decentralized-id.github.io/_posts/application/2023-06-16-use-cases.md
⧉ infominer 9b96beaa02 sort
2023-07-02 01:34:11 +05:30

34 KiB
Raw Blame History

title description excerpt layout permalink canonical_url categories tags last_modified_at
SSI Use-Cases Industries are already digging in. Here are some of the most visible and promising use cases. The general problem statement here is, as you will have noticed, not about proving who you are but about proving what you are. I need to know you have a line of credit, a pilots licence or a diploma from a top ten dental school. I do not care who you are single application/use-cases/ https://decentralized-id.com/application/use-cases/
Uses
Content Attribution
Events
Climate
Bots
IAM
Reputation
Workplace
Energy Systems
Property Management
Gaming
Business
Career
Security
Banking
Loyalty Programs
2023-06-18

General

  • A Solution Looking for a Problem? Digital ID Solves a Million of Them 2022-08-09 David Birch, Forbes

    The general problem statement here is, as you will have noticed, not about proving who you are but about proving what you are. I need to know you have a line of credit, a pilots licence or a diploma from a top ten dental school. I do not care who you are, unless something goes wrong, it which case law enforcement or professional bodies take over.

    Here, then, there is most definitely a problem looking for a solution and we already know what the solution is: verifiable credentials (VCs).

  • 25+ Proof of Concepts (PoCs) for Verifiable Credentials 2021-05-20 Affinidi

    Today, we proudly present another 25+ Proof of Concepts for VC implementation. These use cases are a compilation of the submissions (in no particular order) made by the participants of the Affindi PoCathon 2021.

  • Self-Sovereign Identity: More Use Cases 2021-04-22 BankInfoSecurity Heather Dahl and Ken Ebert of Indicio

    In a video interview with Information Security Media Group, Dahl and Ebert discuss:

    • The evolution of Indicio.tech from the Sovrin Foundation;
    • Key initiatives in implementing and testing decentralized identity;
    • How a decentralized workforce is accelerating the need for identity management.
  • 26 Suggested Use Cases of Verifiable Credentials (With Some Real-World Examples) 2021-04-15 Affinidi

    we hope that business leaders, entrepreneurs, and developers will use this article as a guide to create some breakthrough solutions that will benefit the society at large.

  • How Exactly Are Verifiable Credentials Making the World Better? 2021-01-05 Stepan Gershuni

    6 stories of how verifiable credentials can improve the lives of every day people:

    Ajay is an Uber driver in San Francisco. He wants to try various temporary jobs while hes studying but joining Lyft, Postmates and other platforms requires going through a long and tedious background verification and car certification process over and over again.

  • Digital Identity Isnt Only For People 2020-12-22 David Birch, Forbes

    fintechs and regtechs looking for opportunities in the digital identity space should cast their ideas net pretty wide. Digital identities are not only for people and the future desperately needs digital identities for pretty much everything to underpin recognition, relationships and reputation (the 3Rs of the online economy).

  • 5 Promising Use Cases for Verifiable Credentials 2020-12-05 Hackernoon

    several industries are already digging in. Here are some of the most visible and promising use cases.

  • SSI Essentials: 35 use cases of decentralized identities that will make your life easier 2022-04-07 Gataca

    It is not farfetched to assume that we all strive to perform routine activities in the most simple and efficient way. This can include relatively easy activities such as logging in to your student/employee portal and shopping online or slightly more complex activities such as opening a bank account, renting an apartment, or applying to a masters program or job.

  • How to Convince Dad* of the Importance of Self-Sovereign Identity *and your sister and your daughter and your best friend and your nephew 2018-12-12 rwot7

    This paper addresses that need by offering arguments to a variety of people who might be reluctant to use self-sovereign identity, uninterested in its possibilities, or oblivious to the dangers of centralization. By focusing on the needs of real people, we hope to also encourage developers, engineers, and software business owners to create the apps that will address their reluctance and fulfill their needs, making self-sovereign identity a reality.

