The document proposes an authentication and auditing architecture to enhance security on eGovernment services. It aims to address issues with relying solely on digital certificates for authentication by designing a centralized authentication service that uses salted password hashes. The model also implements a network intrusion detection system and database login auditing to detect and generate evidence of unauthorized database access. Further research will focus on analyzing evidence sources to investigate credential misuse.
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Mahmud Hossain
The document proposes a forensic investigation framework called Probe-IoT that uses a public digital ledger (blockchain) to securely store IoT interaction data that can be used as evidence. It collects data on interactions between IoT devices, users, and clouds and stores encrypted hashes, signatures and data in the distributed ledger. This prevents evidence tampering and ensures availability. An investigator can retrieve related data by providing identities to an escrow service and analyze decrypted data on the ledger to find facts for an investigation. The framework addresses limitations of conventional approaches for the unique characteristics of IoT environments and mobile devices.
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...Srini Karlekar
SmartQuora is an application that enables knowledge sharing among participants while incentivizing answers that are meaningful and well-explained. Inquirers pose questions with a reward for the best answers and a due-date by which they are looking for an answer. Responders compete with each other to provide the best answers. Participants can like or dislike answers. When the due-date arrives the answers are tallied and the reward is shared proportionately among the responders such that the best answers gets the most earnings. To avoid abuse of the platform, inquirers cannot answer their own questions and respondents cannot vote for their own answers.
Technically speaking, SmartQuora is a DApp (Decentralized Application) built on top of the HLF - Hyperledger Fabric Blockchain decentralized peer-to-peer network. It uses Smart Contracts built using HLF Composer API to represent Questions and Answers which contains rules to manage the process and payout.
SmartQuora uses a Javascript-based front-end web application to communicate withe the Blockchain platform on which the Smart Contracts reside using a RESTful interface. It uses Passport for authentication of participants using OAuth protocol and allows maintenance of their digital wallets through which the participants can manage their Digital Identities. These Digital Identities are generated and managed using the Hyperledger Fabric platform.
This document discusses cyber laws in India. It begins by defining cyber space and how increased internet usage has facilitated communication but also enabled cyber crimes. Cyber crimes are defined as unlawful acts using computers as tools or targets. The document then discusses the Information Technology Act 2000, which provides the legal framework for electronic transactions. It established the Controller of Certifying Authorities to regulate digital signature certificates and certifying authorities. The objectives of the act are to facilitate e-commerce, recognize digital signatures, and prevent computer crimes and protect privacy. Key chapters cover attribution of electronic records, secure electronic records and signatures, and regulation of certifying authorities.
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
The document discusses using existing public key infrastructure (PKI) from electronic passports to enable online identity management according to Identity 2.0 standards. It describes how an Identity Provider could verify a user's passport remotely by performing authentication and accessing standardized data groups. Attributes from the passport like date of birth could then be translated to be more privacy-friendly before being shared with a Relying Party. Combining offline and online identity management allows flexibility in privacy protection while leveraging widespread government PKI systems.
The document discusses OAuth, an open standard for authorization in REST APIs. It allows users to grant third party applications access to their private data without sharing their usernames and passwords. OAuth uses tokens instead of passwords, allowing users to control what data apps can access and revoke access at any time. The OAuth process involves a consumer obtaining a request token, then redirecting the user to authorize access, and exchanging the request token for an access token to access private resources on the user's behalf according to their authorization.
Automated E-Pin Generator in Banking Sectordbpublications
For the purpose of saving and securing money, to get loans, employers to get wages, to pay bill online, etc., every human being require a bank account. Either it can be savings account or checking account, each one has its own functionalities. In earlier days the person needs to go for bank for account opening or any other transactions, but now through online any functionality can be handled. If a user can able to access the privileges of bank he must have an account. So the initial step of banking is account opening. To open an account in any bank it undergoes several steps. First the user walk in to any bank or he can visit to any bank website then he needs pick up an account opening application and then has to fill his valid personal details in the application, mention the type of account he is going to open and finally provide nominee for his account. After all these process a unique account number is provided to user in a couple of days. Our project is implemented based on the banking system which is going to resolve the delay in providing an account number by the bank that takes a couple of days to process. To avoid this delay we are implementing a banking application that will process the user application day by day with a short period of time the user will get his bank account number more efficiently.
The document proposes an authentication and auditing architecture to enhance security on eGovernment services. It aims to address issues with relying solely on digital certificates for authentication by designing a centralized authentication service that uses salted password hashes. The model also implements a network intrusion detection system and database login auditing to detect and generate evidence of unauthorized database access. Further research will focus on analyzing evidence sources to investigate credential misuse.
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Mahmud Hossain
The document proposes a forensic investigation framework called Probe-IoT that uses a public digital ledger (blockchain) to securely store IoT interaction data that can be used as evidence. It collects data on interactions between IoT devices, users, and clouds and stores encrypted hashes, signatures and data in the distributed ledger. This prevents evidence tampering and ensures availability. An investigator can retrieve related data by providing identities to an escrow service and analyze decrypted data on the ledger to find facts for an investigation. The framework addresses limitations of conventional approaches for the unique characteristics of IoT environments and mobile devices.
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...Srini Karlekar
SmartQuora is an application that enables knowledge sharing among participants while incentivizing answers that are meaningful and well-explained. Inquirers pose questions with a reward for the best answers and a due-date by which they are looking for an answer. Responders compete with each other to provide the best answers. Participants can like or dislike answers. When the due-date arrives the answers are tallied and the reward is shared proportionately among the responders such that the best answers gets the most earnings. To avoid abuse of the platform, inquirers cannot answer their own questions and respondents cannot vote for their own answers.
Technically speaking, SmartQuora is a DApp (Decentralized Application) built on top of the HLF - Hyperledger Fabric Blockchain decentralized peer-to-peer network. It uses Smart Contracts built using HLF Composer API to represent Questions and Answers which contains rules to manage the process and payout.
