SlideShare a Scribd company logo
Evernym
@evernym | info@evernym.com | February 2020
Getting started with
Self-Sovereign Identity
PRESENTER
Jamie Smith
Strategic Engagement Director
PRESENTER
Drummond Reed
Chief Trust Officer
On the agenda today
Self Sovereign Identity (SSI) - a quick introduction
Crossing contexts: A day in the life with SSI
Where SSI really makes a difference
Fireside chat with Drummond Reed
Getting started & the first 90 days
Q&A
If you have questions….
Please write them in the Zoom Q&A, and
we’ll cover them after the presentation.
Please note, this webinar is being recorded
Self-Sovereign Identity
answers the question:
Who is on the other end of
my connection?
It’s a whole new way
to move and prove digital data:
And it will transform the digital world.
With a single tap or click, you can:
● Login
● Checkout
● Apply
● Register
● Authenticate
● Message
How does it work?
1: Secure Connections
A B
“Connection
Broker”
email provider
WhatsApp
Facebook
Data hub
The old way
Connection brokers
establish and maintain
digital connections
between parties
A B
The new way
Two parties can
independently form
secure, unique and
persistent connections.
No 3rd party needed
Secure connections enable trusted communications
Data watermarking gives data cryptographic superpowers
Anyone can verify the authenticity of the data, including:
• Who issued the data
• Was it only issued to the presenter
• Has it been tampered with
• Has it been revoked
Watermarked data - Verifiable Credentials - can be checked by anyone
Any data, about
anything, issued
by anyone
2: Data watermarking (Verifiable Credentials)
Watermarked data can be verified using public key
cryptography
The public keys of ‘issuers’ needs to be stored
somewhere
• Trusted: Run by many organizations
• Secure: Tamperproof
• Ordered: Chronological data
These are the characteristics of distributed ledgers
The public key directory gives everyone the ability to verify data
3: Trusted Public Key Directory
The Three Pillars of Self-Sovereign Identity
1. secure
connections
2. digital data
watermarking
3. trusted, tamper-proof
public key directory
self-sovereign
identity
verifiable
data
verifiable
connections
private data
exchange
And the best part?
Open Standards, Open Source
With no vendor lock-in
…just like the internet
Open Standards
1. secure
connections
2. digital data
watermarking
3. trusted, tamper-proof
public key directory
self-sovereign
identity
verifiable
data
verifiable
connections
private data
exchangeDecentralized
Identifiers (DIDs)
Verifiable
Credentials
Open Source
1. secure
connections
2. digital data
watermarking
3. trusted, tamper-proof
public key directory
self-sovereign
identity
verifiable
data
verifiable
connections
private data
exchange
A day in the life with SSI
Create peer-to-peer connection
with college
Issued first
student credential issued
Meeting with course professor
Issues grades and credits
Login with digital wallet
Authorization with credential
No username or password
Message from skydiving club:
join for the year?
Secure, private auditable response
New skydiving club credential
Internship advertised on poster
Scans QR code - connection offer
Request to share data to apply
Scans QR code on tablet
Shares data
> valid ticket, over 18
Event ticket as a credential
All of this is possible with open source SSI tools today
All use cases interact with the same student wallet (app)
Leave existing IT in place - no need to rip-and-replace
You can start with a single use case - start small and scale
Where does SSI really make a difference?
Our life is fragmented, distributed
You
University Email
Skydiving club Student union
Employer
Library
We have multiple ‘silos’ for identity
You
University Email
Skydiving club Student union
Library
Employer
University Email
Skydiving club Student union
Employer
Library
The answer is often ‘build a bigger silo!’
You
University Email
Skydiving club Student union
Library
Employer
University Email
Skydiving club Student union
Employer
Library
Which committee should manage identity policy?
How can we connect all these different systems?
We don’t want another 3 year ‘mega IT program’
What if the student
was the point of integration?
Putting the student at the center
of her digital life
You
University
Employer
1. Who issued it?
2. Only to you?
3. Has it been changed?
4. Has it been revoked?
You
University
Employer
Putting the student at the center
of her digital life
You
University
Email
Skydiving club
Student union
Employer
Library
Putting the student at the center
of her digital life
● SSI is changing the way we think about
identity, powering:
○ Secure connections
○ Verifiable credentials
○ Seamless experiences
○ Real digital transformation
● From ‘closed identity’ to ‘open identity’
● Enabling entirely new ‘cross-sector’ and
‘cross-silo’ business models
Bringing it all together
A fireside chat with
Drummond Reed
● Chief Trust Officer, Evernym
● Trustee, Sovrin Foundation
● Co-Chair, Sovrin Governance Framework WG
● Member, Sovrin Guardianship WG
● Co-Author, W3C DID Spec
● 20+ years in Internet identity
● 15+ years in identity standards
Want to get started?
Join 70+ organizations making SSI possible.
Accelerate learning about SSI and
unlock new innovation
We can enable you to:
✓ Learn by doing, fast
○ Develop real solutions in days and weeks
✓ Connect and align with existing SSI initiatives
○ Build on work already done on SSI tech,
policies and governance
✓ Develop the business case and policy plan
○ Understand the impacts on processes and IT
○ Assess and design policy changes
Your SSI project - example first 90 days
1. Learn
In 30 days
● Build demos in days
● Map use cases, user
journeys and data
● Set up initial SSI capabilities
● Develop prototypes
● Align to existing initiatives -
policies, data, SSI tech
Your SSI project - example first 90 days
1. Learn 2. Build
In 30 days
● Build demos in days
● Map use cases, user
journeys and data
● Set up initial SSI capabilities
● Develop prototypes
● Align to existing initiatives -
policies, data, SSI tech
In 60 days
● Design and develop PoCs
● Assess policies and
governance
● Engage existing initiatives
● Map the org impacts
● Outline the business case
Your SSI project - example first 90 days
1. Learn 2. Build 3. Deliver
In 30 days
● Build demos in days
● Map use cases, user
journeys and data
● Set up initial SSI capabilities
● Develop prototypes
● Align to existing initiatives -
policies, data, SSI tech
In 60 days
● Design and develop PoCs
● Assess policies and
governance
● Engage existing initiatives
● Map the org impacts
● Outline the business case
In 90 days
● Plan and deliver initial
pilot
● Integrate with existing
systems
● Plan policy and
governance requirements
and changes
● Develop the business case
Get started today
Join 70+ organizations in taking self-sovereign
identity for a test flight.
www.evernym.com/plans/
Questions!
www.evernym.com
Please put questions in the Zoom Q&A
Connect with us via Twitter or Email
@evernym @jamiedsmith @drummondreed
info@evernym.com

