SlideShare a Scribd company logo
1 of 53
Download to read offline
HYPERLEDGER INDY
A DEVELOPER ECOSYSTEM WALKTHROUGH
INDY IS A SOFTWARE ECOSYSTEM FOR
PRIVATE, SECURE, AND POWERFUL IDENTITY.
Once it is implemented, it puts people — not the organizations that traditionally
centralize identity — in charge of decisions about their own privacy and disclosure.
INDY PRIVACY PROPOSITION
HYPERLEDGER ALLOWS US TO CONSTRUCT INTERACTIONS
WHERE THE DEGREE OF DISCLOSURE IS EXPLICIT AND MINIMAL
INDY MAKES IT POSSIBLE TO PREQUALIFY FOR A LOAN AT A THOUSAND
BANKS, IN A WAY THAT PROVES CREDIT WORTHINESS, INCOME, AND
CITIZENSHIP, WITHOUT FORFEITING PRIVACY. USED CORRECTLY, IT CAN
INSULATE CAUTIOUS WHISTLEBLOWERS; IT CAN ENABLE SECURE,
PRIVATE VOTING; IT CAN MAKE ONLINE DATING SAFER.
HYPERLEDGER INDY
POSSIBILITIES
‣ Connection contracts,
‣ Revocation contracts
‣ Novel payment workflows
‣ Document management features
‣ Creative forms of escrow
‣ Curated reputation
HYPERLEDGER INDY
PRIVACY PRESERVING FEATURES
▸ Pairwise Decentralised Identifiers
▸ Semi Trusted Agents
▸ Agent to Agent Communication
▸ Agent Communication using LibSodium
▸ LibSodium Sealed Box
▸ Authenticated Encryption
▸ Zero Knowledge Proofs
▸ Credential Revocation Features
▸ Affinity for Data and Key Storage at the Edge
▸ Privacy Preserving Agent Revocation
HYPERLEDGER INDY
HYPERLEDGER INDY TOOLS
▸ Distributed Ledger
▸ Client Tools
▸ Shared Components
▸ Reference Implementations
▸ Integration Implementations
DISTRIBUTED LEDGER
INDY NODE, INDY PLENUM
CLIENT TOOLS
INDY SDK, INDY AGENT
SHARED COMPONENT
INDY CRYPTO, INDY HIPE
INDY SSI VC DEMO
A POSSIBLE SCENARIO
Alice, a graduate of the fictional Faber College, wants to apply for a job at the fictional company Acme Corp. As
soon as she has the job, she wants to apply for a loan so she can buy a car. She would like to use her college
transcript as proof of her education on the job application; once hired, Alice would like to use the fact of
employment as evidence of her creditworthiness for the loan.
CURRENT CHALLENGES
The sorts of identity and trust interactions required to pull this off are messy in the
world today; they are slow, they violate privacy, and they are susceptible to fraud.
We’ll show you how Indy is a quantum leap forward.
DIGITAL TRANSCRIPTS
As a graduate of Faber College, Alice receives an alumni newsletter where she learns that her
alma mater is offering digital transcripts. She logs in to the college alumni website and
requests her transcript by clicking Get Transcript.
TRUST ANCHOR
Faber College has done some prep work to offer this service to Alice. It has the role of trust
anchor on the ledger. A trust anchor is a person or organization that the ledger already knows
about, that is able to help bootstrap others.
SELF SOVEREIGN IDENTITY
Alice doesn’t realise it yet, but in order to use this digital transcript she will need a new type of identity -- not the traditional
identity that Faber College has built for her in its on-campus database, but a new and portable one that belongs to her,
independent of all past and future relationships, that nobody can revoke or co-opt or correlate without her permission. T
IDENTITY AGENTS
In normal contexts, managing a self-sovereign identity will require a tool such as a desktop or mobile application. It might be
a standalone app, or it might leverage a third party service provider that the ledger calls an agency. For example, leaders in
this technology such as the Sovrin Foundation and companies like Evernym, publish reference versions of such tools.
INDY CLI
The CLI could play the role of multiple identity owners (a person like Alice, an organization like Faber
College, or an IoT - style thing; these are often called "principals" in security circles). In this guide we
