The document discusses using decentralized identifiers (DIDs) and verifiable credentials to enable trust and interoperability in the Internet of Things (IoT). It describes how traditional IoT systems face challenges with identity, authentication, authorization, and interoperability due to fragmented identification schemes. The presentation introduces DIDs as a new type of identifier that allows entities to prove control over digital identities. It also discusses how verifiable credentials and decentralized key management can improve trustworthiness for IoT devices and systems. The goal is to establish a common foundation for identity to simplify development of autonomous systems using connected devices and machines.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
OpenID Connect 4 SSI aims at specifying a set of protocols based on OpenID Connect to enable SSI applications. The initiative is conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation (DIF). One of the specifications is built up on DID-SIOP in DIDAuth WG in DIF and SIOP v1 in OIDC Core.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
The Hyperledger Indy Public Blockchain NodeSSIMeetup
https://ssimeetup.org/hyperledger-indy-public-blockchain-node-alexander-shcherbakov-webinar-43/
Alexander Shcherbakov is a software engineer at DSR working on the team at Evernym. He has a Ph.D. in Mathematics and is one of the maintainers of Hyperledger Indy and Hyperledger Plenum. In this presentation, he will explain the value of a decentralized ledger in an SSI ecosystem and examine Hyperledger Indy, which is the distributed ledger that has been powering the Sovrin Network for more than two years.
Our identities have to be trusted to be useful. When we meet strangers, we decide how much we trust them by what they tell us, and whether a trusted third party will vouch for them. In traditional identity systems, the trusted third party knows everything about everyone in the ecosystem. In Self-Sovereign Identity systems, we rely on a decentralized ledger to privately validate that the identity claims do in fact come from a trusted issuer.
Indy’s blockchain implementation is Plenum, which is a general purpose, public-permissioned, BFT distributed ledger. The presentation takes a technical look at the architecture, cryptography, transactions, data structures, and storage of the ledger including auditability, request processing, catch-up procedure, and support for custom plugins and custom transactions.
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
On our March 12, 2020 webinar, Evernym Chief Architect Daniel Hardman provided a great introduction to verifiable credentials and compared them to the physical credentials (passports, driver's licenses, loyalty cards) we use every day. He then identified six lessons we can learn from today's physical credentials and how we're applying each to the world of self-sovereign identity.
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Evernym
In Evernym's November 2021 webinar, we discussed the current state of decentralized identifiers (DIDs), their role in a more trusted Web, and why three of the four largest browser vendors are trying to stop their approval at the W3C.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
OpenID Connect 4 SSI aims at specifying a set of protocols based on OpenID Connect to enable SSI applications. The initiative is conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation (DIF). One of the specifications is built up on DID-SIOP in DIDAuth WG in DIF and SIOP v1 in OIDC Core.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
The Hyperledger Indy Public Blockchain NodeSSIMeetup
https://ssimeetup.org/hyperledger-indy-public-blockchain-node-alexander-shcherbakov-webinar-43/
Alexander Shcherbakov is a software engineer at DSR working on the team at Evernym. He has a Ph.D. in Mathematics and is one of the maintainers of Hyperledger Indy and Hyperledger Plenum. In this presentation, he will explain the value of a decentralized ledger in an SSI ecosystem and examine Hyperledger Indy, which is the distributed ledger that has been powering the Sovrin Network for more than two years.
Our identities have to be trusted to be useful. When we meet strangers, we decide how much we trust them by what they tell us, and whether a trusted third party will vouch for them. In traditional identity systems, the trusted third party knows everything about everyone in the ecosystem. In Self-Sovereign Identity systems, we rely on a decentralized ledger to privately validate that the identity claims do in fact come from a trusted issuer.
Indy’s blockchain implementation is Plenum, which is a general purpose, public-permissioned, BFT distributed ledger. The presentation takes a technical look at the architecture, cryptography, transactions, data structures, and storage of the ledger including auditability, request processing, catch-up procedure, and support for custom plugins and custom transactions.
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
On our March 12, 2020 webinar, Evernym Chief Architect Daniel Hardman provided a great introduction to verifiable credentials and compared them to the physical credentials (passports, driver's licenses, loyalty cards) we use every day. He then identified six lessons we can learn from today's physical credentials and how we're applying each to the world of self-sovereign identity.
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Evernym
In Evernym's November 2021 webinar, we discussed the current state of decentralized identifiers (DIDs), their role in a more trusted Web, and why three of the four largest browser vendors are trying to stop their approval at the W3C.
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Gokul Alex
Blockchain Engineering Workshop for World Blockchain Conclave organised by 1point2GWS. Session on Hyperledger Indy Framework, Architecture Model, Components, Modules, Workflows. Demonstrated Verifiable Organisation Networks and Decentralised Workflows on Hyperledger Indy. Demonstrated Hyperledger Indy CLI and Indy Sandbox. Deep Dive on Decentralised Identifiers ( DID ) and the goals of DID. An overview of Sovrin platform is included.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
The Shift from Federated to Decentralized IdentityEvernym
Up until recently, the majority of digital identity systems have been federated, where a small group of “identity providers” supply individuals with a digital identity that can be used to access other websites and services within the federation. Now we’re seeing the shift to decentralized identity solutions and open ecosystems based on verifiable credentials, where anyone can participate, issue, and verify.
In the first of a new series on digital identity and government, we invited leading experts from Accenture and Evernym to discuss the state of digital identity systems within the public sector and the reasons why government interest in decentralized models continues to increase.
We covered:
- The key differences between federated and decentralized identity systems
- An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada)
- What decentralization means for portability, scalability, flexibility, and privacy
- How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
OpenID Connect 4 SSI is an initiative conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation. It aims at specifying a set of protocols based on OpenID Connect to enable SSI applications.