Use Cases

Career

  • Coming soon — a resume-validating blockchain network for job seeker 2022-10-05 Computer World

    "Verifying applicant career records can take days, weeks, if not months, to complete," said Dror Gurevich, founder and CEO of the Velocity Network Foundation. "Hiring methods are severely outdated to the point that one in three Americans have admitted to lying on their resumes, which slows the hiring process immensely.

  • How Blockchain Technology and Self-Sovereign Identity Enables the New Normal of Remote Learning, Training and Working 2022-08-06 Md Sabbir Hossain

    This model lets the identity owner easily organize a unique, verifiable learning path from a wide variety of resources to powerfully prepare for a particular job. Similarly, employers can encourage job candidates to complete recommended learning paths for certain roles, ensuring that they enter the organization with the right skills and verifiable competencies. Or, employers can upskill employees by designing curriculums that draw upon a diverse variety of online courses, university or community college programs, coding academies, or other competency evaluation frameworks. Any course that is completed, a certificate that is earned, or work experience that is gained will produce a verifiable credential that can be shared with any other entity that uses a compatible self-sovereign identity system.

  • Trusted Career Credentials 2022-02-11 Dr Gordon Jones

    Today, even in this digital world that has expanded over the past two years, the job market still relies on self-reported attributes, records, resumes, and/or LinkedIn profiles, that individuals share with employers or recruiters as the source for applicants and employee data.

  • Blockchain and the Decentralised Workforce 2021-05-01 WorkforceFuturist

    For workers, life-long learning will be a big theme and there will more opportunities to earn and learn. We will ditch the CV/resume and use digital credential wallets, as we will for other personal data e.g. health, financial, identity. There will be greater competition for our time and attention, where work and leisure overlap.

  • Self sovereign career identity 2020-11-16 Meg Bear Diginomica

    The Velocity piece is a way for me as an individual to own my credentials, to say, these are the things that I know. And these are the things I've done. And if I can own that, I have a lot more interest in it. And I can use it in a lot more interesting ways. In the past, that might have just been something that I built as reputation within a company, I can now make that a more dynamic and portable reputation I can take with me anywhere.

e-Commerce

Content Attribution

Events

  • Event tickets as verifiable credentials 2022-09-22 Lissi

    This article explains how verifiable credentials can be used to benefit event organizers and visitors alike based on a practical usage of the Lissi team.

  • [literature] Exploring the use of self-sovereign identity for event ticketing systems 2022-07-30 Simon Feulner, Johannes Sedlmeir, Vincent Schlatt, Nils Urbach

    Our findings demonstrate that SSI-based event ticketing can enable efficient secondary market control by facilitating a practical implementation of the centralized exchange model. To generalize our results, we derive design principles for the efficient, reliable, and privacy-oriented ticket and identity verification and the use of revocation registries.

Notarization

  • Digital Notarization Can Kickstart Digital ID Ecosystems (with Dan Gisolfi) 2022-09-08 Northern Block
    • The missing role in the trust triangle: The Examiner.
    • using attestations from multiple issuers helps to create more trust.
    • How Issuance can become a business model for many trusted service providers.
    • Some challenges with the mDL (ISO/IEC 18013) standard.
    • The benefits of using a Microcredentials approach.

Energy Systems

  • Digital identities building block for an automated energy system 2022-09-02 Smart Energy

    New features include credential revocation and expiration, full support for role-authorised issuance, credential issuance based on email verification and asset administration as well as better alignment with the W3Cs Verifiable Credential Standards.

  • Use Case: American Electric Power 2021-05-11 IDRamp

    What kind of strategy will take you to being a next-generation utility company? For AEP Ohio, a large electric utility company based in Columbus, this challenge began with a comprehensive review of their entire ecosystem and which identified their key pain points for innovation.