SmartQuora uses a Javascript-based front-end web application to communicate withe the Blockchain platform on which the Smart Contracts reside using a RESTful interface. It uses Passport for authentication of participants using OAuth protocol and allows maintenance of their digital wallets through which the participants can manage their Digital Identities. These Digital Identities are generated and managed using the Hyperledger Fabric platform.
This document discusses cyber laws in India. It begins by defining cyber space and how increased internet usage has facilitated communication but also enabled cyber crimes. Cyber crimes are defined as unlawful acts using computers as tools or targets. The document then discusses the Information Technology Act 2000, which provides the legal framework for electronic transactions. It established the Controller of Certifying Authorities to regulate digital signature certificates and certifying authorities. The objectives of the act are to facilitate e-commerce, recognize digital signatures, and prevent computer crimes and protect privacy. Key chapters cover attribution of electronic records, secure electronic records and signatures, and regulation of certifying authorities.
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
The document discusses using existing public key infrastructure (PKI) from electronic passports to enable online identity management according to Identity 2.0 standards. It describes how an Identity Provider could verify a user's passport remotely by performing authentication and accessing standardized data groups. Attributes from the passport like date of birth could then be translated to be more privacy-friendly before being shared with a Relying Party. Combining offline and online identity management allows flexibility in privacy protection while leveraging widespread government PKI systems.
The document discusses OAuth, an open standard for authorization in REST APIs. It allows users to grant third party applications access to their private data without sharing their usernames and passwords. OAuth uses tokens instead of passwords, allowing users to control what data apps can access and revoke access at any time. The OAuth process involves a consumer obtaining a request token, then redirecting the user to authorize access, and exchanging the request token for an access token to access private resources on the user's behalf according to their authorization.
Automated E-Pin Generator in Banking Sectordbpublications
For the purpose of saving and securing money, to get loans, employers to get wages, to pay bill online, etc., every human being require a bank account. Either it can be savings account or checking account, each one has its own functionalities. In earlier days the person needs to go for bank for account opening or any other transactions, but now through online any functionality can be handled. If a user can able to access the privileges of bank he must have an account. So the initial step of banking is account opening. To open an account in any bank it undergoes several steps. First the user walk in to any bank or he can visit to any bank website then he needs pick up an account opening application and then has to fill his valid personal details in the application, mention the type of account he is going to open and finally provide nominee for his account. After all these process a unique account number is provided to user in a couple of days. Our project is implemented based on the banking system which is going to resolve the delay in providing an account number by the bank that takes a couple of days to process. To avoid this delay we are implementing a banking application that will process the user application day by day with a short period of time the user will get his bank account number more efficiently.
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
This document summarizes a research study on educating consumers to prevent identity theft and reduce e-commerce fraud. The study involved providing an identity theft prevention class to elementary school staff and measuring its effectiveness through pre- and post-tests. The class covered safe online practices like identifying spoofed emails and calls. It provided an interactive quiz and presentations on topics like privacy on public WiFi and social media. The results showed participants improved their knowledge after the class, correctly answering more questions on the post-test about common fraud scenarios. The study aims to determine if educating consumers empowers them to better protect their personal information and reduce identity theft online.
Webinar: Managing Access to Personal Data: Protecting "Personal Clouds" with UMA and OpenID Connect You can't spell human without UMA... The User-Managed Access (UMA) protocol was created to help individuals gain control over data sharing -- with software applications, with family and friends, with online retailers, and even with doctors and employers.
The document discusses block chain technology and its applications. It begins with an overview of bitcoin and how blockchains work, then discusses how bitcoin is obtained through mining. It describes how blockchains provide a secure and distributed ledger to record transactions. The document proposes a project using blockchain technology to record and secure funding distributions for an open defecation free survey in India in order to reduce corruption. In the proposed system, funds would be tracked in a distributed ledger from the original budget amount down to individual recipients.
Data Privacy
Zero-Knowledge Proof
Transaction Privacy
Smart Contract Privacy
User Profile Sharing (KYC)
IoT Privacy
Multi-Chain Privacy
Lightweight Blockchain Client Privacy
Privacy-Preserving Machine Learning Data Sharing
Privacy-Preserving Shared Distributed Computing
Patents are a good information resource for obtaining the state of the art of blockchain privacy technology innovation insights.
I. Blockchain Privacy Technology Innovation Status
Patents that specifically describe the major blockchain privacy technologies are a good indicator of the blockchain privacy innovations in a specific innovation entity. To find blockchain privacy technology innovation status, patent applications in the USPTO as of June 15, 2020 that specifically describe the major blockchain privacy technologies are searched and reviewed. 35 published patent applications that are related to the key blockchain privacy technology innovation are selected for detail analysis.
II. Blockchain Privacy Technology Innovation Details
Patent information can provide many valuable insights that can be exploited for developing and implementing new technologies. Patents can also be exploited to identify new product/service development opportunities.
Anonymous Sharing of User Profile (KYC)/US20190028277 (IBM)
Anonymous Transaction with Increasing Traceability/US20200134586 (Tbcasoft, Inc.)
Zero-Knowledge Proof for Digital Asset Transaction/US20200034834 (Alibaba Group)
Digital signatures provide authenticity, integrity and non-repudiation for electronic documents. They involve attaching a digital code to an electronically transmitted document that verifies the document's contents and the sender's identity. The digital signature varies from document to document, ensuring the authenticity of each word. Public key infrastructure involves a certification authority that issues digital certificates binding users' identities to their public keys.
The presentation examines current inefficiencies in educational systems, and how new technologies, in particular blockchain might be used to address some of these issues.