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
https://ssimeetup.org/hyperledger-aries-open-source-interoperable-identity-solutions-nathan-george-webinar-30/
Nathan George, Sovrin Foundation CTO, and Hyperledger Contributor will explain what Hyperledger Aries is and how it will facilitate an open source infrastructure for interoperable identity solutions.
Aries was born out of the work on identity agents and identity wallets that began in the Hyperledger Indy project. Aries is, in fact, the second Hyperledger project to spin out of Hyperledger Indy. The first was Hyperledger Ursa, announced in December 2018.
Self-sovereign identity based on DIDs requires strong interoperability and pluggability at the infrastructure level. It also requires great applications that offer end-to-end functionality so that users can accomplish jobs with greater security, flexibility, and privacy. Aries is expected to be a major step forward in this direction.
Aries will be the industry’s first implementation of interoperable open source wallets for digital credentials that use the DKMS (Decentralized Key Management System) architecture that Evernym pioneered under a contract with the U.S. Department of Homeland Security.
This talk will introduce Zero-Knowledge Proofs (ZKPs) and explain why they are a key element in a growing number of privacy-preserving, digital-identity platforms. Clare will provide basic illustrations of ZKPs and leave the necessary mathematics foundations to the readers.
After this talk you will understand that there is a variety of ZKPs, it’s still early days, and why ZKP is such a perfect tool for digital identity platforms. This talk includes significant updates from the newly-organized ZKProof Standardization organization plus a signal of maturity: one of the first known ZKP vulnerabilities.
Clare will explain why ZKPs are so powerful, and why they are building blocks for a range of applications including privacy-preserving cryptocurrency such as Zcash, Ethereum, Artificial Intelligence, and older versions of Trusted Platform Modules (TPMs). The presentation includes many backup slides for future learning and researching, including four slides of references.
Introduction to Self-Sovereign IdentityKaryl Fowler
Juan Caballero from Spherity and Karyl Fowler from Transmute co-presented the Introduction to Self-Sovereign Identity (SSI) session at the 30th Internet Identity Workshop (IIW) in April 2020, demonstrating to newcomers the difference between the values associated with the "SSI movement" and "collection of technologies" that power applications that embody some of said values.
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
This deck gives an overview of OpenID 4 Verifiable Credentials and shows how the specs can be tailored to the needs of a certain category of projects/ecosystems.
FIWARE Training: Identity Management and Access ControlFIWARE
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
Introduction to DID Auth for SSI with Markus SabadelloSSIMeetup
Markus Sabadello, CEO of Danube Tech, will talk about DID Auth, an emerging building block in the SSI ecosystem. Although the technical details of DID Auth are not well-defined at this point, its general concept is clear: With self-sovereign identity infrastructure, the most trivial and straightforward functionality for identity owners should be the ability to authenticate, i.e. to prove control of a DID in some relationship or during a transaction. This could take place using a number of different data formats, protocols, and flows. DID Auth includes the ability to authenticate to web sites and applications, and to establish mutually authenticated communication channels. In this webinar, we will discuss the current state of the DID Auth concept, and how it relates to other efforts such as Verifiable Credentials and agent protocols.
Learn about the Trust Over IP (ToIP) stackSSIMeetup
https://ssimeetup.org/trust-over-ip-toip-stack-webinar-54/
At SSI Meetup you’ve been hearing about the Trust over IP (ToIP) stack (originally called the “SSI stack”) since last September 2019. In this webinar, three pioneers of this new architecture for Internet-scaled digital trust infrastructure will share exciting news about where ToIP is going. We can’t reveal the details yet—it is under embargo until next Tuesday—but let’s just say you don’t want to miss it.
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
https://ssimeetup.org/blockcerts-open-standard-blockchain-credentials-daniel-paramo-anthony-ronning-webinar-39/
Anthony Ronning, an engineer behind Blockcerts and backend dev at Learning Machine and Daniel Paramo, co-founder of swys and advisor at Xertify, explains how Blockcerts started, deep dive on how Blockcerts work, which institutions are implementing this solution and what companies have made a solution for the adoption of this standard. We will review the current Blockcerts roadmap and their pros and cons. What considerations do we need to take when developing a solution around Blockcerts?
Blockcerts is an open standard for creating, issuing, viewing, and verifying blockchain-based certificates. These digital records are registered on a blockchain, cryptographically signed, tamper-proof, and shareable. The goal is to enable a wave of innovation that gives individuals the capacity to possess and share their own official records.
The initial design was based on prototypes developed at the MIT Media Lab and by Learning Machine. The goal of this community is to create technical resources that other developers can utilize in their own projects. Rather than independently developing custom implementations.
Blockcerts consists of open-source libraries, tools, and mobile apps enabling a decentralized, standards-based, recipient-centric ecosystem, enabling trustless verification through blockchain technologies.
Blockcerts uses and encourages consolidation on open standards. Blockcerts is committed to self-sovereign identity of all participants, and enabling recipient control of their claims through easy-to-use tools such as the certificate wallet (mobile app). Blockcerts is also committed to availability of credentials, without single points of failure.
These open-source repos may be utilized by other research projects and commercial developers. It contains components for creating, issuing, viewing, and verifying certificates across any blockchain.
Self-sovereign identity (SSI) is a new identity model that gives the user control and ownership over her data.
To dive into what this means and the benefits it offers, Evernym's Andy Tobin gave a webinar on October 17, 2019 introducing the topic of self-sovereign identity and its role in transforming customer experiences and unlocking competitive advantage.
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Gokul Alex
Blockchain Engineering Workshop for World Blockchain Conclave organised by 1point2GWS. Session on Hyperledger Indy Framework, Architecture Model, Components, Modules, Workflows. Demonstrated Verifiable Organisation Networks and Decentralised Workflows on Hyperledger Indy. Demonstrated Hyperledger Indy CLI and Indy Sandbox. Deep Dive on Decentralised Identifiers ( DID ) and the goals of DID. An overview of Sovrin platform is included.
