SlideShare a Scribd company logo
1 of 49
autonomous
We all want to build autonomous systems – systems of machines that work together to almost magically improve our lives.
But we spend most of our days doing what is best described as - digital plumbing.
PLUMBING
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
To illustrate, let’s consider this extremely simple autonomous system.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we identify a person?
How do we authenticate them?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we know they entered?
With a device?
How do we identify the device?
Can we trust it?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we identify a room?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we change temperature?
With a device?
How do we identify the device?
Can we trust it?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
What is room temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we know their preferred temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we identify a room?
What is room temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
How do we identify a person?
How do we authenticate them?
How do we know they entered?
With a device?
How do we identify the device?
Can we trust it?
How do we change temperature?
With a device?
How do we identify the device?
Can we trust it?
How do we know their preferred temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
This seems hard, surely someone else has already built it.
Found one with a quick google search, but it only works with Nest and IFFTT, our hardware is different :(
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
1000s of People Identity Systems
Google, Facebook, Apple, Active Directory,
Custom Apps etc.
The problem gets worse if, like any good programmer, we only want to write this program once.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
1000s of phones, motion sensors, RFID reader etc.

100s of IoT platforms, proprietary systems etc.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
100s of building management
systems and custom apps etc.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
1000s of HVAC systems, Thermostats etc.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
1000s of custom apps.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
1000s of custom apps.
1000s of HVAC systems, Thermostats etc.
100s of building management
systems and custom apps etc.
1000s of phones, motion sensors, RFID reader etc.

100s of IoT platforms, proprietary systems etc.
1000s of People Identity Systems
Google, Facebook, Apple, Active Directory,
Custom Apps etc.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
Also, this problem statement isn’t general enough, we like to write reusable code.
IF A SHIPMENT ENTERS A CONTAINER
CHANGE CONTAINER TEMPERATURE to
IDEAL TEMPERATURE OF SHIPMENT.
This new problem statement isn’t that different, lets generalize …
IF AN ENTITY THAT HAS PREFERENCES,
IS DETECTED AS HAVING ENTERED AN AREA THAT CAN APPLY PREFERENCES
APPLY ALL ENTITY PREFERENCES THAT THE AREA CAN APPLY
THAT THIS ENTITY IS AUTHORIZED TO APPLY TO THIS AREA.
PLUMBING
Most IoT developers spend most of their time dealing with this complicated plumbing, the magic is rare.
Privacy
Security
SCALABILITY
RELIABILITY
TRUST
All of these plumbing complications also manifest as weaknesses in other key architectural requirements.
IDENTITY
TRUST
INTEROPERABILITY
Ockam is applying several open standards and building open source tools to address these challenges.
Our thinking is organized in the above three layers.
IDENTITY
TRUST
INTEROPERABILITY
Decentralized Identifiers
Decentralized Key Management
Verifiable Claims
Linked Data Signatures
Linked Data
Shared Vocabularies
Introspect-able Services
Reputation Systems
Discover-able Services
LINKED DATA & JSON-LD
The progress made by the open web community around Linked Data can be applied to IoT,
this brings semantic meaning and relationships to IoT data …
Instead of describing temperature as a key of my choosing “temperature”, “temp” or “T” …
Let’s describe it with well defined semantics.
Now, two developers who have never met or coordinated can independently build
a temperature sensor and a controller that can work with each other.
SHARED VOCABULARIES
Shared vocabularies enable us to break down the n-squared integration problem that causes a lot of the plumbing we discussed.
RELATIONSHIPS
Linked Data also enables us to build a relationship graph within our data …
Now this data is about an entity (room) described by the above DID.
Decentralized IDENTIFIERS
did:ockam:2QyqWz4xWB5o4Pr9G9fcZjXTE2ej5
Method
Scheme
Method Specific Unique String
DIDs or Decentralized Identifiers leverage blockchains to enable cryptographically secured
IDs that are not locked in silos and can easily interoperate with other entities.
DID DOCUMENTS
DID Documents are Linked Data documents that describe the DID, they contain
the public keys of the DID, authentication methods, services etc…
GLOBALLY RESOLVABLE
If you have a DID string, you can resolve it to its DID Document via its Method.
We did not have this property of global uniqueness/resolvability across systems with old ID schemes like UUID etc.
This breaks silos.
cryptographically
verifIABLE ownership
DIDs are tied to public keys, you can prove ownership of an ID if you have the corresponding private key.
This enables cryptographically secure identities.
DECENTRALIZED KEY MANAGEMENT
The public keys tied to a DID can be rotated, revoked etc. DID on a blockchain enable a decentralized public key infrastructure.
IOT companies no longer need to spend millions on centralized PKIs that are often single points of failure.
PRIVACY BY DESIGN
DIDs enable privacy in several ways, for example one device can easily generate lots of pair-wise-unique DIDs
SERVICE DISCOVERY
The service section of the DID document enables de-coupling of systems.
VERIFIABLE CLAIMS
An Issuer can cryptographically sign claims about a subject.
DIDs + Verifiable Claims + Blockchain gives cryptographically signed IoT data
that cannot be tampered with in motion or at rest.
IDENTITY
TRUST
INTEROPERABILITY
Decentralized Identifiers
Decentralized Key Management
Verifiable Claims
Linked Data Signatures
Linked Data
Shared Vocabularies
Introspect-able Services
Reputation Systems
Discover-able Services
IDENTITY
TRUST
Decentralized Identifiers
Decentralized Key Management
Verifiable Claims
Linked Data Signatures
Reputation Systems
Blockchains are a new way to implement identity and trust, in
IoT systems, that unlocks interoperability in powerful ways.
github.com/ockam-network/ockam
Come contribute to Ockam on Github or Slack
bit.ly/2CXw4PDSlack:
Code:
w3.org/community/credentials
Shout out to the w3c credentials group that is developing many of these powerful standards.
Mrinal Wadhwa
CTO & Co-Founder
@mrinal
Attributions for the images used in this deck:
• pipes by Aleksandr Vector from the Noun Project
• valve by Ben Davis from the Noun Project
• Robot by Vectors Market from the Noun Project

