105 KiB
published |
---|
false |
Use-Cases
- Protecting Your Driver’s License
the biggest advantage of such an SSI-based driver’s license is that there’s absolutely no possibility of loss. Furthermore, there is no question of your PII on the license to fall into the wrong hands because the holder has complete control over how it is used and with whom it is shared.
- Spherity launches New Product to Support Pharmaceutical Supply Chain Compliance
The product establishes trust in digital interactions between trading partners in pharmaceutical supply chains and ensures compliance with the U.S. Drug Supply Chain Security Act (DSCSA).
- Driving License as a Verifiable Credential
- Verifiable Credentials in Ben’s Serendipity
- Think about it for a moment. No physical documents at all, but a simple and secure self-sovereign identity that Ben had complete control over. More importantly, look at the interoperability and flexibility as Ben could use them in different situations and across multiple platforms.
- On-Demand Employment Endorsements
- Opening a Bank Account
- Accessing Medical Records Anywhere
- Protecting Your Driver’s License
-
Accessing Medical Records Anywhere
this workflow doesn’t involve any third-party to store your medical data and this also means no worry about medical data storage policies and the laws associated with it. The holder completely owns his or her medical data and stores it exclusively in his or her digital wallet, thereby making it secure and hassle-free.
-
How Exactly Are Verifiable Credentials Making the World Better?
This post shares 6 stories of how verifiable credentials can improve the lives of every day people:
Ajay is an Uber driver in San Francisco. He wants to try various temporary jobs while he’s studying but joining Lyft, Postmates and other platforms requires going through a long and tedious background verification and car certification process over and over again.
-
Building decentralized social media
People, in general, want convenience from their technology, not morality. So instead of building a more ethical version of the past, we need to build a more suitable version of the future.
-
Self-Sovereign Identity Verification and Background Screening
self-sovereign identity verification, one of the game-changing background screening trends of 2021. When combined with screening activities, self-sovereign identity solutions offer opportunities to obtain more accurate candidate background data and deliver it to employers faster.
-
Rambling – Do I Need a Credential? Continuum Loop
I am a Professional Engineer, which in Canada, is a regulated profession. That means I am formally credentialed. The tech that I am issues comprises of a rubber stamp and an ink pad. Yup – very high tech…
-
Can SSI Safeguard your Information from Hackers?
The cryptography used is called the Public Key Infrastructure (PKI) that comprises a pair of public and private keys where the holder keeps the private keys, but shares the public keys.
Julian Wilson began his career at Apple in the late 80s [...] joined Ecospend in 2019 to build a self-sovereign data service on top of an Open Banking platform. He describes his role as putting an Internet lens onto product design.
In the real estate industry, TRUST&TRACE can be used by companies to obtain required compliance information from a network of participating companies. In this way, all property data is collected step by step: from building construction and leasing to sale and demolition.
KYC
-
The missing link: digitizing supply chains with portable data Mavnet
-
Mattereum & UNION: Risk Protection for the Digital-Physical Economy
Here’s a brief overview of the DeFi insurance landscape, UNION’s unique approach to risk protection, and how the UNION and Mattereum integration will work in practice.
Avoid costly industry deadlocks and gatekeeping with a peer-produced, decentralized alternative to centralized collectible grading and authentication services with the Mattereum Protocol
- SSI for NFTs, Offline and Connectionless Use Cases, NFC Chip Cards and More with Caspar SSIOrbit
- An SSI Based System for Incentivized and Self-determined Customer-to-Business Data Sharing in a Local Economy Context IdUnion (paper
Self Sovereign Identity (SSI) provides the technical building blocks to create decentralized data-driven systems, which bring data autonomy back to the users. In this paper we propose a system in which the combination of SSI and token economy based incentivisation strategies makes it possible to unlock the potential value of data-pools without compromising the data autonomy of the users.
September 2nd, 2021 was a big day for all of us in the Global Developer Ecosystem (GDE) team of Affinidi as we geared to host our first webinar on Self Sovereign Identity/Decentralised Identity and Financial Services with Varsha Jagdale (General Manager of Financial Services at Affinidi) and Joseph Thompson (CEO of AID:Tech) as the speakers.
- Banking’s identity problem Global Banking and Finance
Banks have sought to overcome some of these challenges with the use of biometrics such as facial recognition and fingerprints. These are now more commonly used to login to, or unlock devices, and increase usability, but still leave the challenge of proving the authenticity of a document wide open to abuse.
Today is an huge milestone for ForgeRock. We are becoming a public company, with our stock publicly traded under the “FORG” symbol, at the New York Stock Exchange.
- On solving the worldwide shipping crisis Doc Searls
“The supply chain is essentially in the hands of the private sector,” a White House official told Donna Littlejohn of the Los Angeles Daily News, “so we need the private sector…to help solve these problems.” But Biden has brokered a deal among the different stakeholders to end what was becoming a crisis.
I categorize them by the stage of the relationship between customer and vendor:
Category 1: Establishing the relationship
What happens when a Customer or a Vendor wishes to initiate a relationship, or wishes to modify the terms of the relationship.
- Top 5 Most Interesting NFT Use Cases (Part 1) Europechain
From racehorses to virtual sushi: a dizzying NFT panoply
As the world becomes even more connected and more machines are hooked up to the internet, the ability for machines to move, trade and interact securely and efficiently becomes increasingly important to life and business. Today’s centralized networks do not enable this. Machines today exist on closed, permission-based environments which massively limit which other machines can be interacted with, what machines can do and where they can go.
- What are some of the benefits of this new wave, such as reduced cybersecurity risk and enhanced travel experiences/personalisation?
- Will this affect the way travel is distributed and paid for change?
- What can players in the established travel eco-system expect?
- When will we see this come about – where will we be by 2030?
A decentralized network using a blockchain-based distributed ledger means you can use Peer DIDs to move most “transactions” and their cryptographic proofing off ledger. This means that for those peer-to-peer interactions, identity blockchains don’t need to do any ledger transactions at all.
- Controlling Our ID with Self-Sovereign Identities KnowHowToWow
Bosch researcher Christian Borman explains how SSI will not only increase privacy but also have a positive impact on B2B interactions and supply chain management. Meanwhile, Geoff meets mentalist Thorsten Havener. Will he reveal Geoff’s true identity? Inspired by this, Shuko presents some crypto magic…
we discussed the white paper he authored on Self Sovereign Identity and IoT. To explain the opportunities SSI can provide to IoT, Michael introduces us to three profiles: Jamie (machine to person), Bob (machine to machine) and Bessie the cow (digital twin).
Are these advantages enough to disrupt surveillance capitalism? Do you think SSI is the antidote for today’s Internet identity problems and surveillance capitalism? Please share your thoughts with us.
CULedger is now Bonifii! Delivering a trusted peer-to-peer services network of verifiable exchange for financial cooperatives.
- Building the Social Graph Infrastructure for Web3.0: How CyberConnect is using Ceramic to connect everyone in Web3.0
At the heart of CyberConnect is a tamper-proof data structure that efficiently facilitates the creation, update, query and verification of user-centric data. Long-term data retention on CyberConnect is guaranteed through Ceramic’s blockchain anchoring and a custom data pinning service.
