This document provides an overview of digital identity concepts from a workshop presented by Kaliya "Identity Woman" Young. The summary includes:
1) Young discusses key concepts around digital identity including enrollment, attributes, identifiers, authentication, authorization, and user-centric/self-sovereign identity models.
2) Contexts for digital identity are explored including enterprises, government systems, and commons-based approaches.
3) Challenges with achieving user-centric digital identity are that it is a complex problem involving technology, legal, social, and business issues and requires changes to existing systems and behaviors.
4) Resources on digital identity properties and design principles are provided to help understand the challenges in building
This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
The Domains of Identity presentation covers the 16 domains of Identity outlined in Kaliya's Masters Report written for the Master of Science in Identity Management and Security program. It is available https://www.identitywoman.net/domains-of-identity
This is a presentation from the MyData Online 2020 Conference that covers the history and evolution of digital identity from the first computers in World War 2 to Enterprise Identity and Access Management and emerging new Self-Sovereign Identity Technology.
Thinking ahead GDPR and CCPA are coming and people are freaking out about how their data is being used. What are the new tools for a Personal Data Ecosystem.
This is a deck that highlights the origins of my Identity Ecosystem Mapping efforts. It shares snapshots of the prototype map in Kumu and outlines the functionality possible for Version 2.0 using the Knowledge Ecology Interface system developed by SOSACorp.
This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
The Domains of Identity presentation covers the 16 domains of Identity outlined in Kaliya's Masters Report written for the Master of Science in Identity Management and Security program. It is available https://www.identitywoman.net/domains-of-identity
This is a presentation from the MyData Online 2020 Conference that covers the history and evolution of digital identity from the first computers in World War 2 to Enterprise Identity and Access Management and emerging new Self-Sovereign Identity Technology.
Thinking ahead GDPR and CCPA are coming and people are freaking out about how their data is being used. What are the new tools for a Personal Data Ecosystem.
This is a deck that highlights the origins of my Identity Ecosystem Mapping efforts. It shares snapshots of the prototype map in Kumu and outlines the functionality possible for Version 2.0 using the Knowledge Ecology Interface system developed by SOSACorp.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
Innovation in the Digital Identity space is crucial for progress. Here’s a fact: a new identity is generated with every birth. Now consider this: by the time you finish your day today, a staggering 360,000 children will be eligible for an identity document.
This is a deck that for describing Self-Sovereign Identity. It was presented at InDITA. It covers Distributed Ledgers (Blockchains), Verifiable Claims, Decentralized Identifiers.
Us, Our Organizations and the Evolving Web: Leveraging Identity Tools for Collaboration. This talk was given at the Net Squared 2008 Conference. The goal was to share some of the activity ongoing in the identity community, how it might be used by the nonprofit sector and invite their involvement in its continued development.
This talk articulates 1) what is a blockchain 2) why it is interesting 3) talks through use-cases grounded in real world projects. 4) Highlights questions government leaders should ask before deciding to use a blockchain.
The future of digital identity initial perspectiveFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
Learn about the Kantara Consent & Information Sharing WG and their major deliverable the digital Consent Receipt - an Alpha project designed to upgrade the way a person provides consent on-line. This is an open standardization project.
Future of digital identity initial perspective - final lrFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
Identity - Past Solutions & Current Blockchain Landscapeaatkin1971
Identity - Past Solutions & Current Blockchain Landscape. Intro and profile of ENS (Ethereum Naming Service) & uPort identity solution. Silicon Valley Ethereum meetup @ Goodwin Law, May 7, 2017.
Kantara Initiative is increasingly known globally as the 'go to' place for operationalized identity and consent based privacy services. This overview provides viewers an insight into Kantara's aims and objectives, services and members. Join us!
Présentation de la méthode de l'Elevator Pitch, indispensable pour se présenter ou présenter son organisation, de manière percutante en quelques mots... le temps d'un voyage en ascenseur.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
Innovation in the Digital Identity space is crucial for progress. Here’s a fact: a new identity is generated with every birth. Now consider this: by the time you finish your day today, a staggering 360,000 children will be eligible for an identity document.
This is a deck that for describing Self-Sovereign Identity. It was presented at InDITA. It covers Distributed Ledgers (Blockchains), Verifiable Claims, Decentralized Identifiers.
Us, Our Organizations and the Evolving Web: Leveraging Identity Tools for Collaboration. This talk was given at the Net Squared 2008 Conference. The goal was to share some of the activity ongoing in the identity community, how it might be used by the nonprofit sector and invite their involvement in its continued development.
This talk articulates 1) what is a blockchain 2) why it is interesting 3) talks through use-cases grounded in real world projects. 4) Highlights questions government leaders should ask before deciding to use a blockchain.