More Related Content

What's hot

Project Oxygen
Project OxygenProject Oxygen
Project Oxygenshivu1234
 
Project oxygen
Project oxygenProject oxygen
Project oxygenlinkoravi
 
34191701 project-oxygen-vijeth
34191701 project-oxygen-vijeth34191701 project-oxygen-vijeth
34191701 project-oxygen-vijethamit243881
 
Iot devices
Iot devicesIot devices
Iot devicesDucat
 
Project oxygen
Project oxygenProject oxygen
Project oxygenamit243881
 
MIT Project Oxygen - A seminar report
MIT Project Oxygen - A seminar reportMIT Project Oxygen - A seminar report
MIT Project Oxygen - A seminar reportPranav Prakash
 
Home automation IoT
Home automation IoTHome automation IoT
Home automation IoTARUN REDDY M
 

What's hot (11)

Project Oxygen
Project OxygenProject Oxygen
Project Oxygen
 
Hn3114461450
Hn3114461450Hn3114461450
Hn3114461450
 
Project oxygen ppt
Project oxygen pptProject oxygen ppt
Project oxygen ppt
 
Project oxygen
Project oxygenProject oxygen
Project oxygen
 
34191701 project-oxygen-vijeth
34191701 project-oxygen-vijeth34191701 project-oxygen-vijeth
34191701 project-oxygen-vijeth
 
Iot devices
Iot devicesIot devices
Iot devices
 
Project oxygen
Project oxygenProject oxygen
Project oxygen
 
MIT Project Oxygen - A seminar report
MIT Project Oxygen - A seminar reportMIT Project Oxygen - A seminar report
MIT Project Oxygen - A seminar report
 
IoT Home Automation System
IoT Home Automation SystemIoT Home Automation System
IoT Home Automation System
 
The Internet n.o [beta]
The Internet n.o [beta]The Internet n.o [beta]
The Internet n.o [beta]
 