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42/
Daniel Hardman, Chief Architect, Evernym / Secretary, Technical Governance Board – Sovrin Foundation will show how Peer DIDs will allow off-chain transactions for the self-sovereign identity (SSI) world.
Most documentation about decentralized identifiers (DIDs) describes them as identifiers that are rooted in a public source of truth like a blockchain, a database, a distributed filesystem, or similar. This publicness lets arbitrary parties resolve the DIDs to an endpoint and keys. It is an important feature for many use cases. However, the vast majority of relationships between people, organizations, and things have simpler requirements. When Alice(Corp|Device) and Bob want to interact, there are exactly and only 2 parties in the world who should care: Alice and Bob. Instead of arbitrary parties needing to resolve their DIDs, only Alice and Bob do. Peer DIDs are perfect in these cases. In many ways, peer DIDs are to public, blockchain-based DIDs what Ethereum Plasma or state channels are to on-chain smart contracts— or what Bitcoin’s Lightning Network is to on-chain cryptopayments. They move interactions off-chain, but offer options to connect back to a chain-based ecosystem as needed. Peer DIDs create the conditions for people, organizations, and things to have full control of their end of the digital relationships they sustain.
The Shift from Federated to Decentralized IdentityEvernym
Up until recently, the majority of digital identity systems have been federated, where a small group of “identity providers” supply individuals with a digital identity that can be used to access other websites and services within the federation. Now we’re seeing the shift to decentralized identity solutions and open ecosystems based on verifiable credentials, where anyone can participate, issue, and verify.
In the first of a new series on digital identity and government, we invited leading experts from Accenture and Evernym to discuss the state of digital identity systems within the public sector and the reasons why government interest in decentralized models continues to increase.
We covered:
- The key differences between federated and decentralized identity systems
- An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada)
- What decentralization means for portability, scalability, flexibility, and privacy
- How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
OpenID Connect 4 SSI is an initiative conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation. It aims at specifying a set of protocols based on OpenID Connect to enable SSI applications.
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
https://ssimeetup.org/hyperledger-aries-open-source-interoperable-identity-solutions-nathan-george-webinar-30/
Nathan George, Sovrin Foundation CTO, and Hyperledger Contributor will explain what Hyperledger Aries is and how it will facilitate an open source infrastructure for interoperable identity solutions.
Aries was born out of the work on identity agents and identity wallets that began in the Hyperledger Indy project. Aries is, in fact, the second Hyperledger project to spin out of Hyperledger Indy. The first was Hyperledger Ursa, announced in December 2018.
Self-sovereign identity based on DIDs requires strong interoperability and pluggability at the infrastructure level. It also requires great applications that offer end-to-end functionality so that users can accomplish jobs with greater security, flexibility, and privacy. Aries is expected to be a major step forward in this direction.
Aries will be the industry’s first implementation of interoperable open source wallets for digital credentials that use the DKMS (Decentralized Key Management System) architecture that Evernym pioneered under a contract with the U.S. Department of Homeland Security.
This talk will introduce Zero-Knowledge Proofs (ZKPs) and explain why they are a key element in a growing number of privacy-preserving, digital-identity platforms. Clare will provide basic illustrations of ZKPs and leave the necessary mathematics foundations to the readers.
After this talk you will understand that there is a variety of ZKPs, it’s still early days, and why ZKP is such a perfect tool for digital identity platforms. This talk includes significant updates from the newly-organized ZKProof Standardization organization plus a signal of maturity: one of the first known ZKP vulnerabilities.
Clare will explain why ZKPs are so powerful, and why they are building blocks for a range of applications including privacy-preserving cryptocurrency such as Zcash, Ethereum, Artificial Intelligence, and older versions of Trusted Platform Modules (TPMs). The presentation includes many backup slides for future learning and researching, including four slides of references.
Introduction to Self-Sovereign IdentityKaryl Fowler
Juan Caballero from Spherity and Karyl Fowler from Transmute co-presented the Introduction to Self-Sovereign Identity (SSI) session at the 30th Internet Identity Workshop (IIW) in April 2020, demonstrating to newcomers the difference between the values associated with the "SSI movement" and "collection of technologies" that power applications that embody some of said values.
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
This deck gives an overview of OpenID 4 Verifiable Credentials and shows how the specs can be tailored to the needs of a certain category of projects/ecosystems.
FIWARE Training: Identity Management and Access ControlFIWARE
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
Introduction to DID Auth for SSI with Markus SabadelloSSIMeetup
Markus Sabadello, CEO of Danube Tech, will talk about DID Auth, an emerging building block in the SSI ecosystem. Although the technical details of DID Auth are not well-defined at this point, its general concept is clear: With self-sovereign identity infrastructure, the most trivial and straightforward functionality for identity owners should be the ability to authenticate, i.e. to prove control of a DID in some relationship or during a transaction. This could take place using a number of different data formats, protocols, and flows. DID Auth includes the ability to authenticate to web sites and applications, and to establish mutually authenticated communication channels. In this webinar, we will discuss the current state of the DID Auth concept, and how it relates to other efforts such as Verifiable Credentials and agent protocols.
Learn about the Trust Over IP (ToIP) stackSSIMeetup
https://ssimeetup.org/trust-over-ip-toip-stack-webinar-54/
At SSI Meetup you’ve been hearing about the Trust over IP (ToIP) stack (originally called the “SSI stack”) since last September 2019. In this webinar, three pioneers of this new architecture for Internet-scaled digital trust infrastructure will share exciting news about where ToIP is going. We can’t reveal the details yet—it is under embargo until next Tuesday—but let’s just say you don’t want to miss it.
