SlideShare a Scribd company logo
1 of 53
Download to read offline
KANTARA INITIATIVE
N O R D I C I A M C O N F E R E N C E 2 0 1 8
Digital Identity 2018 –
A Wedding Rhyme?
#IAMwithUBI, Helsinki, May 24th 2018
Colin Wallis
Executive Director, Kantara Initiative
Ethics & Conformance Trust Marked
Attribution: PA https://ichef.bbci.co.uk/news/976/cpsprodpb/EBFE/production/_101641406_hi046913336.jpg
‘Something old, something new,
something borrowed, something blue’
© Copyright 2018 Kantara Initiative, Inc.
Kantara Initiative – A Snapshot
 US non-profit, founded 2009. Estonia non-profit,
founded 2017 (licensee)
 Strong ethics & societal purpose. Low barriers to
participation. Passionate about giving control of
identity and personal data back back to individual
owners
 Mission: the global consortium improving trustworthy
use of identity and personal data through innovation,
standardization and good practice
 Business model: Membership, Trust Framework
Operator, Specification development, Publishing
platform
 Comprises global thought-leaders; Organizations &
Individuals & Government agencies
© Copyright 2017 Kantara Initiative, Inc
Our Liaisons (examples)
Our Leadership
…and our 40+ individual contributor members
Kantara’s Global
Membership
& x10 Non-Member Participants
© Copyright 2017 Kantara Initiative, Inc
© Copyright 2018 Kantara Initiative, Inc.
Our Core Work
 Nurture emerging technical communities
through our discussion & working groups
and our incubators - Digital Identity
Professionals, Identity and Privacy R&D.
 Develop and standardize community
practices with specifications companies can
understand, trust and implement.
 Operate conformity assessment programs
to enable companies to meet their
adherence goals to standardized practices
needed to support their business.
© Copyright 2018 Kantara Initiative, Inc.
Award-Winning, Trend-Setting, Compliance-
Assisting Innovations
 UMA, the world's first open specification for
delegated authorization, extending OAuth
2.0.
 Consent Receipt specification – a user’s
receipt for personal data containing the
conditions upon which the consent is given –
giving control of personal data back to
individuals.
 The world’s first Trust Framework to offer
3rd party assessment, approval & grant of
trust mark for NIST SP 800-63-3.
© Copyright 2018 Kantara Initiative, Inc.
‘Thought Leader’ Organisations & Individuals
Join Kantara
 Strong Ethics
 Low barrier to participate and contribute
 Collaborate with peers transparently and equitably
 Develop and publish artefacts on the platform
 Seek conformance, approval and grant of trust mark for
solutions
 Contribute comments to ISO and other global policy and
standards bodies side-stepping national policy and
standards bodies
‘something old’…
Who was surprised?
© Copyright 2018 Kantara Initiative, Inc.
Programmatic Advertising is Data driven advertising – an unrestricted trade in PI via Cookie Matching
Who was surprised?
© Copyright 2018 Kantara Initiative, Inc.
Old models using old concepts
Attribution: Behance, April 6, 2011
© Copyright 2018 Kantara Initiative, Inc.
Business practices that pollute
the Internet...
© Copyright 2018 Kantara Initiative, Inc.
‘If industry can’t self regulate, Government will do it for them’
ConsentPerformance
of Contract
Legitimate
Interest
Who was surprised?
© Copyright 2018 Kantara Initiative, Inc.
..even though there are old (but generally good)
mechanisms for industry to self regulate
Conformity
Assessment
System
Standards
Assessment
Scheme
Rules
Qualified
Assessors
Mark of
Conformity
Conformity
Attestation &
Certification
Conformity
Assessment
Systems are
Available ISO/IEC 17000
© Copyright 2017 Kantara Initiative, Inc
© Copyright 2018 Kantara Initiative, Inc.
Principles Upon Which to Develop
Open Standards are Available
 Cooperation
 Adherence to Principles
 Collective Empowerment
 Availability
 Voluntary Adoption
© Copyright 2018 Kantara Initiative, Inc.
What Makes Data Privacy Regulations
Different This Time Around?
 Virality
 Digital transformation
 Aspirations
data
control
data
transparency
data protection
Attribution: Eve Maler @xmlgrrl
© Copyright 2018 Kantara Initiative, Inc.
‘something new’
© Copyright 2018 Kantara Initiative, Inc.
CustomerTech is New…Kind Of..
© Copyright 2018 Kantara Initiative, Inc.
To Which GDPR Articles are Most Relevant?
 Article 5: Principles relating to personal data processing
 Article 7: Conditions for consent
 Article 8: Conditions applicable to child’s consent in relation to information
society services
 Articles 12-23: Rights of the data subject
 Article 25: Data protection by design and by default
 Right of access, to restrict processing, to withdraw consent at any time
 User-controlled delegation of access
 Centralizable management of consents
 Transparency of and control over consented access
 Consented sharing directly from sources for greater data accuracy
 Parent/guardian-to-child constrained delegation
