Digital Credentials Enabling Mobility and Verification of Educational Achievements

Brandon Muramatsu
Brandon MuramatsuAssociate Director, Projects
Digital Credentials
Enabling Mobility
and Verification of
Educational
Achievements
Brandon Muramatsu, MIT
Willem van Valkenburg, Delft University of Technology
Today
● A brief intro to the Digital Credentials
Consortium
● Two case studies
○ GDPR and Digital Credentials, Delft University of
Technology
○ Open Source Learner Credential Wallet, MIT
Digital Credentials Consortium
Our mission is to create a trusted,
distributed, and shared infrastructure
that will become the standard for issuing,
storing, displaying, and verifying
academic credentials, digitally.
DCC Founding Members
Delft University of Technology (The
Netherlands)
Georgia Institute of Technology (USA)
Harvard University (USA)
Hasso Plattner Institute, University of
Potsdam (Germany)
Massachusetts Institute of Technology
(USA)
McMaster University (Canada)
Tecnológico De Monterrey (Mexico)
Technical University of Munich
(Germany)
University of California at Berkeley
(USA)
University of California, Irvine (USA)
University of Milano-Bicocca (Italy)
University of Toronto (Canada)
DCC Guiding Principles
Learners
● Learners retain primary control
over their credentials.
● Learners’ consent is required for
issuance of digital credentials.
● Learners decide to whom they grant
access.
● Barriers to receiving and managing
credentials are minimal to enable
broad participation.
Issuers
● Issuers control to whom they issue
credentials, the particular achievement
that the credential represents, and
which credential options are available
to the learner.
● Issuers can revoke credentials
according to their institution’s policies.
● Barriers to issuing credentials are
minimal to enable broad and diverse
participation.
Trust:
● Everyone is able to review how the infrastructure and processes work.
● Trust in the integrity of the credentials is established cryptographically.
● Credentials can be verified without consulting the original issuer.
How does DCC do its work?
● Consortium of members with alignment to guiding principles,
and each working in similar ways on digital credentials
● DCC does its work through open standards organizations
primarily the W3C Verifiable Credentials for Education
(W3C VC-EDU) Community Group
○ Coordinates with IMS Global on Comprehensive Learner Record
and Open Badges v3 specifications
● Shared technical work through a Technical Working Group
made up of DCC members
● Implementing Verifiable Credentials (VC) and
Decentralized Identifiers (DID) specifications
○ Meet key DCC guiding principles of learner control
Delft University of Technology
General Data
Protection Regulation
and Blockchain
General Data Protection Regulation
(GDPR)
The European Union's General Data Protection Regulation become binding in
May 2018.
Goal of GDPR:
1. to facilitate free movement of personal data between EU members states
2. to establish a framework of fundamental data rights protection.
The legal framework creates a number of obligations resting on data controllers
(entities determining the means and purpose of data processing)
The legal framework creates a number of rights to data subjects (the natural
persons to whom the personal data relates) to be enforced by data controllers.
E.g. Article 16 GDPR – right to rectification, Article 17 GDPR – right to erasure
(‘right to be forgotten’)
Leading principles of GDPR
Lawfulness, fairness
and transparency
organisations need to make sure their data collection practices don’t break the law and that they
aren’t hiding anything from data subjects.
Purpose limitation Organisations should only collect personal data for a specific purpose, clearly state what that
purpose is, and only collect data for as long as necessary to complete that purpose.
Data minimisation Organisations must only process the personal data that they need to achieve its processing
purposes.
Accuracy The accuracy of personal data is integral to data protection. The GDPR states that “every