will just be Alice but to keep things clear and explore functionality let's change the prompt:
IDENTITY WALLET
Creating a new empty wallet basically resets the agent to a clean slate. Because this is
the first time you're setting this up, this step is not actually necessary. If you're wanting
to interact with other DIDs held by the agent then this does become necessary.
STATUS COMMAND
ALICE> STATUS
NOT CONNECTED TO INDY
NETWORK. PLEASE
CONNECT FIRST.
HYPERLEDGER INDY
EVALUATING A CONNECTION REQUEST
ALICE> show sample/faber-request.indy
{
"connection-request": {
"name": "Faber College",
"DID": "ULtgFQJe6bjiFbs7ke3NJD",
"nonce": "b1134a647eb818069c089e7694f63e6d"
},
"sig":
"4QKqkwv9gXmc3Sw7YFkGm2vdF6ViZz9FKZcNJGh6pjnjgBXRqZ
17Sk8bUDSb6hsXHoPxrzq2F51eDn1DKAaCzhqP"
}
Try Next:
load sample/faber-request.indy
HYPERLEDGER INDY
LOADING A CONNECTION REQUEST
ALICE> load sample/faber-request.indy
1 connection request found for Faber
College.
Creating Connection for Faber College.
Try Next:
show connection "Faber College"
accept request from "Faber College"
HYPERLEDGER INDY
SHOW CONNECTION REQUEST
Expanding Faber to "Faber College"
Connection (not yet accepted)
Name: Faber College
DID: not yet assigned
Trust anchor: Faber College (not yet written to Indy)
Verification key: <empty>
Signing key: <hidden>
Remote: FuN98eH2eZybECWkofW6A9BKJxxnTatBCopfUiNxo6ZB
Remote Verification key: <unknown, waiting for sync>
Remote endpoint: <unknown, waiting for sync>
Request nonce: b1134a647eb818069c089e7694f63e6d
Request status: not verified, remote verkey unknown
Last synced: <this connection has not yet been synchronized>
Try Next:
sync "Faber College"
accept request from "Faber College"
HYPERLEDGER INDY
INDY AGENTS
▸ Python Reference Agent
▸ Node Js Reference Agent
▸ Sovrin Connector
▸ IndyCat
▸ StreetCred
▸ Verity
▸ Connect.Me
DECENTRALISED IDENTIFIER
DID (Decentralized Identifier) is an opaque, unique sequences of bits, (like UUIDs or GUIDs) that get generated
when a user tries to accept the connection request. That DID will be sent to Faber College, and used by Faber
College to reference Alice in secure interactions. Each connection request on the Indy network establishes a
pairwise relationship when accepted. A pairwise relationship is a unique relationship between two identity owners
DIGITAL IDENTITY SYSTEMS
DEEP DIVE ON DID
DIDs are fully under the control of the DID subject,
independent from any centralized registry, identity
provider, or certificate authority.
DIDs are URLs that relate a DID subject to means for
trustable interactions with that subject.
DIDs resolve to DID Documents — simple documents that
describe how to use that specific DID.
Each DID Document may contain at least three things:
proof purposes, verification methods, and service
endpoints.
Proof purposes are combined with verification methods to
provide mechanisms for proving things.
HYPERLEDGER INDY
DESIGN GOALS OF DID ARCHITECTURE
▸ Decentralisation
▸ Self sovereignty
▸ Privacy
▸ Security
▸ Proof Based
▸ Discoverability
▸ Interoperability
▸ Portability
▸ Simplicity
▸ Extensibility
DECENTRALISATION
DID architecture should eliminate the requirement for centralized
authorities or single points of failure in identifier management,
including the registration of globally unique identifiers, public
verification keys, service endpoints, and other metadata.
SELF SOVEREIGNTY
DID architecture should give entities, both human and non-
human, the power to directly own and control their digital
identifiers without the need to rely on external authorities.
PRIVACY
DID architecture should enable entities to control the
privacy of their information, including minimal, selective,
and progressive disclosure of attributes or other data.
SECURITY