 A subgroup of the UMA Work Group, with globally acclaimed expert legal help,
has produced a draft framework defining:
 The business tools we (and others) can build from this framework can be single-
and cross-jurisdictional, and single- and cross-sector
 Our contention:
How the UMA protocol enables a license-based model for controlling access
rights to personal digital assets
UMA can provide the autonomy, reciprocity, and objectivity to grow market
trust in widely sharing access to personal digital assets with devices, apps, and
Internet databases.
‘The BLT Sandwich’
Putting together a business, legal, and technical framework for UMA usage & deployment
Attribution Eve Maler @xmlgrrl tinyurl.com/umalegal © Copyright 2017 Kantara Initiative, Inc
Something Else New…
Introducing the Localised Self Propagating Identifier
© Copyright 2018 Kantara Initiative, Inc.https://www.youtube.com/watch?reload=9&v=2njPFYdF29o&feature=youtu.be
“The growth of artificial intelligence
(AI) creates a risk that machine-to-
machine decisions could be made
with no transparency to humans.
To avoid this, and to ensure AI is
developed ethically, individuals
need to be able to influence and
determine the values, rules and
inputs that guide the development
of personalized algorithms directly
related to their identity.”
…yet old problems
persist inside new
ideas…
Blockchain Identity –
it has to be something new, right?
© Copyright 2018 Kantara Initiative, Inc.
© Copyright 2018 Kantara Initiative, Inc.
© Copyright 2018 Kantara Initiative, Inc.
© Copyright 2018 Kantara Initiative, Inc.
You will not have just one DID – you will have thousands
Each one will give you a lifetime encrypted private channel with
another person, organisation, or thing
You will use it not just to prove your identity, but to exchange
verifiable digital credentials
Best of all: there is no central registration authority – every DID is
registered directly on a blockchain or distributed network
SSIMeetup.org
© Copyright 2018 Kantara Initiative, Inc.
Looking Closely at the Terms…
Self Sovereign Identity – User centric identity or self issued identity
Verifiable claims – Attributes exchange, attribute management
Decentralised IDentifier – A pseudonymous key pair
Zero Knowledge Proof – Data minimisation
Distributed Ledger/Blockchain – Registr(ies) of DNS URI
(attribution: .Nat Zone https://nat.sakimura.org/)
Claims Provider – Identity Provider
(attribution: .Nat Zone https://nat.sakimura.org/)
© Copyright 2018 Kantara Initiative, Inc.
Is Blockchain identity ‘new’?
or something ‘borrowed and extended’?
or something ‘re-mixed and re-mastered’?
(thanks to greater computing power, faster internet and some
new technology that can solve an established problem)
‘something borrowed’
© Copyright 2018 Kantara Initiative, Inc.
User Controlled GDPR Consent Cookie
(The IAB’s daisy-chained cookie ‘re-purposed for ‘good’)
 http://advertisingconsent.eu/ the IAB’s transparency & consent
framework.
 The Framework standardises the capture of user consent (CW: first parties)
for data processing and “signals” this information across the advertising
supply chain (CW: third parties) to process user data on one of the legal bases
laid down by the Regulation”. It uses the user’s browser cookie..
 What if….in the context of GDPR consent, this cookie approach could
be ‘re-purposed’ to become part of the consent process ‘for good’,
including agreement on the user terms along with the vendor terms
Kantara’s Consent Receipt Specification
Built into the user journey and machine readable
Signed JWT
© Copyright 2017 Kantara Initiative, Inc
Summary Conclusions
and Closing Thoughts
© Copyright 2018 Kantara Initiative, Inc.
#1: The digital identity landscape
can change within a few months
© Copyright 2018 Kantara Initiative, Inc.
#2: Finland is one of the lead nations
 FICORA – lead agency
 TrustNet Project
Trust Network for Distributed Personal Data
Management. MyData +Sovrin
 Finland Trust Network
 Federated Identity
 European Trust Mark
.. a microcosm of a global phenomenon – privacy, security, user control,
& the challenge of sharing with privacy
© Copyright 2018 Kantara Initiative, Inc.
Back to the wedding rhyme…
‘something blue’..
This image was originally posted to Flickr by katrinket at https://www.flickr.com/photos/53759368@N00/362776208. It was reviewed on 29 May
2010 by FlickreviewR and was confirmed to be licensed under the terms of the cc-by-sa-2.0.
?
?
Icons made by https://www.flaticon.com/authors/maxim-basinski. Flaticon">www.flaticon.com</a> is licensed by http://creativecommons.org/licenses/by/3.0/ CC 3.0 BY
Nurture. Develop. Operate.
– That’s What We Do
colin@kantarainitiative.org
Twitter:
@KantaraColin
@KantaraNews
Join us at https://kantarainitiative.org/membership/
Ethics & Conformance Trust Marked
END OF PRESENTATION
PANEL: REGULATION
T HE PA N E L ISTS
Janne Jutila
Internos Partners
I A M w i t h U B I 2 0 1 8
Colin Wallis
Kantara Intiative
Markku Mehtälä
Inside Secure
Sue Dawes
OIX UK Europe
COFFEE BREAK