reasonable step must be taken” to erase or rectify data that is inaccurate or incomplete.
Storage limitation Organisations need to delete personal data when it’s no longer necessary.
Integrity and
confidentiality
(security)
Personal data should be processed in a manner that ensures appropriate security of the
personal data, including protection against unauthorised or unlawful processing and against
accidental loss, destruction or damage, using appropriate technical or organisational measures.
Accountability The controller shall be responsible for, and be able to demonstrate compliance with the above
principles
Source:https://www.bankinghub.eu/banking/finance-risk/gdpr-
deep-dive-implement-right-forgotten
GDPR and Blockchain
The GDPR is based on assumptions that creates tension with blockchain.
GDPR Blockchain
in relation to each personal data point there is at
least one natural or legal person – the data
controller – whom the subjects can address to
enforce their rights under EU Data protection law.
decentralizes to many actors and allocation of
responsibility and accountability is burdensome.
data can be modified or erased where necessary to
comply with the legal requirements of GDPR Article
16 (right to rectification) and 17 (right to erasure
(‘right to be forgotten’)
Modification and erasure of data is made onerous to
ensure data integrity and increase trust in the
network.
Digital Credentials Enabling Mobility and Verification of Educational Achievements
Personal data on the Blockchain?
In the pilot we explored the following:
● Is data that is encrypted or hashed/ ‘anonymized’ still
quality as personal data as per the GDPR requirements of
anonymisation?
● How is the right to erasure/right to be forgotten dealt with in
the pilot?
The right to be forgotten is not an absolute
right
● if a learner requests to be forgotten, Accredify
deletes their personal data. The learner is the
one who should contact institutes where they
have personally shared their opencert file
which could be still verified.
● What happens now is that Accredify deletes
personal data from their system which is
GDPR complaint. This is because the right to
be forgotten does not extend to all the
institutes where the learner shared their file.
● If a certificate is revoked and cannot be
verified in the future that doesn’t say much –
so it is good to add an explanation.
Hashing, salt and peppering of personal
data
● As long as the hash relates to something it is not
anonymised.
● This is the current conflict within blockchain and GDPR
and the interpretation of what is considered as
anonymous.
Open Source Learner Wallet
MIT
MIT Team
Brandon Muramatsu
Philipp Schmidt
Gillian Walsh
Dmitri Zagidulin
About the Open Source Learner Wallet Project
● A key missing ingredient in a digital credential infrastructure
○ Prioritizes learner agency
○ Enables trust
○ Supports diverse institutions
● A learner credential wallet specification (May 2021)
● An open source learner wallet mobile app, eduWallet
● A pilot with U.S. institutions:
○ College Unbound, Georgia Tech and San Jose City College
○ MIT xPRO and University of North Texas / Concentric Sky
Details on eduWallet
An Open Source Learner Wallet
● Both Android and iOS versions
○ Going into pilot testing December 2021–January 2022
● Key features
○ Login to secure wallet
○ Add verifiable credentials via deep link (direct and QR Code) and
via QR code
○ Display credentials locally—Issuer, issuer logo, credential name,
issuance date
○ Select and share credentials as JSON-LD via operating system
sharing mechanisms (copy to clipboard, save as file)
○ Delete credentials, backup and restore from file
Demo
● Login to a LMS or student portal
● Prompted to install eduWallet from Apple or
Google Play app stores
● First time setup of eduWallet
● (Simulated) Access credential via LMS / QR Code
/ Deep Link
● (Not demonstrated) Authenticate before
receiving credential
● View credentials (and share them)
Questions?
Brandon Muramatsu
mura@mit.edu
Willem van Valkenburg
w.f.vanvalkenburg@tudelft.nl
1 of 21

