decentralized-id.github.io/identosphere-dump/companies
2022-12-12 06:09:55 -05:00
..
avast-evernym-securekey move for easier to think this way 2022-12-12 06:09:55 -05:00
IAM move for easier to think this way 2022-12-12 06:09:55 -05:00
ssi move for easier to think this way 2022-12-12 06:09:55 -05:00
analyst.md move for easier to think this way 2022-12-12 06:09:55 -05:00
apple.md move for easier to think this way 2022-12-12 06:09:55 -05:00
google.md move for easier to think this way 2022-12-12 06:09:55 -05:00
microsoft.md move for easier to think this way 2022-12-12 06:09:55 -05:00
README.md move for easier to think this way 2022-12-12 06:09:55 -05:00
winners.md move for easier to think this way 2022-12-12 06:09:55 -05:00

Companies

  • Microsoft - Azure / Entra
  • Acquisitions
    • Avast-Evernym-SecureKey
  • Analyst Firms
    • KuppingerCole
    • Forrester
    • Gartner
  • Apple
  • Google

RIF Identity

  • A back-end authenticating users by their wallet addressed - their Decentralized Identifiers.
  • A registration model capable of requesting users for data stored in its user-centric cloud storage, the Data Vault.
  • A front-end capable of interacting with any wallet that the user chooses, with a pre-designed user experience for registration and login.
  • Compatibility with a unified platform where the user can control their identity and information, the RIF Identity Manager.
  • Roadmap to Institutional Adoption of DeFi RSK - Coinfirm

    The most recent FATF updated draft guidance from March 2021 introduces significant changes to the legal definition of DeFi platforms, expanding the types of entities that fall under FATF's umbrella. In this guidance, FATF defines most operators of decentralized finance platforms as “Virtual Asset Service Providers” that have AML/CFT obligations.

  • @ilanolkies shares: Okey, so, today I mapped the work done in the last 3 month by @rif_os about Self-Sovereign Identity protocols in a single link https://github.com/rsksmart/rif-identity. All compatible with existent protocols and fully integrated into @RSKsmart blockchain. The future is one step closer.

  • A repository of JSON Schemas for Verifiable Credentials

    The Credential Schema is a document that is used to guarantee the structure, and by

itheum

When “leased out”, the other party can access your personal data — in this manner, the NFMe ID acts as an “authorization key” that allows third parties to use your data in a fair way to generate a shared value between the third party and the owner of the data.

 Dhiway

Video: #MARK Studio - Create tamper-proof, secure and globally verifiable digital credentials instantly Dhiway Networks

5ire

Centre (verite)

Developed last year and launched in Q1 of 2022, the Verite standard welcomes this flourishing of products and experiments with Verifiable Credentials and other privacy-preserving, data-minimizing patterns and principles.

But as the world shifts to an increasingly digital native format, and as people take more ownership over their identity, how can the issuance of, presentation of, and verification of credentials be managed?

Since verification is off-chain (and generally fast/inexpensive, depending on the provider), and since this avoids on-chain storage of potentially correlatable data, this is often the preferred solution.

Exostar

SICPA

Short promo User Journey videos

FuixLabs

Sideos

sideos is a simple data ecosystem backed by a new web standard: self-sovereign identity, or SSI.

 Wider Team

It starts with IdentityOps embracing high assurance for connected devices. Youre bringing together internal stakeholders from your network management, security, procurement, legal, and device care teams. Youre bringing in clinical outcome quality professionals concerned with data provenance, from clinicians who touch your devices and authenticate through them and authorize them to provide services.

Gravity Earth

Gravity and Tykn are pleased to announce our continued collaboration to advance the interoperability of our two distinct decentralized identity solutions for improved identity management in the humanitarian sector.

Cardano

"The vision of the company is to improve the systems of the world for everyone everywhere, and the places that need better systems aren't necessarily Berlin or New York City. So you have to go to places that are a little more difficult, and you have to be very careful as you do it."

Gimly

About Dick Hardts new thing

Gimly ID is leading self-sovereign identity innovation, with the implementation of SSI with self-issued openID provider (SIOPv2) and full support for openID connect and DIF presentation exchange.

Mobix

Digime

Julian describes digi.mes mission of empowering people with their personal data, as individuals know where all their data is, while they also have “a right for that data”. By having that knowledge and ownership, only individuals have “unlimited usage rights” to unlock the potential data has to be a force for good.

Key findings from the report are:

  • Users sacrifice privacy and security for access to valued services
  • Smartphone users begin to sense improvement in the mobile environment
  • More and more users take protective steps, but remain exposed to harm
  • Protective actions do not necessarily drive confidence
  • Cost, knowledge and perceived complexity are key barriers
  • Transparency and control are key values for users

 Entrustient

"When building product-market-fit for our platform, we listened constantly to frustrated customers who embraced the concept of SSI, Verifiable Credentials and Blockchains, but who gave up on piecemealing a solution. And the reasons were mostly due to the lack of specialized SSI developers, implementing complex SDK's and code builds, and trying to provision onto blockchain networks,"

Swisscom

This isnt Swisscom Blockchains first identity partnership. It also has a relationship with Adresta, which developed a digital identity solution for watches.