By integrating with Dock and utilizing verifiable credentials, the process of verifying a workers qualifications goes from analysing paper-based certificates and calling each educational body to certify the legitimacy of it, to having the accreditations sitting in a tamper-proof digital wallet, with a digital signature signature from the issuing body certifying the legitimacy.
The Mines Digital Trust Ecosystem wallet uses verifiable credentials which are enhanced digital versions of physical credentials. The Mines Digital Trust Ecosystem is built on technology that is highly transparent, secure, tamper-proof, and immutable. From the moment information is stored, it cannot be changed. Credentials can be revoked and re-issued as business processes dictate.
Throughout the financial inclusion interview series, we caught up with key partners to discuss the launch of GLEIF’s digital business identity initiative in Africa and how it is bringing about greater financial inclusion for African SMEs. Stephan Wolf, CEO of GLEIF, concludes the series by accentuating the immeasurable opportunities and transparency this initiative will bring to the global supply chain Liquid Avatar Technologies’ PassmateTM shows how decentralized identity will transform the world: by easily integrating into systems that already exist. The soon-to-be-launched Software as a Service — conceived by Liquid Avatar’s David Lucatch, enables verifiable credentials to run on existing payment rails.
At first view, the SSI approach is at odds with the electronic identity documents used in many states, as in the latter model it’s the state that has sovereignty over its citizens’ identity data. On closer inspection, however, SSI and electronic identity documents can complement and even benefit from each other.
Using the self-sovereign identity solution Hyperledger Aries, almost everything works peer to peer between the license issuer and the pilot and between the pilot and the verifier.
Real estate is one of the sectors that has not completely embraced digitalization, and this means, there’s a lot of potential to bring about change in this sector.
- Digital Memories Windley
I think digital memories are one of the primary features of digital embodiment—giving people a place to stand in the digital world, their own perspective, memories, and capacity to act. We can't be peers online without having our own digital memories.
Beyond directly helping children learn in playful ways, this partnership was forged to assist in championing the importance of three learning primitives of tomorrow’s educational landscape: decentralized identifiers (DIDs), verifiable credentials (VCs), and digital wallets.
This is not limited to alcohol, however. It also includes other age-restricted products such as tobacco, cannabis (where legal of course), vaping products, gambling, some movie tickets and even lottery tickets.
This rapid digitalization of the private sector exposed a challenge in the business registration paradigm. To use private digital platforms for e-Logistics or e-Commerce, SMEs have to register and confirm their identity with these platforms, despite already being identified in the government business registry.
In November 2021, GLEIF partnered with Contour, a global network of banks, corporates and trade partners working together to revolutionize the trade finance industry by removing barriers to entry. The partnership enables the use of Legal Entity Identifiers (LEIs) within Contour’s platform and puts digital identity at the heart of its proposition.
Healthcare is a key case-use of the SSI model employing blockchain given the significance and scalability of this sectoral. In this article, we give you details about a pilot project developed for the Andalusian Health Service in Spain to evidence the feasibility of a vaccination card according to the Alastria Self-Sovereign Identity system based on Blockchain technology.
There is a big need for solutions to enable trusted interactions, especially when it comes to identification and authentication. It all stems from the fact that the Internet was never designed for identities of individuals in the first place. Though we have standards and protocols for transactions, these are not constructed to enable the average user control of his or her digital identity without depending on a single third party.
you can provide your DID instead of disclosing your phone number or email ID as the second factor of authentication. In the second step of verification, you will have to prove that you are the owner of that DID provided during the initial setup.
-
ExO Economy Town Hall 11 Medtech & Self Sovereign Identity Adam B Levine Kaliya Identity Woman Young
-
http://economy.openexo.com ExO Economy Town Hall #11 Q- Medtech and Self Sovereign Identity - Adam B Levine & Kaliya Identity Woman Young
Upon successful graduation from a school or university, a certificate is issued as proof of the achievements. However, these are currently still only issued in paper form and therefore cannot be easily presented to third parties.
Many areas of production and trade have been digitized, but in the absence of a universal approach to digital networking, siloed systems have been implemented, creating countless ‘digital islands’. Data is still transferred between the participants’ computer systems on printed documents or as unstructured PDFs.
- Is the Self-Sovereign digital identity the future digital business registry? GORAN VRANIC, ANDREJA MARUSIC
- How LEI datasets can enhance global sustainability initiatives and climate-aligned finance GLEIF
During COP26, GLEIF announced a partnership with Amazon and OS-Climate to add LEI datasets to Amazon’s Sustainability Data Initiative (ASDI) open-data catalog. [...]. We have since caught up with Ana Pinheiro Privette, Global Lead for ASDI, to discuss how the partnership is working to improve global sustainability data modelling, mapping and calculations, and the expected impact on climate finance risk and opportunity evaluations.
When this comes to fruition – and not if, but when – it will be a transformative change, shifting power from travel suppliers to travelers themselves and giving travelers more choice, better personalization, lower friction and more security.
- Businesses’ desire to store less digital identity data stokes travel’s SSI brushfire BiometricUpdate
The potential use cases for self-sovereign identity to transform the travel industry are almost limitless, particularly with the impending arrival of decentralized identifier communications, also known as DIDComm, attendees of a PhocusWire roundtable discussion on the role of SSI in the future of identity and travel at the Phocuswright Conference 2021 heard from an panel of digital identity experts.
- TheirCharts Doc Searls
If you’re getting health care in the U.S., chances are your providers are now trying to give you a better patient experience through a website called MyChart.
This is supposed to be yours, as the first person singular pronoun My implies. Problem is, it’s TheirChart.
“Legisym is thrilled to be working alongside Spherity to bring the first production-level ATP Credentialing solution to the industry,” said Legisym President & Co-Owner David Kessler. “With the successful completion of the ATP Credentialing Pilot in 2020 and the joint founding of the Open Credentialing Initiative in early 2021, the Spherity-Legisym partnership is already proving successful in collaboration and forward thinking.”
are we building for these use-cases?
At the root of the problem is the fact that uniquely identifying a person is hard to do and that people can create fake IDs for themselves quite easily.
- photo attacks based on the presentation of facial evidence of an image of a face printed or displayed via a device’s screen.
- video of user replay attack usually consisting of placing the screen of the attacker’s device in front of the camera.
- 3D mask attacks where 3D masks are crafted to reproduce the real traits of a human face and even include eyes holes to fool the liveliness detection based on eye gaze, blinking and motion.
- deepfake attacks make use of leveraging software capable to create a synthetic video or image realistically representing someone else. Attackers are suspected to have access to a wide dataset containing images or a video of their target.
- The Missing Ingredient for Globally Compatible ESG Data Collation and Reporting? Standardized Digital Entity Identification GLEIF
Research conducted by GLEIF and the Data Foundation, indicates that the U.S. federal government alone uses 50 distinct and incompatible entity identification systems. When this fragmentation is amplified, taking into account the volume of different identifiers globally, it is easy to understand the challenges.
- Blockchains in HR: Prosoon and Talao go together on SSI and HR credentials
- Trusted Career Credentials Dr Gordon Jones
Today, even in this digital world that has expanded over the past two years, the job market still relies on self-reported attributes, records, resumes, and/or LinkedIn profiles, that individuals share with employers or recruiters as the source for applicants and employee data.
Doc Searls and Katherine Druckman talk to Mike Vesey, CEO of IdRamp, about verifiable credentials, decentralization, and real-world identity solutions.