Recommended

Digital Identity Wallets: What They Mean For Banks by
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
427 views24 slides
Verifiable Credentials in Self-Sovereign Identity (SSI) by
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
498 views29 slides
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu... by
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...SSIMeetup
5.4K views36 slides
What is self-sovereign identity (SSI)? by
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
1.2K views44 slides
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver... by
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
56 views19 slides
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver... by
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
1.2K views31 slides

More Related Content

What's hot

Introduction to Self Sovereign Identity by
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityHeather Vescent
1.4K views67 slides
The Shift from Federated to Decentralized Identity by
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityEvernym
386 views20 slides
OpenID 4 Verifiable Credentials + HAIP (Update) by
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)Torsten Lodderstedt
408 views49 slides
Overview of Decentralized Identity by
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized IdentityJim Flynn
1.2K views37 slides
What are Decentralized Identifiers (DIDs)? by
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?Evernym
4.8K views29 slides
Fido Technical Overview by
Fido Technical OverviewFido Technical Overview
Fido Technical OverviewFIDO Alliance
1.9K views27 slides

What's hot(20)

Introduction to Self Sovereign Identity by Heather Vescent
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
Heather Vescent1.4K views
The Shift from Federated to Decentralized Identity by Evernym
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
Evernym386 views
Overview of Decentralized Identity by Jim Flynn
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Jim Flynn1.2K views
What are Decentralized Identifiers (DIDs)? by Evernym
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
Evernym4.8K views
Fido Technical Overview by FIDO Alliance
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
FIDO Alliance1.9K views
Blockchain, Self-Sovereign Identity and Credentials by StrategyWorks
Blockchain, Self-Sovereign Identity and CredentialsBlockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and Credentials
StrategyWorks524 views
Digital euro - Considerations & Questions (v2) by Dirk Braun
Digital euro - Considerations & Questions (v2)Digital euro - Considerations & Questions (v2)
Digital euro - Considerations & Questions (v2)
Dirk Braun490 views
EU Digital Identity Wallet - INNOPAY.pptx by INNOPAY1
EU Digital Identity Wallet - INNOPAY.pptxEU Digital Identity Wallet - INNOPAY.pptx
EU Digital Identity Wallet - INNOPAY.pptx
INNOPAY1802 views
Verifiable Credentials, Self Sovereign Identity and DLTs by Vasiliy Suvorov
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
Vasiliy Suvorov1K views
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a... by Evernym
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Evernym359 views
DeFi - Decentralized Finance - Wallstreet Meets Blockchain by ThatCrypto
DeFi - Decentralized Finance - Wallstreet Meets BlockchainDeFi - Decentralized Finance - Wallstreet Meets Blockchain
DeFi - Decentralized Finance - Wallstreet Meets Blockchain
ThatCrypto2.1K views
Kid Blockchain - Everything You Need to Know - (Part 1) by Seungjoo Kim
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)
Seungjoo Kim2.9K views
Matching Identity Management Solutions to Self-Sovereign Identity Principles by Tommy Koens
Matching Identity Management Solutions to Self-Sovereign Identity PrinciplesMatching Identity Management Solutions to Self-Sovereign Identity Principles
Matching Identity Management Solutions to Self-Sovereign Identity Principles
Tommy Koens3.7K views
Blockchain and DeFi: Overview by Svetlin Nakov
Blockchain and DeFi: OverviewBlockchain and DeFi: Overview
Blockchain and DeFi: Overview
Svetlin Nakov198 views

Similar to Digital Credentials Enabling Mobility and Verification of Educational Achievements

GDPR and IoT: What do you need to know? by
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?MicheleNati
395 views44 slides
ISSA Atlanta - Emerging application and data protection for multi cloud by
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
166 views63 slides
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin... by
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
32 views16 slides
Blockchain and the Future of Digital Learning Credential Assessment and Manag... by
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...eraser Juan José Calderón
806 views12 slides
Mcis 2018 DEFeND Project by
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project DEFeND Project
397 views23 slides
Analytics in Action - Data Protection by
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data ProtectionLee Schlenker
107 views19 slides

Similar to Digital Credentials Enabling Mobility and Verification of Educational Achievements(20)

