www.chyp.comPlease Copy and Distribute1
The Blockchain and Identity
The 3D-ID model and why we might want
to store CRUD on the shared ledger
Dutch Blockchain Congress
Amsterdam
June 2016
www.chyp.comPlease Copy and Distribute
David G.W. Birch
Director of Innovation at Consult Hyperion,
Visiting Professor, University of Surrey Business School
An internationally-recognised thought leader in
digital identity and digital money;
Named one of the global top 15 favourite sources of
business information (Wired magazine);
In the London FinTech top 10 most influential
commentators (City A.M.);
One of the top ten Twitter accounts followed by
innovators, along with Bill Gates and Richard
Branson (PR Daily);
One of the top ten most influential voices in banking
(Financial Brand);
Named one of the “Fintech Titans” (NextBank);
Ranked Europe’s most influential commentator on
emerging payments (Total Payments magazine).
2
www.chyp.comPlease Copy and Distribute
Structure
3
A simple “three domain” model to help us think about
digital identity and its relationship to shared ledgers.
An explanation (!) of why a shared ledger for identity
transactions might be innovative.
A discussion of practical options.
www.chyp.comPlease Copy and Distribute
Digital Identity Model
4
Digital Identity
A simple model to aid discussion
www.chyp.comPlease Copy and Distribute
Identification Problem: Trolls
5
People should be able to interact
pseudonymously!
Linking virtual identities to digital
identities is easy so just do it!
Let people have lots of virtual identities!
www.chyp.comPlease Copy and Distribute
A Three Domain Model
6
www.chyp.comPlease Copy and Distribute
Identification Domain
Binding a digital identity to a mundane identity is expensive
7
www.chyp.comPlease Copy and Distribute
Authentication Domain
For the foreseeable future, mobile the mass market
8
www.chyp.comPlease Copy and Distribute
Authorisation Domain
Allow me to… get on a plane
9
www.chyp.comPlease Copy and Distribute
Adding a Shared Ledger
10
Where is the Connection?
How do we connect identity to the
blockchain or any other kind of
shared ledger?
www.chyp.comPlease Copy and Distribute
3D-ID and the Shared Ledger
Hpw do we connect identity to a blockchain (or any other shared ledger) then?
11
www.chyp.comPlease Copy and Distribute
Identification Domain
We could put “real” identity to the blockchain
12
www.chyp.comPlease Copy and Distribute
Authentication Domain
We can put the digital identity (ie, a key pair) on the blockchain (ie, a wallet)
13
www.chyp.comPlease Copy and Distribute
Authorisation Domain
The blockchain as an immutable history of (pseudonymous) virtual identites
14
www.chyp.comPlease Copy and Distribute
So What?
Identity as a shared ledger application
15
www.chyp.comPlease Copy and Distribute
A Worked Example
16
KYC Thought Experiment
OK, is this a mass market solution?
www.chyp.comPlease Copy and Distribute
A Blockchain Implementation
Implement the identity ledger as a layer on the blockchain (eg, Blockstream)
17
www.chyp.comPlease Copy and Distribute
A Blockchain Implementation
Implement the identity ledger as a layer on the blockchain (eg, Blockstream)
18
www.chyp.comPlease Copy and Distribute
Customer Presents
19
The customer wants to do
something, like log in to a
bank or something similar
The customer points to a
financial services identity
smart contract on the
blockchain – sends a
transactions to the bank
smart contract
www.chyp.comPlease Copy and Distribute
Customer Authenticates
The customer demonstrates they have access to the private key (the wallet)
20
www.chyp.comPlease Copy and Distribute
Contact
21
Browse www.chyp.com
Follow @chyppings
Mail info@chyp.com
Comment http://www.chyp.com/media/blog/
Listen http://www.chyp.com/media/podcasts/
Consult Hyperion UK
Tweed House, 12 The Mount
Guildford, Surrey GU24HN, UK.
+44 1483 301793
Consult Hyperion USA
535 Madison Avenue, 19th Floor
New York, NY 10022, USA.
+1 888 835 6124
www.chyp.comPlease Copy and Distribute
Who Are Consult Hyperion?
Consult Hyperion specialises in working out the
opportunities and threats which result from the
harmony and collision of security, networks and
transactions.
We are constantly assessing these factors, as they
change continuously, and delivering ideas, solutions
and products to our clients
22
www.chyp.comPlease Copy and Distribute
Who Do They Work?
We have a structured and practical approach to secure
electronic transaction systems from the local to the global
23
Strategy
Roadmapping
Market Analysis
Business Modelling
Prototyping
Requirements Analysis
Risk Analysis
System Architecture
Technical Specification
Procurement Support
Software Development
Vendor Management
Project Management
Certification Management
Acceptance Testing
Evaluation
We can help clients in all phases of the product and service lifecycle, from the whiteboard scribble to
the person in the street’s everyday use
www.chyp.comPlease Copy and Distribute
Consult Hyperion…
24
www.chyp.comPlease Copy and Distribute
Learn the world of tomorrow’s transactions
Understanding the
Blockchain
• 7th April
Mobile & Cloud-
Based Payments
• 10th May
The World of Payment
Acceptance & mPOS
• 11th May
Digital Identity &
Authentication
• 24th May
Our new education programme
Demystify the Blockchain &
Bitcoin to understand what it
means for your business & the
future of transactions
Easy-to-understand introduction
into the key concepts, practical
implications and opportunities
that this technology could bring
to financial services and other
sectors?
Essential learning on
implementing & launching mobile
NFC or tokenised m-payment
services
Key aspects of Secure Element
(SE) & Host Card Emulation
(HCE) technologies, deployment
models, tokenisation & credential
management are all covered
Understand the new POS world
driven by innovation in an ever
changing retail payment
environment
Whether an acquirer, payment
provider or retailer, learn how to
build the right business case,
strategies & solutions to meet
the opportunities of the new
world of payments
Learn the importance of trusted
transactions in a digitally
connected world and what it
means for your business
Valuable insight into balancing
risk reduction vs customer
experience; showing you how to
select, implement and manage
the right identity solutions for
your business
In partnership withTo register / more information: www.paymentbusinessschool/events

CRUD chains

  • 1.
    www.chyp.comPlease Copy andDistribute1 The Blockchain and Identity The 3D-ID model and why we might want to store CRUD on the shared ledger Dutch Blockchain Congress Amsterdam June 2016
  • 2.
    www.chyp.comPlease Copy andDistribute David G.W. Birch Director of Innovation at Consult Hyperion, Visiting Professor, University of Surrey Business School An internationally-recognised thought leader in digital identity and digital money; Named one of the global top 15 favourite sources of business information (Wired magazine); In the London FinTech top 10 most influential commentators (City A.M.); One of the top ten Twitter accounts followed by innovators, along with Bill Gates and Richard Branson (PR Daily); One of the top ten most influential voices in banking (Financial Brand); Named one of the “Fintech Titans” (NextBank); Ranked Europe’s most influential commentator on emerging payments (Total Payments magazine). 2
  • 3.
    www.chyp.comPlease Copy andDistribute Structure 3 A simple “three domain” model to help us think about digital identity and its relationship to shared ledgers. An explanation (!) of why a shared ledger for identity transactions might be innovative. A discussion of practical options.
  • 4.
    www.chyp.comPlease Copy andDistribute Digital Identity Model 4 Digital Identity A simple model to aid discussion
  • 5.
    www.chyp.comPlease Copy andDistribute Identification Problem: Trolls 5 People should be able to interact pseudonymously! Linking virtual identities to digital identities is easy so just do it! Let people have lots of virtual identities!
  • 6.
    www.chyp.comPlease Copy andDistribute A Three Domain Model 6
  • 7.
    www.chyp.comPlease Copy andDistribute Identification Domain Binding a digital identity to a mundane identity is expensive 7
  • 8.
    www.chyp.comPlease Copy andDistribute Authentication Domain For the foreseeable future, mobile the mass market 8
  • 9.
    www.chyp.comPlease Copy andDistribute Authorisation Domain Allow me to… get on a plane 9
  • 10.
    www.chyp.comPlease Copy andDistribute Adding a Shared Ledger 10 Where is the Connection? How do we connect identity to the blockchain or any other kind of shared ledger?
  • 11.
    www.chyp.comPlease Copy andDistribute 3D-ID and the Shared Ledger Hpw do we connect identity to a blockchain (or any other shared ledger) then? 11
  • 12.
    www.chyp.comPlease Copy andDistribute Identification Domain We could put “real” identity to the blockchain 12
  • 13.
    www.chyp.comPlease Copy andDistribute Authentication Domain We can put the digital identity (ie, a key pair) on the blockchain (ie, a wallet) 13
  • 14.
    www.chyp.comPlease Copy andDistribute Authorisation Domain The blockchain as an immutable history of (pseudonymous) virtual identites 14
  • 15.
    www.chyp.comPlease Copy andDistribute So What? Identity as a shared ledger application 15
  • 16.
    www.chyp.comPlease Copy andDistribute A Worked Example 16 KYC Thought Experiment OK, is this a mass market solution?
  • 17.
    www.chyp.comPlease Copy andDistribute A Blockchain Implementation Implement the identity ledger as a layer on the blockchain (eg, Blockstream) 17
  • 18.
    www.chyp.comPlease Copy andDistribute A Blockchain Implementation Implement the identity ledger as a layer on the blockchain (eg, Blockstream) 18
  • 19.
    www.chyp.comPlease Copy andDistribute Customer Presents 19 The customer wants to do something, like log in to a bank or something similar The customer points to a financial services identity smart contract on the blockchain – sends a transactions to the bank smart contract
  • 20.
    www.chyp.comPlease Copy andDistribute Customer Authenticates The customer demonstrates they have access to the private key (the wallet) 20
  • 21.
    www.chyp.comPlease Copy andDistribute Contact 21 Browse www.chyp.com Follow @chyppings Mail info@chyp.com Comment http://www.chyp.com/media/blog/ Listen http://www.chyp.com/media/podcasts/ Consult Hyperion UK Tweed House, 12 The Mount Guildford, Surrey GU24HN, UK. +44 1483 301793 Consult Hyperion USA 535 Madison Avenue, 19th Floor New York, NY 10022, USA. +1 888 835 6124
  • 22.
    www.chyp.comPlease Copy andDistribute Who Are Consult Hyperion? Consult Hyperion specialises in working out the opportunities and threats which result from the harmony and collision of security, networks and transactions. We are constantly assessing these factors, as they change continuously, and delivering ideas, solutions and products to our clients 22
  • 23.
    www.chyp.comPlease Copy andDistribute Who Do They Work? We have a structured and practical approach to secure electronic transaction systems from the local to the global 23 Strategy Roadmapping Market Analysis Business Modelling Prototyping Requirements Analysis Risk Analysis System Architecture Technical Specification Procurement Support Software Development Vendor Management Project Management Certification Management Acceptance Testing Evaluation We can help clients in all phases of the product and service lifecycle, from the whiteboard scribble to the person in the street’s everyday use
  • 24.
    www.chyp.comPlease Copy andDistribute Consult Hyperion… 24
  • 25.
    www.chyp.comPlease Copy andDistribute Learn the world of tomorrow’s transactions Understanding the Blockchain • 7th April Mobile & Cloud- Based Payments • 10th May The World of Payment Acceptance & mPOS • 11th May Digital Identity & Authentication • 24th May Our new education programme Demystify the Blockchain & Bitcoin to understand what it means for your business & the future of transactions Easy-to-understand introduction into the key concepts, practical implications and opportunities that this technology could bring to financial services and other sectors? Essential learning on implementing & launching mobile NFC or tokenised m-payment services Key aspects of Secure Element (SE) & Host Card Emulation (HCE) technologies, deployment models, tokenisation & credential management are all covered Understand the new POS world driven by innovation in an ever changing retail payment environment Whether an acquirer, payment provider or retailer, learn how to build the right business case, strategies & solutions to meet the opportunities of the new world of payments Learn the importance of trusted transactions in a digitally connected world and what it means for your business Valuable insight into balancing risk reduction vs customer experience; showing you how to select, implement and manage the right identity solutions for your business In partnership withTo register / more information: www.paymentbusinessschool/events

Editor's Notes

  • #10 All the things you are The number of proposed biometric technologies increases daily. Starting with the well-established fingerprint systems to the more esoteric such as ear geometry (commonly left by listeners at crime scenes in Switzerland, apparently), gait (the way you walk) and body odour. How should you go about deciding the most appropriate technology for any given application? Biometric technologies are useful means of identifying people against databases or verifying that they are who they say they are. A small number of technologies are good at the former function (e.g. iris and fingerprint) whereas many are capable of verification against a biometric template stored on a token such as a smart card or travel document. There are many different applications for these two functions within UK government such as: Verifying that a document holder is the legitimate document holder by matching them against a biometric held within the document. Preventing duplicate applications for documents by searching against the database of currently issued documents. Preventing people holding different identities on different systems (e.g. Driving License vs Passport) by sharing and cross-checking biometric data. Ensuring that only legitimate members of staff have access to secure areas and systems. The complexity of the individual requirements of each application coupled with the speed of advance of biometric technologies means that there is no single best biometric for all applications.