DID architecture should enable sufficient
security for relying parties to depend on DID
Documents for their required level of assurance.
PROOF BASED
DID architecture should enable the DID subject
to provide cryptographic proof of
authentication and proof of authorization rights.
INTEROPERABILITY
DID architecture should use interoperable standards
so DID infrastructure can make use of existing tools
and software libraries designed for interoperability.
PORTABILITY
DID architecture should be system and network-independent
and enable entities to use their digital identifiers with any
system that supports DIDs and DID Methods.
SIMPLICITY
To meet these design goals, DID architecture
should be (to paraphrase Albert Einstein) "as
simple as possible but no simpler".
EXTENSIBILITY
When possible, DID architecture should enable
extensibility provided it does not greatly hinder
interoperability, portability, or simplicity.
DISCOVERABILITY
DID architecture should make it possible for
entities to discover DIDs for other entities to
learn more about or interact with those entities.
HYPERLEDGER INDY
SELF MANAGED DID DOCUMENT
{
"@context": "https://w3id.org/did/v1",
"id": "did:example:123456789abcdefghi",
"authentication": [{
// this key can be used to authenticate as did:...fghi
"id": "did:example:123456789abcdefghi#keys-1",
"type": "RsaVerificationKey2018",
"controller": "did:example:123456789abcdefghi",
"publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----
rn"
}],
"service": [{
"type": "ExampleService",
"serviceEndpoint": "https://example.com/endpoint/8377464"
}]
}
SOVRIN
Integrated anonymous credentials with revocation for
privacy, unforgeability, performance, unlinkabaility and a
distributed ledger with best practices from ethereal and BFT
Protocols
ANONYMOUS CREDENTIALS
It is well known that the anonymity and unlinkability properties are provided by various kinds of anonymous credentials, the
concept dating back to seminal works by David Chaum in 1980s. Zero- knowledge proofs allow a User to prove the possession of a
credential without showing the credential itself, thus providing unlinkability. Additional features include delegation and revocation
REVOCATION FEATURE
The revocation procedure assumes that each credential has special Revocation-ID attribute with value iR, and
Issuer can at any moment revoke a particular iR. For Verifiers this means that if a User with a revoked iR presents
his credential, this can be detected by the Verifier. the revocation feature provides quite a privacy leak.
BLOCKCHAIN FOR DID
Public User Pseudonyms
Issuer Credential Definitions and Public Keys
Revocation Updates
HYPERLEDGER INDY
SOVRIN SOLUTION ARCHITECTURE
It is an Ethereum based ledger, which records transactions and root hashes
of the Merkle tree over the state of public pseudonyms, Issuer public keys,
revocation data, credential definitions, etc.
The immutable data such as revocation tails are stored off-chain in
distributed file systems such as IPFS with relevant links from the ledger
state.
For the consensus protocol BFT family of protocols are chosen as the
number of nodes are limited to a few hundred, impose restricted
membership and have partial control over many of them.
Our BFT protocol is called Plenum and it is an enhancement of RBFT, which
was chosen its resilience and fast recovery properties and implemented it.
MACs are replaced with EdDSA signatures as very fast implementations
now exist, designed a leader election protocol, and added new
blacklisting strategies.
TEXT
INDY ROADMAP
▸ Micro Ledgers
▸ Sophisticated Policies
▸ AI for Agents
▸ Mix Networks for Transaction Submitting
▸ Agent Routing
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity Systems
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity Systems