GDPR and IoT: What do you need to know? by MicheleNati
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?
MicheleNati395 views
ISSA Atlanta - Emerging application and data protection for multi cloud by Ulf Mattsson
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson166 views
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin... by Konstantinos Demertzis
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
Blockchain and the Future of Digital Learning Credential Assessment and Manag... by eraser Juan José Calderón
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Analytics in Action - Data Protection by Lee Schlenker
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
Lee Schlenker107 views
Safeguarding customer and financial data in analytics and machine learning by Ulf Mattsson
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson95 views
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ... by Karlos Svoboda
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Karlos Svoboda4.1K views
ISACA Houston - How to de-classify data and rethink transfer of data between ... by Ulf Mattsson
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
Ulf Mattsson80 views
The Rise of Data Ethics and Security - AIDI Webinar by Eryk Budi Pratama
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
Eryk Budi Pratama919 views
ISACA Houston - Practical data privacy and de-identification techniques by Ulf Mattsson
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson213 views
Privacy Of Data Stream Using Sliding Window Method by Monica Rivera
Privacy Of Data Stream Using Sliding Window MethodPrivacy Of Data Stream Using Sliding Window Method
Privacy Of Data Stream Using Sliding Window Method
Monica Rivera2 views
ico-future-tech-report-20221214.pdf by yashapnt
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
yashapnt8 views
Evolving regulations are changing the way we think about tools and technology by Ulf Mattsson
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
Ulf Mattsson147 views
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan by Capgemini
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
Capgemini233 views
141013 e id-budapest_sia_tobepublished by Alain Ducass
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished
Alain Ducass439 views
Big Data LDN 2017: Applied AI for GDPR by Matt Stubbs
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs166 views

More from Brandon Muramatsu

Sustainability of OER Initiatives: An Interactive Discussion by
Sustainability of OER Initiatives: An Interactive DiscussionSustainability of OER Initiatives: An Interactive Discussion
Sustainability of OER Initiatives: An Interactive DiscussionBrandon Muramatsu
212 views17 slides
Bridging the Gap: Mixing approaches, content and tools to help college students by
Bridging the Gap: Mixing approaches, content and tools to help college studentsBridging the Gap: Mixing approaches, content and tools to help college students
Bridging the Gap: Mixing approaches, content and tools to help college studentsBrandon Muramatsu
201 views11 slides
Federations & Backstage: Thoughts for a Geoscience Education Infrastructure by
Federations & Backstage: Thoughts for a Geoscience Education InfrastructureFederations & Backstage: Thoughts for a Geoscience Education Infrastructure
Federations & Backstage: Thoughts for a Geoscience Education InfrastructureBrandon Muramatsu
176 views9 slides
The Connected Learning Initiative Quality at Scale in India by
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaBrandon Muramatsu
172 views18 slides
The Connected Learning Initiative Quality at Scale in India by
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaBrandon Muramatsu
161 views9 slides
Strategic Education Initiatives , MIT Open Learning by
Strategic Education Initiatives, MIT Open LearningStrategic Education Initiatives, MIT Open Learning
Strategic Education Initiatives , MIT Open LearningBrandon Muramatsu
164 views14 slides

More from Brandon Muramatsu(20)