Home automation IoT
Home automation IoTHome automation IoT
Home automation IoT
 

Similar to Build Autonomous Systems by Solving Digital Plumbing Problems

Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdf
Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdfDecentralized Identifiers & Verifiable Claims for IoT-1548352210.pdf
Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdfM KA
 
IoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdfIoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdfSudhanshiBakre1
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve ThemInnofied Solution
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersFIITJEE PU College
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxrupasharma39
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)GOPAL BASAK
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfShubhamYadav73126
 
How Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsHow Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsAnand SFJ
 
How to Profit from IoT
How to Profit from IoTHow to Profit from IoT
How to Profit from IoTKevin Jones
 
Smart Home Evolution
Smart Home EvolutionSmart Home Evolution
Smart Home EvolutionLuca Lamera
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)Caston Thomas
 
Internet-of-things.pdf
Internet-of-things.pdfInternet-of-things.pdf
Internet-of-things.pdfsuperytnumber1
 
Your Smart Scale Is Leaking More than Your Weight
Your Smart Scale Is Leaking More than Your WeightYour Smart Scale Is Leaking More than Your Weight
Your Smart Scale Is Leaking More than Your WeightCheckmarx
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Amazon Web Services
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisDaksh Raj Chopra
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
 

Similar to Build Autonomous Systems by Solving Digital Plumbing Problems (20)

Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdf
Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdfDecentralized Identifiers & Verifiable Claims for IoT-1548352210.pdf
Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdf
 
IoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdfIoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdf
 
Driving secureiot innovation
Driving secureiot innovationDriving secureiot innovation
Driving secureiot innovation
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginners
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptx
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
How Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsHow Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT Applications
 
How to Profit from IoT
How to Profit from IoTHow to Profit from IoT
How to Profit from IoT
 
Smart Home Evolution
Smart Home EvolutionSmart Home Evolution
Smart Home Evolution
 
internet of things
internet of thingsinternet of things
internet of things
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
IoT Architecture .pdf
IoT Architecture .pdfIoT Architecture .pdf
IoT Architecture .pdf
 
Internet-of-things.pdf
Internet-of-things.pdfInternet-of-things.pdf
Internet-of-things.pdf
 
Your Smart Scale Is Leaking More than Your Weight
Your Smart Scale Is Leaking More than Your WeightYour Smart Scale Is Leaking More than Your Weight
Your Smart Scale Is Leaking More than Your Weight
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 

More from Mrinal Wadhwa

Edge Computing and Machine Learning for a better Internet of Things
Edge Computing and Machine Learning for a better Internet of ThingsEdge Computing and Machine Learning for a better Internet of Things
Edge Computing and Machine Learning for a better Internet of ThingsMrinal Wadhwa
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesMrinal Wadhwa
 
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...Mrinal Wadhwa
 
Better Parking. Better Communities.
Better Parking. Better Communities.Better Parking. Better Communities.
Better Parking. Better Communities.Mrinal Wadhwa
 
Bits, Bytes and Blobs
Bits, Bytes and BlobsBits, Bytes and Blobs
Bits, Bytes and BlobsMrinal Wadhwa
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaMrinal Wadhwa
 
An Introduction To Rich Internet Apllications
An Introduction To Rich Internet ApllicationsAn Introduction To Rich Internet Apllications
An Introduction To Rich Internet ApllicationsMrinal Wadhwa
 
Custom Components In Flex 4
Custom Components In Flex 4Custom Components In Flex 4
Custom Components In Flex 4Mrinal Wadhwa
 
Flex 4 Component Lifecycle
Flex 4 Component LifecycleFlex 4 Component Lifecycle
Flex 4 Component LifecycleMrinal Wadhwa
 
Introduction to Rich Internet Applications, Flex, AIR
Introduction to Rich Internet Applications, Flex, AIRIntroduction to Rich Internet Applications, Flex, AIR
Introduction to Rich Internet Applications, Flex, AIRMrinal Wadhwa
 

More from Mrinal Wadhwa (10)

Edge Computing and Machine Learning for a better Internet of Things
Edge Computing and Machine Learning for a better Internet of ThingsEdge Computing and Machine Learning for a better Internet of Things
Edge Computing and Machine Learning for a better Internet of Things
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...
 