SET was developed by Visa and MasterCard to securely transmit credit and debit card information over the internet. It uses public key encryption and digital certificates to authenticate parties and encrypt transactions for confidentiality. All parties must have digital certificates and information is only shared when necessary to protect privacy. SET supports common transaction types and uses technologies like 3DES, RSA signatures, and SHA-1 hashing to provide security.
Blockchain use cases in health and educationNetcetera
Blockchain is disrupting all industries, since it is a general purpose technology. At the Open Banking Forum in Zürich at the end of March, our expert Elena Karafiloski presented use cases in health and education.
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
In the era ofinternet, most ofthe people all over the world completed their transaction
on internet. Though the user of electronic transaction or E-money transaction system
increase rapidly but the majority person are concern about the security of this system.
The growth in online transactions has resulted in a greater demand for fast and accurate
user identification and authentication. Conventional method of identification based on
possession of ID cards or exclusive knowledge like a social security number or a
password are not all together reliable. Identification and authentication by individuals'
biometric characteristics is becoming an accepted procedure that is slowly replacing the
most popular identification procedure – passwords. Among all the biometrics, fingerprint
based identification is one of the most mature and proven technique. Along with the
combination of conventional system, biometric security, Global positioning system(GPS)
and mobile messaging we have design an algorithm which increase security ofelectronic
transaction and more reliable to user. A three layer security model to enhancing security
ofelectronic transaction is proposed in this paper.
Patents are a good information resource for obtaining the state of the art of blockchain interoperability technology innovation insights.
I. Blockchain Interoperability Technology Innovation Status
Patents that specifically describe the major blockchain interoperability technologies are a good indicator of the blockchain interoperability innovations in a specific innovation entity. To find blockchain interoperability technology innovation status, patent applications in the USPTO as of June 15, 2020 that specifically describe the major blockchain interoperability technologies are searched and reviewed. 28 published patent applications that are related to the key blockchain interoperability technology innovation are selected for detail analysis.
II. Blockchain Interoperability Technology Innovation Details
Patent information can provide many valuable insights that can be exploited for developing and implementing new technologies. Patents can also be exploited to identify new product/service development opportunities.
Interoperability Smart Contract / US20200099533 (Accenture)
Transferring Digital Asset Using Sidechain / US20160330034 (Blockstream Corp)
This document defines phishing as tricking individuals into providing private information like passwords or credit card numbers through fake websites or emails posing as legitimate companies. It discusses types of phishing like deceptive emails, malware-based attacks, and content injection. Phishing affects industries like financial services and online retailers. To combat phishing, the document recommends educating users, enforcing best security practices for applications, and using techniques like strong authentication, session management, and content validation.
This webinar will give an overview of the conventional login forms and currently more popular logins via social networks. Further, we will discuss adopting Social Logins in your applications and an Identity Hub’s role there to overcome any added overhead.
Watch the on-demand webinar here: https://wso2.com/library/webinars/identity-hubs-role-in-social-logins/
Kantara Initiative's UMA Work Group published revision 9 of its OAuth-based protocol on March 6 to solve a broad range of "access management 2.0" challenges, and will shortly begin interoperability testing. On Thursday, March 20, at 8am Pacific, the UMA Work Group conducted a free public webinar sponsored by Kantara board member CA Technologies to discuss UMA's benefits for enterprises. This is a capture of the slides from the webinar. The video can be found at http://bit.ly/1iEs30O
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OpenIDFoundation
Dr. Torsten Lodderstedt with yes.com provided an update on OpenID Connect for Identity Assurance at the OIDF Workshop at the 2019 European Identity Conference on Tuesday, May 14, 2019 in Munich.
1. The document discusses privacy, authentication, and verification in information and communication technology. It lists 12 ways to protect privacy, such as using privacy policies, clearing caches, and installing firewalls.
2. Authentication methods include biometric devices like fingerprint scanners and callback systems. Verification methods are user identification through passwords or pins, and possessing objects like ATM cards or security tokens.
3. Privacy can be threatened by technologies like cookies, profiles, and spyware, so various technical and behavioral measures are recommended to safeguard personal information online.
The document proposes a standardized system called the Digital Locker Technology Specification (DLTS) to issue government documents electronically to Aadhaar holders. This would allow documents to be stored digitally and shared with agencies in real-time, eliminating the need for physical documents. The system would use Aadhaar numbers to authenticate document owners and prevent fraud. It describes key aspects of electronic documents like being machine-readable, printable, shareable, tamper-evident, and verifiable. The proposed architecture involves multiple digital repositories storing documents in a federated manner, with documents being issued, stored, and accessible online through a digital locker portal.
A decentralized consensus application using blockchain ecosystem IJECEIAES
This document summarizes a research paper that proposes developing a secure decentralized consensus application using blockchain technology. The paper identifies limitations in traditional centralized consensus systems, such as availability issues if the central server fails and potential for data manipulation. The proposed application aims to address these issues by building a decentralized application on the Ethereum blockchain that uses smart contracts to securely store data and ensure integrity. The application architecture involves a front-end hosted on IPFS and a backend on the Ethereum blockchain network, where each node maintains a copy of the ledger and smart contracts. The paper provides an overview of blockchain technology and consensus mechanisms to provide context for the proposed application.
Discovering Blockchain Applications in EducationRizal Mohd Nor
Was invited as a speaker to talk about "Discovering Blockchain Applications in Education" at the 1st Advanse Network Conference 2018, UPM. If anybody interested and would like to collaborate on some ideas, here are some intro to the topic.
The document summarizes plans for the Patient ID Service project. It discusses developing an open architecture using existing standards to empower patients to manage their healthcare identity and grant access to providers. It outlines technical components like an account system and OpenID/SAML capabilities. Next steps include coding sprints, implementations, certification, and engaging partners like universities to help develop and test the system.