Sustainability of OER Initiatives: An Interactive Discussion by Brandon Muramatsu
Sustainability of OER Initiatives: An Interactive DiscussionSustainability of OER Initiatives: An Interactive Discussion
Sustainability of OER Initiatives: An Interactive Discussion
Brandon Muramatsu212 views
Bridging the Gap: Mixing approaches, content and tools to help college students by Brandon Muramatsu
Bridging the Gap: Mixing approaches, content and tools to help college studentsBridging the Gap: Mixing approaches, content and tools to help college students
Bridging the Gap: Mixing approaches, content and tools to help college students
Brandon Muramatsu201 views
Federations & Backstage: Thoughts for a Geoscience Education Infrastructure by Brandon Muramatsu
Federations & Backstage: Thoughts for a Geoscience Education InfrastructureFederations & Backstage: Thoughts for a Geoscience Education Infrastructure
Federations & Backstage: Thoughts for a Geoscience Education Infrastructure
Brandon Muramatsu176 views
The Connected Learning Initiative Quality at Scale in India by Brandon Muramatsu
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in India
Brandon Muramatsu172 views
The Connected Learning Initiative Quality at Scale in India by Brandon Muramatsu
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in India
Brandon Muramatsu161 views
Strategic Education Initiatives , MIT Open Learning by Brandon Muramatsu
Strategic Education Initiatives, MIT Open LearningStrategic Education Initiatives, MIT Open Learning
Strategic Education Initiatives , MIT Open Learning
Brandon Muramatsu164 views
Open Embedded Assessments: Play, Author; Anywhere, Anytime by Brandon Muramatsu
Open Embedded Assessments:Play, Author; Anywhere, AnytimeOpen Embedded Assessments:Play, Author; Anywhere, Anytime
Open Embedded Assessments: Play, Author; Anywhere, Anytime
Brandon Muramatsu158 views
Evaluating and Selecting Digital Learning Resources by Brandon Muramatsu
Evaluating and Selecting Digital Learning ResourcesEvaluating and Selecting Digital Learning Resources
Evaluating and Selecting Digital Learning Resources
Brandon Muramatsu161 views
Connected Learning Initiative: Learning at Scale by Brandon Muramatsu
Connected Learning Initiative: Learning at ScaleConnected Learning Initiative: Learning at Scale
Connected Learning Initiative: Learning at Scale
Brandon Muramatsu795 views
The Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity by Brandon Muramatsu
The Best of Both Worlds: Transforming OpenCourseWare in an age of InteractivityThe Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
The Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
Brandon Muramatsu1.6K views
Innovative Educational Technology and Educational Infrastructure at MIT by Brandon Muramatsu
Innovative Educational Technologyand Educational Infrastructureat MITInnovative Educational Technologyand Educational Infrastructureat MIT
Innovative Educational Technology and Educational Infrastructure at MIT
Brandon Muramatsu1.6K views
Workshop: Emerging Possibilities and Takeaways for KFUPM by Brandon Muramatsu
Workshop: Emerging Possibilities and Takeaways for KFUPMWorkshop: Emerging Possibilities and Takeaways for KFUPM
Workshop: Emerging Possibilities and Takeaways for KFUPM
Brandon Muramatsu609 views
Workshop: Lessons from Online and edX / MITx Courses by Brandon Muramatsu
Workshop: Lessons from Online and edX / MITx CoursesWorkshop: Lessons from Online and edX / MITx Courses
Workshop: Lessons from Online and edX / MITx Courses
Brandon Muramatsu963 views
Workshop: Design Considerations for Online / Digital Courses by Brandon Muramatsu
Workshop: Design Considerations for Online / Digital CoursesWorkshop: Design Considerations for Online / Digital Courses
Workshop: Design Considerations for Online / Digital Courses
Brandon Muramatsu625 views
Workshop: Educational Technology Opportunities for KFUPM by Brandon Muramatsu
Workshop: Educational Technology Opportunities for KFUPMWorkshop: Educational Technology Opportunities for KFUPM
Workshop: Educational Technology Opportunities for KFUPM
Brandon Muramatsu570 views

Recently uploaded

Psychology KS5 by
Psychology KS5Psychology KS5
Psychology KS5WestHatch
77 views5 slides
Google solution challenge..pptx by
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptxChitreshGyanani1
98 views18 slides
Create a Structure in VBNet.pptx by
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptxBreach_P
70 views8 slides
ACTIVITY BOOK key water sports.pptx by
ACTIVITY BOOK key water sports.pptxACTIVITY BOOK key water sports.pptx
ACTIVITY BOOK key water sports.pptxMar Caston Palacio
430 views4 slides
The Open Access Community Framework (OACF) 2023 (1).pptx by
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
85 views7 slides
Classification of crude drugs.pptx by
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptxGayatriPatra14
77 views13 slides

Recently uploaded(20)