Reputation

  • Digital Identities Will Change The Nature Of Online Reputation 2022-08-30 Alastair Johnson, Forbes

    This could then act as a form of universal Verifiable Credentials (VCs) that would be acceptable for any platform to confirm who someone is but wouldnt give access to any information that an individual elected to restrict. As an individual demonstrates experience, earns certifications, or expands their credentials, this digital identity would instantly reflect that, evolving an online reputation.

  • [Video] SSI & Proof of Reputation 2022-04-14 Catalyst Swarm

    Join Frank Albanese (Snapbrillia), Lance Byrd (RootsID), Nick Mason (ProofSpace), Niels Kijf (Design Academy), Patrick Suzzi (F8 OSDE), Juan Sierra (HERG), Zoéys Welt, Brian Harper, Ashton Engberg, Ninh Tran (Snapbrillia) and many others as the community discusses the different what is SSI & Proof of Reputation and why it matters.

As a Service

  • Self-Sovereign Identity as a Service: Architecture in Practice 2022-06-02 Yepeng Ding, Hiroyuki Sato, University of Tokyo

    We propose a practical architecture by elaborating the service concept, SSI, and DLT to implement SSIaaS platforms and SSI services. Besides, we present an architecture for constructing and customizing SSI services with a set of architectural patterns and provide corresponding evaluations. Furthermore, we demonstrate the feasibility of our proposed architecture in practice with Selfid, an SSIaaS platform based on our proposed architecture.

  • Credentials as a Service Providing Self Sovereign Identity as a Cloud Service Using Trusted Execution Environments 2021-10-04 Hira Siddiqui, Mujtaba Idrees, Ivan Gudymenko, Do Le Quoc, Christof Fetzer

    With increasing digitization, more and more people use their identification credentials for accessing online services; which increases concern for data privacy. To ensure user's privacy, alternate credential management schemes must be adopted. Self-Sovereign Identity (SSI) is a form of credential management where users are in charge of their credentials. Privacy-critical data is stored at the user's end and they can choose to do selective disclosure of minimal required information to access services. Currently, SSI solutions are not being widely adopted by service providers and the ecosystem is fragmented. One of the reasons for the lack of adoption is the need for maintaining private infrastructure for credential issuance, as critical user information is to be handled during credential issuance. To cater to this, we present a solution that enables the service providers to run their credential issuers on public cloud - a so-called Credentials as a Service (CaaS). CaaS issuers run inside Trusted Execution Environments (TEE) enabling credential issuers to ensure user's privacy while enjoying the flexibility of the pay-per-use cloud model. CaaS can pave the way for making SSI credentials ubiquitous in identity management solutions.

Account Managment

  • Transferable Accounts Putting Passengers at Risk 2022-06 Phil Windley

    The non-transferability of verifiable credential is one of their super powers. This post examines how that super power can be used to reduce fraud and increase safety in a hired car platform.

Security

  • Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests” 2022-03

    If there was a trust framework for police departments and a DID registry for them - the police departments could issue VCs to their officers.

    If you want to se how hard this was/would have been to achieve in earlier technology stacks take a look at conceptual outlines from this NSTIC (National Strategies for Trusted Identities in Cyberspace) developing a trust framework for law enforcement federations done by the Georgia Technology Reserach Institute and the results/learnings.

  • Digital IDs under attack: How to tackle the threat? 2022-01-27 HelpnetSecurity
    • photo attacks based on the presentation of facial evidence of an image of a face printed or displayed via a devices screen.
    • video of user replay attack usually consisting of placing the screen of the attackers device in front of the camera.
    • 3D mask attacks where 3D masks are crafted to reproduce the real traits of a human face and even include eyes holes to fool the liveliness detection based on eye gaze, blinking and motion.
    • deepfake attacks make use of leveraging software capable to create a synthetic video or image realistically representing someone else. Attackers are suspected to have access to a wide dataset containing images or a video of their target.
  • Beware of Digital ID attacks: your face can be spoofed! 2022-01-20 ENISA

    Digital identification is the focus of two new reports by the European Union Agency for Cybersecurity (ENISA): an analysis of self-sovereign identity (SSI) and a study of major face presentation attacks.