Merit

The company spent the last five years working with various governments to build connectors to these licensing databases to allow third parties to access the data and have it update automatically. So if you are a plumbing company, you can display your employees plumbing credentials on the company website and have them update automatically when the license is renewed (or show that it wasnt).

Cryptalk

  • CrypTalk is a messaging service designed to bring together verified projects and potential investors by creating a safe and secure crypto space. Crypto projects undergo thorough verifications and a number of security measures before being verified by CrypTalk.

Fujisu

As for the near future, Fujitsu envisions enhancing the distributed identity, data privacy, and consent management platform, which would open up all of the benefits described in this article on an as-a-Service basis to any player.

To resolve the complications, Fujitsu says it collaborated with the Keio Research Institute at SFC on a digital identity technology in September 2021, which resulted in an identity conversion gateway that enables multiple identity infrastructures to be interconnected without using a unified protocol.

Civic

Now, were making Civic Pass available to developers everywhere. The idea is that developers can plug Civic Pass into their platform and create an identity layer that allows for a permissioned dApp platform, be it a DEX, an NFT marketplace or mint, a metaverse, or who knows what else youll come up with.

Omidyar

Insights from a year-long evaluation of our Digital Identity program

Bloom

Beyond OnRamps direct data integrations, the platform also supports the ability for third party credentials to enter the OnRamp platform via the WACI specification

Bonfii

Block

Block is a new name, but our purpose of economic empowerment remains the same.

5 years after establishing Decentralized Identity at Microsoft, where I had the opportunity to work with great folks developing open source DID infrastructure (e.g. ION), standards, and products, I am joining Square to lead Decentralized Identity.

Energy Web

This release includes major updates to the front-end Switchboard web application as well as the back-end libraries and components, giving companies access to the full suite features offered by legacy identity access management solutions in a decentralized architecture.

Switchboards, our enterprise-grade self sovereign identity and access management solution built on the W3C administered decentralized identifier standard. Examples include Stedins identity and access management solution, CAISO flex alertand our work with Vodafone, Kigen, and KORE wireless.

Authenteq

  • Identity Masters Podcast

    At Authenteq, we spend a lot of time thinking and talking about how to make the internet a safer space. Its also what drives our product roadmap and why we got into identity verification and e-KYC in the first place. As we work to democratize the knowledge we have access to, we know that for it to be truly accessible, we have to work with different formats. This is why were very excited to introduce the brand spanking new Identity Masters podcast now available on Spotify!

Lissi

  • Lissi demonstrates authentication for Gaia-X Federation Services Lissi ID

    Gaia-X creates an open, federated digital ecosystem for data infrastructure for decentralized cloud and edge workloads and data sharing capabilities. As part of the core services, the so-called Gaia-X Federation Services (GXFS) are targeting the areas of Identity & Trust, Federated Catalogue, Sovereign Data Exchange and Compliance as open-source reference implementations. Centre - Verite

  • Lissi Connect Demo <- in German

    The login is only the start of the mutual customer relationship users do not want to monitor and maintain dozens of communication interfaces, but prefer a solution that brings these aspects together. This includes not only login services, but also newsletters, information letters from the bank, digital proof of any kind and other relevant personal information. The media break and the fragmentation of the current systems poses a major challenge for users and organizations. However, once stored in the user's wallet, this information can be easily managed, sorted and presented as needed.

  • The Lissi Wallet is now available in 12 languages!

    Lanugauges supported: Arabic • English • French • German • Italian • Korean • Polish • Portuguese • Russian • Romanian • Spanish • Turkish

the language is only a small part of the whole user experience. The task is to design a universal cockpit, which people can navigate regardless of their social background. Similar to a dashboard in a car, which doesnt look too different wherever you go. In order to achieve this, we have to standardize the icons, colours and user-flows to a certain degree. However, on the other hand, they need to be adjusted to the target audience.

Walt ID

  • The SSI Kit Walt ID

    The SSI Kit bundles three components, one for each functionality profile:

    • Signatory ™ for Issuers enables organisations to transform any identity-related information into digital credentials in order to replace paper documents and automate data provision to stakeholders.
    • Custodian ™ for Holders enables individuals and organisations to securely store, manage and share keys and identity data via data hubs (“wallets”). (Web-Based wallet)
    • Auditor ™ for Verifiers enables organisations to verify identity data in order to authenticate or identify stakeholders and offer frictionless access to services or products.
  • The Wallet Walt

    This post introduces our new open source product: the Wallet, which enables developers and organisations to put Self-Sovereign Identity (SSI) into the hands and pockets of the people via easy-to-use applications.