Psychology KS5 by WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch77 views
Create a Structure in VBNet.pptx by Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P70 views
The Open Access Community Framework (OACF) 2023 (1).pptx by Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc85 views
Classification of crude drugs.pptx by GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1477 views
The basics - information, data, technology and systems.pdf by JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena188 views
Structure and Functions of Cell.pdf by Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan368 views
Narration lesson plan.docx by TARIQ KHAN
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN104 views
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx by Inge de Waard
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptxOEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
Inge de Waard167 views
REPRESENTATION - GAUNTLET.pptx by iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood83 views
Psychology KS4 by WestHatch
Psychology KS4Psychology KS4
Psychology KS4
WestHatch68 views
Dance KS5 Breakdown by WestHatch
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch68 views
Class 10 English notes 23-24.pptx by TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN107 views
Sociology KS5 by WestHatch
Sociology KS5Sociology KS5
Sociology KS5
WestHatch64 views
American Psychological Association 7th Edition.pptx by SamiullahAfridi4
American Psychological Association  7th Edition.pptxAmerican Psychological Association  7th Edition.pptx
American Psychological Association 7th Edition.pptx
SamiullahAfridi482 views
The Accursed House by Émile Gaboriau by DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta158 views
Community-led Open Access Publishing webinar.pptx by Jisc
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc74 views

Digital Credentials Enabling Mobility and Verification of Educational Achievements