More Related Content

What's hot

The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
Evernym
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
Evernym
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Jim Flynn
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
Evernym
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
Evernym
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
SSIMeetup
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
Kaliya "Identity Woman" Young
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
Heather Vescent
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Kaliya "Identity Woman" Young
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
Kaliya "Identity Woman" Young
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
SSIMeetup
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
Kaliya "Identity Woman" Young
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
SSIMeetup
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
Kaliya "Identity Woman" Young
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
Karyl Fowler
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
SSIMeetup
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
SSIMeetup
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
SSIMeetup
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
SSIMeetup
 

What's hot (20)

The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
 

Similar to Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar

SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
SSIMeetup
 
How to Disrupt Digital Product Cultures by LearnVest VP of Product
How to Disrupt Digital Product Cultures by LearnVest VP of ProductHow to Disrupt Digital Product Cultures by LearnVest VP of Product
How to Disrupt Digital Product Cultures by LearnVest VP of Product
Product School
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
drummondreed
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
Drew Madelung
 
CIO Advisory Board 18102013 - Social Enterprise
CIO Advisory Board   18102013 - Social EnterpriseCIO Advisory Board   18102013 - Social Enterprise
CIO Advisory Board 18102013 - Social Enterprise
Tim Paridaens
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
Peter Bihr
 
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
Brian Culver
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
Darrell O'Donnell
 
Unlock your Big Data with Analytics and BI on Office 365
Unlock your Big Data with Analytics and BI on Office 365Unlock your Big Data with Analytics and BI on Office 365
Unlock your Big Data with Analytics and BI on Office 365
Brian Culver
 
Building Engaging Customer Experiences Powered by MongoDB
Building Engaging Customer Experiences Powered by MongoDBBuilding Engaging Customer Experiences Powered by MongoDB
Building Engaging Customer Experiences Powered by MongoDB
rivetlogic
 
Social Media Assessment Case Study Citrix Webex
Social Media Assessment Case Study Citrix WebexSocial Media Assessment Case Study Citrix Webex
Social Media Assessment Case Study Citrix Webex
Society3
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
MicheleNati
 
10 Essentials for Effective Teams Governance
10 Essentials for Effective Teams Governance10 Essentials for Effective Teams Governance
10 Essentials for Effective Teams Governance
Christian Buckley
 
How to Implement Social Selling Strategies into your Sales Department - Assoc...
How to Implement Social Selling Strategies into your Sales Department - Assoc...How to Implement Social Selling Strategies into your Sales Department - Assoc...
How to Implement Social Selling Strategies into your Sales Department - Assoc...
Dent
 
SPT 104 Unlock your big data with analytics and BI on Office 365
SPT 104 Unlock your big data with analytics and BI on Office 365SPT 104 Unlock your big data with analytics and BI on Office 365
SPT 104 Unlock your big data with analytics and BI on Office 365
Brian Culver
 