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
https://ssimeetup.org/blockcerts-open-standard-blockchain-credentials-daniel-paramo-anthony-ronning-webinar-39/
Anthony Ronning, an engineer behind Blockcerts and backend dev at Learning Machine and Daniel Paramo, co-founder of swys and advisor at Xertify, explains how Blockcerts started, deep dive on how Blockcerts work, which institutions are implementing this solution and what companies have made a solution for the adoption of this standard. We will review the current Blockcerts roadmap and their pros and cons. What considerations do we need to take when developing a solution around Blockcerts?
Blockcerts is an open standard for creating, issuing, viewing, and verifying blockchain-based certificates. These digital records are registered on a blockchain, cryptographically signed, tamper-proof, and shareable. The goal is to enable a wave of innovation that gives individuals the capacity to possess and share their own official records.
The initial design was based on prototypes developed at the MIT Media Lab and by Learning Machine. The goal of this community is to create technical resources that other developers can utilize in their own projects. Rather than independently developing custom implementations.
Blockcerts consists of open-source libraries, tools, and mobile apps enabling a decentralized, standards-based, recipient-centric ecosystem, enabling trustless verification through blockchain technologies.
Blockcerts uses and encourages consolidation on open standards. Blockcerts is committed to self-sovereign identity of all participants, and enabling recipient control of their claims through easy-to-use tools such as the certificate wallet (mobile app). Blockcerts is also committed to availability of credentials, without single points of failure.
These open-source repos may be utilized by other research projects and commercial developers. It contains components for creating, issuing, viewing, and verifying certificates across any blockchain.
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
https://ssimeetup.org/kiva-protocol-building-credit-bureau-future-using-ssi-alan-krassowski-webinar-37/
Alan Krassowski, VP of Technology & Blockchain at Kiva, will explain how the Kiva Protocol team is leveraging Self-Sovereign Identity (SSI) and related technologies to develop identity and credit solutions for traditionally underserved populations, starting with an implementation in concert with Sierra Leone’s government and banking systems, in partnership with the United Nations Development Programme (UNDP).
Alan will provide an overview of the project and its goals, including some of the challenges related to infrastructure, such as limited electricity, Internet bandwidth and penetration of smartphone devices — and how Kiva is overcoming those challenges. Alan will also explain how Kiva is leveraging various Hyperledger codebases related to verifiable credentials, decentralized identifiers, and distributed ledgers, as well as how Kiva is contributing back to the open-source community.
The audience will gain a better understanding of a real-world application of SSI technologies that will provide powerful benefits to citizens in the developing world. How is Kiva giving unbanked people digital identity and secure control over their own credit information? How can a systems-level change in identity and credit unlock capital and opportunity for millions of people?
Alan has been a professional software engineer, architect, and leader for over thirty years. After earning his B.S. in Computer Engineering from Rochester Institute of Technology, he worked as a software developer in a wide variety of domains including fintech, insurance, desktop publishing, point-of-sale, accounting, budgeting, video streaming, and narrative theory. He has also held technical leadership roles at various companies in the cybersecurity space, including Chief Architect at Cylance, Inc., Chief Architect & Senior Director at McAfee / Intel Security, and Architect in the Office of the CTO at Symantec. Prior to his role at Kiva, he was a Decentralization Architect at ConsenSys and CTO of ConsenSys Capital where he worked with Ethereum-based blockchain solutions. He has been a technical editor/reviewer on four software security books and one on Bitcoin, and is excited about how advances in cryptography have led to new solutions for people to communicate, collaborate and trade while minimizing the need to trust in centralized institutions.
Just about all of my current technical content in one 364 slide mega-deck. Source files at https://github.com/adrianco/slides
Sections on:
Scene Setting
State of the Cloud
What Changes?
Product Processes
Microservices
State of the Art
Segmentation
What’s Missing?
Monitoring
Challenges
Migration
Response Times
Serverless
Lock-In
Teraservices
Wrap-Up
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
https://ssimeetup.org/highlights-internet-identity-workshop-29-drummond-reed-autumn-2019-webinar-38/
SSI Meetup veteran Drummond Reed, Chief Trust Officer at Evernym and Trustee at the Sovrin Foundation, will cover the highlights of the latest edition of the longest-running conference in the Internet identity space—Internet Identity Workshop. Drummond has attended all 29 IIWs, and he will share his major takeaways from this gathering of the movers and shakers in SSI from around the world in the autumn of 2019.
How to Be a Responsible Open Source CitizenIvar Grimstad
Have you ever worked on a project that didn't use any open source tools, libraries, or products? Using open source has been such an integral part of our daily work life that we don't even think about it. We just expect it to be available, secure, stable, and bug-free.
But how many of you are actually contributing back to an open source project? In this session, I will go through some aspects of being a responsible open source citizen.
There may even be a couple of pointers on how to make a career in open source.
GAINING APPLICATION LIFECYCLE INTELLIGENCE
Applied Spring Track
Today we are facing an ever-increasing speed of product delivery. DevOps practices
like continuous integration and deployment increase the dependence of systems
like task tracking and source code repositories with build servers and test suites.
With data moving rapidly through these different tools, it becomes challenging to
maintain a grasp of the process, especially as the data is distributed and in a variety
of formats. But it is still critical to maintain full visibility of the product development
journey – from user stories to production data. By starting at the beginning of the
Product Development Lifecycle, you can track a problem in production all the way
back to the code that was checked into the build and the developer responsible for
the code.
In this session I'll demonstrate some of the ways in which Splunk software can be
used to collect and correlate data throughout the various stages of the lifecycle of
your code, to ultimately make you more efficient and make your code better.
There is a rising demand for Corda architect or certified Corda expert. Before heading further to understand about Corda certification program offered by Blockchain Council, we need to understand Corda.
Content: (1) How the core interaction defines a platform (2) How a traditional (pipeline) value chain differs from a platform value matrix (3) What's inside and what's outside the platform
These slides provide complimentary course materials for the Ch 3 of Platform Revolution - How Network Markets are Transforming the Economy and How to Make Them Work for You. Final slides provide reading supplements and links to other chapters for industry and academia.