Better Parking. Better Communities.
Better Parking. Better Communities.Better Parking. Better Communities.
Better Parking. Better Communities.
 
Bits, Bytes and Blobs
Bits, Bytes and BlobsBits, Bytes and Blobs
Bits, Bytes and Blobs
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal Wadhwa
 
An Introduction To Rich Internet Apllications
An Introduction To Rich Internet ApllicationsAn Introduction To Rich Internet Apllications
An Introduction To Rich Internet Apllications
 
Custom Components In Flex 4
Custom Components In Flex 4Custom Components In Flex 4
Custom Components In Flex 4
 
Flex 4 Component Lifecycle
Flex 4 Component LifecycleFlex 4 Component Lifecycle
Flex 4 Component Lifecycle
 
Introduction to Rich Internet Applications, Flex, AIR
Introduction to Rich Internet Applications, Flex, AIRIntroduction to Rich Internet Applications, Flex, AIR
Introduction to Rich Internet Applications, Flex, AIR
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Build Autonomous Systems by Solving Digital Plumbing Problems

  • 1. autonomous We all want to build autonomous systems – systems of machines that work together to almost magically improve our lives.
  • 2. But we spend most of our days doing what is best described as - digital plumbing. PLUMBING
  • 3. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. To illustrate, let’s consider this extremely simple autonomous system.
  • 4. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we identify a person? How do we authenticate them?
  • 5. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we know they entered? With a device? How do we identify the device? Can we trust it?
  • 6. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we identify a room?
  • 7. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we change temperature? With a device? How do we identify the device? Can we trust it?
  • 8. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. What is room temperature? Is it called temp, temperature or T? Is it set in °C, °F or some other unit?
  • 9. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we know their preferred temperature? Is it called temp, temperature or T? Is it set in °C, °F or some other unit?
  • 10. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we identify a room? What is room temperature? Is it called temp, temperature or T? Is it set in °C, °F or some other unit? How do we identify a person? How do we authenticate them? How do we know they entered? With a device? How do we identify the device? Can we trust it? How do we change temperature? With a device? How do we identify the device? Can we trust it? How do we know their preferred temperature? Is it called temp, temperature or T? Is it set in °C, °F or some other unit?
  • 11. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. This seems hard, surely someone else has already built it.
  • 12. Found one with a quick google search, but it only works with Nest and IFFTT, our hardware is different :(
  • 13. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 1000s of People Identity Systems Google, Facebook, Apple, Active Directory, Custom Apps etc. The problem gets worse if, like any good programmer, we only want to write this program once.
  • 14. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 1000s of phones, motion sensors, RFID reader etc.
 100s of IoT platforms, proprietary systems etc.
  • 15. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 100s of building management systems and custom apps etc.
  • 16. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 1000s of HVAC systems, Thermostats etc.
  • 17. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 1000s of custom apps.
  • 18. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 1000s of custom apps. 1000s of HVAC systems, Thermostats etc. 100s of building management systems and custom apps etc. 1000s of phones, motion sensors, RFID reader etc.
 100s of IoT platforms, proprietary systems etc. 1000s of People Identity Systems Google, Facebook, Apple, Active Directory, Custom Apps etc.
  • 19. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. Also, this problem statement isn’t general enough, we like to write reusable code.
  • 20. IF A SHIPMENT ENTERS A CONTAINER CHANGE CONTAINER TEMPERATURE to IDEAL TEMPERATURE OF SHIPMENT. This new problem statement isn’t that different, lets generalize …