More Related Content

What's hot

Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Updatekantarainitiative
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011kantarainitiative
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014Chin Wan Lim
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10Hai Nguyen
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CityPeter Waher
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 kantarainitiative
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityGareth Niblett
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 

What's hot (20)

Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
 
Blockchain with iot
Blockchain with iotBlockchain with iot
Blockchain with iot
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
SecureMAG Vol 3
SecureMAG Vol 3SecureMAG Vol 3
SecureMAG Vol 3
 
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart City
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Loqr
LoqrLoqr
Loqr
 

Similar to Kantara - Digital Identity in 2018

Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Digipolis Antwerpen
 
Digital Life of Things
Digital Life of ThingsDigital Life of Things
Digital Life of ThingsStan Nazarenko
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitNoreen Whysel
 
A brief Overview on Finance and Technology for Solving Business problem
A brief Overview on Finance and Technology for Solving Business problemA brief Overview on Finance and Technology for Solving Business problem
A brief Overview on Finance and Technology for Solving Business problemsaraahmed870035
 
Hypermine | 2019 Business Plan
Hypermine | 2019 Business PlanHypermine | 2019 Business Plan
Hypermine | 2019 Business PlanIrfanKhan625
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Blockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial RevolutionBlockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial RevolutionAlex G. Lee, Ph.D. Esq. CLP
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Trustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchTrustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchPeter Bihr
 
South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018 James Quinlan
 
Kantara Initiative Consent Receipt Interoperability Demo v4
Kantara Initiative Consent Receipt Interoperability Demo v4Kantara Initiative Consent Receipt Interoperability Demo v4
Kantara Initiative Consent Receipt Interoperability Demo v4Andrew Hughes
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
 

Similar to Kantara - Digital Identity in 2018 (20)

Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
 
Digital Life of Things
Digital Life of ThingsDigital Life of Things
Digital Life of Things
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID Summit
 
A brief Overview on Finance and Technology for Solving Business problem
A brief Overview on Finance and Technology for Solving Business problemA brief Overview on Finance and Technology for Solving Business problem
A brief Overview on Finance and Technology for Solving Business problem
 