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...sparkfabrik
In this talk I’ll explain what is the Software Supply Chain, common threats and mitigations and how they apply to IAC ecosystem too. I’ll show off security threats using Terraform and its ecosystem and finally i’ll talk about OCI images talking about digital signatures and SBOM using Sigstore and Syft. I’ll do a live coding session showing off how to deploy secure OCI images on K8S cluster with security policies built with Kyverno, the session includes also security scanning using the generated SBOM.
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
The immense potential unlocked by SSI in content-centric social networks (forums) is largely unaddressed by the recent wave of decentralized social networks. Enter ZKorum - a network of verifiable communities where members create anonymous polls and discussions. In this episode, Nicolas Gimenez, the Co-Founder and CTO of ZKorum, unveils the Alpha version and delves into its architecture, drawing inspiration from SSI, DWeb, and Password Managers.
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
Lovesh Harchandani from Dock presents their approach to anonymous credentials and dives in on the various predicates that can be proven in zero knowledge. In over 90 minutes of discussion, we cover what these cryptographic techniques are, how they enable several important use cases for digital identity credentials, and we stretch James Monaghan's ability to keep up as interviewer by taking a look at the source code which makes it all possible! We show how various zero knowledge primitives we've built can be used in a modular fashion to solve real-world use cases. We cover privacy-preserving signature schemes, zero knowledge attribute equalities, range proofs, and verifiable encryption based on ZK-SNARKs, expressing arbitrary predicates as Circom programs and creating ZK proofs for them and blinded credentials (issuer is unaware of all attributes). For anyone interested in the technical underpinnings of this new frontier of digital identity, this episode is a must!
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
Talk with Vladimir Vujovic, Senior Digital Innovation Manager from SICPA about product definition and value proposition of Issuer/Holder/Verifier software of SSI tech providers. Why is it hard to convey the right message to the audience coming from outside of SSI domain. How different SSI tech providers define their offering and the language they use to convey the message. What is really the value proposition of SSI tech providers who are offering their Issuer/Verifier software to the market. How big regulation initiatives like the one in Europe for eIDAS v2 are driving the market and roadmaps for SSI tech providers and how will such initiative will have impact to the rest of the world in terms of regulation, but some of the underlying technical standards. What is the place of SSI platforms in the broader Identity landscape and when are we going to see more maturity from the market.
SSI Adoption: What will it take? Riley HughesSSIMeetup
Adoption: its the elephant in the room. SSI has so much potential, but the benefits are only realised once adoption happens at scale. In this webinar, Riley Hughes, CEO and Co-Founder of Trinsic, shares his 3 concrete recommendations for building products which are successful according to the most important metric - getting adopted!
Daniel Buchner is here to save the web. Not the web as we know it, full of closed platforms and intermediaries where both free choice and free speech are curtailed, but the web as it was intended to be: a thriving, open ecosystem of apps and protocols which put individuals at the center. To do this, he and the TBD team at Block are building what they call “Web5” which combines decentralized identifiers, verifiable credentials and personal datastores to create a platform for building truly self-sovereign apps on the web. In this webinar, we go beyond the controversial name to learn what the project is, why it is important, and what we can expect from the upcoming release this summer.
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
Complying with Know Your Customer and Anti Money Laundering regulations is hugely complicated and expensive for financial institutions, and burdensome for their customers. Nate Soffio, Co-Founder and CEO of Portabl, believes that the solution lies in secure, interoperable data - enabled by verifiable credentials. In this webinar, he explains why it is such a thorny problem, how open banking needs to evolve to more of a “tap to prove” model as organizations increasingly need continuous identity assurance, and why despite describing the task as “playing SSI on ‘hard mode’”, he believes building a “compound startup” is the best way to get the job done.
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
Daniel Fritz, Executive Director of the PharmaLedger Association and Marco Cuomo, Director of Tech Products & Innovation at Novartis, will present their SSI journey from the initial ideas, through realization of several Proof of Concepts with DIDs and VCs, to the PharmaLedger initiative. PharmaLedger was a 29 member, 3-year, €22 million project under the EU and EFPIA Innovative Medicine Initiative pursued DIDs with external partners such as the global standards organization GS1 and the Global Legal Identifier Foundation (GLEIF). The project also resulted in the creation of the PharmaLedger Association in 2022, a non-profit Swiss association mandated to launch the first open-source product, electronic Product Information (eLeaflet). The webinar will review some of the use cases and dive a little into the technical architecture adopted in the project.
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
Everyone is excited about SSI but there still aren’t any use cases that form part of people’s daily lives, so the team at Cheqd set out to change that. In this session, Ankur Banerjee walks through the research that led them to settle on social reputation in Web3 ecosystems as a use case that would be fun and drive daily usage. Find out more on creds.xyz.
Polygon ID offers tools that allow developers to build self-sovereign, decentralized and private identity solutions for users that leverage zero knowledge proofs. Polygon ID was released as open source last March 2023 at ETH Denver. In this presentation, Otto Mora, BD Lead for Americas, and Oleksander Brezhniev, Technical Lead at Polygon ID, will be covering aspects of the did:PolygonID method including: Verifiable presentations leveraging ZK Proofs; How the Proofs are generated; Credential Issuance Methods; and Identity Management Features.
Building SSI Products: A Guide for Product ManagersSSIMeetup
Self-sovereign identity, decentralised identity, web5… collectively “ID Tech” has become a much more mainstream topic in recent years, and we are seeing an increasing number of products being built using these new technologies. However, with all the hand-wringing about adoption that we hear in the industry, it can sometimes feel like a hammer looking for nails. Which specific and tangible benefits can ID Tech bring to its users, and what special considerations should a product manager have in mind when working in this space? James Monaghan has been a product leader for two decades and has worked on ID Tech projects in financial services, travel, healthcare, education and more. In this talk he will share his views on how to tell whether a customer problem might call for an ID Tech solution, and how to approach some of the product decisions which arise when applying these tools.