Future of digital identity programme summary - 19 mar 2019 lrFuture Agenda
How we prove that we are who or what we say we are during digital transactions and interactions is set to become one of the defining features of the next stage of the human digital transformation. Today, we are living with early attempts to solve the problem that are no longer fit for purpose. At best, the multitude of different ways we login, confirm our identities, and establish trust in claims made during digital exchanges, has become profoundly inconvenient. At worst, they have left us in a connected world which is neither safe nor secure, and in which we seem to have completely lost control of our most personal information. The next generation solutions to the digital identity challenge could change all of this.
At the end of 2018, Future Agenda undertook a major project exploring the Future of Digital Identity. With the generous support of Mastercard, the Future Agenda team ran a series of expert workshops in different locations around the world that explored the key factors that are likely to shape the future of digital identity. The programme began with an initial perspective as a provocation. Participants in the workshops then gave us new, more fully formed, insights which were in turn explored further during one-to-one interviews with major stakeholders and thinkers in the space.
We are proud to launch this report of the findings of that work
We would like to extend our sincerest thanks to all of those who contributed to the programme.
As always, we consider our reports to be the start point for further conversations, and would welcome further input. If you would like to join the conversation, you can join our LinkedIn Group here. If you have any further questions or would like to have a conversation about how your organisation can best make use of our respond to the implications of the Future of Digital Identity please contact
Dr Robin Pharoah https://www.linkedin.com/in/robinpharoah,
James Alexander https://uk.linkedin.com/pub/james-alexander/0/747/617 or
Patrick Harris https://www.linkedin.com/in/patrick-harris-777767/
This is the initial perspective:
https://www.slideshare.net/futureagenda2/the-future-of-digital-identity-initial-perspective
This was the initial summary:
https://www.slideshare.net/futureagenda2/future-of-digital-identity-programme-summary-15-dec-2018-lr
This document provides a summary of the fintech module for week 4. It reminds students that the module is half completed and slides will be made available online. It notes that the next week is a reading week and module 4 will be on November 16th. The syllabus topics for the module are then listed, including digital identity, regulation, and payments technologies. Key points about identity emphasize the development of digital identity standards and the role of identity as a banking business model. Authentication methods and post-authentication identity management are discussed. The document also covers privacy issues and the relationship between legaltech and social credit systems.
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
This document summarizes a research study on educating consumers to prevent identity theft and reduce e-commerce fraud. The study involved providing an identity theft prevention class to elementary school staff and measuring its effectiveness through pre- and post-tests. The class covered safe online practices like identifying spoofed emails and calls. It provided an interactive quiz and presentations on topics like privacy on public WiFi and social media. The results showed participants improved their knowledge after the class, correctly answering more questions on the post-test about common fraud scenarios. The study aims to determine if educating consumers empowers them to better protect their personal information and reduce identity theft online.
Webinar: Managing Access to Personal Data: Protecting "Personal Clouds" with UMA and OpenID Connect You can't spell human without UMA... The User-Managed Access (UMA) protocol was created to help individuals gain control over data sharing -- with software applications, with family and friends, with online retailers, and even with doctors and employers.
The document discusses block chain technology and its applications. It begins with an overview of bitcoin and how blockchains work, then discusses how bitcoin is obtained through mining. It describes how blockchains provide a secure and distributed ledger to record transactions. The document proposes a project using blockchain technology to record and secure funding distributions for an open defecation free survey in India in order to reduce corruption. In the proposed system, funds would be tracked in a distributed ledger from the original budget amount down to individual recipients.
Data Privacy
Zero-Knowledge Proof
Transaction Privacy
Smart Contract Privacy
User Profile Sharing (KYC)
IoT Privacy
Multi-Chain Privacy
Lightweight Blockchain Client Privacy
Privacy-Preserving Machine Learning Data Sharing
Privacy-Preserving Shared Distributed Computing
Patents are a good information resource for obtaining the state of the art of blockchain privacy technology innovation insights.
I. Blockchain Privacy Technology Innovation Status
Patents that specifically describe the major blockchain privacy technologies are a good indicator of the blockchain privacy innovations in a specific innovation entity. To find blockchain privacy technology innovation status, patent applications in the USPTO as of June 15, 2020 that specifically describe the major blockchain privacy technologies are searched and reviewed. 35 published patent applications that are related to the key blockchain privacy technology innovation are selected for detail analysis.
II. Blockchain Privacy Technology Innovation Details
Patent information can provide many valuable insights that can be exploited for developing and implementing new technologies. Patents can also be exploited to identify new product/service development opportunities.
Anonymous Sharing of User Profile (KYC)/US20190028277 (IBM)
Anonymous Transaction with Increasing Traceability/US20200134586 (Tbcasoft, Inc.)
Zero-Knowledge Proof for Digital Asset Transaction/US20200034834 (Alibaba Group)
Digital signatures provide authenticity, integrity and non-repudiation for electronic documents. They involve attaching a digital code to an electronically transmitted document that verifies the document's contents and the sender's identity. The digital signature varies from document to document, ensuring the authenticity of each word. Public key infrastructure involves a certification authority that issues digital certificates binding users' identities to their public keys.
The presentation examines current inefficiencies in educational systems, and how new technologies, in particular blockchain might be used to address some of these issues.
SET was developed by Visa and MasterCard to securely transmit credit and debit card information over the internet. It uses public key encryption and digital certificates to authenticate parties and encrypt transactions for confidentiality. All parties must have digital certificates and information is only shared when necessary to protect privacy. SET supports common transaction types and uses technologies like 3DES, RSA signatures, and SHA-1 hashing to provide security.
Blockchain use cases in health and educationNetcetera
Blockchain is disrupting all industries, since it is a general purpose technology. At the Open Banking Forum in Zürich at the end of March, our expert Elena Karafiloski presented use cases in health and education.
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
In the era ofinternet, most ofthe people all over the world completed their transaction
on internet. Though the user of electronic transaction or E-money transaction system
increase rapidly but the majority person are concern about the security of this system.