- Leveraging Self-Sovereign Identity, Blockchain, and Zero-Knowledge Proof to Build a Privacy-Preserving Vaccination Pass Maurício Barrosa, Frederico Schardong, Ricardo Felipe Custódio
This solution allows users to prove that they are vaccinated for different pathogens without revealing their identity. The architecture is loosely coupled, allowing components to be exchanged, which we discuss when we present the implementation of a working prototype.
avatars (the visualisation of self-sovereign identities) go beyond simply providing users with further ownership and control over their cryptographically secure identities, by offering an end-to-end application ecosystem designed to facilitate the commerce and exchange of digital and physical services
Gatekeeping of internet access is a fact of life in the Philippines, where the market is shaped by the telecommunications duopoly. President Rodrigo Duterte threatened to seize the telco giants, Globe and PLDT, if they didn’t improve their service by the end of 2020. Like much of his bluster, though, the threat has failed to have an effect.
Let’s say Mr.X is forced out of his country due to war and he reaches the neighboring country but doesn’t have any physical document to prove his identity such as name, address, educational qualifications, work experience, etc.
- An automatized Identity and Access Management system for IoT combining SSI and smart contracts Montassar Naghmouchi, Hella Kaffel, and Maryline Laurent
This paper proposes a blockchain-based identity and access management system for IoT – specifically smart vehicles- as an example of use-case, showing two interoperable blockchains, Ethereum and Hyperledger Indy, and a self-sovereign identity model.
This report is the first phase of the Education Blockchain Initiative, funded by the U.S. Department of Education and managed by the American Council on Education (ACE). It summarizes an intensive research project to better understand the application of blockchain, a form of distributed ledger technology, to education. Its content is intended to inform policymakers, technology developers, education practitioners, and workforce entities about the state of and potential of interoperable digital credentials anchored on blockchains. This report also provides guidance to these stakeholders on the effective implementation of blockchain-based digital credentials infrastructure.
At Energy Web, we understand that in order to have any meaningful adoption of enterprise applications using decentral technology, a DID-based tech stack has to be offered in a convenient and reliable way as well. This is why we’re developing the Decentralized Service Level Assurance (DLSA) solution.
- Airports continue to deploy biometrics as SSI ‘big wave’ approaches Biometric Update
The conflation of biometrics and SSI is somewhat disturbing.
TravelScrum Co-founder and Chairman Gene Quinn described self-sovereign ID (SSI) as “a big wave of change that’s coming,” and advised that organizations can “ride this wave by swimming at it, greeting it, and rolling gently over it as it heads to shore, or you can be caught in the shore-break and have it consume you later.”
In 2018, I was trying to open a bank account in my home town of Mutare, Zimbabwe, having just come back from the 1st world, I was under the impression it would take me at most 30 mins to an hour. I immediately realised I couldn’t provide most of the requirements such as my ‘Proof of Residence’ and many more. It turns out it took weeks and months for some to finish the entire process.
Marketplace deception is everywhere, at great cost and risk to consumers and businesses. Regulation alone won’t fix it. Can Mattereum Asset Passports and Product Information Markets help secure trust in B2B and B2C trade?
Most healthcare organizations are and should be, focused on their core business pursuits, such as patient care or processing insurance claims. Information security and identity management is not their core business, yet is a critical factor in compliant, secure business operations.
While self-sovereign identity (SSI) sounds like an unfamiliar concept for some, others are actively leveraging the technology to address industry-specific challenges — take the KYC trial of the Financial Conduct Authority or the IATA Travel Pass.
Yes, text messaging, aka SMS, is ubiquitous, but what should you do when you need to grow beyond what texting has to offer? Remember, “the medium is the message” (Marshall McLuhan, 1964). Text messaging is not the right channel for every engagement.
Much like cell phone technology and the internet, the true power of SSDI will only be unleashed when it is embedded across all sectors of society, from education and medical care to telecommunications and retail. And that will require all role players – government bodies, regulators, service providers, public and private agencies – to take up the SSDI baton and become part of the change.
- SSI for smart locks h\t Animo
Privacy Security
- [Enterprise] The Challenging New World of Privacy & Security Atlanta Innovation Forum featuring folks from MSFT, GSM, and Michael Becker. The video looks at the range of risks present in managing identity assets. Its focus is coming from the enterprise-level perspective.
loyalty rewards
-
Check out the latest version of our beta prototype in the Appstore for #verifiablecredentials for #LoyaltyPrograms. https://apps.apple.com/us/app/id1458328593 When #sovereign #decentralized #identity becomes a reality, your #Loyalty and #loyaltyrewards #Wallet will be on XPID. #SSI
-
The End of Logins and Passwords, Just for Starters The Reboot
-
verify the verifier use-case TNO
The article proposes including coercion countermeasures in governance frameworks:
- Require authoritative verifier.
- Require evidence collection.
- Require enabling anonymous complaints.
- Require remote/proxy verification.
- Require complying holder agent.
-
Confidential exchanges and the sharing of sensitive data: a major problem in business
if a crypto-account acquires an NFT UNIKNAME, the DID attached to it will totally control this NFT . The NFT UNIKNAME is a random-looking character string to which properties can be attached. The characters actually encode an obscured form of a human-memorable identifier.
- Groundwork laid for mass digital identity take up as use cases grow Biometric update
Identos is adding W3C (World Wide Web Consortium) verifiable credentials as a product feature for its digital ID solutions by the end of the year, announcing its position in the race to incorporate international standards for how digital credentials – from health records to degree certificates – are stored and verified.
One sector where SSI is expected to have far-reaching implications is the real estate industry, as it has the potential to bring in a lot of transparency and trust among the stakeholders.
So, how does SSI fit into this traditional real-estate sector?
Enabling Australian FinTechs a direct avenue to discuss how they partner and collaborate to access the eftpos payments network through the Committee resulted in recommendations that covered a number of central themes, including consultation and engagement, regulation, and technology and solutionsBen Tabell, eftpos Chief Information Officer and Committee Chair
- Digital Twins and Self-Sovereign Identity: Build the next generation of Simulation with privacy preservation IOT Practicioner
The rise in the use of advanced analytics, machine learning (ML) and Artificial Intelligence (AI) and the Internet of Things (IoT) today have driven the technology of simulation into the concept of the digital twin. Digital twins are generally defined as a virtual digital model of a physical system that is used to make better decisions about the real world physical system. Digital twins are usually intertwined with sensors and include a two-way interaction between the physical and digital twin.
- Why Centralised Decentralised Finance (CeDeFi) and Self-sovereign Identity (SSI) Work Together Unizen
the combination of Centralised and Decentralised Finance — unites two ways of interacting with assets into one. Centralised Finance (CeFi) represents traditional entities (e.g. banks, brokers, funds), Decentralised Finance (DeFi) covers blockchain financial applications, cryptocurrencies, exchanges, decentralised payment services, etc. By merging the two, high transparency, impactful innovation, and wide adoption can be achieved.
- Self-Sovereign Identity for Online Gaming, VR, & AR – Crucible Evernym (via identity-economy.de)
Crucible's CEO (Ryan Gill) and CTO (Toby Tremayne) for a discussion on what self-sovereign identity (SSI) and verifiable credentials mean for gaming and the greater online entertainment sector.