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
https://ssimeetup.org/solving-compliance-crypto-businesses-using-decentralized-identity-pelle-braendgaard-webinar-60/
A new global framework for regulating the crypto industry is coming into place this year. One of the most important new rules that businesses interacting with crypto has to implement is what is known as the Travel Rule. The Travel Rule, which is also known as The Wire Transfer rule, requires a business managing crypto on behalf of their user to transfer KYC’d (Know-Your-Customer) Identity Information to a receiving institution. Pelle Braendgaard, CEO of Notabene, will share his insights and explain how his company is tackling this business challenge for the industry.
Complying with this rule provides many challenges for the industry. Several industry groups have already started to invent several new protocols to solve this. Notabene helps financial companies be compliant with new, global anti-money laundering (AML) regulations for crypto transactions coming into effect right now. Pelle believes this is a critical use case for SSI (Self-Sovereign Identity). In this talk, he will go over the rule itself, industry protocols, how he sees SSI can help here, and how they are helping to solve it.
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
https://ssimeetup.org/pan-canadian-trust-framework-pctf-ssi-tim-bouma-webinar-59/
We are very proud to release a special webinar to introduce the next chapter of the “Self-Sovereign Identity Book” from two of the most eminent authorities on digital identity in government: Tim Bouma and Dave Roberts, senior public servants with the Government of Canada and major contributors to the Pan-Canadian Trust Framework (PCTF).
In this chapter, Tim and Dave explain the PCTF model and how it maps to the SSI model and the Trust over IP (ToIP) stack.
This webinar describes how a world leader in digital identity (which Canada has been for two decades) sees the opportunity in the new decentralized identity model represented by SSI (Self-Sovereign Identity).
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
https://ssimeetup.org/identity-centric-interoperability-ceramic-protocol-joel-thorstensson-webinar-57/
Ceramic is a new permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Joel Thorstensson is the founder and CTO of 3Box and the primary author of the ceramic protocol as well as several Ethereum standards for identity and will provide a conceptual and technical intro to Ceramic.
At the root of many of the internet’s problems is that apps and services today are built primarily in silos. This includes identity registries and credentials, user data and access permissions, infrastructure, and services. It not only puts control over data and identities in the wrong hands, but it’s a fundamentally outdated and inefficient model for building digital products.
Ceramic unlocks information interoperability between all platforms and services across the web, allowing participants to create and resolve documents for any type of information without any centralized service. Ceramic uses DIDs (Decentralized Identifiers), IPLD (InterPlanetary Linked Data), signed messages, and blockchain anchoring to create a trusted and shared graph of verifiable documents. While flexible, these documents are especially well-suited for self-sovereign identity systems, user-centric data ecosystems, and open web services.
https://ssimeetup.org/ssi-ecosystem-south-korea-jaehoon-shim-webinar-56/
Jaehoon Shim, a blockchain researcher at LG CNS and the founder of SSIMeetup Korea, will introduce the Self-Sovereign Identity (SSI) ecosystem of South Korea. South Korea became a hotbed of Self Sovereign Identity in the last couple of years. The number of government-funded projects, including the mobile credential for government officials, requires using DIDs (Decentralized Identifiers). Also, hundreds of enterprises joined public/private consortia on decentralized identity to empower the digital transformation of the South Korean society. Jaehoon will explain in detail the current ecosystem and discuss opportunities for the future.
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
https://ssimeetup.org/how-avoid-another-identity-tragedy-with-ssi-christopher-allen-webinar-53/
Join the Dutch Self-Sovereign Identity community in a #Foremembrance for those who died by attempting to bomb the civil archives captured by the Nazis & those defending the vulnerable today. Christopher Allen will share with us the importance of this event for the self-sovereign identity community to build the future of identity on sunset Amsterdam time March 27th. We will also analyze the impact and risk of COVID-19 for privacy and identity systems.
March 27th is a Friday this year. Sunset in Amsterdam is at 19:06 CET, 2:06 pm EDT, 11:06 am PDT & is 1:06 am March 28 in Taipei & Hong Kong.
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
https://ssimeetup.org/self-sovereign-identity-why-we-here-christopher-allen-webinar-51/
Internet cryptography and Self-sovereign identity (SSI) pioneer Christopher Allen talks about essential insights and reflections around historical, technological and ethical aspects of Self-Sovereign Identity at the 51st SSIMeetup.org webinar in collaboration with Rebooting the Web of Trust (RWOT) and Alianza Blockchain Iberoamérica as part of the events that took place at RWOT in Buenos Aires (Argentina).
Christopher is an entrepreneur and technologist who specializes in collaboration, security, and trust. As a pioneer in internet cryptography, he’s initiated cross-industry collaborations and co-created industry standards that influence the entire internet. Christopher’s focus on internet trust began as the founder of Consensus Development where he co-authored the IETF TLS internet-draft that is now at the heart of all secure commerce on the World Wide Web. Christopher is co-chair of the W3C Credentials CG working on standards for decentralized identity. Christopher has also been a digital civil liberties and human-rights privacy advisor, was part of the team that led the first UN summit on Digital Identity & Human Rights, and was the producer of a half-dozen iPhone and iPad games, and of Infinite PDF, a non-linear media app.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
https://ssimeetup.org/eidas-regulation-anchoring-trust-self-sovereign-identity-systems-ignacio-alamillo-webinar-49/
Ignacio Alamillo is a lawyer, PhD in eIDAS Regulation, CISA, CISM, and EU Commission legal expert for EBSI eSSIF and the EBSI eIDAS Bridge initiatives. Ignacio will introduce SSI solutions, using the Alastria ID reference model as an illustrative example, taking into account the need for trust management frameworks, and trust anchors. Secondly, he will introduce the eIDAS Regulation, currently the major electronic identification regulation in the European Union, supporting a pan-European identity federation system, and the legal framework for the so-called trust services.