The future of digital identity initial perspectiveFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
Learn about the Kantara Consent & Information Sharing WG and their major deliverable the digital Consent Receipt - an Alpha project designed to upgrade the way a person provides consent on-line. This is an open standardization project.
Future of digital identity initial perspective - final lrFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
Identity - Past Solutions & Current Blockchain Landscapeaatkin1971
Identity - Past Solutions & Current Blockchain Landscape. Intro and profile of ENS (Ethereum Naming Service) & uPort identity solution. Silicon Valley Ethereum meetup @ Goodwin Law, May 7, 2017.
Kantara Initiative is increasingly known globally as the 'go to' place for operationalized identity and consent based privacy services. This overview provides viewers an insight into Kantara's aims and objectives, services and members. Join us!
Présentation de la méthode de l'Elevator Pitch, indispensable pour se présenter ou présenter son organisation, de manière percutante en quelques mots... le temps d'un voyage en ascenseur.
JOUR 450 - Client Pitch Presentation for USC Annenberg AdmissionsShuWen Zhang
For JOUR 450: PR Capstone course, the entire class worked as a team to develop a strategic plan to help our client, USC Annenberg Admissions, better attract quality applicants to the graduate programs. As the team leader for the presentation team, I created this presentation deck with the help of my team. This was used to pitch our idea to members of the Admissions team.
Fortifiez vos ventes! Quelques astuces de base, par Christian Wopperer et Nad...CLDEM
Dans le cadre de la journée de l’entrepreneur qui a eu lieu le 21 mars 2012, Christian Wopperer et Nada Zogheib ont présenté au public leurs astuces de base pour fortifier les ventes.
Christian Wopperer est vice-président, sales Intelligence, au Centre d’entreprises et d’innovation de Montréal (CEIM).
Pitcher car c’est la tâche n°1 de tout entrepreneur ! Pour séduire un investisseur, un client, un journaliste, il faut être préparé.
Dans cette conférence nous vous donnons les clés pour bien pitcher et nous vous apprenons à construire votre discours et à incarner votre projet. Ensuite c'est à vous de jouer et on améliore en direct !
Contactez-nous : hello@yellowlab.fr
Une présentation mise à jour sur le pitch et l’elevator pitch ... mais aussi sur la proposition de valeur, indispensable réflexion pour travailler sur le pitch ...
Le Business storytelling expliqué pas à pas pour vous aider à créer votre mar...TALK2LEAD
Les techniques du business storytelling: quelles questions se poser? Comment connaitre le public, se reconnaitre dans les archétypes? Définir le héros et l'intrigue? Rédiger l'histoire de succès de votre marque, produit ou service?
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...PayPalX Developer Network
Outsourcing identity-related services—such as customer authentication—to PayPal could speed your application development, save you the hassle of dealing with password resets, and give your customers a shorter and easier path to purchases. An authentication service is just one example of the identity services we've got planned. Come learn how all of them can improve business opportunities and enhance user experiences.
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...Chema Alonso
Technicall report created by Gartner analyst in which they explore Telefonica & Eleven Paths technologies to provide Authentication & Authorization as a Service. In it they analyse Mobile Connect, Latch, SealSign and SmartID
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA
Harrison Tang, CEO at Spokeo
Emerging Tech
Digital identity is who you are in the digital world, and you should be able to control your own identity. In a world where Big Tech controls data on millions of its users, how do we claim our digital identities? Self-sovereign identity gives people the control over their identities by empowering them as intermediaries of identity-related transactions. People are the platform, not Big Tech or governments. Decentralized identity leverages technologies like blockchain and token-based economy to ensure that the identity infrastructure is not controlled by a few companies. Despite the decentralized infrastructure, federated identity enables identity information to be easily aggregated, processed, and available to use for good. Personalized identity individualizes the sharing of identity information (e.g. selective disclosure) based on different people's needs and sharing contexts. Secure identity makes sure that the access to identity information will be more secure, authenticated, and accountable. And lastly, intelligent identity helps streamline identity management.
Presented on the main stage at CVC2019 in Zug, Switzerland. Discusses the shifts in how digital identity, particularly CULedger's self-sovereign identity solution MyCUID is being used to return to a normal approach for relationships. Discusses future application in payments as well.
Validide is a Self Sovereign Identity company enabling individuals to have a digital wallet they control, not the TechGiants nor Gov't. We believe everyone should BE FUTURE PROOF and OWN THEIR IDENTITY
Mature Digital Trust Infrastructure - Are we there yet?sorenpeter
Presented at the European e-Identity Management Conference 2011 in Tallinn, Estonia:
Reflections on current Government approaches to Trust, federation and identity management. What needs to change as we move forward. We have come a long way with PKI, federation standards, trust frameworks, etc. but are we there yet? Where is there still work to be done and mindsets to be changed?