The ROI of UX
The ROI of UXThe ROI of UX
The ROI of UX
Erik Wingren
 
The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...
Pieter De Leenheer
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
GGV Capital
 
Brookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 twoBrookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 two
gvaughan
 

Similar to Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar (20)

SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
How to Disrupt Digital Product Cultures by LearnVest VP of Product
How to Disrupt Digital Product Cultures by LearnVest VP of ProductHow to Disrupt Digital Product Cultures by LearnVest VP of Product
How to Disrupt Digital Product Cultures by LearnVest VP of Product
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
CIO Advisory Board 18102013 - Social Enterprise
CIO Advisory Board   18102013 - Social EnterpriseCIO Advisory Board   18102013 - Social Enterprise
CIO Advisory Board 18102013 - Social Enterprise
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
 
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
SPS Utah 2016 - Unlock your big data with analytics and BI on Office 365
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Unlock your Big Data with Analytics and BI on Office 365
Unlock your Big Data with Analytics and BI on Office 365Unlock your Big Data with Analytics and BI on Office 365
Unlock your Big Data with Analytics and BI on Office 365
 
Building Engaging Customer Experiences Powered by MongoDB
Building Engaging Customer Experiences Powered by MongoDBBuilding Engaging Customer Experiences Powered by MongoDB
Building Engaging Customer Experiences Powered by MongoDB
 
Social Media Assessment Case Study Citrix Webex
Social Media Assessment Case Study Citrix WebexSocial Media Assessment Case Study Citrix Webex
Social Media Assessment Case Study Citrix Webex
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
10 Essentials for Effective Teams Governance
10 Essentials for Effective Teams Governance10 Essentials for Effective Teams Governance
10 Essentials for Effective Teams Governance
 
How to Implement Social Selling Strategies into your Sales Department - Assoc...
How to Implement Social Selling Strategies into your Sales Department - Assoc...How to Implement Social Selling Strategies into your Sales Department - Assoc...
How to Implement Social Selling Strategies into your Sales Department - Assoc...
 
SPT 104 Unlock your big data with analytics and BI on Office 365
SPT 104 Unlock your big data with analytics and BI on Office 365SPT 104 Unlock your big data with analytics and BI on Office 365
SPT 104 Unlock your big data with analytics and BI on Office 365
 
The ROI of UX
The ROI of UXThe ROI of UX
The ROI of UX
 
The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
Brookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 twoBrookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 two
 

More from Evernym

What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
Evernym
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
Evernym
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
Evernym
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
Evernym
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
Evernym
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
Evernym
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
Evernym
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
Evernym
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
Evernym
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
Evernym
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
Evernym
 

More from Evernym (11)