  • 21. IF AN ENTITY THAT HAS PREFERENCES, IS DETECTED AS HAVING ENTERED AN AREA THAT CAN APPLY PREFERENCES APPLY ALL ENTITY PREFERENCES THAT THE AREA CAN APPLY THAT THIS ENTITY IS AUTHORIZED TO APPLY TO THIS AREA.
  • 22. PLUMBING Most IoT developers spend most of their time dealing with this complicated plumbing, the magic is rare.
  • 23. Privacy Security SCALABILITY RELIABILITY TRUST All of these plumbing complications also manifest as weaknesses in other key architectural requirements.
  • 24. IDENTITY TRUST INTEROPERABILITY Ockam is applying several open standards and building open source tools to address these challenges. Our thinking is organized in the above three layers.
  • 25. IDENTITY TRUST INTEROPERABILITY Decentralized Identifiers Decentralized Key Management Verifiable Claims Linked Data Signatures Linked Data Shared Vocabularies Introspect-able Services Reputation Systems Discover-able Services
  • 26. LINKED DATA & JSON-LD The progress made by the open web community around Linked Data can be applied to IoT, this brings semantic meaning and relationships to IoT data …
  • 27. Instead of describing temperature as a key of my choosing “temperature”, “temp” or “T” …
  • 28. Let’s describe it with well defined semantics.
  • 29. Now, two developers who have never met or coordinated can independently build a temperature sensor and a controller that can work with each other.
  • 30. SHARED VOCABULARIES Shared vocabularies enable us to break down the n-squared integration problem that causes a lot of the plumbing we discussed.
  • 31. RELATIONSHIPS Linked Data also enables us to build a relationship graph within our data …
  • 32. Now this data is about an entity (room) described by the above DID.
  • 33. Decentralized IDENTIFIERS did:ockam:2QyqWz4xWB5o4Pr9G9fcZjXTE2ej5 Method Scheme Method Specific Unique String DIDs or Decentralized Identifiers leverage blockchains to enable cryptographically secured IDs that are not locked in silos and can easily interoperate with other entities.
  • 34. DID DOCUMENTS DID Documents are Linked Data documents that describe the DID, they contain the public keys of the DID, authentication methods, services etc…
  • 35.
  • 36. GLOBALLY RESOLVABLE If you have a DID string, you can resolve it to its DID Document via its Method. We did not have this property of global uniqueness/resolvability across systems with old ID schemes like UUID etc. This breaks silos.
  • 37. cryptographically verifIABLE ownership DIDs are tied to public keys, you can prove ownership of an ID if you have the corresponding private key. This enables cryptographically secure identities.
  • 38. DECENTRALIZED KEY MANAGEMENT The public keys tied to a DID can be rotated, revoked etc. DID on a blockchain enable a decentralized public key infrastructure. IOT companies no longer need to spend millions on centralized PKIs that are often single points of failure.
  • 39. PRIVACY BY DESIGN DIDs enable privacy in several ways, for example one device can easily generate lots of pair-wise-unique DIDs
  • 40. SERVICE DISCOVERY The service section of the DID document enables de-coupling of systems.
  • 41. VERIFIABLE CLAIMS An Issuer can cryptographically sign claims about a subject.
  • 42.
  • 43. DIDs + Verifiable Claims + Blockchain gives cryptographically signed IoT data that cannot be tampered with in motion or at rest.
  • 44. IDENTITY TRUST INTEROPERABILITY Decentralized Identifiers Decentralized Key Management Verifiable Claims Linked Data Signatures Linked Data Shared Vocabularies Introspect-able Services Reputation Systems Discover-able Services
  • 45. IDENTITY TRUST Decentralized Identifiers Decentralized Key Management Verifiable Claims Linked Data Signatures Reputation Systems Blockchains are a new way to implement identity and trust, in IoT systems, that unlocks interoperability in powerful ways.
  • 46. github.com/ockam-network/ockam Come contribute to Ockam on Github or Slack bit.ly/2CXw4PDSlack: Code:
  • 47. w3.org/community/credentials Shout out to the w3c credentials group that is developing many of these powerful standards.
  • 48. Mrinal Wadhwa CTO & Co-Founder @mrinal
  • 49. Attributions for the images used in this deck: • pipes by Aleksandr Vector from the Noun Project • valve by Ben Davis from the Noun Project • Robot by Vectors Market from the Noun Project