SlideShare a Scribd company logo
Sovereign Identity
Presented By :
Amrita B. Chavan
SYME
PCCoE,Nigdi,Pune
Guided By :
Dr. K. Rajeswari
HOD of Computer Engineering
PCCoE,Nigdi,Pune
Introduction
● Identities are no longer simple.
● The method for defining an individual’s identity grow more and more
complex.
● While advances in technology have made the management of data easier,
they have also created a need for people to have digitized identities.
● Identities have changed over time to include other details
● Identity fraud and theft are some of the most frequent crimes today
10-Sept-2018 Seminar II
2
3
Seminar II10-Sept-2018
Evaluation
We can separate it into 3 sections:
1. Centralized Identity: Administrative control by a single authority.
Ex : SSN (Social Security Number), Validation Of IP Addresses, Distribution
of DNS.
2. Federated Identity : Administrative control by multiple authorities.
Ex : Microsoft Passport
3. User-Centric : Administrative control across multiple authorities.
Ex : OpenID, 0Auth, or FIDO
410-Sept-2018 Seminar II
Source : https://www.altoros.com/blog/the-journey-to-a-self-sovereign-digital-identity-built-on-a-blockchain/
5
Problems
● We have yet to reach that fourth phase of self-sovereign identity
● Individuals generally have no control over the information that covers
their identities
● Without visibility into the exchange of identity attributes across the
enterprise for authentication, verification, and authorization, individuals
are vulnerable to identity fraud
10-Sept-2018 Seminar II
610-Sept-2018 Seminar II
Source : https://www.altoros.com/blog/the-journey-to-a-self-sovereign-digital-identity-built-on-a-blockchain/
7
Problems Contd...
We have different organizations for varying elements of identity. This presents
a number of problems and challenges
For individuals:
○ Too many steps and documents involved in proving identity
○ Unpleasant experiences and unwanted services
○ Limited control over identity information and identity theft concerns
Seminar II10-Sept-2018
8
Problems Contd...
For Bussiness:
○ Compliance and regulation
○ Fraud, identity theft, and data
breach
○ Costs, complexity, and
unreliability
For Governments:
○ Ensuring citizens’ privacy and safety
○ Theft while simplifying experience
○ Increasing costs and complexity of
physical ID issuance, renewal,
maintenance, monitoring, and
verification
10-Sept-2018 Seminar II
9
10-Sept-2018 Seminar II
Required Technologies :
To address the challenges, there is a need to create a trusted digital identity
network, which adopts such technologies as:
● Cognitive applications that collect data from cumulative online
interactions to simplify and expedite routine tasks
● Applications that simplify transactions
● Holistic health care applications that give doctors and pharmacists access
to patients’ electronic medical records
10
Solution : Sovereign Identity
True self-sovereign identity requires a few features:
1. Users must be unique.
2. Users must have control over who views their identity.
3. Users must be able to access their own identity.
4. The verification process must be clear and unconcealed.
5. Identities must be interoperable.
6. Users must be protected.
10-Sept-2018 Seminar II
11
Transparent Verification Process
● Identity verification has always been centralized in some way.
● The complete decentralization of it is simply not possible. There will
always be an organization that has to verify the identity.
● In order to minimize this centralized power as much as possible, we make
the verification process as transparent as possible.
● This aspect of self-sovereign identity is just as important to the user, as it
is to the security of the whole system.
10-Sept-2018 Seminar II
12
Architecture
10-Sept-2018 Seminar II
Source: https://www.xoken.org/blog/self-sovereign-identity/
● User: The person whose identity needs to
be verified.
● Issuer: The party responsible for
verifying the identity and issuing a
certificate.
● Requester: The party requesting whether
or not the user has been verified.
● Public Ledger: The blockchain that is
being used.
13
Architecture contd...
2 Forms of Data:
1. Certificate: Proof that the user has been verified
2. Verification Data: Data hosted by user that allows access to the certificate
There are various steps to be involved :
10-Sept-2018 Seminar II
14
Steps :
1. The user sends information to be validated by the issuer. The Issuer
verifies the information through a public process. If the public process is
passed, the Issuer sends the user verification data.
2. If the user passes, a certificate is added to the public ledger by the issuer.
3. The user wants access to an application. The requestor asks the user for the
verification data. If the request is accepted by the User, the verification
data is sent to the requestor.
10-Sept-2018 Seminar II
15
Steps contd...
4. The Requester uses the verification data in order to access the certificate
on the public ledger. The certificate is proof that the user’s identity has
been verified.
The certificate is proof that the user’s identity has been verified
10-Sept-2018 Seminar II
16
Other Projects
CIVIC: Identity Verification System
Steps :
1. User submits personal information to Civic and the information is
validated . If the user passed, the verified identity data is sent to the user’s
Civic App.
2. Civic sends a certificate to the blockchain confirming that the user’s
identity has been verified.
10-Sept-2018 Seminar II
17
3. An Identity requester defines the requirements for identity validation. The
requester asks the user for his verified identity data. If the User accepts the
request, the verified identity data is sent from the civic app to the
requester.
4. Using the verified identity data, the requester can check the authenticity of
the data by checking the blockchain. Confirmation of ownership and
validity of the identity is returned to the requester.
Civic contd...
10-Sept-2018 Seminar II
18
References :
1. Der, Uwe, Stefan Jähnichen, and Jan Sürmeli. “Self-Sovereign Identity – Opportunities and Challenges for the Digital
Revolution,” n.d., 6.
2. Subramanian, Aravind. “Self-Sovereign Identity.” Xoken. Accessed September 9, 2018.
https://www.xoken.org/blog/self-sovereign-identity/.
3. Takemiya, Makoto, and Bohdan Vanieiev. “Sora Identity: Secure, Digital Identity on the Blockchain.” In 2018 IEEE 42nd
Annual Computer Software and Applications Conference (COMPSAC), 582–87. Tokyo, Japan: IEEE, 2018.
https://doi.org/10.1109/COMPSAC.2018.10299.
4. “The Journey to a Self-Sovereign Digital Identity Built on a Blockchain.” Altoros (blog), April 12, 2017.
https://www.altoros.com/blog/the-journey-to-a-self-sovereign-digital-identity-built-on-a-blockchain/.
10-Sept-2018 Seminar II