- Introduction to Smart Property Humanizing the Singularity
How can we streamline and improve the techno-social protocols around commerce so we can better maintain equilibrium with our planet and ourselves?
- President Biden’s cybersecurity executive order
- The security landscape for global enterprises
- Decentralized identity, what it is and how it fortifies existing data infrastructure
- Case study: applying zero trust and decentralized identity to energy
- Electronic signatures for hospitality ValidatedID
Looking at the many developments that have happened lately, digitization has become the center of attention for all kinds of industries, and yet many of the typical processes within the hospitality industry remain paper-based.
- Using Blockchain to Get Information When You Need It from Wherever You Are Information Matters
The goal of this project is to provide unencumbered access to digital content and print collections while ensuring the privacy and personal identity of each user is secure. Partner libraries will issue a ULC to any individual with either a fixed or descriptive address. Information access will be increased as users gain access to resources and services in those libraries that recognize the ULC.
- Identity + Security + Privacy = Trust DigitalID NZ
We had four insightful presentations, given by Jono Soo (Marsh NZ), Jonathon Berry (InPhySec), Andy Prow (Red Shield) and Paul Platen (SSS) which provided a deep-dive into what has been going on in the world of cyber security and insurance
- How decentralised identity & verifiable credentials will transform the world of healthcare HealthTech World
When a medical accrediting agency provides a digitally signed certificate, the healthcare practitioner and owner of that certificate holds the credential in a digital wallet. The details of the credential such as the time stamp in which the certificate was given and how long it is valid for, can be optionally held within a blockchain network, digitally linked to the certificate, this process is called ‘anchoring’.
Learn how Bonifii is using Verifiable Credentials as a Digital Transformation mechanism for Credit Unions to Increase Engagement with their Members. John Ainsworth explains how they are revolutionizing how Credit Unions say “hello” to a member.
-
The Benefits of Automating Your Employees’ Identity Verification
-
Digital signatures, a fast track to digital transformation in the real estate sector
The latest real estate trend reports show how the pandemic has accelerated the use of technology and the implementation of trends such as teleworking and digitisation of processes. Find out how digital signatures are revolutionising the industry.
QiqoChat has really stepped up in this time of need to provide an incredible online event user-experience, enabling a re-creation of the IIW experience throughout our Covid travel restrictions. This week they announced the launch of a Verifiable Credentials integration with the QiqoChat platform.
The community of professionals working on data privacy & consumer protection has been an early adopter of QiqoChat. During regional and global conferences, they have used the platform to share ideas and deliberate about the future of user-centric identity. Through these conferences, we’ve learned how solutions like IdRamp can be tremendously empowering for Internet users.
Credit unions and their members face the threat of fraud on all sides. And credit unions employ lots of tools to fight it. But ultimately, the problem comes down to the member and credit union authenticating each other. The problem is that doing this securely annoys people.
Participants in this co-creation use case were TNO, CZ, Rabobank and Accenture. The developed solution can be applied in other industries as well. For example in public services, which are often offered by a network of organisations that are all required to comply with high administrative standards.
ready to market by end of end of 2022 offering increased flexibility, control, ease of use and speed when managing the access of video distribution ecosystem data, independent of the technology used. Divitel video carrier customers will be offered the option to include this blockchain module on top of their ecosystems.
The primary objective of the report is to inform humanitarian organizations working with migrants of the opportunities and risks in the use of digital identities in providing services throughout the migrants’ journeys.
-
Innovative concepts and software for managing digital master data and certificates IDUnion
-
Evernym Selected as a 2021 Technology Pioneer by the World Economic Forum
The 2021 cohort of Tech Pioneers includes many future headline-makers at the forefront of their industries. These companies show great potential to not only shake up their industries but offer real solutions to global problems.
In our last post we briefly presented Veramo and how it evolved from the challenges faced with uPort’s libraries. In this next series of articles we will give Veramo a proper introduction and answer some of the basics: why it exists and what it does, followed by articles describing the architecture in more detail, and how to build applications using Veramo.
How to issue Verifiable Credentials from Auth0 user data using MATTR's Auth0 Marketplace Integration
- Verifiable Credentials with Auth0 and MATTR Damian Schenkelman
How to issue Verifiable Credentials from Auth0 user data using MATTR's Auth0 Marketplace Integration
You can probably use the good news. It’s never been easy to run a credit union, especially when you get whacked from all sides. Regulations change, members always seem to want access to another shiny new technology gadget, and financial fraud continues to be a threat. On top of that, we’ve all had to grapple with the pervasive life-changing effects of the coronavirus pandemic for the past year.
based on the article Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion by Fennie Wang and Primavera De Filippi.
- Decentralized Identity isn't a hypothetical need, as I personally experienced this week
- Alternatives to the CompuServe of Things Windley
^^^ Interesting feature: Phil is leveraging the Hypothesis sidebar for comments\annotation -
The current model for connected things puts manufacturers in between people and their things. That model negatively affects personal freedom, privacy, and society. Alternate models can provide the same benefits of connected devices without the societal and personal costs.
State agency feedback:
- Identity is at the heart
- Disconnect between the data desired and the data entered
- Confusing fields, more confusing mapping
- Mismatched data
- Stick to 99% of a standard
School has changed:
- Used to be:
- District organized by physical location
- Revenue systems based on seat time
- School buildings
- Classrooms divided into grades
- Teachers as sage on the stage
- COVID:
- Some kids still out of school
- Playlists, virtual classrooms, hybrid
- Access to food. Access to internet. Access to a device.
- Teachers maxed to the limit
- FUTURE:
- Learning Loss?!?
- Social Emotional Learning?!?
- 1/3 of students expected not to return
- Virtual models abound
- Teacher mobility and agency
- Chaos versus Opportunity?
Questions for discussion:
- Identity technical solutions are easy. The data clean up and alignment is the first problem to solve.
- How can self attestation be trustworthy?
- What are the responsibilities of a proxy issuer?
- How far can we move people's cheese before they rebel?
- Self-Sovereign E-Commerce by Doc Searls
There is momentum here, and a need to start building out much of what was discussed.
Doc introduced the session with the slide deck
, wearing his hat as a founding member of
, the .org working on the Intention Byway discussed at earlier IIW sessions and described in
, posed later.
His case is that the incumbent e-commece system hasn’t progressed past its dependence on the cookie, and perhaps never will; and that there is a need to stand up an alternate model, built on asynchronous pub-sub messaging and compute nodes that run apps that don’t have to come from the stores of Apple and Google.
First examples of target areas (where communities are already active) are food distribution in Michigan and real estate in Boston. Hadrian Zbarcea led the discussion of both, using slides from the deck above.
Bosch will now also systematically transfer the self-sovereign identity (SSI) principle to the B2B sector – in other words to business relationships between companies. A further step will involve transferring it to secure and trustworthy interactions between machines.
Career Creds
- Self sovereign career identity Diginomica with Meg Bear
The Velocity piece is a way for me as an individual to own my credentials, to say, these are the things that I know. And these are the things I've done. And if I can own that, I have a lot more interest in it. And I can use it in a lot more interesting ways. In the past, that might have just been something that I built as reputation within a company, I can now make that a more dynamic and portable reputation I can take with me anywhere.