  • 1. Digital Credentials Enabling Mobility and Verification of Educational Achievements Brandon Muramatsu, MIT Willem van Valkenburg, Delft University of Technology
  • 2. Today ● A brief intro to the Digital Credentials Consortium ● Two case studies ○ GDPR and Digital Credentials, Delft University of Technology ○ Open Source Learner Credential Wallet, MIT
  • 3. Digital Credentials Consortium Our mission is to create a trusted, distributed, and shared infrastructure that will become the standard for issuing, storing, displaying, and verifying academic credentials, digitally.
  • 4. DCC Founding Members Delft University of Technology (The Netherlands) Georgia Institute of Technology (USA) Harvard University (USA) Hasso Plattner Institute, University of Potsdam (Germany) Massachusetts Institute of Technology (USA) McMaster University (Canada) Tecnológico De Monterrey (Mexico) Technical University of Munich (Germany) University of California at Berkeley (USA) University of California, Irvine (USA) University of Milano-Bicocca (Italy) University of Toronto (Canada)
  • 5. DCC Guiding Principles Learners ● Learners retain primary control over their credentials. ● Learners’ consent is required for issuance of digital credentials. ● Learners decide to whom they grant access. ● Barriers to receiving and managing credentials are minimal to enable broad participation. Issuers ● Issuers control to whom they issue credentials, the particular achievement that the credential represents, and which credential options are available to the learner. ● Issuers can revoke credentials according to their institution’s policies. ● Barriers to issuing credentials are minimal to enable broad and diverse participation. Trust: ● Everyone is able to review how the infrastructure and processes work. ● Trust in the integrity of the credentials is established cryptographically. ● Credentials can be verified without consulting the original issuer.
  • 6. How does DCC do its work? ● Consortium of members with alignment to guiding principles, and each working in similar ways on digital credentials ● DCC does its work through open standards organizations primarily the W3C Verifiable Credentials for Education (W3C VC-EDU) Community Group ○ Coordinates with IMS Global on Comprehensive Learner Record and Open Badges v3 specifications ● Shared technical work through a Technical Working Group made up of DCC members ● Implementing Verifiable Credentials (VC) and Decentralized Identifiers (DID) specifications ○ Meet key DCC guiding principles of learner control
  • 7. Delft University of Technology
  • 9. General Data Protection Regulation (GDPR) The European Union's General Data Protection Regulation become binding in May 2018. Goal of GDPR: 1. to facilitate free movement of personal data between EU members states 2. to establish a framework of fundamental data rights protection. The legal framework creates a number of obligations resting on data controllers (entities determining the means and purpose of data processing) The legal framework creates a number of rights to data subjects (the natural persons to whom the personal data relates) to be enforced by data controllers. E.g. Article 16 GDPR – right to rectification, Article 17 GDPR – right to erasure (‘right to be forgotten’)
  • 10. Leading principles of GDPR Lawfulness, fairness and transparency organisations need to make sure their data collection practices don’t break the law and that they aren’t hiding anything from data subjects. Purpose limitation Organisations should only collect personal data for a specific purpose, clearly state what that purpose is, and only collect data for as long as necessary to complete that purpose. Data minimisation Organisations must only process the personal data that they need to achieve its processing purposes. Accuracy The accuracy of personal data is integral to data protection. The GDPR states that “every reasonable step must be taken” to erase or rectify data that is inaccurate or incomplete. Storage limitation Organisations need to delete personal data when it’s no longer necessary. Integrity and confidentiality (security) Personal data should be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures. Accountability The controller shall be responsible for, and be able to demonstrate compliance with the above principles
  • 12. GDPR and Blockchain The GDPR is based on assumptions that creates tension with blockchain. GDPR Blockchain in relation to each personal data point there is at least one natural or legal person – the data controller – whom the subjects can address to enforce their rights under EU Data protection law. decentralizes to many actors and allocation of responsibility and accountability is burdensome. data can be modified or erased where necessary to comply with the legal requirements of GDPR Article 16 (right to rectification) and 17 (right to erasure (‘right to be forgotten’) Modification and erasure of data is made onerous to ensure data integrity and increase trust in the network.
  • 14. Personal data on the Blockchain? In the pilot we explored the following: ● Is data that is encrypted or hashed/ ‘anonymized’ still quality as personal data as per the GDPR requirements of anonymisation? ● How is the right to erasure/right to be forgotten dealt with in the pilot?
  • 15. The right to be forgotten is not an absolute right ● if a learner requests to be forgotten, Accredify deletes their personal data. The learner is the one who should contact institutes where they have personally shared their opencert file which could be still verified. ● What happens now is that Accredify deletes personal data from their system which is GDPR complaint. This is because the right to be forgotten does not extend to all the institutes where the learner shared their file. ● If a certificate is revoked and cannot be verified in the future that doesn’t say much – so it is good to add an explanation.
  • 16. Hashing, salt and peppering of personal data ● As long as the hash relates to something it is not anonymised. ● This is the current conflict within blockchain and GDPR and the interpretation of what is considered as anonymous.
  • 17. Open Source Learner Wallet MIT MIT Team Brandon Muramatsu Philipp Schmidt Gillian Walsh Dmitri Zagidulin
  • 18. About the Open Source Learner Wallet Project ● A key missing ingredient in a digital credential infrastructure ○ Prioritizes learner agency ○ Enables trust ○ Supports diverse institutions ● A learner credential wallet specification (May 2021) ● An open source learner wallet mobile app, eduWallet ● A pilot with U.S. institutions: ○ College Unbound, Georgia Tech and San Jose City College ○ MIT xPRO and University of North Texas / Concentric Sky
  • 19. Details on eduWallet An Open Source Learner Wallet ● Both Android and iOS versions ○ Going into pilot testing December 2021–January 2022 ● Key features ○ Login to secure wallet ○ Add verifiable credentials via deep link (direct and QR Code) and via QR code ○ Display credentials locally—Issuer, issuer logo, credential name, issuance date ○ Select and share credentials as JSON-LD via operating system sharing mechanisms (copy to clipboard, save as file) ○ Delete credentials, backup and restore from file
  • 20. Demo ● Login to a LMS or student portal ● Prompted to install eduWallet from Apple or Google Play app stores ● First time setup of eduWallet ● (Simulated) Access credential via LMS / QR Code / Deep Link ● (Not demonstrated) Authenticate before receiving credential ● View credentials (and share them)
  • 21. Questions? Brandon Muramatsu mura@mit.edu Willem van Valkenburg w.f.vanvalkenburg@tudelft.nl

Editor's Notes

  1. https://docs.google.com/document/d/1Rvnt_wi_pIeX9YXtjXMXHbTow8ZO_J5V/edit#
  2. College Unbound Small IHE serving low-income learners in degree completion programs San Jose City College Provides non-degree courses for high demand tech skills, has previously worked with MIT on their Technest program Georgia Tech Influential in DCC, piloting verifiable with training programs