More Related Content

What's hot

Hyperledger Indy tutorial
Hyperledger Indy tutorialHyperledger Indy tutorial
Hyperledger Indy tutorialssuser3993f3
 
OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)Torsten Lodderstedt
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36Torsten Lodderstedt
 
Matching Identity Management Solutions to Self-Sovereign Identity Principles
Matching Identity Management Solutions to Self-Sovereign Identity PrinciplesMatching Identity Management Solutions to Self-Sovereign Identity Principles
Matching Identity Management Solutions to Self-Sovereign Identity PrinciplesTommy Koens
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized IdentityJim Flynn
 
Verifiable Credentials_Kristina_Identiverse2022_vFIN.pdf
Verifiable Credentials_Kristina_Identiverse2022_vFIN.pdfVerifiable Credentials_Kristina_Identiverse2022_vFIN.pdf
Verifiable Credentials_Kristina_Identiverse2022_vFIN.pdfKristina Yasuda
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonSSIMeetup
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Heather Vescent
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3SSIMeetup
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityPrateek Panda
 
What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?Evernym
 

What's hot (20)

Hyperledger Indy tutorial
Hyperledger Indy tutorialHyperledger Indy tutorial
Hyperledger Indy tutorial
 
OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
 
Matching Identity Management Solutions to Self-Sovereign Identity Principles
Matching Identity Management Solutions to Self-Sovereign Identity PrinciplesMatching Identity Management Solutions to Self-Sovereign Identity Principles
Matching Identity Management Solutions to Self-Sovereign Identity Principles
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
Verifiable Credentials_Kristina_Identiverse2022_vFIN.pdf
Verifiable Credentials_Kristina_Identiverse2022_vFIN.pdfVerifiable Credentials_Kristina_Identiverse2022_vFIN.pdf
Verifiable Credentials_Kristina_Identiverse2022_vFIN.pdf
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
 
OIDC4VP for AB/C WG
OIDC4VP for AB/C WGOIDC4VP for AB/C WG
OIDC4VP for AB/C WG
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
OpenID Connect 4 SSI
OpenID Connect 4 SSIOpenID Connect 4 SSI
OpenID Connect 4 SSI
 
What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
 

Similar to Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity Systems

Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityKaryl Fowler
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessKaliya "Identity Woman" Young
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すHyperleger Tokyo Meetup
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Kaliya "Identity Woman" Young
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Introduction to Decentralized Finance (DeFi)
Introduction to Decentralized Finance (DeFi)Introduction to Decentralized Finance (DeFi)
Introduction to Decentralized Finance (DeFi)101 Blockchains
 
CyberSecurity Meetup - Zero Trust Architecture and Electric Vehicle Cyberrisks
CyberSecurity Meetup - Zero Trust Architecture and Electric Vehicle CyberrisksCyberSecurity Meetup - Zero Trust Architecture and Electric Vehicle Cyberrisks
CyberSecurity Meetup - Zero Trust Architecture and Electric Vehicle CyberrisksRoger Qiu
 
OpenID @ Winterschool 2008
OpenID @ Winterschool 2008OpenID @ Winterschool 2008
OpenID @ Winterschool 2008scottw
 
Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorizationAlexandru Pasaila
 
Self-Sovereign-Identity.pptx
Self-Sovereign-Identity.pptxSelf-Sovereign-Identity.pptx
Self-Sovereign-Identity.pptxSanketKulkarni94
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_securityAnil Pandey
 
Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityPhil Windley
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
 
Blockchain Self Sovereign Identity
Blockchain Self Sovereign IdentityBlockchain Self Sovereign Identity
Blockchain Self Sovereign IdentityPercival Lucena
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 

Similar to Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity Systems (20)

Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
Wk White Paper
Wk White PaperWk White Paper
Wk White Paper
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Introduction to Decentralized Finance (DeFi)
Introduction to Decentralized Finance (DeFi)Introduction to Decentralized Finance (DeFi)
Introduction to Decentralized Finance (DeFi)
 