Having a look at the Velocity Whitepaper it does mention they are keeping an eye on the work developing in W3C and DIF.
it’s hard to keep track since some call, some… email, and still others send you a message on WhatsApp.” Going through all of these disparate messages is its own fulltime job!
That’s why Domi locates all communication about a property in one place, making it easy for tenants and property managers to stay in touch.
This month, Gravity joined some of the largest international NGOs in the world to launch the Dignified Identities in Cash Programming (DIGID) project in Kenya. The goal of this project is to help the Kenya Red Cross leverage Gravity’s decentralized identity protocol on Tezos to provide much-needed cash transfers to vulnerable Kenyan populations.
- Blockchain and the Decentralised Workforce WorkforceFuturist
Trade
-
Federal Blockchain News - Podcast talking about SSI use at CBP
-
Vincent Annunziato, talks about his work with The Silicon Valley Innovation Program. He is the Director of Transformation & Innovation Division of the Customs and Border Patrol Office of Trade, talks about shaping blockchain technologies to make imports safer and more secure. CBP's current projects include tracking steel, oil, and natural gas imports from Canada.
-
What Is Self-Sovereign Identity Verification and How Is It Changing Background Screening?
A prime example is self-sovereign identity verification, one of the game-changing background screening trends of 2021. When combined with screening activities, self-sovereign identity solutions offer opportunities to obtain more accurate candidate background data and deliver it to employers faster.
-
The Equifax Incident, And How SSI Could Have Prevented It Europechain
On March 8, 2017, Cisco staff found and reported a critical flaw in Apache Struts, an open-source framework that enables the creation of web-based Java applications. The vulnerability in question was identified as CVE-2017-5638. In short, Strut’s parser tool, Jakarta, could be manipulated to enable a malicious actor to upload files remotely to a server, and potentially run code on that compromised server.
-
Digital signatures, a fast track to digital transformation in the real estate sector ValidatedID
The report Emerging Trends in Real Estate in Europe 2021, prepared by PwC and Urban Land Institute (ULI), presents a sector in full transformation. It also shows how the pandemic has accelerated the use of technology and the implementation of trends such as remote working and the digitisation of processes.
In this episode, Raj Hegde sits down with Dr. Carsten Stöcker, Founder & CEO of Spherity to understand how #decentralized identity is transforming the end-to-end supply chain lifecycle.
Tune in to this episode to explore the increasingly important role of provenance in helping build a better world and learn about the intersection of exciting concepts such as non-fungible tokens (NFTs) and decentralized identifiers (DIDs).
-
Use Case: American Electric Power
What kind of strategy will take you to being a next-generation utility company? For AEP Ohio, a large electric utility company based in Columbus, this challenge began with a comprehensive review of their entire ecosystem and which identified their key pain points for innovation.
-
Recap: OECD Forum on Responsible Mineral Supply Chains
What kind of strategy will take you to being a next-generation utility company? For AEP Ohio, a large electric utility company based in Columbus, this challenge began with a comprehensive review of their entire ecosystem and which identified their key pain points for innovation.
-
5 Promising Use Cases for Verifiable Credentials - Hackernoon
verifiable credentials promise to appear in our daily lives in the not-too-distant future.
In fact, several industries are already digging in. Here are some of the most visible and promising use cases.
-
Are we doing enough to align our work with Zero Trust Architecture? Adrian Gropper on Public DID-WG mailing list
https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html What would be a good way for our SSI communities to advance zero trust architecture through more effective accountability and audit?
-
Could DIDs and VCs help with systems architected with Zero Trust in mind? Yeah, probably:
- You could use VCs to prove that you should have certain levels of access to certain systems. Checking this could happen automatically, but while ensuring that you're "live" and not some bot.
- Logs could be kept of which VCs were used when to receive the authority to do something.
- ZCAPs could be used to provide fine-grained access to very specific resources, even behind the firewall, within an organizations systems. DIDs could power much of this... but shouldn't promise any of it. The closest we could probably get to what you're asking, Adrian, is to align the Zero Trust Architecture principles to how DIDs and VCs can help -- primarily around: identity verification (VCs), login authentication (DIDs), least-privilege access (ZCAPs, Confidential Storage), and HTTP API access authorization (ZCAPs).
- More from Adrian
The most important message from the SolarWinds hack and much of the ransomware havoc is that our systems are not set up for individual accountability or independent audit.
The VC and ZCAPs perspective is inadequate. As an SSI community we need to address the separation of concerns between authentication, authorization, and audit as equally important and needing a harmonized best-practice perspective. Standardized EDVs are table stakes but not terribly relevant to the protocols that link authentication, authorization, and audit. Confidential Storage should be adopting the protocols that connect authentication, authorization, and audit rather than introducing protocols narrowly scoped to the narrow and obvious role of encryption at rest. I've put together a few slides in an attempt to clarify the relationship between non-repudiable accountability and audits (and EDVs). https://docs.google.com/presentation/d/1ksKal62ZiApX09Nejm4RSqHzHJbgwpu_l2Ho64_ePKU/edit#slide=id.p
- Adrian follows up with some explanation of the slides
Considering risk mitigation, based on SSI principles, there are four separate actors:
- Resource Owner (RO) their user agent (mobile wallet), and cloud agent (AS)
- Service Provider (SP), by definition has data in the clear
- Requesting Party (RQ) and their user agent (mobile wallet)
- Requesting Client (RC), by definition has data in the clear
- Digital Identity Isn’t Only For People David Birch, Forbes
fintechs and regtechs looking for opportunities in the digital identity space should cast their ideas net pretty wide. Digital identities are not only for people and the future desperately needs digital identities for pretty much everything to underpin recognition, relationships and reputation (the 3Rs of the online economy).
- @debimr75 shares
Now Animals too can have their own #decentralizedidentity to help them send their status updates to the rightful owner from their #IoT devices. #Decentralized #digitalidentity for #IoT devices would lead to #SmartFarming
- Impacts from a new reality drive the need for an enhanced digital identity framework Bank Automation News
While US-based entities are adhering to an enhanced regulatory framework, these mandates are particularly applicable in Europe, where there is necessary compliance with enacted standards (such as the General Data Protection Regulation—commonly known as GDPR—and the Payment Service Providers Directive 2—referred to as PSD2. A clear need for a true and persistent digital identity as a solution to the ancillary—and sometimes unforeseen—challenges that have arisen.
Do you know the story of Carlos Kaiser? He was a professional Brazilian football player that never played a single match but managed to still have a professional football career. He wanted the lifestyle without having to do the work.
- Why self-sovereign identity will get adopted (and it’s not the reason you probably want) Tuesday Night
In the payment card world, there are clear guidelines on personal liability. $50 if you use credit and up to $500 for debit depending on when you report the issue. Based on that, different people choose to use different “systems.”
However, no such guidelines exist for the use of identity information (e.g. attributes.)
- Digital Infrastructure for Vaccination Open Credentialing (DIVOC) - This is an open-source platform that enables countries to digitally orchestrate country-wide health campaigns such as vaccinations and certifications.
- EU Digital COVID Certificate (EU-DCC) - This specification allows EU citizens and residents to have their digital health certificates issued and verified across the EU.
- Smart Health Card (SHC) - This initiative encourages the development of open standards and technologies to connect people with their health data. Led by Microsoft, Vaccination Credential Initiative (VCI), The Commons Project, and The MITRE Corporation, SHCs are seeing wide adoption across North America.
