical options.
4. www.chyp.comPlease Copy and Distribute
Digital Identity Model
4
Digital Identity
A simple model to aid discussion
5. www.chyp.comPlease Copy and Distribute
Identification Problem: Trolls
5
People should be able to interact
pseudonymously!
Linking virtual identities to digital
identities is easy so just do it!
Let people have lots of virtual identities!
10. www.chyp.comPlease Copy and Distribute
Adding a Shared Ledger
10
Where is the Connection?
How do we connect identity to the
blockchain or any other kind of
shared ledger?
11. www.chyp.comPlease Copy and Distribute
3D-ID and the Shared Ledger
Hpw do we connect identity to a blockchain (or any other shared ledger) then?
11
12. www.chyp.comPlease Copy and Distribute
Identification Domain
We could put “real” identity to the blockchain
12
13. www.chyp.comPlease Copy and Distribute
Authentication Domain
We can put the digital identity (ie, a key pair) on the blockchain (ie, a wallet)
13
14. www.chyp.comPlease Copy and Distribute
Authorisation Domain
The blockchain as an immutable history of (pseudonymous) virtual identites
14
16. www.chyp.comPlease Copy and Distribute
A Worked Example
16
KYC Thought Experiment
OK, is this a mass market solution?
17. www.chyp.comPlease Copy and Distribute
A Blockchain Implementation
Implement the identity ledger as a layer on the blockchain (eg, Blockstream)
17
18. www.chyp.comPlease Copy and Distribute
A Blockchain Implementation
Implement the identity ledger as a layer on the blockchain (eg, Blockstream)
18
19. www.chyp.comPlease Copy and Distribute
Customer Presents
19
The customer wants to do
something, like log in to a
bank or something similar
The customer points to a
financial services identity
smart contract on the
blockchain – sends a
transactions to the bank
smart contract
20. www.chyp.comPlease Copy and Distribute
Customer Authenticates
The customer demonstrates they have access to the private key (the wallet)
20
21. www.chyp.comPlease Copy and Distribute
Contact
21
Browse www.chyp.com
Follow @chyppings
Mail info@chyp.com
Comment http://www.chyp.com/media/blog/
Listen http://www.chyp.com/media/podcasts/
Consult Hyperion UK
Tweed House, 12 The Mount
Guildford, Surrey GU24HN, UK.
+44 1483 301793
Consult Hyperion USA
535 Madison Avenue, 19th Floor
New York, NY 10022, USA.
+1 888 835 6124
22. www.chyp.comPlease Copy and Distribute
Who Are Consult Hyperion?
Consult Hyperion specialises in working out the
opportunities and threats which result from the
harmony and collision of security, networks and
transactions.
We are constantly assessing these factors, as they
change continuously, and delivering ideas, solutions
and products to our clients
22
23. www.chyp.comPlease Copy and Distribute
Who Do They Work?
We have a structured and practical approach to secure
electronic transaction systems from the local to the global
23
Strategy
Roadmapping
Market Analysis
Business Modelling
Prototyping
Requirements Analysis
Risk Analysis
System Architecture
Technical Specification
Procurement Support
Software Development
Vendor Management
Project Management
Certification Management
Acceptance Testing
Evaluation
We can help clients in all phases of the product and service lifecycle, from the whiteboard scribble to
the person in the street’s everyday use
25. www.chyp.comPlease Copy and Distribute
Learn the world of tomorrow’s transactions
Understanding the
Blockchain
• 7th April
Mobile & Cloud-
Based Payments
• 10th May
The World of Payment
Acceptance & mPOS
• 11th May
Digital Identity &
Authentication
• 24th May
Our new education programme
Demystify the Blockchain &
Bitcoin to understand what it
means for your business & the
future of transactions
Easy-to-understand introduction
into the key concepts, practical
implications and opportunities
that this technology could bring
to financial services and other
sectors?
Essential learning on
implementing & launching mobile
NFC or tokenised m-payment
services
Key aspects of Secure Element
(SE) & Host Card Emulation
(HCE) technologies, deployment
models, tokenisation & credential
management are all covered
Understand the new POS world
driven by innovation in an ever
changing retail payment
environment
Whether an acquirer, payment
provider or retailer, learn how to
build the right business case,
strategies & solutions to meet
the opportunities of the new
world of payments
Learn the importance of trusted
transactions in a digitally
connected world and what it
means for your business
Valuable insight into balancing
risk reduction vs customer
experience; showing you how to
select, implement and manage
the right identity solutions for
your business
In partnership withTo register / more information: www.paymentbusinessschool/events
Editor's Notes
All the things you are
The number of proposed biometric technologies increases daily. Starting with the well-established fingerprint systems to the more esoteric such as ear geometry (commonly left by listeners at crime scenes in Switzerland, apparently), gait (the way you walk) and body odour. How should you go about deciding the most appropriate technology for any given application?
Biometric technologies are useful means of identifying people against databases or verifying that they are who they say they are. A small number of technologies are good at the former function (e.g. iris and fingerprint) whereas many are capable of verification against a biometric template stored on a token such as a smart card or travel document.
There are many different applications for these two functions within UK government such as:
Verifying that a document holder is the legitimate document holder by matching them against a biometric held within the document.
Preventing duplicate applications for documents by searching against the database of currently issued documents.
Preventing people holding different identities on different systems (e.g. Driving License vs Passport) by sharing and cross-checking biometric data.
Ensuring that only legitimate members of staff have access to secure areas and systems.
The complexity of the individual requirements of each application coupled with the speed of advance of biometric technologies means that there is no single best biometric for all applications.