CyberSecurity Meetup - Zero Trust Architecture and Electric Vehicle Cyberrisks
CyberSecurity Meetup - Zero Trust Architecture and Electric Vehicle CyberrisksCyberSecurity Meetup - Zero Trust Architecture and Electric Vehicle Cyberrisks
CyberSecurity Meetup - Zero Trust Architecture and Electric Vehicle Cyberrisks
 
OpenID @ Winterschool 2008
OpenID @ Winterschool 2008OpenID @ Winterschool 2008
OpenID @ Winterschool 2008
 
Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorization
 
Self-Sovereign-Identity.pptx
Self-Sovereign-Identity.pptxSelf-Sovereign-Identity.pptx
Self-Sovereign-Identity.pptx
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_security
 
Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn Identity
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
Blockchain Self Sovereign Identity
Blockchain Self Sovereign IdentityBlockchain Self Sovereign Identity
Blockchain Self Sovereign Identity
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 

More from Gokul Alex

Blockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A ReviewBlockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A ReviewGokul Alex
 
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFDEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFGokul Alex
 
Digital Innovation and Dynamics of Entrepreneurship
Digital Innovation and Dynamics of Entrepreneurship Digital Innovation and Dynamics of Entrepreneurship
Digital Innovation and Dynamics of Entrepreneurship Gokul Alex
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionGokul Alex
 
R3Corda - Architecture Overview - Concepts and Components
R3Corda - Architecture Overview - Concepts and ComponentsR3Corda - Architecture Overview - Concepts and Components
R3Corda - Architecture Overview - Concepts and ComponentsGokul Alex
 
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsCovid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsGokul Alex
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
Creative Careers for Post Pandemic Times
Creative Careers for Post Pandemic TimesCreative Careers for Post Pandemic Times
Creative Careers for Post Pandemic TimesGokul Alex
 
Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020Gokul Alex
 
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...Gokul Alex
 
A Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic ConceptsA Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic ConceptsGokul Alex
 
Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationGokul Alex
 
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...Gokul Alex
 
Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Gokul Alex
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesGokul Alex
 
Quantum Computing - A History in the Making
Quantum Computing - A History in the Making Quantum Computing - A History in the Making
Quantum Computing - A History in the Making Gokul Alex
 
Future of Education through Exponential and Emerging Technologies
Future of Education through Exponential and Emerging TechnologiesFuture of Education through Exponential and Emerging Technologies
Future of Education through Exponential and Emerging TechnologiesGokul Alex
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersGokul Alex
 
Introduction to Blockchain Business Models
Introduction to Blockchain Business ModelsIntroduction to Blockchain Business Models
Introduction to Blockchain Business ModelsGokul Alex
 
Blockchain and Cryptography - A Primer
Blockchain and Cryptography - A PrimerBlockchain and Cryptography - A Primer
Blockchain and Cryptography - A PrimerGokul Alex
 

More from Gokul Alex (20)

Blockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A ReviewBlockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A Review
 
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFDEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
 
Digital Innovation and Dynamics of Entrepreneurship
Digital Innovation and Dynamics of Entrepreneurship Digital Innovation and Dynamics of Entrepreneurship
Digital Innovation and Dynamics of Entrepreneurship
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An Introduction
 
R3Corda - Architecture Overview - Concepts and Components
R3Corda - Architecture Overview - Concepts and ComponentsR3Corda - Architecture Overview - Concepts and Components
R3Corda - Architecture Overview - Concepts and Components
 
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsCovid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Creative Careers for Post Pandemic Times
Creative Careers for Post Pandemic TimesCreative Careers for Post Pandemic Times
Creative Careers for Post Pandemic Times
 
Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020
 
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
 
A Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic ConceptsA Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic Concepts
 
Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital Transformation
 
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...
 
Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
Quantum Computing - A History in the Making
Quantum Computing - A History in the Making Quantum Computing - A History in the Making
Quantum Computing - A History in the Making
 
Future of Education through Exponential and Emerging Technologies
Future of Education through Exponential and Emerging TechnologiesFuture of Education through Exponential and Emerging Technologies
Future of Education through Exponential and Emerging Technologies
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
Introduction to Blockchain Business Models
Introduction to Blockchain Business ModelsIntroduction to Blockchain Business Models
Introduction to Blockchain Business Models
 
Blockchain and Cryptography - A Primer
Blockchain and Cryptography - A PrimerBlockchain and Cryptography - A Primer
Blockchain and Cryptography - A Primer
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity Systems

  • 1. HYPERLEDGER INDY A DEVELOPER ECOSYSTEM WALKTHROUGH
  • 2. INDY IS A SOFTWARE ECOSYSTEM FOR PRIVATE, SECURE, AND POWERFUL IDENTITY. Once it is implemented, it puts people — not the organizations that traditionally centralize identity — in charge of decisions about their own privacy and disclosure.
  • 3.
  • 4. INDY PRIVACY PROPOSITION HYPERLEDGER ALLOWS US TO CONSTRUCT INTERACTIONS WHERE THE DEGREE OF DISCLOSURE IS EXPLICIT AND MINIMAL
  • 5. INDY MAKES IT POSSIBLE TO PREQUALIFY FOR A LOAN AT A THOUSAND BANKS, IN A WAY THAT PROVES CREDIT WORTHINESS, INCOME, AND CITIZENSHIP, WITHOUT FORFEITING PRIVACY. USED CORRECTLY, IT CAN INSULATE CAUTIOUS WHISTLEBLOWERS; IT CAN ENABLE SECURE, PRIVATE VOTING; IT CAN MAKE ONLINE DATING SAFER.
  • 6. HYPERLEDGER INDY POSSIBILITIES ‣ Connection contracts, ‣ Revocation contracts ‣ Novel payment workflows ‣ Document management features ‣ Creative forms of escrow ‣ Curated reputation
  • 7. HYPERLEDGER INDY PRIVACY PRESERVING FEATURES ▸ Pairwise Decentralised Identifiers ▸ Semi Trusted Agents ▸ Agent to Agent Communication ▸ Agent Communication using LibSodium ▸ LibSodium Sealed Box ▸ Authenticated Encryption ▸ Zero Knowledge Proofs ▸ Credential Revocation Features ▸ Affinity for Data and Key Storage at the Edge ▸ Privacy Preserving Agent Revocation
  • 8.
  • 9. HYPERLEDGER INDY HYPERLEDGER INDY TOOLS ▸ Distributed Ledger ▸ Client Tools ▸ Shared Components ▸ Reference Implementations ▸ Integration Implementations
  • 10.
  • 14.
  • 15. INDY SSI VC DEMO
  • 16.
  • 17. A POSSIBLE SCENARIO Alice, a graduate of the fictional Faber College, wants to apply for a job at the fictional company Acme Corp. As soon as she has the job, she wants to apply for a loan so she can buy a car. She would like to use her college transcript as proof of her education on the job application; once hired, Alice would like to use the fact of employment as evidence of her creditworthiness for the loan.
  • 18.
  • 19. CURRENT CHALLENGES The sorts of identity and trust interactions required to pull this off are messy in the world today; they are slow, they violate privacy, and they are susceptible to fraud. We’ll show you how Indy is a quantum leap forward.
  • 20. DIGITAL TRANSCRIPTS As a graduate of Faber College, Alice receives an alumni newsletter where she learns that her alma mater is offering digital transcripts. She logs in to the college alumni website and requests her transcript by clicking Get Transcript.
  • 21. TRUST ANCHOR Faber College has done some prep work to offer this service to Alice. It has the role of trust anchor on the ledger. A trust anchor is a person or organization that the ledger already knows about, that is able to help bootstrap others.
  • 22. SELF SOVEREIGN IDENTITY Alice doesn’t realise it yet, but in order to use this digital transcript she will need a new type of identity -- not the traditional identity that Faber College has built for her in its on-campus database, but a new and portable one that belongs to her, independent of all past and future relationships, that nobody can revoke or co-opt or correlate without her permission. T