- International Civil Aviation Organisation - Visible Digital Seal (ICAO-VDS) - This is a travel document verification to re-establish travel and trade through aviation.
Compatibility with open standards is key to optimizing innovation. “We consider this solution part of a bigger ecosystem that will connect and cooperate with other ecosystems,” adds Radhakrishnan. “We’re exploring linking student credentials to the transportation authorities in Victoria and Melbourne to provide students with discounts on those systems. Microsoft embracing open-source technologies opens possibilities like these.”
- Technical Design and Development of a Self-Sovereign Identity Management Platform for Patient-Centric Healthcare Using Blockchain Technology Blockchain Healthcare Today
To manage patient’s self-sovereign identity, we leveraged the Hyperledger Indy blockchain framework to store patient’s decentralized identifiers (DIDs) and the schemas or format for each credential type. In contrast, the credentials containing patient data are stored “off-ledger” in each person’s wallet and accessible via a computer or smartphone. We used Hyperledger Aries as a middleware layer (API) to connect Hyperledger Indy with the front-end, which was developed using a JavaScript framework, ReactJS (Web Application) and React Native (iOS Application).
Promising advances in digital personal health empower patients. Technologically, we could shift from symptom based intervention to prevention and early treatment. But advanced innovations also generate debates on trust in sharing intrusive data and regulatory compliance. You can find details regarding our panel presentation here.
- ID Verification Threats On the Horizon Liminal Podcasts
Cognito's CEO Alain Meier joins the State of Identity host Cameron D’Ambrosi to dive into why industries beyond financial services are now in the market for identity verification. They also unpack the impact of synthetic identity fraud across verticals, and how platforms find the balance when building their onboarding processes.
- Fixing Aid | Can blockchain help fix the I.D. problem for a billion people? The New Humanitarian
Ismail looks at the concept of self-sovereign identity, which asserts that individuals must have ownership over their personal digital data and identification, and how that idea influences efforts to create efficient, secure digital identities for people in the midst of humanitarian crises.
SSI Fixes this?
I have been prompted several times this week by this article
and people asking questions about whether SSI could slove this use case - Yes.
If there was a trust framework for police departments and a DID registry for them - the police departments could issue VCs to their officers.
If you want to se how hard this was/would have been to achieve in earlier technology stacks take a look at conceptual outlines from this NSTIC (National Strategies for Trusted Identities in Cyberspace) developing a trust framework for law enforcement federations done by the Georgia Technology Reserach Institute and the results/learnings.
Energy Web, the non-profit building operating systems for energy grids, and Stedin, the Dutch distribution system operator (DSO), announced a partnership today to deploy a future-proofed solution for managing energy assets. This would include DSO-native devices, such as smart meters and distribution automation devices, and consumer/prosumer devices commonly referred to as distributed energy resources (DERs).
- Trusted Timestamping Part 1: Scenarios Nunnaphat Songmanee, Finema
Evidentiary value is an essential component of important transactions. When a transaction is recorded in a printed document, one way to impart evidentiary value is by including date and time
Credential fraud has, unfortunately, become commonplace in today’s instant electronic age. Especially problematic in higher education, credential fraud has spiralled into a multi-billion-dollar industry
- Self-Sovereign Identity User Scenarios in the Educational Domain Educause Review
Due to the high level of international mobility in the academic sector, insular solutions relying on only one national type of government-issued digital ID card will be insufficient; instead, the officials at the federation need to decide which digital ID cards are valid to uniquely associate an individual with private cryptographic keys, similar to the way passports are acknowledged internationally
- The challenges universities are facing.
- Digital transcripts and credentials.
- How universities can support students beyond graduation.
- The benefits for universities, students, and employers.
Travel
Healthcare
- Technical Design and Development of a Self-Sovereign Identity Management Platform for Patient-Centric Healthcare Using Blockchain Technology
- Survey: How Do You Use Your Identity at Work? FindBiometrics
The COVID-19 pandemic rapidly shifted the way we work, coinciding with digital transformation trends that depend on strong identity assurance. Hybrid workplaces are more common, as is completely remote work
- Demystifying Data Trusts as DAOs in the Data Economy Ocean Protocol
Kelsie Nabben, Researcher, RMIT on Data Trusts, DAOs and use cases of the Data Economy in DAOs [...] Kelsie is interested in the human outcomes of digital infrastructure, blockchain community culture, and algorithmic governance.
Since 2019, Gravity has been providing decentralized identity solutions for the Dignified Identities for Cash assistance project. The first phase was implemented by KRCS to meet the needs of the vulnerable populations without official IDs
LONDON, United Kingdom – In the largest update of protocol coverage in Coinfirm’s history, the firm has added support for 840,361 new tokens to the AML Platform, offering total digital asset coverage of 17 blockchains. Now, the company’s industry-recognized blockchain agnostic AML Platform supports ~846 thousand cryptocurrencies and tokens.
- Trust but Verify Liminal Podcasts
Peter Padd, Co-Founder & CEO at Fortifyedge shares how he's built Zero Trust authentication software that provides IoT device OEM's with password-free authentication utilizing Tiny Machine Learning at the edge.
AERGO is proud to announce the launch of the AERGO Venture Fund: a fund dedicated to dApp development! “Start Together, Scale Together” is a fundamental ethos of the AERGO hybrid blockchain ecosystem.
I had a stab at why Cardspace failed, in “Identities Evolve: Why Federated Identity is Easier Said than Done
Why does digital identity turn out to be such a hard problem? People are social animals with deep seated intuitions and conventions around identity, but exercising our identities online has been hugely problematic.
The 3Box Labs team recently published a new standard for creating capability containers for accessing decentralized data to the Chain Agnostic Standards Alliance. Capability containers are an approach for managing advanced data security and permissions, commonly referred to as “Object Capabilities” or “OCAPs.”
- Trust Registry or Machine-Readable Governance? Indicio Tech
The world will move towards decentralized identity if we make it easy for them to do so—and easy means, above all, fast. The solution is machine readable governance—a smart way of implementing rules for how to manage trust.
- Education pilot Kraken
This pilot allows university students to trade their academic records in a privacy-preserving way, and recruitment agencies to acquire this data and process it, keeping the student's privacy intact.
IGNOU (Indira Gandhi National Open University) had their convocation today and they issued more than 60000 degrees and certificates as Self-Sovereign Identity document (Cryptographically verifiable Credential) on National Blockchain Project and CRUBN's SSI blockchain.
- Self-Sovereign Identity as a Service: Architecture in Practice Yepeng Ding, Hiroyuki Sato, University of Tokyo
We propose a practical architecture by elaborating the service concept, SSI, and DLT to implement SSIaaS platforms and SSI services. Besides, we present an architecture for constructing and customizing SSI services with a set of architectural patterns and provide corresponding evaluations. Furthermore, we demonstrate the feasibility of our proposed architecture in practice with Selfid, an SSIaaS platform based on our proposed architecture.
The model of self-sovereign identity offers tempting benefits as educational systems become increasingly global and as learning spans a lifetime.
Ontario (a province in Canada) just had an election last week and Darrell thinks: Digital ID Can Increase Voter Participation
I’m not an expert on the election process, and this is just my opinion. I’ve been lazy in past elections, and I’d be lying if I said I’ve voted in every one. As a citizen, I believe ease and accessibility have a lot to do with it.