The EU has developed some key proposals arising from the legal assessment of the EBSI ESSIF use case, oriented to extend the eIDAS Regulation to SSI solutions used with public sector bodies relationships and procedures. This results were publicly presented in the 2nd ESSIF Stakeholders Meeting that took place in Brussels mid-January 2020.
The objective of the ESSIF legal assessment is to evaluate the potential legal issues that are horizontal to an SSI solution, including:
DIDs: What is the legal nature and ownership of DIDs (asset vs a special kind of pseudonym), how should be DIDs managed in case of minors and incapable persons, if DID may be subject to seizure, when DIDs may be deactivated, what is the legal regime of keys and wallets, etc.
VCs: What are the duties and responsibilities of VCs issuers, holders and verifiers. How to model the contractual/non-contractual relations between issuers & verifiers, and set up liability models. We should pay special attention to the legal aspects of the VC lifecycle (issuance, suspension and revocation causes, etc).
Alignment of the SSI solution with the eIDAS Regulation: aligning VCs with eIDAS eID rules, but also linking VCs to eSeals or eSignatures.
Trust framework: legal input regarding LoAs, governance aspects, conformity, etc.
The use cases include:
Using eIDAS identification means (and qualified certificates?) to issue verifiable credentials.
Using qualified certificates to support verifiable claims (EBSI eIDAS bridge) and legal evidences with full legal value.
Using SSI VCs as an eIDAS identification means.
Using blockchain plus SSI as an electronic registered delivery service.
All content represent just the opinion of Ignacio Alamillo, and do not represent any official position from the EU Commission nor any of its officers
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
https://ssimeetup.org/explaining-ssi-c-suite-executives-anyone-else-john-phillips-webinar-48/
John Phillips from 460degrees in Australia has been exploring with his team for more than two years for a way to describe Self-Sovereign Identity (SSI) that was easy to understand. We think he has found a good method to make SSI easy to understand for any C-suite executive and business people that goes beyond the technology.
John published a video in late 2019 that we found deeply insightful and we have invited him to share this with the SSI Meetup audience. This demo has been going down amazingly well with audiences from c-suite technology execs to design students.
This approach quite literally animates the discussion. People add other objects into the mix, move things around, ask relevant, insightful, questions.
John will share the learnings he is gaining from University research, as well as the results of work in supporting capstone projects for higher education students, and how this has led us to a storytelling model to explain SSI.
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
https://ssimeetup.org/did-report-2-2nd-official-w3c-did-working-group-meeting-netherlands-drummond-reed-markus-sabadello-webinar-45/
The DID Report 2 about the Second Meeting of the W3C DID Working Group with Drummond Reed and Markus Sabadello from Danube Tech, co-authors of the W3C DID specification.
DID spec co-author Drummond Reed and Markus Sabadello will report back from Amsterdam (The Netherlands) for the second official meeting of the W3C DID Working Group taking place from January 29-31, 2020 to share highlights of the meeting and the roadmap for taking DIDs to a full Web standard.
This session will be followed one hour later by a full DID education session based on the DID chapter published with Manning by IdentityBook.info authors Drummond Reed, Markus Sabadello and Alex Preukschat. If you want to learn all the basics about DIDs please also join this session here: Webinar 46
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Machine identity - DIDs and verifiable credentials for a secure, trustworthy and interoperable IoT - Mrinal Wadhwa
1. MACHINE IDENTITY
Decentralized Identifiers & Verifiable Credentials for
Trust & Interoperability in the Internet of Things
Mrinal Wadhwa
CTO @ Ockam
@mrinal
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.org
2. 1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
3. I’m passionate about building systems where connected machines come together with intelligent algorithms to improve our lives.
AUTONOMOUS SYSTEMS
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
4. PLUMBING
But I spend most of my days doing what is best described as - digital plumbing.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
5. IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE
TO THEIR PREFERENCE.
To illustrate, let’s think about how we may build this extremely simple autonomous system.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
6. IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE
TO THEIR PREFERENCE.
How do we identify a person?
How do we authenticate them?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
7. IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE
TO THEIR PREFERENCE.
How do we know they entered?
With a device?
How do we identify the device?
How do we authenticate the device?
Can we trust it?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
8. IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE
TO THEIR PREFERENCE.
How do we identify a room?
Which people are authorized to
change this room’s temperature?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
9. IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE
TO THEIR PREFERENCE.
How do we change temperature?
With a device?
How do we identify the device?
How do we authenticate the device?
Can we trust it?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
10. IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE
TO THEIR PREFERENCE. What is room temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
11. IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE
TO THEIR PREFERENCE.
How do we know their preferred temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
12. IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE
TO THEIR PREFERENCE.
How do we identify a person?
How do we authenticate them?
How do we know they entered?
With a device?
How do we identify the device?
How do we authenticate the device?
Can we trust it?
How do we identify a room?
Which people are authorized to
change this room’s temperature?
How do we change temperature?
With a device?
How do we identify the device?
How do we authenticate the device?
Can we trust it?
How do we know their preferred temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
What is room temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
13. IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE
TO THEIR PREFERENCE.
This seems hard, surely someone else has already built it.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
14. Found one with a quick google search, but it only works with Nest and IFFTT, our hardware is different :(.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
15. IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE
TO THEIR PREFERENCE.
1000s of People Identity Systems
Google, Facebook, Apple, Active Directory,
Custom Apps etc.
1000s of phones, motion sensors, RFID reader etc.
100s of IoT platforms, proprietary systems etc.
100s of building management
systems and custom apps etc.
1000s of HVAC systems, Thermostats etc.