  • A Tour Through the OWASP Top 10 2021-10-21 Auth0
    Market issues that we should make sure SSI addresses

A quick look at the refreshed OWASP Top 10 to celebrate Cybersecurity Awareness Month

  • Broken access control
  • Cryptographic Failure
  • Injection
  • Insecure Design
  • Security Misconfiguration
  • Outdated Components
  • ID-Auth Failure
  • Software\Data Integrity Failure
  • Logging\Monitoring Failure
  • Server Side Request Forgery

Banking

  • [Whitepaper] The changing landscape of digital identity by Tata Consultancy Services

    This paper will redefine the traditional relationship between credit bureaus and consumers by offering a disruptive solution to digital identity management through a self-sovereign identity solution based on blockchain. We propose a solution that will place the control of digital identity and consent to the use of personally identifiable information (PII) in the hands of the individual consumer for the first time. The follow-up article will further expand on this concept of the consumer consent hub.

  • Bankings identity problem 2021-08-19 Global Banking and Finance

    Banks have sought to overcome some of these challenges with the use of biometrics such as facial recognition and fingerprints.  These are now more commonly used to login to, or unlock devices, and increase usability, but still leave the challenge of proving the authenticity of a document wide open to abuse.

  • Opening the domestic card rails to innovation 2021-07-29 Meeco

    Of the recommendations in the report, Meeco is especially interested in the inclusion of data as the new currency, mobile wallets and digital identity. These map directly to the work Meeco has had the privilege to explore and validate together with eftpos over the past year. This includes a micropayments Proof-of-Technology using Meeco's multipurpose wallet decentralised on Hedera and a pilot that is now underway with eftpos' identity broker solution, connectID, for credentials verification as part of employee onboarding.

  • MemberPass Digital ID can help Reduce Expenses and Build Member Trust 2021-06 MemberPass

    You can probably use the good news. Its never been easy to run a credit union, especially when you get whacked from all sides. Regulations change, members always seem to want access to another shiny new technology gadget, and financial fraud continues to be a threat. On top of that, weve all had to grapple with the pervasive life-changing effects of the coronavirus pandemic for the past year.

  • Building an SSI Ecosystem: MemberPass and Credit Unions 2021/06 Phil Windley

    Credit unions and their members face the threat of fraud on all sides. And credit unions employ lots of tools to fight it. But ultimately, the problem comes down to the member and credit union authenticating each other. The problem is that doing this securely annoys people.

  • [Video] [Video] New Bank Account Use Case 2021-05-25 Trustblock

    As a user, you should be able to open a new bank account online by providing your digital drivers license, digital drivers license assurance/evidence and digital credit report.

  • Julian Wilson: Self-Sovereign Data meets Open Banking 2021-03-03 Masters of Privacy

    Julian Wilson began his career at Apple in the late 80s [...] joined Ecospend in 2019 to build a self-sovereign data service on top of an Open Banking platform. He describes his role as putting an Internet lens onto product design.

  • A banking approach to decentralized identity and building a credential ecosystem - Mike Brown 2019-01-29 presentation

    Mike Brown is the Director of Product Innovation with ATB Financial, leading their efforts on blockchain-related technologies. With 5,000 team members serving over 725,000 Albertans for the past 80 years, ATB Financial is Albertas largest home grown financial institution. This presentation provides an overview of the work ATB has done to-date through various proof-of-concepts around self-sovereign identity, and their current efforts around developing an ecosystem within Alberta (Canada) around SSI, and more specifically around trusted credentials.

Video Distribution

Property Management

  • A Decentralised Real Estate Transfer Verification Based on Self-Sovereign Identity and Smart Contracts 2022-07-10 Abubakar-Sadiq Shehu, Anto ́nio Pinto, Manuel E. Correia1

    SSI technology enable methods for acquiring verified credential (VC) that are verifiable on a decentralised blockchain registry to identify both real estate owner(s) and real estate property. Second, the smart contracts are used to negotiate the secure transfer of real estate property deeds on the marketplace. To assess the viability of our proposal we define an application scenario and compare our work with other approaches.