Solution: Election Integrity & Expanded Voter Access w/ blockchain voting & Self Sovereign Identity https://tiktok.com/t/ZTdvvX1uy/
while SSI principles incorporate similar notions to the provisions and principles in the GDPR, closer analysis shows that they might have different meanings.
1/ Can QUIC use DIDComm as a Handshake protocol instead TLS1.3? The spec provides enough abstraction for the session handling, and most crypto operations are the same. The main difference is the trust architecture and model: certificate chain vs DID Documents.
- Identity Terms Provide Value along the Supply Chain: How We Know When to Buy the Farm Jessica Tacka, Transmute
Supply chain credentialing in the form of bills of lading, certificates of origin, or letters of credit is used to protect honest parties and their merchandise from being confused with dishonest parties or entities that are engaged in unethical practices, such as environmental destruction, or forced labor.
-
SSI Essentials: 35 use cases of decentralized identities that will make your life easier
-
The Importance of Verifiable Credentials to Training Providers Credivera
Great report!
Digital badges or PDF credentials lack proof of being authentic and current, and can be easily reproduced or falsified, impacting both the individual and the reputation of the training provider.
-
How badges can change the world WeareOpen
-
This model […] shows how systems have a lifespan and what happens as that lifespan peaks.
As one system begins to deteriorate, a new system begins to emerge. This got us thinking about how this model applies to the world of Open Recognition.
SSI Fixes This
- Why Location Data Brokers Put All Communities At Risk Zach Edwards M2BA
New work that may leverage decentralized ID from the supply chain side of things…but not sure (lots of links inside on data brokers harm)
- How LEIs streamline KYC Ubisecure
Ubisecure brought innovation to the LEI market by automating LEI issuance. Revolutionising how quickly and effectively an LEI can be registered. While improving data accuracy along the way by connecting directly to business registries globally. This innovation has helped RapidLEI to become the #1 LEI Issuer globally, issuing about 1 in 4 new LEIs monthly, in just 3 short years.
In Part 1: The Two Loops Model for Open Recognition advocacy, we talked about how as one system begins to deteriorate, an alternative begins to emerge. We know the alternative system, one that integrates credentials with other forms of recognition, is better for everyone. Without that integration, cold-hard credentialing supports outdated power dynamics.
- Transferable Accounts Putting Passengers at Risk Phil Windley
The non-transferability of verifiable credential is one of their super powers. This post examines how that super power can be used to reduce fraud and increase safety in a hired car platform.
- The impact of self-sovereign identity on the cybersecurity world
- SSI and FIDO2: Different approaches for a passwordless world
- Can digital identity help with the world refugee crisis?
In proving that tamper-proof health data could be issued to travelers by their health providers and be verified by airlines and other countries without having to check back in with the health provider, Cardea has laid the foundation for something much bigger than Covid testing. Verifiable credential technology provides a way for all kinds of health data to be shared in a privacy-preserving and security-enhanced way.
I see what we’re doing in self-sovereign identity as further reducing the costs of business/transactions. And this incremental value value is achieved by reducing trust costs across silos.
- A Digital Staff Passport for hospital facilities, DIZME voted best solution at SHACK22 hackathon Infocert
The hackathon held by INTEROPen, a leading organization to support & accelerate the delivery and adoption of Interoperability Standards in health & social, in partnership with NHS (National Health System) was aimed at developing innovative solutions for the management of access and safe mobility of staff in hospital facilities.
The evident solution is to imbue connected entities with unique, tamper-evident, self-sovereign, Decentralized Identifiers (DIDs), developed by the W3C, anchored in a decentralized trust network. For MOBI’s community, this is the Integrated Trust Network, or ITN.
- Identity is the sum of a lot of individual parts that, when pieced together, paint a comprehensive and multi-layered picture of who someone truly is
- Zaisan’s my.D platform leverages blockchain technology to provide a comprehensive digital identity management solution
- My.D enables a cost-effective and efficient management solution for an individual’s digital credentials
- Digital Identity: It’s All About Authenticity video from GLEIF
Through the creation of the verifiable Legal Entity Identifier (vLEI), GLEIF has created a universal system of organizational identity that answers this need. The vLEI enables instant and automated business verification for all legal entities and their official representatives
“There will be no Green Energy Transition without full digitalization. There will be no EU data strategy without data sharing. Data Spaces can answer to both challenges at once, being Energy one of the flagship use cases.” Javier Valiño — Atos
Discussed the approach and the implementation challenges of drone pilot credentialing for air safety using verifiable credentials at the July 21, 2022 Ecosystem Foundry Working Group of the Trust Over IP Foundation.
-
Decentralized Identity of Things Winner Microsoft Decentralized Identity Hackathon
-
DIDoT - DID of Things. Decentralized Identity of Things. Allergen management in food shopping. Based on the concept of ‘things’ having verifiable credentials.
-
Supercharge your Job Search with Next-gen Tech results of Affinidi hackathon
They came up with impressive submissions, ranging from job portals showcasing verified jobs and companies to scam alert verification features.
- Energy Web and Volkswagen deliver 24/7 renewable energy charging solution for electric vehicles: Solution enables EV owners to charge from specific power plants and match their charging session with close to real-time production from renewables
The purpose of this project has been to showcase that advanced EV charging solutions can empower EV owners to set their own preferences for when and where they get their energy. For instance, they can select to charge using wind and solar resources, from energy assets within a 10 km radius, and target 80% charge by 5 pm — all from within a user-friendly application, with an accurate breakdown of their session’s carbon footprint
-
How Blockchain Technology and Self-Sovereign Identity Enables the New Normal of Remote Learning, Training and Working Md Sabbir Hossain
-
An autonomous reputation system reb00ted
we need to figure out how to give more power to “better” actors within a given community or context, and disempower or keep out the detractors and direct opponents. All without putting a centralized authority in place.
how can something as complicated as the international supply chain take fundamental trade practices and marry them with innovation so we can move at the speed of digitization? Join us for a mind-blowing discussion with Karyl Fowler, CEO at Transmute
the implementation of granular security measures to protect that data creates trusted networks between governments and the citizens they serve. Everyone wins.
we invite you to build hyperstructures with us with focus on NFTs, on-chain music ecosystems, a new generation of DAOs and Zora’s vast ecosystem of tools and smart contracts.
In this edition of the Vienna Digital Identity Meetup we open our 4th year with a couple presentations and a discussion on how Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) are starting to make inroads and impact in the global supply chain. GS1 is the global association for supply chain identifiers with members across all industry sectors and interacting (unbeknownst) with general consumer on a daily basis. Transmute a foundational member of the DID/VC community and a participant in the US DHS Silicon Valley Innovation Program’s cross-border shipping use case.
Slide Decks:
- Transmute Deck: thedinglegroup.com/s/Transmute_Vienna-Digital-ID-Forum-Jan-2022.pdf
- GS1 Deck: thedinglegroup.com/s/2022-01-24_ViennaDigitalIdentityPhilA.pdf
UNECE UN/CEFACT White Paper
- eDATA Verifiable Credentials for Cross Border Trade
- How DID and SSI will Transform the Travel Experience Market Phocuswire
Over time the evolution of DID/SSI is likely to be a travel industry game-changer, enabling travelers to manage their own personal information to maximize personal economic effect and protect personal privacy.