1000s of custom apps.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
16. IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE
TO THEIR PREFERENCE.
Also, this problem statement isn’t general enough, we like to write reusable code.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
17. IF A SHIPMENT ENTERS A CONTAINER
CHANGE CONTAINER TEMPERATURE TO
IDEAL TEMPERATURE OF SHIPMENT.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
18. IF AN ENTITY THAT HAS PREFERENCES,
IS DETECTED AS HAVING ENTERED AN AREA THAT CAN APPLY PREFERENCES
APPLY ALL ENTITY PREFERENCES THAT THE AREA CAN APPLY
THAT THIS ENTITY IS AUTHORIZED TO APPLY TO THIS AREA.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
19. PLUMBING
Most IoT developers spend most of their time dealing with this complicated plumbing, the magic is rare.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
20. SCALABILITY
SECURITY
PRIVACY
TRUST
RELIABILITY
All this plumbing complexity manifests as weaknesses in other key architectural requirements.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
21. BUILDING BLOCKS
Decentralized Identifiers (DIDs)
Knowledge Graphs
Semantic, Linked Data
Linked Data Signatures
Linked Data Proofs
Cryptography
DID Documents Verifiable Claims/Credentials
Authorization/Object CapabilitiesAuthentication
Shared Schemas & Ontologies
Blockchains
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
23. This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
24. If you have a DID string, you can resolve it to its DID Document via its Method.
We did not have this property of global uniqueness/resolvability across systems with older ID schemes.
This breaks silos.
GLOBALLY RESOLVABLE
ACCESS CONTROL ALGORITHM
did:ockam:2QyqWz4xWB5o4Pr9G9fcZjXTE2ej5 did:sov:2wJPyULfLLnYTEFYzByfUR
Device Identity People Identity
did:v1:nym:4jWHwNdrG9-6jd9..
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
25. DID DOCUMENTS
DID Documents are Linked Data documents that describe the DID, they contain the public keys of the DID, authentication methods, services etc…
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
26. CRYPTOGRAPHICALLY PROVABLE
If a device possess the corresponding private key, a device can cryptographically prove its identity.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
27. DECENTRALIZED KEY MANAGEMENT
DEVICE BACKEND
Backend public
Device secret
Backend secret
Device public
Sensed Data, Acknowledgements etc.
Control Instructions, Firmware &
Configuration updates etc.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
28. SERVICE DISCOVERY
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
29. SEMANTIC & LINKED DATA
The progress made by the open web community around Linked Data can be applied to IoT.
This brings semantic meaning and relationships to IoT data …
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
30. Instead of describing temperature as a key of my choosing “temperature”, “temp” or “T” …
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
31. Let’s describe it with well defined semantics.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
32. Now, two developers who have never met or coordinated can independently build a
temperature sensor and a controller that can work with each other.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
33. Now this data is about an entity (room) described by the above DID.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
34. VERIFIABLE CLAIMS
VALUESUBJECT
PROPERTY
SIGNED BY ISSUER
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
35. TEMPERATURE
VERIFIABLE CLAIMS
70ROOM
SIGNED BY ISSUER
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
36. VERIFIABLE CLAIMS
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
37. This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
38. WEB OF TRUST
CLAIM:BOM PLM System
CLAIM:Audit Security Auditor
REGISTERED
CLAIM:Firmware-V1 Software Update Service
did:ockam:2QyqWz4xWB5o4Pr9G9fcZjXTE2ej5
CLAIM:Firmware-V2 Software Update Service
CLAIM:Deployed On boarding Service
Key Rotated Device
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
39. ○ Was the device made by a reputable manufacturer?
○ Does the device have hardware based cryptography and secure key storage?
○ Does the device have unique identity and cryptographic keys?
○ Has the device been audited by a security auditing firm?
○ Is there a signed audit proof?
○ Are there any known vulnerabilities for the device hardware/software?
○ Does the device produce signed data and signed firmware
acknowledgements?
○ Does the device have the latest firmware?
○ Who installed the device? Who provisioned the device?
etc.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
40. TRUST ARCHITECTURE
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
41. AUTHENTICATION
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
42. This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
43. AUTHORIZATION
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
44. https://github.com/ockam-network/ockam
Decentralized Identifiers (DIDs)
Knowledge Graphs
Semantic, Linked Data
Linked Data Signatures
Linked Data Proofs
Cryptography
DID Documents Verifiable Claims/Credentials
Authorization/Object CapabilitiesAuthentication
Shared Schemas & Ontologies
Blockchains
Ockam is an open-source collection of tools that makes it simple to build connected solutions with these building blocks.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
45. Decentralized Identifiers (DIDs)
Knowledge Graphs
Semantic, Linked Data
Linked Data Signatures
Linked Data Proofs
Cryptography
DID Documents Verifiable Claims/Credentials
Authorization/Object CapabilitiesAuthentication
Shared Schemas & Ontologies
Blockchains
Hardware Key Storage & Cryptography Blockchains Light ClientsBattery Efficient Messaging & Transports
Zero Knowledge Proofs Private InteractionsSecure Zero Touch Onboarding
Bidirectional Signed/Encrypted DataSigned Firmware & Config Updates Service & Data format discovery
https://github.com/ockam-network/ockam
We’re also building open tools for several other related capabilities for IoT systems
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
46. https://github.com/ockam-network/did
We open sourced a Golang parser for DIDs, give it a try.
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
47. MACHINE IDENTITY
Decentralized Identifiers & Verifiable Credentials for
Trust & Interoperability in the Internet of Things
Mrinal Wadhwa
CTO @ Ockam
@mrinal
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.org
@ockam_io
https://ockam.io
48. ● Robot by Vectors Market from the Noun Project
● pipes by Aleksandr Vector from the Noun Project
● valve by Ben Davis from the Noun Project
Attributions for images used in this deck: