decentralized-id.github.io/identosphere-dump/companies
2022-12-24 00:35:23 -05:00
..
avast-evernym-securekey update and sort 2022-12-24 00:35:23 -05:00
IAM update and sort 2022-12-24 00:35:23 -05:00
ssi update and sort 2022-12-24 00:35:23 -05:00
analyst.md move for easier to think this way 2022-12-12 06:09:55 -05:00
apple.md move for easier to think this way 2022-12-12 06:09:55 -05:00
google.md move for easier to think this way 2022-12-12 06:09:55 -05:00
README.md update and sort 2022-12-24 00:35:23 -05:00
winners.md move for easier to think this way 2022-12-12 06:09:55 -05:00

Companies

  • Microsoft - Azure / Entra
  • Acquisitions
    • Avast-Evernym-SecureKey
  • Analyst Firms
    • KuppingerCole
    • Forrester
    • Gartner
  • Apple
  • Google

RootsID

covers our work with DIF, Trust over IP, and attending Consensus 2022.

Thrivacy

RIF Identity

  • A back-end authenticating users by their wallet addressed - their Decentralized Identifiers.
  • A registration model capable of requesting users for data stored in its user-centric cloud storage, the Data Vault.
  • A front-end capable of interacting with any wallet that the user chooses, with a pre-designed user experience for registration and login.
  • Compatibility with a unified platform where the user can control their identity and information, the RIF Identity Manager.
  • Roadmap to Institutional Adoption of DeFi RSK - Coinfirm

    The most recent FATF updated draft guidance from March 2021 introduces significant changes to the legal definition of DeFi platforms, expanding the types of entities that fall under FATF's umbrella. In this guidance, FATF defines most operators of decentralized finance platforms as “Virtual Asset Service Providers” that have AML/CFT obligations.

  • @ilanolkies shares: Okey, so, today I mapped the work done in the last 3 month by @rif_os about Self-Sovereign Identity protocols in a single link https://github.com/rsksmart/rif-identity. All compatible with existent protocols and fully integrated into @RSKsmart blockchain. The future is one step closer.

  • A repository of JSON Schemas for Verifiable Credentials

    The Credential Schema is a document that is used to guarantee the structure, and by

itheum

When “leased out”, the other party can access your personal data — in this manner, the NFMe ID acts as an “authorization key” that allows third parties to use your data in a fair way to generate a shared value between the third party and the owner of the data.

 Dhiway

Video: #MARK Studio - Create tamper-proof, secure and globally verifiable digital credentials instantly Dhiway Networks

5ire

Exostar

SICPA

Short promo User Journey videos

FuixLabs

Sideos

sideos is a simple data ecosystem backed by a new web standard: self-sovereign identity, or SSI.

 Wider Team

It starts with IdentityOps embracing high assurance for connected devices. Youre bringing together internal stakeholders from your network management, security, procurement, legal, and device care teams. Youre bringing in clinical outcome quality professionals concerned with data provenance, from clinicians who touch your devices and authenticate through them and authorize them to provide services.

Gravity Earth

Gravity and Tykn are pleased to announce our continued collaboration to advance the interoperability of our two distinct decentralized identity solutions for improved identity management in the humanitarian sector.

Cardano

"The vision of the company is to improve the systems of the world for everyone everywhere, and the places that need better systems aren't necessarily Berlin or New York City. So you have to go to places that are a little more difficult, and you have to be very careful as you do it."

Gimly

About Dick Hardts new thing

Gimly ID is leading self-sovereign identity innovation, with the implementation of SSI with self-issued openID provider (SIOPv2) and full support for openID connect and DIF presentation exchange.

Mobix

Digime

Julian describes digi.mes mission of empowering people with their personal data, as individuals know where all their data is, while they also have “a right for that data”. By having that knowledge and ownership, only individuals have “unlimited usage rights” to unlock the potential data has to be a force for good.

Key findings from the report are:

  • Users sacrifice privacy and security for access to valued services
  • Smartphone users begin to sense improvement in the mobile environment
  • More and more users take protective steps, but remain exposed to harm
  • Protective actions do not necessarily drive confidence
  • Cost, knowledge and perceived complexity are key barriers
  • Transparency and control are key values for users

 Entrustient

"When building product-market-fit for our platform, we listened constantly to frustrated customers who embraced the concept of SSI, Verifiable Credentials and Blockchains, but who gave up on piecemealing a solution. And the reasons were mostly due to the lack of specialized SSI developers, implementing complex SDK's and code builds, and trying to provision onto blockchain networks,"

Swisscom

This isnt Swisscom Blockchains first identity partnership. It also has a relationship with Adresta, which developed a digital identity solution for watches.

Merit

The company spent the last five years working with various governments to build connectors to these licensing databases to allow third parties to access the data and have it update automatically. So if you are a plumbing company, you can display your employees plumbing credentials on the company website and have them update automatically when the license is renewed (or show that it wasnt).

Cryptalk

  • CrypTalk is a messaging service designed to bring together verified projects and potential investors by creating a safe and secure crypto space. Crypto projects undergo thorough verifications and a number of security measures before being verified by CrypTalk.

Fujisu

As for the near future, Fujitsu envisions enhancing the distributed identity, data privacy, and consent management platform, which would open up all of the benefits described in this article on an as-a-Service basis to any player.

To resolve the complications, Fujitsu says it collaborated with the Keio Research Institute at SFC on a digital identity technology in September 2021, which resulted in an identity conversion gateway that enables multiple identity infrastructures to be interconnected without using a unified protocol.

Civic

Now, were making Civic Pass available to developers everywhere. The idea is that developers can plug Civic Pass into their platform and create an identity layer that allows for a permissioned dApp platform, be it a DEX, an NFT marketplace or mint, a metaverse, or who knows what else youll come up with.

Omidyar

Insights from a year-long evaluation of our Digital Identity program

Bloom

Beyond OnRamps direct data integrations, the platform also supports the ability for third party credentials to enter the OnRamp platform via the WACI specification

Block

Block is a new name, but our purpose of economic empowerment remains the same.

5 years after establishing Decentralized Identity at Microsoft, where I had the opportunity to work with great folks developing open source DID infrastructure (e.g. ION), standards, and products, I am joining Square to lead Decentralized Identity.

Authenteq

  • Identity Masters Podcast

    At Authenteq, we spend a lot of time thinking and talking about how to make the internet a safer space. Its also what drives our product roadmap and why we got into identity verification and e-KYC in the first place. As we work to democratize the knowledge we have access to, we know that for it to be truly accessible, we have to work with different formats. This is why were very excited to introduce the brand spanking new Identity Masters podcast now available on Spotify!

  • The Benefits of Automating Your Employees Identity Verification

darkmatterlabs

Self-sovereign objects are are self-executing and self-owning; capable of determining their own lifecycle to maximise material utility and performance whilst minimizing negative environmental impacts. Augmented by sensing capabilities and the ability to autonomously execute smart contracts, material objects could continuously monitor their own performance and contract for their maintenance, repair or recycling.

Elastos

  • Elastos DID: Whats Ahead for 2021

    Tuum Tech is working on an Elastos DID-based application called Profile, a rising competitor to LinkedIn in large part by leveraging Elastos DIDs. Unlike in conventional applications where data and identities are managed and controlled by centralized systems, users will retain full ownership of their data when using Profile.

Tru

  • Tru.net is live and ready for communities/users

    If you are looking for an alternative to Facebook that uses DIDs as its foundation and other protocols that are free to use (JLINC Kaliya highly recommend Tru.net

IDPro

Onfido

Chipper Cash has become the latest financial institution to adopt Onfidos identity verification technology. The company currently operates one of the largest money transfer platforms in Africa, and is hoping

IDWorks

GAIA-X

ShareRing

  • Blockchain platform enables users to pay for Viator experiences with crypto

    The ShareRing platform, built on Tendermint, will allow users to book, register, and pay for Viators 395,000 global activities and experiences, using local fiat currencies or major crypto assets, including Bitcoin (BTC), Ether (ETH), and its native SharePay token (SHRP).