Driven by the behaviors and preferences of millennials, digital identities are growing rapid-fire. See how the largest cohort in history is driving a "digital first" evolution, and what role federated identity will play in this shift.
This talk was presented at the 2016 Cloud Identity Summit. It was in the Rise of the Identity-enabled Personal Information Economy Track. It puts forward 6 Diagrams to make Sense of the overall Personal Data Ecosystem including What is Personal Data? What Happens to Personal Data? What are Market Models and how is it regulated?
This is the presentation I gave at the Grace Hopper Celebration for Women in Computing October 2015. It covers three main ethical market models that could support the emergence of a Personal Data Ecosystem centered on individuals and their personal clouds. The three models are Vendor Relationship Management, Infomediaries, and Data Aggregators. It highlights the need for Accountability Frameworks (also called Trust Frameworks) combinations of code and law/policy. This is contextualized in an overall Landscape picture where two other modes of governance also co-exist - Peer Governance and Identifier Governance.
Kaliya and Bob gave this talk as the closing keynote for the Cloud Identity Summit on July 19th, 2012 in Vail Colorado. It discusses a range of issues and options for identity in society. It postulates that social justice or fairness must be an underlying design feature of any system. It encourages people to get involved with the NSTIC process and the current steering committee being formed.
I presented to SDForum Tech Women's group about Identity and Personal Data. I presented and also got input from the women attending about how they understood their own identities and what they want to have happen with their personal data.
I presented this talk on September 23 to the Computer Science and Telecommunications Board of the National Academies in Washington DC. It has three parts
1) What is User Centric Digital Identity
2) What are the technologies that have been developed to date
3) Emerging work on developing a Personal Data Ecosystem.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
2. Internet
Identity
Workshop
Co-Founded in 2005
Born in Vancouver
Played Water Polo
UC Berkeley
Planetwork
Identity Commons
Identity Gang
Canada
Founded
in 2010 ECOSYSTEM
CONSORTIUM
PERSONAL
DATA
Today Independent
Identity Consulting
Who is
3. 1. Big Picture - What is Identity?
2. Digital Identity - Key Terms
3. ID in Context of Society
Enterprise, Government, Commons
4. User-Centric/Self-Sovereign Identity
5. Spectrum of Identity
6. Big Picture - ID Resources
7. Questions and Answers
Outline
5. Who I am
Who I present
myself to be
How I am seen
In a
given
context
6. Contexts Roles (Persona)
Family
Parent, Child
Brother, Sister
Religious Life
Hobbies
Professional Work
Congregant
Religious Leader
Creator, Maker
Teacher
Employee, Employer
Contractor
Professionally Licensed
7.
8. Atoms
Bits
Easy to move physically
between contexts.
To Present Different Selves
Movement Between Different Contexts
Requires Different
Non-Correlated Identifiers
14. Proofing / Verification
Triangulation
Identity Proofing or Verification: The processes used to
check the veracity of identity claims about a person. This is
often done in an enrollment process.
15. Attributes Claims
Attributes and Claims can be both self asserted by a
person or ascribed to a person by an institution.
Identifier
Identifies are pointers at people.
Within institutional or network systems these are often
numbers that point particular people.
16. Identifiers Claims
Single String Pairs
Identifiers link things together
and enable correlation.
They can be endpoints on the
internet.
A claim is by one party about
another or itself.
It does not have to be linked to
an identifier.
Proving you are over 18 for
example and not giving your
real name.
17. Directed Identifier
These is a types of identifies enable individuals to
use different identifiers for different contexts.
The BC Citizen Services card is “one card” but
when one uses it in a Healthcare content it has a
different identifier then when used within the
context of a drivers license. So the identifier is
“directed” and only used in one context.
18. Network End-Point Identifier
Identifiers that are also Network End-Points include
Phone numbers
e-mail addresses
Authentication can be performed with the end-point.
That is you can prove you are in position of the end-
point with a challenge - such as a being sent code to a
phone and then entering it into the site asking to confirm
that you are in control of it.
19. Authentication
AuthN
What you Know
(A Password, OneTime Password)
What you Have (A Credential)
What you Are (Biometric)
Emerging: What you Do (Behavior)
20. Multi-Factor Authentication
MFA
What you Have (a bank card)
and What you know (The PIN #)
What you Know (Password
and What you Are (A Biometric shared at Enrollment)
Using more then one form of Authentication.
21. Authorization
AuthZ
This is very different then Authentication which is just
checking that an individual is the same one who
presented themselves with the credentials before.
What are you permitted (authorized) to do in a system?