The DID/SSI effort is already gaining a foothold in the banking and medical industries. Like travel, these are sectors that need to engage with consumers of all types en masse while requiring proof of identity prior to the certified exchange of digital documents.
Energy Systems
New features include credential revocation and expiration, full support for role-authorised issuance, credential issuance based on email verification and asset administration as well as better alignment with the W3C’s Verifiable Credential Standards.
- Unlocking the Potential of Self-Sovereign Identity for Enterprise with Energy Web Switchboard EnergyWeb
At Energy Web we believe self-sovereign identity (SSI) will become a fundamental pillar of the energy transition, enhancing interoperability and strengthening security for billions of assets, organizations, and customers.
Travel
As chair of the Hospitality and Travel Special Interest Group within the Decentralized Identity Foundation, Price is one of the leading voices on how DID and SSI will impact all sectors of travel.
At Phocuswright Europe, [Nick] Price explains how this technology – and the trusted, permissioned, secure communication it enables - will change the way suppliers and travelers interact and eliminate impediments that exist today.
Guests can reclaim, re-use and protect their personal data, the "Traveller ID", within the ecosystem of participating hotels.
The Traveller ID and other credentials in this solution are Atala PRISM Verifiable Credentials on Cardano blockchain - a global first for hospitality.
Essentially, the TSA wants a CAT2 system that confirms and displays passenger information, including flight reservation information and pre-screening status, to TSA operators, and that uses facial recognition to match travelers to their photo ID.
The story focuses on critical trade verifiable credentials being issued, presented, and verified by trade, CBP, and PGAs.
signature can now be done on mobile devices such as smartphones and tablets with the new NSUITE.mobile product, with a consequent streamlining of the entire process.
ETO uses a network of distributed digital identities (DIDs) and verifiable credentials (VCs). A side benefit from the perspective of human Internet users: they regain data sovereignty over their personal data. [github]
- War Against the Robots – Pick your Side with SelfKey & Metaproof Platform SelfKey Foundation
Trying to ban or sideline bots is not a solution. The solution is to distinguish bots from humans so that humans can do human stuff and bots can do bot stuff.
- Creating a culture of recognition We Are Open co-op
Too often, though, these badges focus on credentialing rather than recognition. Open Recognition is the awareness and appreciation of talents, skills and aspirations in ways that go beyond
-
OpenEarth partners with BCGov to develop a digital trust marketplace for climate accounting OpenEarth Foundation
OpenEarth Foundation partnered with the Mines Digital Trust initiative to allow BC companies to also share their greenhouse gas (GHG) emissions credentials to the OpenClimate platform so that they can be integrated into BC’s subnational climate inventory and showcased to interested purchasers and civic society
This article explains how verifiable credentials can be used to benefit event organizers and visitors alike based on a practical usage of the Lissi team.
- Orie Steele @OR13b via Twitter
The Content Authenticity Initiative one of Orie’s favoriate Use-cases for VCS
Yes, verifiable authentic human content is important. I also think cryptography can provide better transparency for synthetic content. It's one of my favorite applications of W3C Verifiable Credentials.
-
Credivera @crediveratech via Twitter
We Credivera are Having fun at the #NSCExpo
“recently launched LearnCard, a digital wallet for education and employment programmable verifiable credentials”
Since the same data is required and utilised by everyone, blockchain-based SSI can satisfy the demand for general service for data without creating competition while also adhering to legislation and consumer expectations around data protection.
the solution has allowed CaixaBank, at the request of a fictitious user, to issue an account ownership credential and, subsequently, this credential has been used to proceed with the direct debit of the invoices of Aigües de Barcelona
- HUMBL @HUMBLPay via Twitter (ANN
using verifiable credentials in their wallet.
#HUMBL x GF2GO - San Diego, CA - Pilot Program: New search engine, mobile wallet, verifiable credentials and delivery technologies.
- Why self-sovereign identity will increase university demands for a future in lifelong digital credentials BiometricUpdate
Biometrics Update running a series by cheqd CEO Fraser Edwards
Supply Chain
- Transmute @TransmuteNews via Twitter
The "[Fake] 30TB hard drive" investigation shows the real impact verification could have on #eCommerce. #verifiablecredentials
- The Phygital Future of the Supply Chain Next Level Supply Chain Podcast with GS1
The digital and physical world are merging more than ever before. As the supply chain becomes more ‘phygital,’ innovative ways of sharing data – like using verifiable credentials – are helping to build more trust with data along the supply chain. Join us as we chat with Senior VP of Innovation & Partnerships at GS1 US, Melanie Nuce, as we explore what’s around the corner and how standards play
CLIENT CREDENTIALS FLOW
Auth URL https://example.com/authorize
Token URL https://example.com/oauth/token
Scopes
resolve:dids - Grants permission to resolve DIDsissue:credentials - Grants permission issue Verifiable Credentialsverify:credentials - Grants permission verify Verifiable Credentialsread:credentials - Grants permission to get Verifiable Credentialsupdate:credentials - Grants permission to update the status of Verifiable Credentialsprove:presentations - Grants permission to prove Verifiable Presentationsverify:presentations - Grants permission verify Verifiable Presentationssubmit:presentations - Grants permission to submit Verifiable Presentations
- EricTang.eth Twitter
Tweet of the week (emphasis ours)
Self sovereign online identity is going to be a CRITICAL tool for everyone on the internet. Without it, we will lose trust of any content on the internet due to AI advancement in the next 12-24 months.
This one of the most urgent issues in our society today.
Most Refugees and IDPs did not have the time to properly prepare by gathering all their important documents such as passports, identity cards, driver’s licenses, and land titles or rental agreements. Fleeing your home may save your life, but fleeing without identity documents can lead to a very long wait – sometimes a decade or more – before your life is stable again.
Until now, we relied on physical id document such as ID cards driving licenses to identify ourselves in the real world as well as online. Digital attributes and credentials were solely used online. Digital identity wallets, like the IDnow Wallet, are about to change that, as they are simultaneously addressing our digital and real-world requirements by bringing physical and digital credentials together.
The global supply chain management market size was valued at USD 10.1 Billion in 2020 and is projected to reach USD 19.3 Billion by 2028. Supply chain is the path for any product such as food, clothes, or appliances to go from where it was a produced, to distributors, procurement officers (quality inspections), and the market.
Similarly, a battery passport is nothing but a presentation of data points about a particular battery – who manufactured it, its physical and chemical composition, its current state of health, whether it was refurbished or repurposed from another battery, and so on.
-
Creating trust in assertions, claims and the authenticity of the original content LICCIUM
-
The Block Space @theblockspaceio via Twitter
we believe that education should evolve, apadt and adopt the latest technologies available such as #Web3. Let's talk about why self-sovereign identity will increase the demand of educational institutions for a future in lifetime digital credentials
“Verifying applicant career records can take days, weeks, if not months, to complete," said Dror Gurevich, founder and CEO of the Velocity Network Foundation. "Hiring methods are severely outdated to the point that one in three Americans have admitted to lying on their resumes, which slows the hiring process immensely.
“How to have an enterprise Decentralized Identifier (DID) when an employee 👨💼👩💼 can act on behalf of this company 🏢 with flexible permissions layer in a decentralized or peer-to-peer way?” [delagation]