What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar

  • 1. Evernym @evernym | info@evernym.com | February 2020 Getting started with Self-Sovereign Identity
  • 2. PRESENTER Jamie Smith Strategic Engagement Director PRESENTER Drummond Reed Chief Trust Officer
  • 3. On the agenda today Self Sovereign Identity (SSI) - a quick introduction Crossing contexts: A day in the life with SSI Where SSI really makes a difference Fireside chat with Drummond Reed Getting started & the first 90 days Q&A
  • 4. If you have questions…. Please write them in the Zoom Q&A, and we’ll cover them after the presentation. Please note, this webinar is being recorded
  • 5. Self-Sovereign Identity answers the question: Who is on the other end of my connection?
  • 6. It’s a whole new way to move and prove digital data: And it will transform the digital world.
  • 7.
  • 8. With a single tap or click, you can: ● Login ● Checkout ● Apply ● Register ● Authenticate ● Message
  • 9. How does it work?
  • 10. 1: Secure Connections A B “Connection Broker” email provider WhatsApp Facebook Data hub The old way Connection brokers establish and maintain digital connections between parties A B The new way Two parties can independently form secure, unique and persistent connections. No 3rd party needed Secure connections enable trusted communications
  • 11. Data watermarking gives data cryptographic superpowers Anyone can verify the authenticity of the data, including: • Who issued the data • Was it only issued to the presenter • Has it been tampered with • Has it been revoked Watermarked data - Verifiable Credentials - can be checked by anyone Any data, about anything, issued by anyone 2: Data watermarking (Verifiable Credentials)
  • 12. Watermarked data can be verified using public key cryptography The public keys of ‘issuers’ needs to be stored somewhere • Trusted: Run by many organizations • Secure: Tamperproof • Ordered: Chronological data These are the characteristics of distributed ledgers The public key directory gives everyone the ability to verify data 3: Trusted Public Key Directory
  • 13. The Three Pillars of Self-Sovereign Identity 1. secure connections 2. digital data watermarking 3. trusted, tamper-proof public key directory self-sovereign identity verifiable data verifiable connections private data exchange
  • 14. And the best part? Open Standards, Open Source With no vendor lock-in …just like the internet
  • 15. Open Standards 1. secure connections 2. digital data watermarking 3. trusted, tamper-proof public key directory self-sovereign identity verifiable data verifiable connections private data exchangeDecentralized Identifiers (DIDs) Verifiable Credentials
  • 16. Open Source 1. secure connections 2. digital data watermarking 3. trusted, tamper-proof public key directory self-sovereign identity verifiable data verifiable connections private data exchange
  • 17. A day in the life with SSI
  • 20. Meeting with course professor Issues grades and credits
  • 21. Login with digital wallet Authorization with credential No username or password
  • 22. Message from skydiving club: join for the year? Secure, private auditable response New skydiving club credential
  • 23. Internship advertised on poster Scans QR code - connection offer Request to share data to apply
  • 24. Scans QR code on tablet Shares data > valid ticket, over 18 Event ticket as a credential
  • 25. All of this is possible with open source SSI tools today All use cases interact with the same student wallet (app) Leave existing IT in place - no need to rip-and-replace You can start with a single use case - start small and scale
  • 26. Where does SSI really make a difference?
  • 27. Our life is fragmented, distributed You University Email Skydiving club Student union Employer Library
  • 28. We have multiple ‘silos’ for identity You University Email Skydiving club Student union Library Employer University Email Skydiving club Student union Employer Library
  • 29. The answer is often ‘build a bigger silo!’ You University Email Skydiving club Student union Library Employer University Email Skydiving club Student union Employer Library
  • 30. Which committee should manage identity policy? How can we connect all these different systems? We don’t want another 3 year ‘mega IT program’
  • 31. What if the student was the point of integration?
  • 32. Putting the student at the center of her digital life You University Employer 1. Who issued it? 2. Only to you? 3. Has it been changed? 4. Has it been revoked?
  • 33. You University Employer Putting the student at the center of her digital life
  • 34. You University Email Skydiving club Student union Employer Library Putting the student at the center of her digital life
  • 35. ● SSI is changing the way we think about identity, powering: ○ Secure connections ○ Verifiable credentials ○ Seamless experiences ○ Real digital transformation ● From ‘closed identity’ to ‘open identity’ ● Enabling entirely new ‘cross-sector’ and ‘cross-silo’ business models Bringing it all together
  • 36. A fireside chat with Drummond Reed ● Chief Trust Officer, Evernym ● Trustee, Sovrin Foundation ● Co-Chair, Sovrin Governance Framework WG ● Member, Sovrin Guardianship WG ● Co-Author, W3C DID Spec ● 20+ years in Internet identity ● 15+ years in identity standards
  • 37. Want to get started? Join 70+ organizations making SSI possible.
  • 38. Accelerate learning about SSI and unlock new innovation We can enable you to: ✓ Learn by doing, fast ○ Develop real solutions in days and weeks ✓ Connect and align with existing SSI initiatives ○ Build on work already done on SSI tech, policies and governance ✓ Develop the business case and policy plan ○ Understand the impacts on processes and IT ○ Assess and design policy changes
  • 39. Your SSI project - example first 90 days 1. Learn In 30 days ● Build demos in days ● Map use cases, user journeys and data ● Set up initial SSI capabilities ● Develop prototypes ● Align to existing initiatives - policies, data, SSI tech
  • 40. Your SSI project - example first 90 days 1. Learn 2. Build In 30 days ● Build demos in days ● Map use cases, user journeys and data ● Set up initial SSI capabilities ● Develop prototypes ● Align to existing initiatives - policies, data, SSI tech In 60 days ● Design and develop PoCs ● Assess policies and governance ● Engage existing initiatives ● Map the org impacts ● Outline the business case
  • 41. Your SSI project - example first 90 days 1. Learn 2. Build 3. Deliver In 30 days ● Build demos in days ● Map use cases, user journeys and data ● Set up initial SSI capabilities ● Develop prototypes ● Align to existing initiatives - policies, data, SSI tech In 60 days ● Design and develop PoCs ● Assess policies and governance ● Engage existing initiatives ● Map the org impacts ● Outline the business case In 90 days ● Plan and deliver initial pilot ● Integrate with existing systems ● Plan policy and governance requirements and changes ● Develop the business case
  • 42. Get started today Join 70+ organizations in taking self-sovereign identity for a test flight. www.evernym.com/plans/
  • 43. Questions! www.evernym.com Please put questions in the Zoom Q&A Connect with us via Twitter or Email @evernym @jamiedsmith @drummondreed info@evernym.com