More Related Content

What's hot

Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
Diane M. Metcalf
 
Uma webinar 2014 06-19
Uma webinar 2014 06-19Uma webinar 2014 06-19
Uma webinar 2014 06-19
kantarainitiative
 
Introduction to blockchain_technology
Introduction to blockchain_technologyIntroduction to blockchain_technology
Introduction to blockchain_technology
V C
 
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsBlockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
Shubham Sharma
 
Beyond the hype, a blockchain approach to educational management
Beyond the hype, a blockchain approach to educational managementBeyond the hype, a blockchain approach to educational management
Beyond the hype, a blockchain approach to educational management
Anthony Fisher Camilleri
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
Agnė Chomentauskaitė
 
Blockchain use cases in health and education
Blockchain use cases in health and educationBlockchain use cases in health and education
Blockchain use cases in health and education
Netcetera
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
Syeful Islam
 
Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsBlockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Phishing
PhishingPhishing
Phishing
HK Khemnani
 
Identity Hub’s Role in Social Logins
Identity Hub’s Role in Social LoginsIdentity Hub’s Role in Social Logins
Identity Hub’s Role in Social Logins
WSO2
 
Uma webinar 2014 03-20
Uma webinar 2014 03-20Uma webinar 2014 03-20
Uma webinar 2014 03-20
kantarainitiative
 
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OpenIDFoundation
 
2011 5-privacy
2011 5-privacy2011 5-privacy
2011 5-privacy
cikgushaharizan
 
Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3
DigiLocker
 
AI, Blockchain, IoT for Finance AT A Glance
AI, Blockchain, IoT for Finance AT A GlanceAI, Blockchain, IoT for Finance AT A Glance
AI, Blockchain, IoT for Finance AT A Glance
Alex G. Lee, Ph.D. Esq. CLP
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
IJECEIAES
 
Discovering Blockchain Applications in Education
Discovering Blockchain Applications in EducationDiscovering Blockchain Applications in Education
Discovering Blockchain Applications in Education
Rizal Mohd Nor
 
Smart card kantara pids presentation w-blue background
Smart card kantara pids presentation w-blue backgroundSmart card kantara pids presentation w-blue background
Smart card kantara pids presentation w-blue background
Dan Combs
 