    The platform uses the ShareRing ID system to ensure that sensitive personal and financial information is securely handled, and has contact tracing features to help with tourism safety during the pandemic.

  • ShareRing Unites with Chinas International Blockchain-based Service Network (BSN)

    BSN aggregates their technology partners services into their cloud-based ecosystem to make them all accessible to any company or developer that wishes to use them, with very low monthly access fees starting at just $20. Their “plug and play” approach eliminates the need for hiring or outsourcing highly specialized developers, who are in short supply due to high demand in this industry.

    One of the most exciting benefits of ShareRings integration with BSNs global ecosystem is how effortless it will be for companies to incorporate our products and services without requiring ShareRings assistance with development and integration.

Gluu

  • Gluu vs. Keycloak Mike Swartz talks about the difference between his product Gluu and Keycloak, which he describes as a less stable project that shouldnt be used in production environments.

Talao

Blockchain-based Digital Identity specialist Talao, a Paris-based startup which focuses on Self-Sovereign Identity options and blockchain-based options is the developer of the primary French smartphone pockets for Self-Sovereign Identity. The firm simply introduced the provision of its new id pockets for all cellular customers in Europe.

  • Work on Android and iOS
  • Wallet DID: did: tz, did: key (curve Ed25519)
  • Issuer DID supported: did: tz, did: web, did: key; did: ethr, did: pkh.
  • Revocation of VCs: RevocationList2020
  • SDK development environment: PHP, Python, NodeJS, java, C, Flutter,…
  • Wallet templates: employer certificate, experience certificate, skills certificate, company pass , proof of email, proof of telephone, certificate of residence, loyalty card, diplomas, student card

Shyft

Identity has been a contentious point for humanity ever since we evolved societies. How are we sure that someone is who they say they are?

IAMX

insights on what IAMX does, how can users and telcos can benefit from it, and why would users be interested in and trust IAMX. Later we talked about the recording and securing of biometric information. IAMX is having an ISPO

Zetrix

Vereign

For the realisation of the three projects, Self-Sovereign Identity will be a quintessential technology. A decentralised identity is supposed to allow users more self-determination in regards to identity data by putting the user in charge of the storage and transfer of their data. The data is only stored in a so-called wallet which belongs to the user. The wallet also contains digital keys for the authentication with services making individual profiles for each service obsolete. State-of-the-art Blockchain technology ensures the reliability of the used data. Vereign AG, the head of the consortium, has been working with and on this technology for quite a while already. DAASI International will lend their expertise in the development of innovative open source software, as well as in classic identity management authentication technologies, and help with the development and overall realisation of the project.

AyanWorks: @ayanworkstech is excited to announce that we, along with our partners Vereign and @DAASI_Int, have won 3 tenders from @gaiax_aisbl to build SSI solutions

Publish

PUBLISH CEO Sonny Kwon gave an overview of a press ID app PUBLISH is building in collaboration with the Journalists Association of Korea (JAK). He explained that the mobile application, which leverages decentralized identity (DID) technology to manage press credentials, would help the JAK combat misinformation and reduce administrative costs associated with its current press credentialing process.

PUBLISHiD users will further be able to assemble collections of verifiable credentials from one or more issuers into a single verifiable presentation. Other features include DAuth-based authentication, single-sign on (SSO), and an agent ID service capable of handling the management of and security between credential issuers and verifiers.

Bosch

Bosch will now also systematically transfer the self-sovereign identity (SSI) principle to the B2B sector in other words to business relationships between companies. A further step will involve transferring it to secure and trustworthy interactions between machines.

In cross-border and migration contexts, digital wallets promise to have wide ranging implications for global governance, especially in identity management and finance. In this brief Margie Cheesman outlines use cases as well as concerns and risks when it comes to their adoption in the migration sector.