29. Citizen Identity
The power relationship between the citizen /
subject and government entities is NOT the same
as the power relationship between the employer
and their employee.
The systems used for enterprise identity
management CAN NOT be picked up and
plopped down on citizen <—> government identity
management contexts. It has to work differently.
Enterprise provisioning and termination is clearly not
the same as the government issuance of a birth
certificate and death certificate.
33. The Identity Dog
Represents 2 things:
* Freedom to be who you want to be
* Freedom to share more specific
info about yourself that is validated
User-Centric / Self-Sovereign Identity
50. How do people “get”
User Centric Digital Identity today?
Google profiles
Yahoo! profiles
Facebook
LinkedIn
Hack it together with handles from web mail providers
or on a service like Twitter
Challenge with e-mail addresses as identities
the communications token is the “ID”
User-Centric / Self-Sovereign Identity
51. What are our rights in these commercial
spaces governed by Terms of Service?
How are we “citizens” in private space?
In physical life we have protection of our
physical self - people will be prosecuted for
harming us. What is the equivalent in online
spaces?
Freedom to not be “erased” under TOS
User-Centric / Self-Sovereign Identity
52. Identifier side:
Own their own
domain name.
Have a blog?
Run an openID server?
Claims based side:
Almost impossible.
Little relying party adoption
(Places where 3rd party
or self generated claims
will be accepted)
Little client side app adoption
How do people “get”
User Centric Digtial Identity?
User-Centric / Self-Sovereign Identity
53. Identifier side: Claims based side:
Emerging Today: How do people “get”
Self-Sovereign Digital Identity today?
User-Centric / Self-Sovereign Identity
Proposed:
Distributed IDentity -> DID
Distributed Ledger Technology
Emerging Networks
for their Exchange
ID/DataWeb
W3C: Verified Claims
Working Group
Personal Data Banks / Stores / Vaults / etc….
54. What is the context for people gathering?
“We’re trying to build a social
layer for everything.”
- Mark Zuckerburg
User-Centric / Self-Sovereign Identity
56. Freedom to group and cluster outside commercial silos
& business contexts.
Freedom of
Movement and Assembly
User-Centric / Self-Sovereign Identity
57. •Freedom to Aggregate
•Freedom to Disaggregate
•Freedom to not be “erased” under TOS
•Freedom of Movement and Assembly
•Freedom to Peer-to-Peer link & the
Freedom to determine if the link is seen
by others
•Custodianship is Possible
User Centric Digital Identity is the:
User-Centric / Self-Sovereign Identity
58. Isn’t just a technical problem
TECHNOLOGY
LEGAL
SOCIAL BUSINESS?
User-Centric / Self-Sovereign Identity
59. Why have we have yet to succeed?
It is a REALLY hard problem set to solve for,
User Centric Digital Identity that is:
1. open standards based
2. the scale of the internet + other digital systems
3. that people find usable
4. that they understand
5. that is secure
6. it requires emergence of new social behavior
7. and changes business models & norms
User-Centric / Self-Sovereign Identity
60. Why have we have yet to succeed?
It is a REALLY hard problem set to solve for,
User Centric Digital Identity that is:
1. open standards based
2. the scale of the internet + other digital systems
3. that people find usable
4. that they understand
5. that is secure
6. it requires emergence of new social behavior
7. and changes business models & norms
User-Centric / Self-Sovereign Identity
CAUSE IT IS
REALLY HARD…
61. We are still working on making the vision real
The Internet Identity Workshop Continues
& New Efforts that Complement
* Rebooting Web of Trust * Personal Data Ecosystem
* Re-Decentralize * Personal Data 2016 …
Many protocols emerging - OpenID, OAuth, SCIM,
Frameworks To Believe Veracity Exchange of
Attributes and Identifiers
User-Centric / Self-Sovereign Identity
68. ?
Anonymous
One Site Multi-Site
Self-Asserted Socially
Validated
Verified
✓
Pseudonymous
?
✓
Verified
Anonymity
Over 18 years
Woman Voter
CA Congressional
District 9
Ms.Sue Donna
DOB = 1/21/1982
1823 6th Ave.
Alameda, CA
74. Identity is social.
Identity is subjective.
Identity is valuable.
Identity is referential.
Identity is composite.
Identity is consequential.
Identity is dynamic.
Identity is contextual.
Identity is equivocal.
OECD Paper At a Crossroads: "Personhood” and the Digital Identity in the Information Society
Properties of Identity
75. 1. User Control and Consent
2. Limited Disclosure for Limited Use
3. The Law of Fewest Parties
4. Directed Identity
5. Pluralism of Operators and Technologies
6. Human Integration
7. Consistent Experience Across Contexts
by Kim Cameron - https://www.identityblog.com/?p=354
Laws of Identity