What's hot (20)

Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Uma webinar 2014 06-19
Uma webinar 2014 06-19Uma webinar 2014 06-19
Uma webinar 2014 06-19
 
Introduction to blockchain_technology
Introduction to blockchain_technologyIntroduction to blockchain_technology
Introduction to blockchain_technology
 
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsBlockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from Patents
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Beyond the hype, a blockchain approach to educational management
Beyond the hype, a blockchain approach to educational managementBeyond the hype, a blockchain approach to educational management
Beyond the hype, a blockchain approach to educational management
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
Blockchain use cases in health and education
Blockchain use cases in health and educationBlockchain use cases in health and education
Blockchain use cases in health and education
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsBlockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from Patents
 
Phishing
PhishingPhishing
Phishing
 
Identity Hub’s Role in Social Logins
Identity Hub’s Role in Social LoginsIdentity Hub’s Role in Social Logins
Identity Hub’s Role in Social Logins
 
Uma webinar 2014 03-20
Uma webinar 2014 03-20Uma webinar 2014 03-20
Uma webinar 2014 03-20
 
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
 
2011 5-privacy
2011 5-privacy2011 5-privacy
2011 5-privacy
 
Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3
 
AI, Blockchain, IoT for Finance AT A Glance
AI, Blockchain, IoT for Finance AT A GlanceAI, Blockchain, IoT for Finance AT A Glance
AI, Blockchain, IoT for Finance AT A Glance
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
 
Discovering Blockchain Applications in Education
Discovering Blockchain Applications in EducationDiscovering Blockchain Applications in Education
Discovering Blockchain Applications in Education
 
Smart card kantara pids presentation w-blue background
Smart card kantara pids presentation w-blue backgroundSmart card kantara pids presentation w-blue background
Smart card kantara pids presentation w-blue background
 

Similar to Sovereign identity

Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
Future Agenda
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
Drago Indjic
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015
Jerry Fishenden
 
Fintech & Blockchain
Fintech & BlockchainFintech & Blockchain
Fintech & Blockchain
IndSightsResearchSG
 
User Documentation Verification Portal
User Documentation Verification PortalUser Documentation Verification Portal
User Documentation Verification Portal
IRJET Journal
 
PPT, ENISA, service delivery webinar 310522
PPT, ENISA, service delivery webinar 310522PPT, ENISA, service delivery webinar 310522
PPT, ENISA, service delivery webinar 310522
Support for Improvement in Governance and Management SIGMA
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
Pankaj Rane
 
The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...
Techgropse Pvt.Ltd.
 
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET Journal
 
Bitcoin wallet hacking software AI Seed.pdf
Bitcoin wallet hacking software AI Seed.pdfBitcoin wallet hacking software AI Seed.pdf
Bitcoin wallet hacking software AI Seed.pdf
Vograce
 
Blockchain Development and Innovation in the Banking and Finance Space Webina...
Blockchain Development and Innovation in the Banking and Finance Space Webina...Blockchain Development and Innovation in the Banking and Finance Space Webina...
Blockchain Development and Innovation in the Banking and Finance Space Webina...
Inflectra
 
IRJET-Wireless Sensing Network for Agriculture Monitoring
IRJET-Wireless Sensing Network for Agriculture MonitoringIRJET-Wireless Sensing Network for Agriculture Monitoring
IRJET-Wireless Sensing Network for Agriculture Monitoring
IRJET Journal
 
Payments and AML CFT KYC
Payments and AML CFT KYCPayments and AML CFT KYC
Payments and AML CFT KYC
Martin Chan
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
Future Agenda
 
Trust-Aid (Blockchain-based Charity system)
Trust-Aid (Blockchain-based Charity system)Trust-Aid (Blockchain-based Charity system)
Trust-Aid (Blockchain-based Charity system)
IRJET Journal
 
National Volunteering Forum: May18
National Volunteering Forum: May18National Volunteering Forum: May18
National Volunteering Forum: May18
NCVO - National Council for Voluntary Organisations
 
DELLA - CRYPTOCURRENCY PRICE TRACKER
DELLA - CRYPTOCURRENCY PRICE TRACKERDELLA - CRYPTOCURRENCY PRICE TRACKER
DELLA - CRYPTOCURRENCY PRICE TRACKER
IRJET Journal
 
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMEUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
IJNSA Journal
 
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMEUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
IJNSA Journal
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 

Similar to Sovereign identity (20)

Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015
 
Fintech & Blockchain
Fintech & BlockchainFintech & Blockchain
Fintech & Blockchain
 
User Documentation Verification Portal
User Documentation Verification PortalUser Documentation Verification Portal
User Documentation Verification Portal
 
PPT, ENISA, service delivery webinar 310522
PPT, ENISA, service delivery webinar 310522PPT, ENISA, service delivery webinar 310522
PPT, ENISA, service delivery webinar 310522
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 
The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...
 