  • Me, myself and (SS)I Why everybody must have a Self-Sovereign Identity in 5 years
  • Open Policy Agent: Credential validation powered by the Open Policy Agent Walt ID

    The Open Policy Agent (https://www.openpolicyagent.org) is an open source, general-purpose policy engine that unifies policy enforcement. OPA provides a high-level declarative language called Rego that lets you specify policy as code in order to offload policy decision-making from your business logic.

darkmatterlabs

Self-sovereign objects are are self-executing and self-owning; capable of determining their own lifecycle to maximise material utility and performance whilst minimizing negative environmental impacts. Augmented by sensing capabilities and the ability to autonomously execute smart contracts, material objects could continuously monitor their own performance and contract for their maintenance, repair or recycling.

Ubisecure

“I think its interesting if we overlay this utopia of a self-sovereign identity that sounds maybe like science fiction today, and where these UK digital initiatives are geared, and my best guess is we can and will land somewhere in the middle.”

Elastos

  • Elastos DID: Whats Ahead for 2021

    Tuum Tech is working on an Elastos DID-based application called Profile, a rising competitor to LinkedIn in large part by leveraging Elastos DIDs. Unlike in conventional applications where data and identities are managed and controlled by centralized systems, users will retain full ownership of their data when using Profile.

Tru

  • Tru.net is live and ready for communities/users

    If you are looking for an alternative to Facebook that uses DIDs as its foundation and other protocols that are free to use (JLINC Kaliya highly recommend Tru.net

IDPro

Onfido

Chipper Cash has become the latest financial institution to adopt Onfidos identity verification technology. The company currently operates one of the largest money transfer platforms in Africa, and is hoping

KYC CHain

IDWorks

GAIA-X

ShareRing

  • Blockchain platform enables users to pay for Viator experiences with crypto

    The ShareRing platform, built on Tendermint, will allow users to book, register, and pay for Viators 395,000 global activities and experiences, using local fiat currencies or major crypto assets, including Bitcoin (BTC), Ether (ETH), and its native SharePay token (SHRP).

    The platform uses the ShareRing ID system to ensure that sensitive personal and financial information is securely handled, and has contact tracing features to help with tourism safety during the pandemic.

  • ShareRing Unites with Chinas International Blockchain-based Service Network (BSN)

    BSN aggregates their technology partners services into their cloud-based ecosystem to make them all accessible to any company or developer that wishes to use them, with very low monthly access fees starting at just $20. Their “plug and play” approach eliminates the need for hiring or outsourcing highly specialized developers, who are in short supply due to high demand in this industry.

    One of the most exciting benefits of ShareRings integration with BSNs global ecosystem is how effortless it will be for companies to incorporate our products and services without requiring ShareRings assistance with development and integration.

Gluu

  • Gluu vs. Keycloak Mike Swartz talks about the difference between his product Gluu and Keycloak, which he describes as a less stable project that shouldnt be used in production environments.

Talao

Blockchain-based Digital Identity specialist Talao, a Paris-based startup which focuses on Self-Sovereign Identity options and blockchain-based options is the developer of the primary French smartphone pockets for Self-Sovereign Identity. The firm simply introduced the provision of its new id pockets for all cellular customers in Europe.

  • Work on Android and iOS
  • Wallet DID: did: tz, did: key (curve Ed25519)
  • Issuer DID supported: did: tz, did: web, did: key; did: ethr, did: pkh.
  • Revocation of VCs: RevocationList2020
  • SDK development environment: PHP, Python, NodeJS, java, C, Flutter,…
  • Wallet templates: employer certificate, experience certificate, skills certificate, company pass , proof of email, proof of telephone, certificate of residence, loyalty card, diplomas, student card

Shyft

Identity has been a contentious point for humanity ever since we evolved societies. How are we sure that someone is who they say they are?

IAMX

insights on what IAMX does, how can users and telcos can benefit from it, and why would users be interested in and trust IAMX. Later we talked about the recording and securing of biometric information. IAMX is having an ISPO

Zetrix

Vereign

For the realisation of the three projects, Self-Sovereign Identity will be a quintessential technology. A decentralised identity is supposed to allow users more self-determination in regards to identity data by putting the user in charge of the storage and transfer of their data. The data is only stored in a so-called wallet which belongs to the user. The wallet also contains digital keys for the authentication with services making individual profiles for each service obsolete. State-of-the-art Blockchain technology ensures the reliability of the used data. Vereign AG, the head of the consortium, has been working with and on this technology for quite a while already. DAASI International will lend their expertise in the development of innovative open source software, as well as in classic identity management authentication technologies, and help with the development and overall realisation of the project.

AyanWorks: @ayanworkstech is excited to announce that we, along with our partners Vereign and @DAASI_Int, have won 3 tenders from @gaiax_aisbl to build SSI solutions

Publish

PUBLISH CEO Sonny Kwon gave an overview of a press ID app PUBLISH is building in collaboration with the Journalists Association of Korea (JAK). He explained that the mobile application, which leverages decentralized identity (DID) technology to manage press credentials, would help the JAK combat misinformation and reduce administrative costs associated with its current press credentialing process.

PUBLISHiD users will further be able to assemble collections of verifiable credentials from one or more issuers into a single verifiable presentation. Other features include DAuth-based authentication, single-sign on (SSO), and an agent ID service capable of handling the management of and security between credential issuers and verifiers.