Hypermine | 2019 Business Plan
Hypermine | 2019 Business PlanHypermine | 2019 Business Plan
Hypermine | 2019 Business Plan
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Blockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial RevolutionBlockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
 
Blockchain BM Development
Blockchain BM DevelopmentBlockchain BM Development
Blockchain BM Development
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Trustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchTrustable Technology Mark: Public Launch
Trustable Technology Mark: Public Launch
 
South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018
 
Kantara Initiative Consent Receipt Interoperability Demo v4
Kantara Initiative Consent Receipt Interoperability Demo v4Kantara Initiative Consent Receipt Interoperability Demo v4
Kantara Initiative Consent Receipt Interoperability Demo v4
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart cities
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 

More from Ubisecure

User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, DirectoryUbisecure
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use CasesUbisecure
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-OnUbisecure
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationUbisecure
 
Identity Data & Credential Self-Service
Identity Data & Credential Self-ServiceIdentity Data & Credential Self-Service
Identity Data & Credential Self-ServiceUbisecure
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified IdentitiesUbisecure
 
Using Social & Business Identities
Using Social & Business IdentitiesUsing Social & Business Identities
Using Social & Business IdentitiesUbisecure
 
Delegation of Authority
Delegation of AuthorityDelegation of Authority
Delegation of AuthorityUbisecure
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectUbisecure
 
Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Ubisecure
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Ubisecure
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsUbisecure
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile ConnectUbisecure
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMUbisecure
 
SSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessSSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessUbisecure
 
Nixu - Passwords must Die!
Nixu - Passwords must Die!Nixu - Passwords must Die!
Nixu - Passwords must Die!Ubisecure
 
FICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationFICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationUbisecure
 

More from Ubisecure (17)

User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use Cases
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-On
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
Identity Data & Credential Self-Service
Identity Data & Credential Self-ServiceIdentity Data & Credential Self-Service
Identity Data & Credential Self-Service
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Using Social & Business Identities
Using Social & Business IdentitiesUsing Social & Business Identities
Using Social & Business Identities
 
Delegation of Authority
Delegation of AuthorityDelegation of Authority
Delegation of Authority
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
 
Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAM
 
SSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessSSH - Credentialess Cloud Access
SSH - Credentialess Cloud Access
 
Nixu - Passwords must Die!
Nixu - Passwords must Die!Nixu - Passwords must Die!
Nixu - Passwords must Die!
 
FICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationFICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong Identification
 

Recently uploaded

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Kantara - Digital Identity in 2018