  • Apartment rentals and fraud: Discover technology that will ensure trusted content 2022-01-27 Michel Plante

    At the root of the problem is the fact that uniquely identifying a person is hard to do and that people can create fake IDs for themselves quite easily.

  • A brighter future for tenant/landlord relationships 2021-05-26 Domi Labs

    its hard to keep track since some call, some… email, and still others send you a message on WhatsApp.” Going through all of these disparate messages is its own fulltime job!

    Thats why Domi locates all communication about a property in one place, making it easy for tenants and property managers to stay in touch.

  • The Credential Highway - How Self-Sovereign Identity Unlocks Property Rights for the Bottom Billion 2019-05-13

    Why? Because the pieces of evidence that administrative agencies require to register property — things like a survey plan, a notarized will, or a state-issued identity card — may be inaccessible, or may not represent the reality of rights on the ground. As a result, land administration systems end up excluding billions of people.

  • [Report] The Nail Finds a Hammer: Self-Sovereign Identity, Design Principles, and Property Rights in the Developing World 2018-10-18 New America

    Our interest in identity systems was an inevitable outgrowth of our earlier work on blockchain-based1 land registries.2 Property registries, which at the simplest level are ledgers of who has which rights to which asset, require a very secure and reliable means of identifying both people and properties. In the course of investigating solutions to that problem, we began to appreciate the broader challenges of digital identity and its role in international development. And the more we learned about digital identity, the more convinced we became of the need for self-sovereign identity, or SSI. This model, and the underlying principles of identity which it incorporates, will be described in detail in this paper.

Loyalty programs

Smart Cities

  • What does it take to develop human-centric solutions for the built environment? 2022-05-13 MyData [Video]

    Building better, more human-centric solutions in smart cities starts by realising that citizens and their digital footprints are not merely aspects to monitor and evaluate. They are active participants in the cities we live and work together and need to be engaged in designing better cities and managing the data about themselves. This is not important only for respecting citizens rights, but it is crucial to building sustainable services and humane cities.

  • Non-human Personas: Including Nature in the Participatory Design of Smart Cities 2022-01-05 Martin Tomitsch, Joel Fredericks, Dan Vo, Jessica Frawley, Marcus Foth

    this article assesses how the personas method can be adapted to include morethan-human perspectives in the design process. Based on a case study, which involved designing smart urban furniture for human and non-human use, we introduce a framework for developing and employing non-human personas. As a key element of the framework, we describe a middle-out approach for forming a coalition that can speak on behalf of the non-human species that are impacted by design decisions.

  • Catalysing transformative change: new project to produce innovative services in smart cities 2021-09-02 MyData

    “Cities around the world are racing ahead to be smarter by taking ethical approaches to personal data”, explains Teemu Ropponen, General Manager of MyData Global “MyData Global is a centre of excellence for personal data management expertise, with the H3C project we are bringing together city administrations, companies and individuals to find solutions that put people in control of their personal data”

  • Data Co-Operatives through Data Sovereignty 2021-08-15 Igor Calzada

    This article illustrates an open debate in data governance and the data justice field related to current trends and challenges in smart cities, resulting in a new approach advocated for and recently coined by the UN-Habitat programme People-Centred Smart Cities.

  • Training: Building smart cities services 2.0 2021-08 MyData

    You will learn about business models, compliance with complex regulatory regimes, standards, and governance mechanisms. You will be connected with EU funding opportunities, and you will learn how to build successful partnerships with companies and cities

  • Smart cities need user centric digital id to be built on foundational principles 2019-11

    DIACC firmly believes in user-centred digital ID designed to prioritize and require user choice, control and consent regarding access to collect and manage data. As Sidewalk Labs looks to move forward in their work in Waterfront Toronto, we reiterate the importance of these principles as foundational to the empowerment of a digital society that works for all Canadians.

Gaming