The growth in online transactions has resulted in a greater demand for fast and accurate
user identification and authentication. Conventional method of identification based on
possession of ID cards or exclusive knowledge like a social security number or a
password are not all together reliable. Identification and authentication by individuals'
biometric characteristics is becoming an accepted procedure that is slowly replacing the
most popular identification procedure – passwords. Among all the biometrics, fingerprint
based identification is one of the most mature and proven technique. Along with the
combination of conventional system, biometric security, Global positioning system(GPS)
and mobile messaging we have design an algorithm which increase security ofelectronic
transaction and more reliable to user. A three layer security model to enhancing security
ofelectronic transaction is proposed in this paper.
Patents are a good information resource for obtaining the state of the art of blockchain interoperability technology innovation insights.
I. Blockchain Interoperability Technology Innovation Status
Patents that specifically describe the major blockchain interoperability technologies are a good indicator of the blockchain interoperability innovations in a specific innovation entity. To find blockchain interoperability technology innovation status, patent applications in the USPTO as of June 15, 2020 that specifically describe the major blockchain interoperability technologies are searched and reviewed. 28 published patent applications that are related to the key blockchain interoperability technology innovation are selected for detail analysis.
II. Blockchain Interoperability Technology Innovation Details
Patent information can provide many valuable insights that can be exploited for developing and implementing new technologies. Patents can also be exploited to identify new product/service development opportunities.
Interoperability Smart Contract / US20200099533 (Accenture)
Transferring Digital Asset Using Sidechain / US20160330034 (Blockstream Corp)
This document defines phishing as tricking individuals into providing private information like passwords or credit card numbers through fake websites or emails posing as legitimate companies. It discusses types of phishing like deceptive emails, malware-based attacks, and content injection. Phishing affects industries like financial services and online retailers. To combat phishing, the document recommends educating users, enforcing best security practices for applications, and using techniques like strong authentication, session management, and content validation.
This webinar will give an overview of the conventional login forms and currently more popular logins via social networks. Further, we will discuss adopting Social Logins in your applications and an Identity Hub’s role there to overcome any added overhead.
Watch the on-demand webinar here: https://wso2.com/library/webinars/identity-hubs-role-in-social-logins/
Kantara Initiative's UMA Work Group published revision 9 of its OAuth-based protocol on March 6 to solve a broad range of "access management 2.0" challenges, and will shortly begin interoperability testing. On Thursday, March 20, at 8am Pacific, the UMA Work Group conducted a free public webinar sponsored by Kantara board member CA Technologies to discuss UMA's benefits for enterprises. This is a capture of the slides from the webinar. The video can be found at http://bit.ly/1iEs30O
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OpenIDFoundation
Dr. Torsten Lodderstedt with yes.com provided an update on OpenID Connect for Identity Assurance at the OIDF Workshop at the 2019 European Identity Conference on Tuesday, May 14, 2019 in Munich.
1. The document discusses privacy, authentication, and verification in information and communication technology. It lists 12 ways to protect privacy, such as using privacy policies, clearing caches, and installing firewalls.
2. Authentication methods include biometric devices like fingerprint scanners and callback systems. Verification methods are user identification through passwords or pins, and possessing objects like ATM cards or security tokens.
3. Privacy can be threatened by technologies like cookies, profiles, and spyware, so various technical and behavioral measures are recommended to safeguard personal information online.
The document proposes a standardized system called the Digital Locker Technology Specification (DLTS) to issue government documents electronically to Aadhaar holders. This would allow documents to be stored digitally and shared with agencies in real-time, eliminating the need for physical documents. The system would use Aadhaar numbers to authenticate document owners and prevent fraud. It describes key aspects of electronic documents like being machine-readable, printable, shareable, tamper-evident, and verifiable. The proposed architecture involves multiple digital repositories storing documents in a federated manner, with documents being issued, stored, and accessible online through a digital locker portal.
A decentralized consensus application using blockchain ecosystem IJECEIAES
This document summarizes a research paper that proposes developing a secure decentralized consensus application using blockchain technology. The paper identifies limitations in traditional centralized consensus systems, such as availability issues if the central server fails and potential for data manipulation. The proposed application aims to address these issues by building a decentralized application on the Ethereum blockchain that uses smart contracts to securely store data and ensure integrity. The application architecture involves a front-end hosted on IPFS and a backend on the Ethereum blockchain network, where each node maintains a copy of the ledger and smart contracts. The paper provides an overview of blockchain technology and consensus mechanisms to provide context for the proposed application.
Discovering Blockchain Applications in EducationRizal Mohd Nor
Was invited as a speaker to talk about "Discovering Blockchain Applications in Education" at the 1st Advanse Network Conference 2018, UPM. If anybody interested and would like to collaborate on some ideas, here are some intro to the topic.
The document summarizes plans for the Patient ID Service project. It discusses developing an open architecture using existing standards to empower patients to manage their healthcare identity and grant access to providers. It outlines technical components like an account system and OpenID/SAML capabilities. Next steps include coding sprints, implementations, certification, and engaging partners like universities to help develop and test the system.
Future of digital identity programme summary - 19 mar 2019 lrFuture Agenda
How we prove that we are who or what we say we are during digital transactions and interactions is set to become one of the defining features of the next stage of the human digital transformation. Today, we are living with early attempts to solve the problem that are no longer fit for purpose. At best, the multitude of different ways we login, confirm our identities, and establish trust in claims made during digital exchanges, has become profoundly inconvenient. At worst, they have left us in a connected world which is neither safe nor secure, and in which we seem to have completely lost control of our most personal information. The next generation solutions to the digital identity challenge could change all of this.