  • 23. IDENTITY AGENTS In normal contexts, managing a self-sovereign identity will require a tool such as a desktop or mobile application. It might be a standalone app, or it might leverage a third party service provider that the ledger calls an agency. For example, leaders in this technology such as the Sovrin Foundation and companies like Evernym, publish reference versions of such tools.
  • 24. INDY CLI The CLI could play the role of multiple identity owners (a person like Alice, an organization like Faber College, or an IoT - style thing; these are often called "principals" in security circles). In this guide we will just be Alice but to keep things clear and explore functionality let's change the prompt:
  • 25. IDENTITY WALLET Creating a new empty wallet basically resets the agent to a clean slate. Because this is the first time you're setting this up, this step is not actually necessary. If you're wanting to interact with other DIDs held by the agent then this does become necessary.
  • 26. STATUS COMMAND ALICE> STATUS NOT CONNECTED TO INDY NETWORK. PLEASE CONNECT FIRST.
  • 27. HYPERLEDGER INDY EVALUATING A CONNECTION REQUEST ALICE> show sample/faber-request.indy { "connection-request": { "name": "Faber College", "DID": "ULtgFQJe6bjiFbs7ke3NJD", "nonce": "b1134a647eb818069c089e7694f63e6d" }, "sig": "4QKqkwv9gXmc3Sw7YFkGm2vdF6ViZz9FKZcNJGh6pjnjgBXRqZ 17Sk8bUDSb6hsXHoPxrzq2F51eDn1DKAaCzhqP" } Try Next: load sample/faber-request.indy
  • 28. HYPERLEDGER INDY LOADING A CONNECTION REQUEST ALICE> load sample/faber-request.indy 1 connection request found for Faber College. Creating Connection for Faber College. Try Next: show connection "Faber College" accept request from "Faber College"
  • 29. HYPERLEDGER INDY SHOW CONNECTION REQUEST Expanding Faber to "Faber College" Connection (not yet accepted) Name: Faber College DID: not yet assigned Trust anchor: Faber College (not yet written to Indy) Verification key: <empty> Signing key: <hidden> Remote: FuN98eH2eZybECWkofW6A9BKJxxnTatBCopfUiNxo6ZB Remote Verification key: <unknown, waiting for sync> Remote endpoint: <unknown, waiting for sync> Request nonce: b1134a647eb818069c089e7694f63e6d Request status: not verified, remote verkey unknown Last synced: <this connection has not yet been synchronized> Try Next: sync "Faber College" accept request from "Faber College"
  • 30. HYPERLEDGER INDY INDY AGENTS ▸ Python Reference Agent ▸ Node Js Reference Agent ▸ Sovrin Connector ▸ IndyCat ▸ StreetCred ▸ Verity ▸ Connect.Me
  • 31. DECENTRALISED IDENTIFIER DID (Decentralized Identifier) is an opaque, unique sequences of bits, (like UUIDs or GUIDs) that get generated when a user tries to accept the connection request. That DID will be sent to Faber College, and used by Faber College to reference Alice in secure interactions. Each connection request on the Indy network establishes a pairwise relationship when accepted. A pairwise relationship is a unique relationship between two identity owners
  • 32. DIGITAL IDENTITY SYSTEMS DEEP DIVE ON DID DIDs are fully under the control of the DID subject, independent from any centralized registry, identity provider, or certificate authority. DIDs are URLs that relate a DID subject to means for trustable interactions with that subject. DIDs resolve to DID Documents — simple documents that describe how to use that specific DID. Each DID Document may contain at least three things: proof purposes, verification methods, and service endpoints. Proof purposes are combined with verification methods to provide mechanisms for proving things.
  • 33. HYPERLEDGER INDY DESIGN GOALS OF DID ARCHITECTURE ▸ Decentralisation ▸ Self sovereignty ▸ Privacy ▸ Security ▸ Proof Based ▸ Discoverability ▸ Interoperability ▸ Portability ▸ Simplicity ▸ Extensibility
  • 34. DECENTRALISATION DID architecture should eliminate the requirement for centralized authorities or single points of failure in identifier management, including the registration of globally unique identifiers, public verification keys, service endpoints, and other metadata.