  • 1. KANTARA INITIATIVE N O R D I C I A M C O N F E R E N C E 2 0 1 8
  • 2. Digital Identity 2018 – A Wedding Rhyme? #IAMwithUBI, Helsinki, May 24th 2018 Colin Wallis Executive Director, Kantara Initiative Ethics & Conformance Trust Marked
  • 4. ‘Something old, something new, something borrowed, something blue’
  • 5. © Copyright 2018 Kantara Initiative, Inc. Kantara Initiative – A Snapshot  US non-profit, founded 2009. Estonia non-profit, founded 2017 (licensee)  Strong ethics & societal purpose. Low barriers to participation. Passionate about giving control of identity and personal data back back to individual owners  Mission: the global consortium improving trustworthy use of identity and personal data through innovation, standardization and good practice  Business model: Membership, Trust Framework Operator, Specification development, Publishing platform  Comprises global thought-leaders; Organizations & Individuals & Government agencies © Copyright 2017 Kantara Initiative, Inc Our Liaisons (examples) Our Leadership
  • 6. …and our 40+ individual contributor members Kantara’s Global Membership & x10 Non-Member Participants © Copyright 2017 Kantara Initiative, Inc
  • 7. © Copyright 2018 Kantara Initiative, Inc. Our Core Work  Nurture emerging technical communities through our discussion & working groups and our incubators - Digital Identity Professionals, Identity and Privacy R&D.  Develop and standardize community practices with specifications companies can understand, trust and implement.  Operate conformity assessment programs to enable companies to meet their adherence goals to standardized practices needed to support their business.
  • 8. © Copyright 2018 Kantara Initiative, Inc. Award-Winning, Trend-Setting, Compliance- Assisting Innovations  UMA, the world's first open specification for delegated authorization, extending OAuth 2.0.  Consent Receipt specification – a user’s receipt for personal data containing the conditions upon which the consent is given – giving control of personal data back to individuals.  The world’s first Trust Framework to offer 3rd party assessment, approval & grant of trust mark for NIST SP 800-63-3.
  • 9. © Copyright 2018 Kantara Initiative, Inc. ‘Thought Leader’ Organisations & Individuals Join Kantara  Strong Ethics  Low barrier to participate and contribute  Collaborate with peers transparently and equitably  Develop and publish artefacts on the platform  Seek conformance, approval and grant of trust mark for solutions  Contribute comments to ISO and other global policy and standards bodies side-stepping national policy and standards bodies
  • 12. © Copyright 2018 Kantara Initiative, Inc. Programmatic Advertising is Data driven advertising – an unrestricted trade in PI via Cookie Matching Who was surprised?
  • 13. © Copyright 2018 Kantara Initiative, Inc. Old models using old concepts Attribution: Behance, April 6, 2011
  • 14. © Copyright 2018 Kantara Initiative, Inc. Business practices that pollute the Internet...
  • 15. © Copyright 2018 Kantara Initiative, Inc. ‘If industry can’t self regulate, Government will do it for them’ ConsentPerformance of Contract Legitimate Interest Who was surprised?
  • 16. © Copyright 2018 Kantara Initiative, Inc. ..even though there are old (but generally good) mechanisms for industry to self regulate
  • 18. © Copyright 2018 Kantara Initiative, Inc. Principles Upon Which to Develop Open Standards are Available  Cooperation  Adherence to Principles  Collective Empowerment  Availability  Voluntary Adoption
  • 19. © Copyright 2018 Kantara Initiative, Inc. What Makes Data Privacy Regulations Different This Time Around?  Virality  Digital transformation  Aspirations data control data transparency data protection Attribution: Eve Maler @xmlgrrl
  • 20. © Copyright 2018 Kantara Initiative, Inc. ‘something new’
  • 21. © Copyright 2018 Kantara Initiative, Inc. CustomerTech is New…Kind Of..
  • 22. © Copyright 2018 Kantara Initiative, Inc. To Which GDPR Articles are Most Relevant?  Article 5: Principles relating to personal data processing  Article 7: Conditions for consent  Article 8: Conditions applicable to child’s consent in relation to information society services  Articles 12-23: Rights of the data subject  Article 25: Data protection by design and by default  Right of access, to restrict processing, to withdraw consent at any time  User-controlled delegation of access  Centralizable management of consents  Transparency of and control over consented access  Consented sharing directly from sources for greater data accuracy  Parent/guardian-to-child constrained delegation