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
 
Bitcoin wallet hacking software AI Seed.pdf
Bitcoin wallet hacking software AI Seed.pdfBitcoin wallet hacking software AI Seed.pdf
Bitcoin wallet hacking software AI Seed.pdf
 
Blockchain Development and Innovation in the Banking and Finance Space Webina...
Blockchain Development and Innovation in the Banking and Finance Space Webina...Blockchain Development and Innovation in the Banking and Finance Space Webina...
Blockchain Development and Innovation in the Banking and Finance Space Webina...
 
IRJET-Wireless Sensing Network for Agriculture Monitoring
IRJET-Wireless Sensing Network for Agriculture MonitoringIRJET-Wireless Sensing Network for Agriculture Monitoring
IRJET-Wireless Sensing Network for Agriculture Monitoring
 
Payments and AML CFT KYC
Payments and AML CFT KYCPayments and AML CFT KYC
Payments and AML CFT KYC
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Trust-Aid (Blockchain-based Charity system)
Trust-Aid (Blockchain-based Charity system)Trust-Aid (Blockchain-based Charity system)
Trust-Aid (Blockchain-based Charity system)
 
National Volunteering Forum: May18
National Volunteering Forum: May18National Volunteering Forum: May18
National Volunteering Forum: May18
 
DELLA - CRYPTOCURRENCY PRICE TRACKER
DELLA - CRYPTOCURRENCY PRICE TRACKERDELLA - CRYPTOCURRENCY PRICE TRACKER
DELLA - CRYPTOCURRENCY PRICE TRACKER
 
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMEUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
 
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMEUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 

Recently uploaded

Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 

Recently uploaded (20)

Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 

Sovereign identity

  • 1. Sovereign Identity Presented By : Amrita B. Chavan SYME PCCoE,Nigdi,Pune Guided By : Dr. K. Rajeswari HOD of Computer Engineering PCCoE,Nigdi,Pune
  • 2. Introduction ● Identities are no longer simple. ● The method for defining an individual’s identity grow more and more complex. ● While advances in technology have made the management of data easier, they have also created a need for people to have digitized identities. ● Identities have changed over time to include other details ● Identity fraud and theft are some of the most frequent crimes today 10-Sept-2018 Seminar II 2
  • 3. 3 Seminar II10-Sept-2018 Evaluation We can separate it into 3 sections: 1. Centralized Identity: Administrative control by a single authority. Ex : SSN (Social Security Number), Validation Of IP Addresses, Distribution of DNS. 2. Federated Identity : Administrative control by multiple authorities. Ex : Microsoft Passport 3. User-Centric : Administrative control across multiple authorities. Ex : OpenID, 0Auth, or FIDO
  • 4. 410-Sept-2018 Seminar II Source : https://www.altoros.com/blog/the-journey-to-a-self-sovereign-digital-identity-built-on-a-blockchain/
  • 5. 5 Problems ● We have yet to reach that fourth phase of self-sovereign identity ● Individuals generally have no control over the information that covers their identities ● Without visibility into the exchange of identity attributes across the enterprise for authentication, verification, and authorization, individuals are vulnerable to identity fraud 10-Sept-2018 Seminar II
  • 6. 610-Sept-2018 Seminar II Source : https://www.altoros.com/blog/the-journey-to-a-self-sovereign-digital-identity-built-on-a-blockchain/
  • 7. 7 Problems Contd... We have different organizations for varying elements of identity. This presents a number of problems and challenges For individuals: ○ Too many steps and documents involved in proving identity ○ Unpleasant experiences and unwanted services ○ Limited control over identity information and identity theft concerns Seminar II10-Sept-2018
  • 8. 8 Problems Contd... For Bussiness: ○ Compliance and regulation ○ Fraud, identity theft, and data breach ○ Costs, complexity, and unreliability For Governments: ○ Ensuring citizens’ privacy and safety ○ Theft while simplifying experience ○ Increasing costs and complexity of physical ID issuance, renewal, maintenance, monitoring, and verification 10-Sept-2018 Seminar II
  • 9. 9 10-Sept-2018 Seminar II Required Technologies : To address the challenges, there is a need to create a trusted digital identity network, which adopts such technologies as: ● Cognitive applications that collect data from cumulative online interactions to simplify and expedite routine tasks ● Applications that simplify transactions ● Holistic health care applications that give doctors and pharmacists access to patients’ electronic medical records
  • 10. 10 Solution : Sovereign Identity True self-sovereign identity requires a few features: 1. Users must be unique. 2. Users must have control over who views their identity. 3. Users must be able to access their own identity. 4. The verification process must be clear and unconcealed. 5. Identities must be interoperable. 6. Users must be protected. 10-Sept-2018 Seminar II
  • 11. 11 Transparent Verification Process ● Identity verification has always been centralized in some way. ● The complete decentralization of it is simply not possible. There will always be an organization that has to verify the identity. ● In order to minimize this centralized power as much as possible, we make the verification process as transparent as possible. ● This aspect of self-sovereign identity is just as important to the user, as it is to the security of the whole system. 10-Sept-2018 Seminar II
  • 12. 12 Architecture 10-Sept-2018 Seminar II Source: https://www.xoken.org/blog/self-sovereign-identity/ ● User: The person whose identity needs to be verified. ● Issuer: The party responsible for verifying the identity and issuing a certificate. ● Requester: The party requesting whether or not the user has been verified. ● Public Ledger: The blockchain that is being used.
  • 13. 13 Architecture contd... 2 Forms of Data: 1. Certificate: Proof that the user has been verified 2. Verification Data: Data hosted by user that allows access to the certificate There are various steps to be involved : 10-Sept-2018 Seminar II
  • 14. 14 Steps : 1. The user sends information to be validated by the issuer. The Issuer verifies the information through a public process. If the public process is passed, the Issuer sends the user verification data. 2. If the user passes, a certificate is added to the public ledger by the issuer. 3. The user wants access to an application. The requestor asks the user for the verification data. If the request is accepted by the User, the verification data is sent to the requestor. 10-Sept-2018 Seminar II
  • 15. 15 Steps contd... 4. The Requester uses the verification data in order to access the certificate on the public ledger. The certificate is proof that the user’s identity has been verified. The certificate is proof that the user’s identity has been verified 10-Sept-2018 Seminar II
  • 16. 16 Other Projects CIVIC: Identity Verification System Steps : 1. User submits personal information to Civic and the information is validated . If the user passed, the verified identity data is sent to the user’s Civic App. 2. Civic sends a certificate to the blockchain confirming that the user’s identity has been verified. 10-Sept-2018 Seminar II
  • 17. 17 3. An Identity requester defines the requirements for identity validation. The requester asks the user for his verified identity data. If the User accepts the request, the verified identity data is sent from the civic app to the requester. 4. Using the verified identity data, the requester can check the authenticity of the data by checking the blockchain. Confirmation of ownership and validity of the identity is returned to the requester. Civic contd... 10-Sept-2018 Seminar II
  • 18. 18 References : 1. Der, Uwe, Stefan Jähnichen, and Jan Sürmeli. “Self-Sovereign Identity – Opportunities and Challenges for the Digital Revolution,” n.d., 6. 2. Subramanian, Aravind. “Self-Sovereign Identity.” Xoken. Accessed September 9, 2018. https://www.xoken.org/blog/self-sovereign-identity/. 3. Takemiya, Makoto, and Bohdan Vanieiev. “Sora Identity: Secure, Digital Identity on the Blockchain.” In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), 582–87. Tokyo, Japan: IEEE, 2018. https://doi.org/10.1109/COMPSAC.2018.10299. 4. “The Journey to a Self-Sovereign Digital Identity Built on a Blockchain.” Altoros (blog), April 12, 2017. https://www.altoros.com/blog/the-journey-to-a-self-sovereign-digital-identity-built-on-a-blockchain/. 10-Sept-2018 Seminar II