SlideShare a Scribd company logo
Identity on the blockchain
Suzy Thomas
Head of Customer Experience
Suzy.Thomas@gbgplc.com
3
Electronic ID
We are here
Introduction to GBG
5 steps of identity
1
Reputation
2
Paper ID
4
Interoperability
5
Attributes
Easily and quickly
verify ID
electronically
Verify once, use
many times
Anonymous, secure
transacting
Behaviour, family
and social status
Documentary
evidence
How do we make that
leap from step 3 to 4?
3
Electronic ID
We are here
4
Interoperability
We need to
get to here
• Block chain – secure & decentralised
• Mobile optimised
• Biometrics – replace password
Identity on the blockchain
Consumer in the
driving seat
Person
• Name
• Address
• Telephone number
• DOB
Documents
• Passport
• National ID card
• Drivers licence
Regulatory Checks
• CRB
• Sanctions
• Credit check
One off verified
customer
Re-usable verified
customer
CitizenPass Identity Platform
Private data
kept on
device
- Each field is hashed
- Then digitally signed while on device
- Result sent to CitizenPass Service
Note: Data is n
ever exchanged
in clear text
Split private-key used to write
hashed record to the blockchain
blockchain
Merchant
Bank
Government
Re-Authentication
Login
Payment verification
Benefits
Less Fraud
• Banish the password - A third of fraud occurs from account takeover so instead of
a password we will use a verified identity, plus mobile encryption, plus biometrics plus blockchain
• Re-use of the verified identity - Use to re-authenticate more than before
+
Customer Experience
• Optimised for mobile - Reduce on-boarding time, specifically on mobile
• Interoperability - Take verified data to new services
+
Government Services
1 Account set up
- Personal Details
- Username
- Password
2
3
4
Security
Identity Verification
Security QuestionsINCREASED SECURITY
Summary
We’re a long way off a trusted, frictionless world. However, it wasn’t
so long ago when we were sending our passport in the post, so there
is hope…
…and blockchain could be a key enabler of this change
Thank you
Suzy Thomas
CitizenSafe Head Customer Experience
Suzy.Thomas@gbgplc.com
Summary

More Related Content

Viewers also liked

Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
Mark Diodati
 
Time for some new thinking about IoT
Time for some new thinking about IoTTime for some new thinking about IoT
Time for some new thinking about IoT
David Birch
 
Identity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsIdentity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management Systems
ForgeRock
 
Smart Contracts and Identity
Smart Contracts and IdentitySmart Contracts and Identity
Smart Contracts and Identity
Pascal Van Hecke
 
BIMA Blockchain Breakfast Briefing | Simon Gill Presentation | DigitasLBi
BIMA Blockchain Breakfast Briefing | Simon Gill Presentation | DigitasLBiBIMA Blockchain Breakfast Briefing | Simon Gill Presentation | DigitasLBi
BIMA Blockchain Breakfast Briefing | Simon Gill Presentation | DigitasLBi
BIMA (British Interactive Media Association)
 
Week 1 Using The Social Web For Social Change - Elluminate (#bgimgt566sx)
Week 1 Using The Social Web For Social Change - Elluminate (#bgimgt566sx)Week 1 Using The Social Web For Social Change - Elluminate (#bgimgt566sx)
Week 1 Using The Social Web For Social Change - Elluminate (#bgimgt566sx)
Christopher Allen
 
Blockchain 101 & 102: A primer for every board and c-level.
Blockchain 101 & 102: A primer for every board and c-level.Blockchain 101 & 102: A primer for every board and c-level.
Blockchain 101 & 102: A primer for every board and c-level.
Richie Etwaru
 
How Blockchain Technology is Reshaping Personal Identity
How Blockchain Technology is Reshaping Personal IdentityHow Blockchain Technology is Reshaping Personal Identity
How Blockchain Technology is Reshaping Personal Identity
Melanie Swan
 
Making Blockchain Real for Business Explained - ibm
Making Blockchain Real for Business Explained - ibmMaking Blockchain Real for Business Explained - ibm
Making Blockchain Real for Business Explained - ibm
Diego Alberto Tamayo
 
Structured approach to blockchain and consensus techniques
Structured approach to blockchain and consensus techniquesStructured approach to blockchain and consensus techniques
Structured approach to blockchain and consensus techniques
Vasiliy Suvorov
 
Blockchains 101 - Muneeb Ali, Blockstack Labs
Blockchains 101  - Muneeb Ali, Blockstack LabsBlockchains 101  - Muneeb Ali, Blockstack Labs
Blockchains 101 - Muneeb Ali, Blockstack Labs
WithTheBest
 
Blockchain Financial Networks
Blockchain Financial NetworksBlockchain Financial Networks
Blockchain Financial Networks
Melanie Swan
 
Blockchain explained - Brunswick Review Spotlight on Cybersecurity
Blockchain explained - Brunswick Review Spotlight on CybersecurityBlockchain explained - Brunswick Review Spotlight on Cybersecurity
Blockchain explained - Brunswick Review Spotlight on Cybersecurity
Brunswick Group
 
Blockchain Explained
Blockchain ExplainedBlockchain Explained
Blockchain Explained
Shermin Voshmgir
 
Spine Examination And Scoliosis
Spine Examination And ScoliosisSpine Examination And Scoliosis
Spine Examination And Scoliosis
drkmliau
 

Viewers also liked (15)

Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
 
Time for some new thinking about IoT
Time for some new thinking about IoTTime for some new thinking about IoT
Time for some new thinking about IoT
 
Identity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsIdentity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management Systems
 
Smart Contracts and Identity
Smart Contracts and IdentitySmart Contracts and Identity
Smart Contracts and Identity
 
BIMA Blockchain Breakfast Briefing | Simon Gill Presentation | DigitasLBi
BIMA Blockchain Breakfast Briefing | Simon Gill Presentation | DigitasLBiBIMA Blockchain Breakfast Briefing | Simon Gill Presentation | DigitasLBi
BIMA Blockchain Breakfast Briefing | Simon Gill Presentation | DigitasLBi
 
Week 1 Using The Social Web For Social Change - Elluminate (#bgimgt566sx)
Week 1 Using The Social Web For Social Change - Elluminate (#bgimgt566sx)Week 1 Using The Social Web For Social Change - Elluminate (#bgimgt566sx)
Week 1 Using The Social Web For Social Change - Elluminate (#bgimgt566sx)
 
Blockchain 101 & 102: A primer for every board and c-level.
Blockchain 101 & 102: A primer for every board and c-level.Blockchain 101 & 102: A primer for every board and c-level.
Blockchain 101 & 102: A primer for every board and c-level.
 
How Blockchain Technology is Reshaping Personal Identity
How Blockchain Technology is Reshaping Personal IdentityHow Blockchain Technology is Reshaping Personal Identity
How Blockchain Technology is Reshaping Personal Identity
 
Making Blockchain Real for Business Explained - ibm
Making Blockchain Real for Business Explained - ibmMaking Blockchain Real for Business Explained - ibm
Making Blockchain Real for Business Explained - ibm
 
Structured approach to blockchain and consensus techniques
Structured approach to blockchain and consensus techniquesStructured approach to blockchain and consensus techniques
Structured approach to blockchain and consensus techniques
 
Blockchains 101 - Muneeb Ali, Blockstack Labs
Blockchains 101  - Muneeb Ali, Blockstack LabsBlockchains 101  - Muneeb Ali, Blockstack Labs
Blockchains 101 - Muneeb Ali, Blockstack Labs
 
Blockchain Financial Networks
Blockchain Financial NetworksBlockchain Financial Networks
Blockchain Financial Networks
 
Blockchain explained - Brunswick Review Spotlight on Cybersecurity
Blockchain explained - Brunswick Review Spotlight on CybersecurityBlockchain explained - Brunswick Review Spotlight on Cybersecurity
Blockchain explained - Brunswick Review Spotlight on Cybersecurity
 
Blockchain Explained
Blockchain ExplainedBlockchain Explained
Blockchain Explained
 
Spine Examination And Scoliosis
Spine Examination And ScoliosisSpine Examination And Scoliosis
Spine Examination And Scoliosis
 

Similar to BIMA Blockchain Breakfast Briefing | Suzy Thomas Presentation | GBG PLC

Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun
tejashree bangera
 
IDENTOMAT PRODUCT DECK
IDENTOMAT PRODUCT DECKIDENTOMAT PRODUCT DECK
IDENTOMAT PRODUCT DECK
DavidLomiashvili
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!Process Fusion Inc
 
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
Damrongsak Kobtakul
 
Why and how to implement strong authentication on the web cartes 2010 - pat...
Why and how to implement strong authentication on the web   cartes 2010 - pat...Why and how to implement strong authentication on the web   cartes 2010 - pat...
Why and how to implement strong authentication on the web cartes 2010 - pat...Keynectis
 
Enterprise Content Management and Digital Signiatures
Enterprise Content Management and Digital SigniaturesEnterprise Content Management and Digital Signiatures
Enterprise Content Management and Digital SigniaturesLaserfiche
 
Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?
Electronic Signature & Records Association
 
Digital Identity & Security
Digital Identity & SecurityDigital Identity & Security
Digital Identity & Security
Michael Bromby
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Nicholas Davis
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Nicholas Davis
 
Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)
FaizahFarook
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
Shubham Sharma
 
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Techsylvania
 
Digital certificate
Digital certificateDigital certificate
Digital certificate
Komal Agarwal
 
Proofing ex post facto from Cloud Identity Summit 2017
Proofing ex post facto from Cloud Identity Summit 2017Proofing ex post facto from Cloud Identity Summit 2017
Proofing ex post facto from Cloud Identity Summit 2017
David Kelts, CIPT
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Dr. Prashant Vats
 
Digital signature provider in patna
Digital signature provider in patnaDigital signature provider in patna
Digital signature provider in patna
Class3DigitalSignatu
 
RahasNym: Preventing Linkability in the Digital Identity Eco System
RahasNym: Preventing Linkability in the Digital Identity Eco SystemRahasNym: Preventing Linkability in the Digital Identity Eco System
RahasNym: Preventing Linkability in the Digital Identity Eco System
HasiniG
 
Digital Signature provider in Delhi
Digital Signature provider in DelhiDigital Signature provider in Delhi
Digital Signature provider in Delhi
Digital Signature Agency
 

Similar to BIMA Blockchain Breakfast Briefing | Suzy Thomas Presentation | GBG PLC (20)

Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
IDENTOMAT PRODUCT DECK
IDENTOMAT PRODUCT DECKIDENTOMAT PRODUCT DECK
IDENTOMAT PRODUCT DECK
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
 
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
 
Why and how to implement strong authentication on the web cartes 2010 - pat...
Why and how to implement strong authentication on the web   cartes 2010 - pat...Why and how to implement strong authentication on the web   cartes 2010 - pat...
Why and how to implement strong authentication on the web cartes 2010 - pat...
 
Enterprise Content Management and Digital Signiatures
Enterprise Content Management and Digital SigniaturesEnterprise Content Management and Digital Signiatures
Enterprise Content Management and Digital Signiatures
 
Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?
 
Digital Identity & Security
Digital Identity & SecurityDigital Identity & Security
Digital Identity & Security
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
 
Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)Digital Signature Certificate (DSC)
Digital Signature Certificate (DSC)
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
 
Digital certificate
Digital certificateDigital certificate
Digital certificate
 
Proofing ex post facto from Cloud Identity Summit 2017
Proofing ex post facto from Cloud Identity Summit 2017Proofing ex post facto from Cloud Identity Summit 2017
Proofing ex post facto from Cloud Identity Summit 2017
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature provider in patna
Digital signature provider in patnaDigital signature provider in patna
Digital signature provider in patna
 
RahasNym: Preventing Linkability in the Digital Identity Eco System
RahasNym: Preventing Linkability in the Digital Identity Eco SystemRahasNym: Preventing Linkability in the Digital Identity Eco System
RahasNym: Preventing Linkability in the Digital Identity Eco System
 
Digital Signature provider in Delhi
Digital Signature provider in DelhiDigital Signature provider in Delhi
Digital Signature provider in Delhi
 

More from BIMA (British Interactive Media Association)

BIMA Breakfast Briefing | Creative Ai
BIMA Breakfast Briefing | Creative AiBIMA Breakfast Briefing | Creative Ai
BIMA Breakfast Briefing | Creative Ai
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing | Headless Content Management
BIMA Breakfast Briefing | Headless Content ManagementBIMA Breakfast Briefing | Headless Content Management
BIMA Breakfast Briefing | Headless Content Management
BIMA (British Interactive Media Association)
 
BIMA Scotland Future of Fashion Evening 14 March 2018
BIMA Scotland Future of Fashion Evening 14 March 2018BIMA Scotland Future of Fashion Evening 14 March 2018
BIMA Scotland Future of Fashion Evening 14 March 2018
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing: The Rise Of Automation - AI and Machine Learning
BIMA Breakfast Briefing: The Rise Of Automation - AI and Machine LearningBIMA Breakfast Briefing: The Rise Of Automation - AI and Machine Learning
BIMA Breakfast Briefing: The Rise Of Automation - AI and Machine Learning
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing | Incubating Innovation | 28 Feb
BIMA Breakfast Briefing | Incubating Innovation | 28 FebBIMA Breakfast Briefing | Incubating Innovation | 28 Feb
BIMA Breakfast Briefing | Incubating Innovation | 28 Feb
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
BIMA Breakfast Briefing | GDPR & Why People Say YES to MarketingBIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
BIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
BIMA (British Interactive Media Association)
 
BIMA Evening Masterclass | Instagram & World Domination
BIMA Evening Masterclass | Instagram & World DominationBIMA Evening Masterclass | Instagram & World Domination
BIMA Evening Masterclass | Instagram & World Domination
BIMA (British Interactive Media Association)
 
BIMA + Creative Equals Evening Masterclass: How to Shape Great Creative
BIMA + Creative Equals Evening Masterclass: How to Shape Great CreativeBIMA + Creative Equals Evening Masterclass: How to Shape Great Creative
BIMA + Creative Equals Evening Masterclass: How to Shape Great Creative
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing | Artificial Intelligence and Robots
BIMA Breakfast Briefing | Artificial Intelligence and RobotsBIMA Breakfast Briefing | Artificial Intelligence and Robots
BIMA Breakfast Briefing | Artificial Intelligence and Robots
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing | How to 'do' Diversity
BIMA Breakfast Briefing | How to 'do' DiversityBIMA Breakfast Briefing | How to 'do' Diversity
BIMA Breakfast Briefing | How to 'do' Diversity
BIMA (British Interactive Media Association)
 
BIMA Next Level Agency Leadership | Don Elgie Keynote
BIMA Next Level Agency Leadership | Don Elgie KeynoteBIMA Next Level Agency Leadership | Don Elgie Keynote
BIMA Next Level Agency Leadership | Don Elgie Keynote
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing | Breaking into Asian Markets
BIMA Breakfast Briefing | Breaking into Asian MarketsBIMA Breakfast Briefing | Breaking into Asian Markets
BIMA Breakfast Briefing | Breaking into Asian Markets
BIMA (British Interactive Media Association)
 
BIMA Evening Masterclass | How to win a BIMA Award
BIMA Evening Masterclass | How to win a BIMA AwardBIMA Evening Masterclass | How to win a BIMA Award
BIMA Evening Masterclass | How to win a BIMA Award
BIMA (British Interactive Media Association)
 
BIMA Blockchain Breakfast Briefing | Benjamin Maugain Presentation | Cyber-Duck
BIMA Blockchain Breakfast Briefing | Benjamin Maugain Presentation | Cyber-DuckBIMA Blockchain Breakfast Briefing | Benjamin Maugain Presentation | Cyber-Duck
BIMA Blockchain Breakfast Briefing | Benjamin Maugain Presentation | Cyber-Duck
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing | The Art of Agile Marketing
BIMA Breakfast Briefing | The Art of Agile MarketingBIMA Breakfast Briefing | The Art of Agile Marketing
BIMA Breakfast Briefing | The Art of Agile Marketing
BIMA (British Interactive Media Association)
 
BIMA CSD Presentation by Rufus Leonard
BIMA CSD Presentation by Rufus LeonardBIMA CSD Presentation by Rufus Leonard
BIMA CSD Presentation by Rufus Leonard
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing | Productivity | Daniel Harvey | SapientNitro
BIMA Breakfast Briefing | Productivity | Daniel Harvey | SapientNitro BIMA Breakfast Briefing | Productivity | Daniel Harvey | SapientNitro
BIMA Breakfast Briefing | Productivity | Daniel Harvey | SapientNitro
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing | Vlogging | Lindsay Nuttall | BBH | Presentation
BIMA Breakfast Briefing | Vlogging | Lindsay Nuttall | BBH | PresentationBIMA Breakfast Briefing | Vlogging | Lindsay Nuttall | BBH | Presentation
BIMA Breakfast Briefing | Vlogging | Lindsay Nuttall | BBH | Presentation
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing | Vlogging | Cara Parish | Cult LDN | Presentation
BIMA Breakfast Briefing | Vlogging | Cara Parish | Cult LDN | PresentationBIMA Breakfast Briefing | Vlogging | Cara Parish | Cult LDN | Presentation
BIMA Breakfast Briefing | Vlogging | Cara Parish | Cult LDN | Presentation
BIMA (British Interactive Media Association)
 
BIMA Breakfast Briefing | Vlogging | James Stafford | Stylehaul | Presentation
BIMA Breakfast Briefing | Vlogging | James Stafford | Stylehaul | PresentationBIMA Breakfast Briefing | Vlogging | James Stafford | Stylehaul | Presentation
BIMA Breakfast Briefing | Vlogging | James Stafford | Stylehaul | Presentation
BIMA (British Interactive Media Association)
 

More from BIMA (British Interactive Media Association) (20)

BIMA Breakfast Briefing | Creative Ai
BIMA Breakfast Briefing | Creative AiBIMA Breakfast Briefing | Creative Ai
BIMA Breakfast Briefing | Creative Ai
 
BIMA Breakfast Briefing | Headless Content Management
BIMA Breakfast Briefing | Headless Content ManagementBIMA Breakfast Briefing | Headless Content Management
BIMA Breakfast Briefing | Headless Content Management
 
BIMA Scotland Future of Fashion Evening 14 March 2018
BIMA Scotland Future of Fashion Evening 14 March 2018BIMA Scotland Future of Fashion Evening 14 March 2018
BIMA Scotland Future of Fashion Evening 14 March 2018
 
BIMA Breakfast Briefing: The Rise Of Automation - AI and Machine Learning
BIMA Breakfast Briefing: The Rise Of Automation - AI and Machine LearningBIMA Breakfast Briefing: The Rise Of Automation - AI and Machine Learning
BIMA Breakfast Briefing: The Rise Of Automation - AI and Machine Learning
 
BIMA Breakfast Briefing | Incubating Innovation | 28 Feb
BIMA Breakfast Briefing | Incubating Innovation | 28 FebBIMA Breakfast Briefing | Incubating Innovation | 28 Feb
BIMA Breakfast Briefing | Incubating Innovation | 28 Feb
 
BIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
BIMA Breakfast Briefing | GDPR & Why People Say YES to MarketingBIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
BIMA Breakfast Briefing | GDPR & Why People Say YES to Marketing
 
BIMA Evening Masterclass | Instagram & World Domination
BIMA Evening Masterclass | Instagram & World DominationBIMA Evening Masterclass | Instagram & World Domination
BIMA Evening Masterclass | Instagram & World Domination
 
BIMA + Creative Equals Evening Masterclass: How to Shape Great Creative
BIMA + Creative Equals Evening Masterclass: How to Shape Great CreativeBIMA + Creative Equals Evening Masterclass: How to Shape Great Creative
BIMA + Creative Equals Evening Masterclass: How to Shape Great Creative
 
BIMA Breakfast Briefing | Artificial Intelligence and Robots
BIMA Breakfast Briefing | Artificial Intelligence and RobotsBIMA Breakfast Briefing | Artificial Intelligence and Robots
BIMA Breakfast Briefing | Artificial Intelligence and Robots
 
BIMA Breakfast Briefing | How to 'do' Diversity
BIMA Breakfast Briefing | How to 'do' DiversityBIMA Breakfast Briefing | How to 'do' Diversity
BIMA Breakfast Briefing | How to 'do' Diversity
 
BIMA Next Level Agency Leadership | Don Elgie Keynote
BIMA Next Level Agency Leadership | Don Elgie KeynoteBIMA Next Level Agency Leadership | Don Elgie Keynote
BIMA Next Level Agency Leadership | Don Elgie Keynote
 
BIMA Breakfast Briefing | Breaking into Asian Markets
BIMA Breakfast Briefing | Breaking into Asian MarketsBIMA Breakfast Briefing | Breaking into Asian Markets
BIMA Breakfast Briefing | Breaking into Asian Markets
 
BIMA Evening Masterclass | How to win a BIMA Award
BIMA Evening Masterclass | How to win a BIMA AwardBIMA Evening Masterclass | How to win a BIMA Award
BIMA Evening Masterclass | How to win a BIMA Award
 
BIMA Blockchain Breakfast Briefing | Benjamin Maugain Presentation | Cyber-Duck
BIMA Blockchain Breakfast Briefing | Benjamin Maugain Presentation | Cyber-DuckBIMA Blockchain Breakfast Briefing | Benjamin Maugain Presentation | Cyber-Duck
BIMA Blockchain Breakfast Briefing | Benjamin Maugain Presentation | Cyber-Duck
 
BIMA Breakfast Briefing | The Art of Agile Marketing
BIMA Breakfast Briefing | The Art of Agile MarketingBIMA Breakfast Briefing | The Art of Agile Marketing
BIMA Breakfast Briefing | The Art of Agile Marketing
 
BIMA CSD Presentation by Rufus Leonard
BIMA CSD Presentation by Rufus LeonardBIMA CSD Presentation by Rufus Leonard
BIMA CSD Presentation by Rufus Leonard
 
BIMA Breakfast Briefing | Productivity | Daniel Harvey | SapientNitro
BIMA Breakfast Briefing | Productivity | Daniel Harvey | SapientNitro BIMA Breakfast Briefing | Productivity | Daniel Harvey | SapientNitro
BIMA Breakfast Briefing | Productivity | Daniel Harvey | SapientNitro
 
BIMA Breakfast Briefing | Vlogging | Lindsay Nuttall | BBH | Presentation
BIMA Breakfast Briefing | Vlogging | Lindsay Nuttall | BBH | PresentationBIMA Breakfast Briefing | Vlogging | Lindsay Nuttall | BBH | Presentation
BIMA Breakfast Briefing | Vlogging | Lindsay Nuttall | BBH | Presentation
 
BIMA Breakfast Briefing | Vlogging | Cara Parish | Cult LDN | Presentation
BIMA Breakfast Briefing | Vlogging | Cara Parish | Cult LDN | PresentationBIMA Breakfast Briefing | Vlogging | Cara Parish | Cult LDN | Presentation
BIMA Breakfast Briefing | Vlogging | Cara Parish | Cult LDN | Presentation
 
BIMA Breakfast Briefing | Vlogging | James Stafford | Stylehaul | Presentation
BIMA Breakfast Briefing | Vlogging | James Stafford | Stylehaul | PresentationBIMA Breakfast Briefing | Vlogging | James Stafford | Stylehaul | Presentation
BIMA Breakfast Briefing | Vlogging | James Stafford | Stylehaul | Presentation
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

BIMA Blockchain Breakfast Briefing | Suzy Thomas Presentation | GBG PLC

  • 1. Identity on the blockchain Suzy Thomas Head of Customer Experience Suzy.Thomas@gbgplc.com
  • 2. 3 Electronic ID We are here Introduction to GBG 5 steps of identity 1 Reputation 2 Paper ID 4 Interoperability 5 Attributes Easily and quickly verify ID electronically Verify once, use many times Anonymous, secure transacting Behaviour, family and social status Documentary evidence
  • 3. How do we make that leap from step 3 to 4? 3 Electronic ID We are here 4 Interoperability We need to get to here • Block chain – secure & decentralised • Mobile optimised • Biometrics – replace password
  • 4. Identity on the blockchain Consumer in the driving seat Person • Name • Address • Telephone number • DOB Documents • Passport • National ID card • Drivers licence Regulatory Checks • CRB • Sanctions • Credit check One off verified customer Re-usable verified customer
  • 5. CitizenPass Identity Platform Private data kept on device - Each field is hashed - Then digitally signed while on device - Result sent to CitizenPass Service Note: Data is n ever exchanged in clear text Split private-key used to write hashed record to the blockchain blockchain Merchant Bank Government Re-Authentication Login Payment verification
  • 6. Benefits Less Fraud • Banish the password - A third of fraud occurs from account takeover so instead of a password we will use a verified identity, plus mobile encryption, plus biometrics plus blockchain • Re-use of the verified identity - Use to re-authenticate more than before + Customer Experience • Optimised for mobile - Reduce on-boarding time, specifically on mobile • Interoperability - Take verified data to new services +
  • 7. Government Services 1 Account set up - Personal Details - Username - Password 2 3 4 Security Identity Verification Security QuestionsINCREASED SECURITY
  • 8. Summary We’re a long way off a trusted, frictionless world. However, it wasn’t so long ago when we were sending our passport in the post, so there is hope… …and blockchain could be a key enabler of this change Thank you Suzy Thomas CitizenSafe Head Customer Experience Suzy.Thomas@gbgplc.com Summary

Editor's Notes

  1. Thanks Benjamin, I am now going to show you a case study of how block chain technology can be used to improve online identity verification.
  2. Before we invented official ID documents our identity was based on our REPUTATION Then paper ID came along and you had to physically show organisations your documentation Then the internet allowed quicker easier electronic verification of ID and this is where we are today Our aim is to allow users to verify once and use that verified ID over and over again With the ultimate aim of Attribute exchange making anonymous interaction possible by only passing attributes such as over 18 or verified ID.
  3. To help us move from step 3-4 we have created CitizenPass. It enables: A single federated identity that uses Blockchain technology to provide a secure and de-centralised solution Which is fully optimised for mobile And uses biometrics to replace passwords which simplifies the customer journey
  4. CitizenPass lets the consumer control their identity. We use our existing award winning ID3gloabl product functionality to carry out the ID verification and then allow the consumer to choose to reuse their verified identity
  5. If the user has chosen to reuse their verified identity they can save it on their mobile device and re-use it to sign in to other websites that feature CitizenPass The user will be directed to download the CitizenPass App and the information is pre populated or if registering with CitizenPass they enter their personal information and upload their identity documents – which are then verified. A point to note is that all private data is kept on the device The information is hashed (or encrypted) and sent to our CitizenPass identity service From there the verified identity is stamped on the blockchain and the keys provided to the users devices Then any merchants/Bank/Government etc who signs up to CitizenPass, can re-use this verification via our identity service and allow users to re-authenticate themselves when they access the service, using only their mobile device and finger print
  6. The benefits of using block chain technology are reducing fraud and improving the customer experience: By banishing the password we can reduce fraud by replacing the password with: A Verified Identity Mobile encryption Biometrics And blockchain technology We can also improve the customer experience with quicker onboarding specifically on mobile devices .
  7. One last point I wanted to mention was the potential of integrating blockchain technology into an exciting solution we are getting ready to launch. CitizenSafe is our Government Identity Verification solution part of the GOV.UK Verify service. With the introduction of CitizenPass functionality we will be able to improve the customer experience using biometrics instead of passwords and improve security as previously discussed.
  8. I know what is a lot to over in a couple of minutes but I will be around along side my colleague Gareth who is the CitizenPass product Manager to cover these solutions in more depth. I’ll leave you with this thought… Thank you for listening.