At the end of 2018, Future Agenda undertook a major project exploring the Future of Digital Identity. With the generous support of Mastercard, the Future Agenda team ran a series of expert workshops in different locations around the world that explored the key factors that are likely to shape the future of digital identity. The programme began with an initial perspective as a provocation. Participants in the workshops then gave us new, more fully formed, insights which were in turn explored further during one-to-one interviews with major stakeholders and thinkers in the space.
We are proud to launch this report of the findings of that work
We would like to extend our sincerest thanks to all of those who contributed to the programme.
As always, we consider our reports to be the start point for further conversations, and would welcome further input. If you would like to join the conversation, you can join our LinkedIn Group here. If you have any further questions or would like to have a conversation about how your organisation can best make use of our respond to the implications of the Future of Digital Identity please contact
Dr Robin Pharoah https://www.linkedin.com/in/robinpharoah,
James Alexander https://uk.linkedin.com/pub/james-alexander/0/747/617 or
Patrick Harris https://www.linkedin.com/in/patrick-harris-777767/
This is the initial perspective:
https://www.slideshare.net/futureagenda2/the-future-of-digital-identity-initial-perspective
This was the initial summary:
https://www.slideshare.net/futureagenda2/future-of-digital-identity-programme-summary-15-dec-2018-lr
This document provides a summary of the fintech module for week 4. It reminds students that the module is half completed and slides will be made available online. It notes that the next week is a reading week and module 4 will be on November 16th. The syllabus topics for the module are then listed, including digital identity, regulation, and payments technologies. Key points about identity emphasize the development of digital identity standards and the role of identity as a banking business model. Authentication methods and post-authentication identity management are discussed. The document also covers privacy issues and the relationship between legaltech and social credit systems.
UK Government identity initiatives since the late 1990s - IDnext 2015Jerry Fishenden
My presentation from IDnext 2015, the European Digital Identity Event. "UK government identity initiatives past, present, future: policy and technology perspectives"
FinTech is just short for financial technology and it refers to the application of technology in the financial industry. On the other hand, blockchain refers to the distributed ledger technology behind cryptocurrencies; it allows digital information to be distributed and each piece of data can only have one owner.
The document describes a user documentation verification portal that uses computer vision techniques to verify the authenticity of identity documents uploaded by users. It discusses:
1) The need for document verification in industries like banking, insurance, etc. and issues with current manual verification processes.
2) The system architecture of the proposed portal, which allows users to register, upload documents, and gets results of verification through email.
3) The verification process, which involves converting documents to grayscale, comparing them using Structural Similarity Index (SSIM) and notifying the user of the accuracy percentage.
4) Testing results like confusion matrix to evaluate the model's performance in predicting actual and modified documents.
The portal
Citizen-centric public services in the Western Balkans:
Webinar 2 - Digital identity and trust services, 31 May 2022.
Presentation by Evgenia Nikolouzou, European Union Agency for Cyber Security (ENISA).
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONPankaj Rane
Public Key Infrastructure is a widely deployed security technology for handling key distribution and validation in computer security. Despite PKI’s popularity as a security solution, Phishing and other Man-in-the-Middle related attacks are accomplished with ease throughout our computer networks. The major problems with PKI come down to trust, and largely, how much faith we must place in cryptographic keys alone to establish authenticity and identity.
In this paper, we look at a novel biometric solution that mitigates this problem at both the user and certificate authority levels. More importantly, we examine the trouble with the application of unprotected biometric features directly into PKI, and propose the integration of a secure, revocable biometric template protection technology that supports transactional key release. A detailed explanation of this new Biometric application is provided, including composition, enrollment, authentication, and revocation details. The Biometric provides a new paradigm for blending elements of physical and virtual security to address pesky network attacks that more conventional approaches have not been able to stop.
The future of identity verification predictions and trends in blockchain tech...Techgropse Pvt.Ltd.
As a leading mobile app development company in UAE, we have been closely following the rapid development of blockchain technology and its potential to transform various industries. One area that has caught our attention is identity verification, which plays a crucial role in countless processes - from financial transactions to government services. Dubai, a city at the forefront of technological innovation, is becoming a center for exploring the intersection of blockchain and identity management.
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET Journal
This document proposes an e-grievance system for municipal corporations in India to improve citizen satisfaction with complaint resolution. The system aims to provide anonymity to citizens registering complaints. It would generate encrypted tokens for authentication and encrypted keys for users. Citizens could register complaints through a complaint form online or via a mobile app. The system would prioritize complaints and automatically escalate pending complaints to higher officials. The goal is to address issues citizens face with delayed responses and improve satisfaction with complaint handling.
Bitcoin wallet hacking software AI Seed.pdfVograce
Learn how to utilize AI capabilities and the 'AI Private Key Finder' program to recover or generate the correct private key Bitcoin wallet hacking software for a Bitcoin wallet, solely from the BTC address, in this insightful guide
Blockchain Development and Innovation in the Banking and Finance Space Webina...Inflectra
Inflectra and BLOOCK co-hosted the webinar: Blockchain Development & Innovation in the Banking and Finance Industry. In this webinar, August Guenther, Software Engineer at Inflectra, and Marc Baqué, CTO at BLOOCK, discussed the current state of the traditional banking and finance space, the benefits of blockchain implementation in the industry, and scenarios in which customers might find an integration between Inflectra's and BLOOCK's technologies useful.
Webinar Agenda:
- Current state of traditional Banking & Finance space
- Software development & testing challenges
- Blockchain solution in the Banking & Finance space
- Benefits of blockchain implementation in the industry
- Inflectra and BLOOCK technologies: application scenarios & Spira's integration capabilities
- Questions from the audience
Webinar Presenters:
Marc Baqué is a full stack developer with deep knowledge in blockchain technology and expertise in the Ethereum ecosystem. Holding a master’s degree in IT Projects and Service Management from UPC, he leads BLOOCK technical team as the CTO. Through his expertise in Project Management as well as software development, Marc continues to grow BLOOCK’s product by developing new functionalities, all in accordance with client needs. Marc is also deeply involved in the Catalan tech community and proves himself as a key leader.