  • 23.  A subgroup of the UMA Work Group, with globally acclaimed expert legal help, has produced a draft framework defining:  The business tools we (and others) can build from this framework can be single- and cross-jurisdictional, and single- and cross-sector  Our contention: How the UMA protocol enables a license-based model for controlling access rights to personal digital assets UMA can provide the autonomy, reciprocity, and objectivity to grow market trust in widely sharing access to personal digital assets with devices, apps, and Internet databases. ‘The BLT Sandwich’ Putting together a business, legal, and technical framework for UMA usage & deployment Attribution Eve Maler @xmlgrrl tinyurl.com/umalegal © Copyright 2017 Kantara Initiative, Inc
  • 24. Something Else New… Introducing the Localised Self Propagating Identifier
  • 25. © Copyright 2018 Kantara Initiative, Inc.https://www.youtube.com/watch?reload=9&v=2njPFYdF29o&feature=youtu.be
  • 26. “The growth of artificial intelligence (AI) creates a risk that machine-to- machine decisions could be made with no transparency to humans. To avoid this, and to ensure AI is developed ethically, individuals need to be able to influence and determine the values, rules and inputs that guide the development of personalized algorithms directly related to their identity.”
  • 27. …yet old problems persist inside new ideas…
  • 28. Blockchain Identity – it has to be something new, right?
  • 29.
  • 30. © Copyright 2018 Kantara Initiative, Inc.
  • 31. © Copyright 2018 Kantara Initiative, Inc.
  • 32. © Copyright 2018 Kantara Initiative, Inc.
  • 33. © Copyright 2018 Kantara Initiative, Inc. You will not have just one DID – you will have thousands Each one will give you a lifetime encrypted private channel with another person, organisation, or thing You will use it not just to prove your identity, but to exchange verifiable digital credentials Best of all: there is no central registration authority – every DID is registered directly on a blockchain or distributed network SSIMeetup.org
  • 34.
  • 35. © Copyright 2018 Kantara Initiative, Inc. Looking Closely at the Terms… Self Sovereign Identity – User centric identity or self issued identity Verifiable claims – Attributes exchange, attribute management Decentralised IDentifier – A pseudonymous key pair Zero Knowledge Proof – Data minimisation Distributed Ledger/Blockchain – Registr(ies) of DNS URI (attribution: .Nat Zone https://nat.sakimura.org/) Claims Provider – Identity Provider (attribution: .Nat Zone https://nat.sakimura.org/)
  • 36. © Copyright 2018 Kantara Initiative, Inc. Is Blockchain identity ‘new’? or something ‘borrowed and extended’? or something ‘re-mixed and re-mastered’? (thanks to greater computing power, faster internet and some new technology that can solve an established problem)
  • 38. © Copyright 2018 Kantara Initiative, Inc. User Controlled GDPR Consent Cookie (The IAB’s daisy-chained cookie ‘re-purposed for ‘good’)  http://advertisingconsent.eu/ the IAB’s transparency & consent framework.  The Framework standardises the capture of user consent (CW: first parties) for data processing and “signals” this information across the advertising supply chain (CW: third parties) to process user data on one of the legal bases laid down by the Regulation”. It uses the user’s browser cookie..  What if….in the context of GDPR consent, this cookie approach could be ‘re-purposed’ to become part of the consent process ‘for good’, including agreement on the user terms along with the vendor terms
  • 39. Kantara’s Consent Receipt Specification Built into the user journey and machine readable Signed JWT © Copyright 2017 Kantara Initiative, Inc
  • 41. © Copyright 2018 Kantara Initiative, Inc. #1: The digital identity landscape can change within a few months
  • 42. © Copyright 2018 Kantara Initiative, Inc. #2: Finland is one of the lead nations  FICORA – lead agency  TrustNet Project Trust Network for Distributed Personal Data Management. MyData +Sovrin  Finland Trust Network  Federated Identity  European Trust Mark .. a microcosm of a global phenomenon – privacy, security, user control, & the challenge of sharing with privacy
  • 43. © Copyright 2018 Kantara Initiative, Inc.
  • 44. Back to the wedding rhyme…
  • 46. This image was originally posted to Flickr by katrinket at https://www.flickr.com/photos/53759368@N00/362776208. It was reviewed on 29 May 2010 by FlickreviewR and was confirmed to be licensed under the terms of the cc-by-sa-2.0. ?
  • 47. ?
  • 48. Icons made by https://www.flaticon.com/authors/maxim-basinski. Flaticon">www.flaticon.com</a> is licensed by http://creativecommons.org/licenses/by/3.0/ CC 3.0 BY
  • 49. Nurture. Develop. Operate. – That’s What We Do colin@kantarainitiative.org Twitter: @KantaraColin @KantaraNews Join us at https://kantarainitiative.org/membership/ Ethics & Conformance Trust Marked
  • 52. T HE PA N E L ISTS Janne Jutila Internos Partners I A M w i t h U B I 2 0 1 8 Colin Wallis Kantara Intiative Markku Mehtälä Inside Secure Sue Dawes OIX UK Europe