  • 35. SELF SOVEREIGNTY DID architecture should give entities, both human and non- human, the power to directly own and control their digital identifiers without the need to rely on external authorities.
  • 36. PRIVACY DID architecture should enable entities to control the privacy of their information, including minimal, selective, and progressive disclosure of attributes or other data.
  • 37. SECURITY DID architecture should enable sufficient security for relying parties to depend on DID Documents for their required level of assurance.
  • 38. PROOF BASED DID architecture should enable the DID subject to provide cryptographic proof of authentication and proof of authorization rights.
  • 39. INTEROPERABILITY DID architecture should use interoperable standards so DID infrastructure can make use of existing tools and software libraries designed for interoperability.
  • 40. PORTABILITY DID architecture should be system and network-independent and enable entities to use their digital identifiers with any system that supports DIDs and DID Methods.
  • 41. SIMPLICITY To meet these design goals, DID architecture should be (to paraphrase Albert Einstein) "as simple as possible but no simpler".
  • 42. EXTENSIBILITY When possible, DID architecture should enable extensibility provided it does not greatly hinder interoperability, portability, or simplicity.
  • 43. DISCOVERABILITY DID architecture should make it possible for entities to discover DIDs for other entities to learn more about or interact with those entities.
  • 44. HYPERLEDGER INDY SELF MANAGED DID DOCUMENT { "@context": "https://w3id.org/did/v1", "id": "did:example:123456789abcdefghi", "authentication": [{ // this key can be used to authenticate as did:...fghi "id": "did:example:123456789abcdefghi#keys-1", "type": "RsaVerificationKey2018", "controller": "did:example:123456789abcdefghi", "publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY----- rn" }], "service": [{ "type": "ExampleService", "serviceEndpoint": "https://example.com/endpoint/8377464" }] }
  • 45. SOVRIN Integrated anonymous credentials with revocation for privacy, unforgeability, performance, unlinkabaility and a distributed ledger with best practices from ethereal and BFT Protocols
  • 46.
  • 47. ANONYMOUS CREDENTIALS It is well known that the anonymity and unlinkability properties are provided by various kinds of anonymous credentials, the concept dating back to seminal works by David Chaum in 1980s. Zero- knowledge proofs allow a User to prove the possession of a credential without showing the credential itself, thus providing unlinkability. Additional features include delegation and revocation
  • 48. REVOCATION FEATURE The revocation procedure assumes that each credential has special Revocation-ID attribute with value iR, and Issuer can at any moment revoke a particular iR. For Verifiers this means that if a User with a revoked iR presents his credential, this can be detected by the Verifier. the revocation feature provides quite a privacy leak.
  • 49. BLOCKCHAIN FOR DID Public User Pseudonyms Issuer Credential Definitions and Public Keys Revocation Updates
  • 50. HYPERLEDGER INDY SOVRIN SOLUTION ARCHITECTURE It is an Ethereum based ledger, which records transactions and root hashes of the Merkle tree over the state of public pseudonyms, Issuer public keys, revocation data, credential definitions, etc. The immutable data such as revocation tails are stored off-chain in distributed file systems such as IPFS with relevant links from the ledger state. For the consensus protocol BFT family of protocols are chosen as the number of nodes are limited to a few hundred, impose restricted membership and have partial control over many of them. Our BFT protocol is called Plenum and it is an enhancement of RBFT, which was chosen its resilience and fast recovery properties and implemented it. MACs are replaced with EdDSA signatures as very fast implementations now exist, designed a leader election protocol, and added new blacklisting strategies.
  • 51. TEXT INDY ROADMAP ▸ Micro Ledgers ▸ Sophisticated Policies ▸ AI for Agents ▸ Mix Networks for Transaction Submitting ▸ Agent Routing