August Guenther is a Full stack web developer with market and general knowledge of popular blockchain implementations such as Bitcoin, Ethereum, and other miscellaneous crypto and NFT projects. He is on Inflectra's SpiraPlan product team working on external tools such as migration tools, data syncs, and other utility applications. August is a self taught developer and is involved in online communities helping new to-be developers get started on their own self led software development journeys.
Audrey Marcum is a Strategic Partner Manager at Inflectra Corporation. New to the IT industry, she has applied her skills developed in her education and previous job positions to her role at Inflectra, where she oversees the Partner Program, manages partners in the US and Canada, and provides support to Inflectra’s global partner channel. She also manages Inflectra's technology partnerships and organizes partner marketing efforts. Prior to working at Inflectra, she completed her Bachelor of Arts degree in Philosophy with a focus in Public Affairs at The George Washington University.
IRJET-Wireless Sensing Network for Agriculture MonitoringIRJET Journal
This document describes a proposed document management system called "Docs Track" that would allow users to securely store personal documents like identification cards, education certificates, and bills online. It discusses how the current process of managing physical documents is time-consuming and error-prone. The proposed system would have 3 types of users - regular users who can upload and manage their documents, administrators who can verify documents, and organizations who can request to view specific documents from users. The system aims to streamline document sharing for services like opening bank accounts or obtaining government certificates by allowing verified documents to be digitally shared as needed.
The document discusses identity verification for regulated transactions. It begins by outlining what drives the need for e-identity, noting that identity is required when people want to conduct transactions like buying, selling, or receiving goods and services online. It then examines different regulatory approaches to identity verification in several jurisdictions. Specifically, it analyzes how identity is identified and verified remotely in the EU, South Korea, Hong Kong, Singapore, and Australia. The document concludes by discussing private sectors that require identity verification, and different methods for establishing identity, including using physical documents, static electronic databases, and dynamic electronic verification through transactions.
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
Over the past few months we have run a series of expert workshops exploring the future of digital identity. Supported by Mastercard five events took place in London, Singapore, Sydney, San Francisco and Brussels building a collaborative expert view.
The project online and initial perspective is here https://www.futureagenda.org/news/the-future-of-digital-identity
The full report will be published in the New Year
This document proposes a blockchain-based charity system called Trust-Aid to increase transparency in the charitable sector. It discusses issues with the current charity system like lack of transparency and accountability. The proposed system uses blockchain and smart contracts to create a decentralized platform for donors and beneficiaries. Donors can view charity campaigns, donate funds which get stored on the blockchain. Beneficiaries can create withdrawal requests which require approval from a minimum of 50% donors before funds are released. The system aims to improve trust in charities by making all transactions and funds flow transparent, immutable and verifiable on the blockchain. It provides an efficient and fraud-proof solution to address the problems with the existing charity system.
This document contains summaries from a National Volunteering Forum event on May 15th 2018 about volunteering and the General Data Protection Regulation (GDPR). It includes:
- A summary of key GDPR points from Richard Sisson of the UK Information Commissioner's Office, such as the focus on transparency and accountability.
- Summaries of two presentations from organizations on their GDPR compliance efforts, including equipping volunteers with their responsibilities and addressing an enforcement notice.
- A discussion on privacy policies, fundraising and direct marketing, consent, and managing multiple data subject relationships under GDPR.
This document summarizes a web-based cryptocurrency price tracking project called Della. The project uses Python and Django to provide features like live cryptocurrency prices from APIs, latest news from news APIs, upcoming events from web scraping, and an online forum using Redis. It allows users to post images and comments about cryptocurrencies. The project aims to help users learn about cryptocurrencies and decide where to invest. It was tested for response time with increasing users and was found to provide the essential information and guidance needed for cryptocurrency newcomers.
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMIJNSA Journal
The document describes EUNICERT, an Ethereum-based digital certificate verification system. EUNICERT improves upon a previous system called UniCert by integrating the Ethereum platform's proof-of-stake consensus algorithm. This decreases the average transaction validation latency by 3.27 times and increases the number of verified blocks by 11%, compared to the previous proof-of-work based system. The document outlines the architecture and design of EUNICERT, including how it issues and verifies digital certificates on the Ethereum blockchain network. It also evaluates the system's performance compared to the original UniCert solution.
EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEMIJNSA Journal
The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
Privacy is not only a concern of customers. Service providers also fear privacy violations as a main hurdle for the acceptance of personalised services. Furthermore, the protection of privacy is an interest of service providers who take on customer relationship management activities of several service providers. They manage customers’ profiles, e.g. in loyalty programs and e-health scenarios with electronic patient records, and offer the service of aggregation. If it is possible to link profiles of a customer without the need of such service providers, latter would not benefit from their aggregation service. Case studies show privacy threats in business processes with personalised services.
The objective of this FIDIS work package 14 is to identify privacy threats in business processes with personalised services, to suggest process models for modelling privacy-aware business processes and to derive security requirements for user-centric identity management in order to preserve privacy.
The presented scenarios and use cases are recommended for non-technical audicence, whereas the analysis of user-centric identity management protocols and approaches for identity management extensions are recommended for technical audience.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Sovereign identity
1. Sovereign Identity
Presented By :
Amrita B. Chavan
SYME
PCCoE,Nigdi,Pune
Guided By :
Dr. K. Rajeswari
HOD of Computer Engineering
PCCoE,Nigdi,Pune
2. Introduction
● Identities are no longer simple.
● The method for defining an individual’s identity grow more and more
complex.
● While advances in technology have made the management of data easier,
they have also created a need for people to have digitized identities.
● Identities have changed over time to include other details
● Identity fraud and theft are some of the most frequent crimes today
10-Sept-2018 Seminar II
2
3. 3
Seminar II10-Sept-2018
Evaluation
We can separate it into 3 sections:
1. Centralized Identity: Administrative control by a single authority.
Ex : SSN (Social Security Number), Validation Of IP Addresses, Distribution
of DNS.
2. Federated Identity : Administrative control by multiple authorities.
Ex : Microsoft Passport
3. User-Centric : Administrative control across multiple authorities.
Ex : OpenID, 0Auth, or FIDO
4. 410-Sept-2018 Seminar II
Source : https://www.altoros.com/blog/the-journey-to-a-self-sovereign-digital-identity-built-on-a-blockchain/
5. 5
Problems
● We have yet to reach that fourth phase of self-sovereign identity
● Individuals generally have no control over the information that covers
their identities
● Without visibility into the exchange of identity attributes across the
enterprise for authentication, verification, and authorization, individuals
are vulnerable to identity fraud
10-Sept-2018 Seminar II
6. 610-Sept-2018 Seminar II
Source : https://www.altoros.com/blog/the-journey-to-a-self-sovereign-digital-identity-built-on-a-blockchain/
7. 7
Problems Contd...
We have different organizations for varying elements of identity. This presents
a number of problems and challenges
For individuals:
○ Too many steps and documents involved in proving identity
○ Unpleasant experiences and unwanted services
○ Limited control over identity information and identity theft concerns
Seminar II10-Sept-2018
8. 8
Problems Contd...
For Bussiness:
○ Compliance and regulation
○ Fraud, identity theft, and data
breach
○ Costs, complexity, and
unreliability
For Governments:
○ Ensuring citizens’ privacy and safety
○ Theft while simplifying experience
○ Increasing costs and complexity of
physical ID issuance, renewal,
maintenance, monitoring, and
verification
10-Sept-2018 Seminar II
9. 9
10-Sept-2018 Seminar II
Required Technologies :
To address the challenges, there is a need to create a trusted digital identity
network, which adopts such technologies as:
● Cognitive applications that collect data from cumulative online
interactions to simplify and expedite routine tasks
● Applications that simplify transactions
● Holistic health care applications that give doctors and pharmacists access
to patients’ electronic medical records
10. 10
Solution : Sovereign Identity
True self-sovereign identity requires a few features:
1. Users must be unique.
2. Users must have control over who views their identity.
3. Users must be able to access their own identity.
4. The verification process must be clear and unconcealed.
5. Identities must be interoperable.
6. Users must be protected.
10-Sept-2018 Seminar II
11. 11
Transparent Verification Process
● Identity verification has always been centralized in some way.
● The complete decentralization of it is simply not possible. There will
always be an organization that has to verify the identity.
● In order to minimize this centralized power as much as possible, we make
the verification process as transparent as possible.
● This aspect of self-sovereign identity is just as important to the user, as it
is to the security of the whole system.
10-Sept-2018 Seminar II
12. 12
Architecture
10-Sept-2018 Seminar II
Source: https://www.xoken.org/blog/self-sovereign-identity/
● User: The person whose identity needs to
be verified.
● Issuer: The party responsible for
verifying the identity and issuing a
certificate.
● Requester: The party requesting whether
or not the user has been verified.
● Public Ledger: The blockchain that is
being used.
13. 13
Architecture contd...
2 Forms of Data:
1. Certificate: Proof that the user has been verified
2. Verification Data: Data hosted by user that allows access to the certificate
There are various steps to be involved :
10-Sept-2018 Seminar II
14. 14
Steps :
1. The user sends information to be validated by the issuer. The Issuer
verifies the information through a public process. If the public process is
passed, the Issuer sends the user verification data.
2. If the user passes, a certificate is added to the public ledger by the issuer.
3. The user wants access to an application. The requestor asks the user for the
verification data. If the request is accepted by the User, the verification
data is sent to the requestor.
10-Sept-2018 Seminar II
15. 15
Steps contd...
4. The Requester uses the verification data in order to access the certificate
on the public ledger. The certificate is proof that the user’s identity has
been verified.
The certificate is proof that the user’s identity has been verified
10-Sept-2018 Seminar II
16. 16
Other Projects
CIVIC: Identity Verification System
Steps :
1. User submits personal information to Civic and the information is
validated . If the user passed, the verified identity data is sent to the user’s
Civic App.
2. Civic sends a certificate to the blockchain confirming that the user’s
identity has been verified.
10-Sept-2018 Seminar II
17. 17
3. An Identity requester defines the requirements for identity validation. The
requester asks the user for his verified identity data. If the User accepts the
request, the verified identity data is sent from the civic app to the
requester.
4. Using the verified identity data, the requester can check the authenticity of
the data by checking the blockchain. Confirmation of ownership and
validity of the identity is returned to the requester.
Civic contd...
10-Sept-2018 Seminar II
18. 18
References :
1. Der, Uwe, Stefan Jähnichen, and Jan Sürmeli. “Self-Sovereign Identity – Opportunities and Challenges for the Digital
Revolution,” n.d., 6.
2. Subramanian, Aravind. “Self-Sovereign Identity.” Xoken. Accessed September 9, 2018.
https://www.xoken.org/blog/self-sovereign-identity/.
3. Takemiya, Makoto, and Bohdan Vanieiev. “Sora Identity: Secure, Digital Identity on the Blockchain.” In 2018 IEEE 42nd
Annual Computer Software and Applications Conference (COMPSAC), 582–87. Tokyo, Japan: IEEE, 2018.
https://doi.org/10.1109/COMPSAC.2018.10299.
4. “The Journey to a Self-Sovereign Digital Identity Built on a Blockchain.” Altoros (blog), April 12, 2017.
https://www.altoros.com/blog/the-journey-to-a-self-sovereign-digital-identity-built-on-a-blockchain/.
10-Sept-2018 Seminar II